Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
e9dcf0ed20aa367943e8e34762cffe3b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e9dcf0ed20aa367943e8e34762cffe3b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9dcf0ed20aa367943e8e34762cffe3b_JaffaCakes118.html
-
Size
10KB
-
MD5
e9dcf0ed20aa367943e8e34762cffe3b
-
SHA1
f8e3ee1e33f01ae1960c8554ae7d1a3edab72932
-
SHA256
9255b30cd25da6d902aad8493033e2796b055b7f0cdd02368c5def32a47d5e22
-
SHA512
b35c06d45f63a765cf5621261c94399fd443aeb5dfda3ee15033b57ec6b800a53d462436c856c03db697586b748efc7971bef59eeb8fe04d1df907608d1ff33e
-
SSDEEP
192:PkpKzrpr2p1WbFrVGWAWkWIHWJ2Khr/FjBFUQW9Y1MuNCQ:PkpKRr2pgxxGWAWkWIHWJ2KF/985O
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432850944" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DD08021-75F7-11EF-91DA-667598992E52} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000008d5331daa68993fb8d8f895c0d7cb6f53475fecd81d23dec00ea9c45c572a8d4000000000e80000000020000200000006bd90ae256684e4775df388b5cca2f64d877b4d1b88ceec3101fe95a01c9f35320000000dd819b3824cd4be2209e0239c1f7c572c1804b0899fb6e3af283c11f23c2e75640000000bdf198d51a812bac437deb48f54275d525fe4e7efa862529eb53e1ec5cc3b518a8bd92d38b4edadbf82a5c308a183b1a34cbe8cef1afde5d1846abddade7ad79 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90539636040adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1296 iexplore.exe 1296 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1296 wrote to memory of 2252 1296 iexplore.exe 30 PID 1296 wrote to memory of 2252 1296 iexplore.exe 30 PID 1296 wrote to memory of 2252 1296 iexplore.exe 30 PID 1296 wrote to memory of 2252 1296 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9dcf0ed20aa367943e8e34762cffe3b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed7e8ea64fcc99e8b513d928dc6bd6b6
SHA11421a89e9aec50d68261212f5851f2cf27d148a7
SHA2566c49b97223d40dc1547ade7f0c2963ee75eb2a34eba01ec2dd998c43a891ad96
SHA512de28e28dd56adac4006f325bf30f9471b46e30ae7e463ef69178ef53edb5c0955e0ed46e5c2d44d85fc8439ccbef6057bdc6c361372d788be6326848fc6efcbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df503ce4870286a490127184e98cbb37
SHA15c97d402efb2c586570c8e4884879bf89773e8dd
SHA256d3b81f2be339a866a65fe3bf9fcdb8d87f664a2ee044a554dff65ffc499440b3
SHA512254d09bc278cb0920b4ac7a4e1172046000d2319b5c27fd6d268dfa61e00824eb7f63d4fb72753e98fff263801b3f5ed15ba7f04ce5d313c0dc4314b46779e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57653acc1e3ab26481a7617faf071f397
SHA1dbe167ac2bd6e68a19f5a49a18fe5b54b7c8819a
SHA256aefd712f82656fda909cc7e60938d36150f5fdf024df80679308b5beccd598fc
SHA512c10b00d06de09c84c150ed83407d7e5a07c8a3980c2e9e891662378f1571d2e06baf8d0a04342b652f6727f604ef4028d7df207f8252e34c4d27faa11b617ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f99a562373528fefd3dc57e79b304f18
SHA1d3127c85c1e71182748170944aed3d8f5afa7022
SHA256124a3b46b27887ed9e4d39ab7f37813cb4df442a0ca956a0a21ea4edc3302e67
SHA51208bdc5dcda7579d061e657553631ec20ee2512bb9c1fa9a7e6654797963f0ea2cc45b4ab5e7b6ac623383688ee1c0906f46dd272f311551c898c633767644571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52647c74e8be87741ec7d33ed97126e60
SHA17768edd949e190369dccb7586f44fa54deb94da5
SHA256024720f1def1b6c5f5041a91fea2456a7ac8d4720a717fdc4eb87b936233b338
SHA512a790bd17bf7c7003836663306633a1aa874e778908f68a1ad7323964c6b54ded9145674f28640bac9b64fe7e2801f30b48224f15be9e785b80ba2b3c15075dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569fdc38622fa1d68d3c098405317020a
SHA1af08f4d86551d4fc53edb5b9ae833bd4589131f7
SHA256a102163771d5957c41bc72aeaa930b14afdf52a849b75f192b12fb47d406b1df
SHA512a180fcbc1de84fdf7a26fd638c3a4c4b70905aa381f0bfc383fcbd6a00c0f31ae16c43177d8d86568e0411b017cece5f7924c00e81839983b3815fa908581305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af4faf2c13a6edd1a20e4f4ebafbd1df
SHA14c011394c3711280ef220686af830cc4bdfe502d
SHA2565acbfe9871bb905a4d0df7b66c7dc6d4d839b8b626ae63b08d7568dff0fcec2c
SHA512989ed60cdf7ce924f241cb51ea913b6197bc9902fe83a27709b67e3142cf64a12e537e542d38096a85a93f8b0c206619219752edd6c1c9bc248b0bf1ed446131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58656fe6c1978c98f2830e75b1c24d863
