Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:09
Static task
static1
Behavioral task
behavioral1
Sample
ea794e00832f676ecb557c454f5dbb21_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea794e00832f676ecb557c454f5dbb21_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea794e00832f676ecb557c454f5dbb21_JaffaCakes118.html
-
Size
8KB
-
MD5
ea794e00832f676ecb557c454f5dbb21
-
SHA1
59aff324c32b8503b8b9f83c92227c6182643779
-
SHA256
0c37238f034cff9f4e3e56e64d054d83452ed55e3fcef7ba5b8d08dc2259b162
-
SHA512
794ae72c9a94fe0447e1eb16466d51c4a154ff4acf6f8e8752c4f8a3aa8ea65438b23e98f24365f7d73eded3723598cbdb7cd0d084fc0f0e1021c561bfdb22ee
-
SSDEEP
96:uzVs+ux7hzLLY1k9o84d12ef7CSTU3wyqUhoU9gUdlBdvn99JcEZ7ru7f:csz7hzAYS/uf5hV9TdlBdvn99Jb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10733c7c410adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A5BC51B1-7634-11EF-BBB7-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000064e72f50611e6043e640dff7a7abedafd49940c15cb72e3d5d8ece0fec8aea7d000000000e8000000002000020000000e62986461d544b34b46d69133c67e44a2e9d9359f649790fe051690a272f17a02000000079a2a6033ae87f461e6ebae0a19d8de809e9ad94a51727a323f0792dcea966fc40000000740b98175b6d53603386ba224f9f873367583ee8ba4413750654a7cb5b2bfaf5d99e6a5d6d40063c951cfa5e9f6b896c268d79d554b5216086e8957086fc66df iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000a28c0358af8bfa46540e255c3c005f4da1f872fc823c7b1b1c8bd28fd0f0baad000000000e80000000020000200000006a7406f99d1fb6c456ffe978948939e9470c9ca1cfec3e7bbf1cebb9fb74fd5390000000587aceebac27103995fa51c14c3015ebd6c807fb135d1e59f8064d3c92d1202278b7325a95b3ceb6ca97073f5714159c7b65350a5068c61e95d15afab440e1b90fd9828d612854a57d6ffe2fb8f94ea2fdcf4d703122ddabc21f18274910506ecc44c8d37ec7d0fd767cf3be16f180e4701c632998351520a451fd4abe7fcf8b00a3c1c52bc6b7f6744cee6dc773891240000000c5fdef31379334c37d779d4d89d8f78df228f34a236e3fd0236a543ff266ce747670ea4020dc06384bc77b0c907fe453013d5508642fff0dfb66e6e034a22536 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432877263" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2480 2336 iexplore.exe 31 PID 2336 wrote to memory of 2480 2336 iexplore.exe 31 PID 2336 wrote to memory of 2480 2336 iexplore.exe 31 PID 2336 wrote to memory of 2480 2336 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea794e00832f676ecb557c454f5dbb21_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb13dff1d91ae47e86047b074e9ce77
SHA1621333c17d26f1dee05baa228003d39f3195fd1f
SHA2569fe5dd25d693d5ab804c176f6a08f01fe2ad2f4f3f8ebf75c544bec66398b427
SHA512d72ef081cf57dd2b2cd046af8c63f10c41ba752671ca605a088aba04d7ad4f6a2ba8ef9a06347ce81beff5289210d980d265807b4a761debcb72058df0c19c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f8175a742d0061b1248929323c3f68e
SHA14720fd4472caf9fd7df9dda237ab57d240369546
SHA2566f7e21d25e1380c20d63dfdf2deb00dcba274d2f3054e9d55beb48678c88a0ce
SHA512c308f8de9a11f4ccd6231f82ebec187bdb569db1940761d7e13e15c44674b0584718766009a6850f63f46e85915a99a2ab5e9051dc97669ec485070b91263bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc7a8bd22740468420f6b0076946f170
SHA120dc22fd8d374f0ef6e51b78ddce525441c311fe
SHA256f35e23a50316fea2fab74430a47bf307aa07fe4551adf43c2977c4d58bc470a6
SHA512542956c897689ab3608fa62996ef945bf5128f4fa63558a03c7041cc4d7da4c312d0c9f7f6fc7e53ad8f4abf794f4cb3fb1b4206edd846d41a70870b0523a0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d9907a079587697ac1e86794cd33b92
SHA149e9d42bf8fa6ec74255a31a8caf6443e6b085c8
SHA25618fc1070c1ae915ae80efcf8523f6a2938b3cefa54269688e6834dcc3faac570
SHA51299ab19731e2d15ecb91e269599b248a27a698924c648a69602bb44059f1124f466cd56f5e07a4c08e5c706bf3b12fa10e8c3794df3b126698a0f3cf843fe0d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e381bc799efbda894089f0c7b14cdbb7
SHA1ec45c693c3c8999e59fdce9a46ad41e4e4060811
SHA2560be8bf58169e67c1866871dcf8a140ae877f0a315a54a6182b64f71aa31fb744
SHA51211826b344b4517b00e4b5ea5574d7856e365670cdfb16eb820ee75552a7c41f1871f99d5ae7b9bcac5e9e8886ec041068cd4bfbb6b9286d4fbd14326d22733f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bfd9d31824c57474343abbf9892ee0a
SHA1e9c6bc969991e6b9b4565f1480c0aaa7b0238d96
SHA256a271030405d8d49dc937ccc59c4bd0696119ccf637c3bc953478e8dc7fa0301d
SHA51290c5b85003f9ddf0b76c48ce13f7bcdc495b3895d80eb4b7ac7cde13a363e4ebb311c99edbad843f2fbc0f48d889fd20050043609b4c88820ab9da2ca2b79ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb07ded6bdbccaf25dee2efe4e22d57d
SHA1df9f2e649e04107420ee9c0a65d20d8290444f58
SHA256ee7060ca7e6e544dc571cb187f63e83178afe1e436c3306c8d462d5ccd7d5fff
SHA512bf2045c84a8ad38df0e9d1292ad3edec003a1f425f1c9aa053fc07c8f623caf956a9104d206440dfe3081fc40b76fc18de157da085fbd506173d0b08141e8711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5251ec884cb305652297b0875cfe76544
SHA14231e0b8851f61fc025207f388326b24bd60982a
SHA2563cd64db93b3c09515e09a9ca2c1f384e7bdc9a116beff21d260c8353e842ff4c
SHA512a470b8b66369e573b9cd4ed2c1ead5df375ac7e942ef034dcc3e69e754a655a00a4e7e7acb3ac0cfa5a3c494b024f8222fe189e895319ae1cb66eb94f88dbbbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cba60ab952d43de355667ac022b0b974
SHA14b5c94fde92d9674c4b4cadd241f26b4e0e90960
SHA25651979a060caa9269c9d59c3fad2874f2067940afb750d9e3da1a8cf25c3e6527
SHA5124841c2d7087a5e7512a07feba3e6b143ac6a47fe6112bd5fefe6928e40f808c9d17f7d8ab630ec8ca62746042ee16f24984a739a5e4674297231cad512a62ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5bdbd33f94b071987e50a0eff72a8cd
SHA1934964282af78e19104a48ac3333870152f7c231
SHA2560b0d072bd88d2d7a8474993ebe06f01c897f25891a42c4739b074dc82e7648ad
SHA512f25d1f27278d4092300c6c1ac6cacf29cc5ede561e419d7505b5398f9ab9f11d404723251a71b0d85577b17f981becca5eda7e4415f3fcc8e273e76e10c7acd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599dc1059880d8884796c7c8847ffe7f0
SHA155b989b2ee138856d745747de37d23de4dc2256c