SHA1e9080f19b9c5f68a0a42f735b091d060770e67ef
SHA256860d5d5bc7438007ebae898a26edc318272f5a647fbfca04cc3f546382f17c06
SHA512c83b7454fbe39a9cd0221cd221d2cd1050144b1efd2b0da8eb019c0084c1f0097121fa34d7ac525fea0031692798e02555b05a277fa08be9441100a91bbd3b62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546ab261d4c9d1baf81c5d258f8e462ba
SHA155de9fd118d0d8591146d3829ebe53363b80e557
SHA256125c6dd407c93c0814faf0ecbf09392fb43b8ad1828b89008902ff3fcc1b375d
SHA5120229951c68f9d833b98f178779cffa6d77345a873b8a29e3e4f0666cd70038a788aba0127f4e4731848b7632370ae404436eda96e825d6eb5aea4267d009a142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dee8755fe095f6435fd03d55ef13b8b
SHA19f00ecd8e1abe5e97e5fde2c3196bd4a7690325c
SHA256b47a7e6858a7ec92ad71a40e0d37ae8d553c6fe4cd4a1dd62ae72d65a133909b
SHA512ae2448e047e92e121fceb2237a2523b1609bbf2c60629250471d810d6bf23d5704cbfed01c0a2932046fa6d4fbd144a07766fe635875cc16afde1f0f4be733f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f98191a60003a90a632a6433a6f7654d
SHA1d82dfe1514094fc403d13eb842efde3aed35a234
SHA2568fdcaabaa368347a2c8134c98dd5f103981e9f70bd3724e8cc037a4cd79f38c8
SHA5121c6905639261d4f1a92e413ca1cccbfbfd08691164cda93777d5cf43db6c14d22213b1e6303133a068d6ad4545296dffd0902dcecec176a96279e5451ef312f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5413d52be5455ed86434ffe407348d448
SHA14652e76e4d135e20530ac8a2a112d3cbf6289121
SHA2568f7f284730e5e89f504f5ebecdfa3397f5ffc0523932512c05f3eadb2d4e22b0
SHA5124b9212e91439ec88bdf000c8fcd871aab4b9169e5672b3105f9f521395b716effbede9a60573bbc1ef3ca5e4cb80eca4d4802600089cb556a1fa5ab3eed31014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2ad49b4c07692da833fd54880bbae65
SHA14fd3943ad276e71c023e45feee2516b349390817
SHA256e139f085550e1b2278ff878bd133c4da3909bdfe85452956eb5eca818d2e4d5f
SHA5126bf7576f822a980bbc48f6aae8ce2dda2ddb6dbab77399ef72f70806640a3ab0568cfe66757e78803783b7f5fb2236f674286e840fe86c79be2b2e29d316cc5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef61b058a3f1ed13855d1ad7f7e777f
SHA1c765db777315c302808f4e94fc6ba17f28ab5111
SHA2563ead56ce396f3a8065b1a7702864cfb8e9048904f89d530e19e497a29987e613
SHA512fdfb50b199c2d6e7cd99d98cc8f0238d76f06fddd42b560883178fe8ba70742447390fed72e8fab6a223495106eb70b9a6f6fa5f0bd02b88d0fc4938ddeb4374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe71090e5bcfc9430564ae73c5eb3bd2
SHA17f594f69af55b63e9693f5b792025ca0ab10f652
SHA256ba0abed5d586ccc3111c3882b5dcf5550c76f40a5a1bb9969a1c6383663362c4
SHA5129dc24ce7e8997f5fdda0ba1b1eb0a60c6ca335048c2ee3b3e29063b446ef9100d9c0076758955ea00abe7dbfe70d28adb6a0045941da033022bd6744896b4b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb7505349d73af1818a8fd611baebb61
SHA1a5b7ab3bbb8589cd213fdbdf342920dba6bc81f7
SHA2563eae6e998ee2b3d0508d6ab0af056105568d7e3086c0e70a664538496e44d35e
SHA512229ed44dc2060380f27684be3d7c387a42ffbce353113fd621b1f3f66d144b1c8867a334849bfa35c0b8550484f47fbefd269c5b5d4321c78026aab3ffdacaaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5556fce5eae8a9537c10c1e4383a54af2
SHA19052e0ec0d3547048dc5f1b681e8f01122e11868
SHA256740b3b546b4e15c9e2997bdcb54ab7955793514efd59f861ea961cf643ed72c5
SHA5129d6efeff6db0cdfda6dc4fa0897f0403e53aeac89bb913e70757192ab10045902ebbca62d4f84528ef65b706963c1cafaa4488595c97a18d4e1ae3a8ce36c9e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55274d9c9a5d1ae1ae7a218188072313d
SHA194f26b6b6008bd43cbc6c35b2f03318418d110c1
SHA2568ae5e5a4433bcc9076db74534881ba7ff2b68855acb9bd645aa46ab48a440c22
SHA512662e54b5b1eccb4171c798fe429b0aa34ee939f85ee7d7fdc7398a00d605c07f66bffc3cca500b16bceebb07195ff7004d0010b8da09aca5218bb0bced5778b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a84542aa166a8d16b4738718c3f0853
SHA1ea87efe36dd186d62dae27f21ad2e21d6c76663a
SHA256e15c9da4d77c9c11ee92b607e16e700a12722452bba718a42e57fcb46f68c425
SHA512044c86f6055c02cafcae2bde6217b99bdd1af453006cedc0345c9f7f51456e75e5e5c0adb132e8b9086d58e41581de086191b508613bbd12937d994745f2a3d7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b