SHA2569cff9537d4b0fdcaa6dd5216374c66015c1b290bafb967c6c66def258a97c675
SHA51246e53d6be7aa8f578be647833d782990c03c8dbc1128fce4443867592ad47d178dcf5267aafb7c7c18c0110e08a401fbd70f41afc79d88933cc826da6c11b2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a0b4430c945aeefe3bfd6b4db6958b4
SHA1f7f2e4770b147f696f9a94bb090b15bd7c490384
SHA25653e310b832b50dd6730e2803053007fb40c28a3733638f242e750de524508e48
SHA5127dfe33717e482620de4dbdb0220d7dfd15e00c7a97c9b5da1c830ef43803ae969e7d0b9ccb464fd51877c67142b99bb897cad1a3119b25d518c74918bdf57466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bfe59d163f38454884b9db568904d52
SHA16fb2a58c1eab463e0e422874ed3983a77a655ca8
SHA256925819a193eabcfbf4b31a9adaaed590534b57d26a2b5f27b68ef8cdedd6dce0
SHA5120e5d8227d1469046f5d1f8627cd86a5a6aab62f91719c7ab55ccbeb6f8d773625942ad95df86114dcc5032e5473cda856bab6b22854399499c2933e37d4ae765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585f9b12f4a6424ddf01c3b8f1098cd11
SHA1aeea7e6dbcfb9ac6ab0c6fedb6da4b28f3332027
SHA25670e5c2f7d7c13094d30fd08b5d9e0d9885a398d77c4153566e5a6671072f18e0
SHA512060351f06add176316b067bc7cc119cf718030a967256651c62993d658b9fbd6ca89e6754691742aab78d7c68bd8cd583aa9fad5f95d2f5ae669e6139ba80418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d29d2b2d3ec26b7606eca91da805fe7
SHA1600c60172589cafd863175768ae0650fcabfd11e
SHA2560153fba1228ac5a30932614a695d6c1053cbb424e73358f97632e0aa3445a456
SHA5128c1ac92c98d492c4e0138b8e6bf41f655aa6de9969c74f97eabbc46515959efe25702f0dfe1e2da2e36474118af27e86f40a6c5eb147f4168e4f3cb341830473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc991666875496f3a0f9e70c975f41c7
SHA1c7db5702d5318deedeee58d231eb8b52aa4b1106
SHA25655fc8a2162beaedccb5d5ee4c88a74918f4aec409764cd416926f201c293eb1f
SHA51285fce8a806eba7b3a918cb3254a0bd2fe0249b79585e73aea9c37078426f04df03ea149969475f5a0b1f48e21d3837bf9bbcf7467b5ba98d5379fc926bbf06d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e019ba9d4d1f6c0ad38d19e1de8e185
SHA11473912f53b2ffcbb371b72b9c28bea230e8bd22
SHA256abddca07e873db17518dcbf4e4f4a921dec91aff6b0f32319b1bedb995794fbc
SHA5120af51e6475f0c1aea4e972bbf6a6a46b88de36771fb8a59b75758eb013b419b41e74698beb13fcc80d7efee51c43bb9503e8782f19b947e1397f38a8389b13ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5447e4446fcecfabddf5b35603080f7
SHA1edfb0e30368ba643e6cc1291f0453de88486bd6e
SHA2569587487c4ce189af369110752a66b6a35fe18a6115499dd6e4fe827694ba1792
SHA5129497a66abdf7bd88631c3d8d538504796e96994d845e3a323562c89bf288c3c8073777b3c6b8adea79d72c2dc04e238e8b2b88c0faa5790da7105e818b5c7397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583e0e6a72482a323f97b0aa9fb297f70
SHA1ec75657873cdb2166f9a0e1d2a3530f2130f3fef
SHA256eb54fdb53a7d6c02c6b0ea79f3941c0096bb322eba350399824fab012a1a43ea
SHA5123a8f3f4eded5fff645f26fd62883e28f030dd6150d5a99e12c6ec9920b3921fcc653bebcdabfb9066dd56da1e227ac1da1e7833d5dec7546fd89686bc64e1757
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b