Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
0e84b937dc843271cd2c6dce60bfe083_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e84b937dc843271cd2c6dce60bfe083_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0e84b937dc843271cd2c6dce60bfe083_JaffaCakes118.html
-
Size
19KB
-
MD5
0e84b937dc843271cd2c6dce60bfe083
-
SHA1
c6b8e2efb2cf1e38fa6a63357eaae2216503bcc1
-
SHA256
1b01d89589d465cf68bf4ff597545f7f7febabbf9cbca7c528e7baafdb90fb81
-
SHA512
99d1eac0f0a16903ec1f03dc93e1bd08d967ecaeef65befa49b573536d09b00dbd47e40b1cc9e23eae8186ed4b24218dd6f79cfd48b191fff1831d18bdecd8d9
-
SSDEEP
384:iwonPItv4PB42xCPjJeKJzr52T9GYDkuTSXGy5YUnKJ4ZpP3D26q53kRJ:iwonPQgPWg3RuXGylD3PzTq53kRJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425489935" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003ac26fd79c597846a61c2d9f2edf30fc0000000002000000000010660000000100002000000046fca3003875accb1851f8f8c3cfddc4800c3e3e62e9f688a23eab1eaa9abbfa000000000e800000000200002000000071d2b9328e77f064d76380eedb5806dba95001d80422ef0ed97033d71b1cf4ef2000000039c08753436dabe51c0963964561b85ecb49f42189c7b3b620c06c1cec10767340000000b2649a01f3bb526cab20198d25cd21ae7e07477b14236181215630ba381f6eabb2235a9cd874335e1d3c4bca8123848a352541feaf56f5068fe1c1b4b432da00 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 700c2d8311c7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE84E731-3304-11EF-9F07-6E6327E9C5D7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003ac26fd79c597846a61c2d9f2edf30fc000000000200000000001066000000010000200000009b205a77a86436ba99800c5d049590c14b3f5acacdf22824df78858638272a87000000000e8000000002000020000000b9f9ca54570e7f1086f13a53bb5be88c7b1e5c0d0165372a0d75942257df963a900000003c7ecb85a7713b833467ee771982f744014fd59294f6f2c2ed0e75a68d709a41ff09ba49a6245cdbe1239aa5878e9330f4303bd341b06ede518411fcae4ecc63fd10702270d41a058e98d4904feb3e525f48dbde7502c6fb11b881c0d272464e55c1b4ee5c20f90d4e5055bdd67bdeb161c27d34c1f561266f42cb1bad0dcbdc64feb3bb31382745dc66e87f18b2f1cb4000000010b3b6cb2e2243e4e7008fbb9ead1b03c5a545c72060340b720736c0fdfb9f670f478ed804d0e1d45e67cae501d3c4de4f872567b8a8e461d077f9f8e5edc1ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2500 3068 iexplore.exe 28 PID 3068 wrote to memory of 2500 3068 iexplore.exe 28 PID 3068 wrote to memory of 2500 3068 iexplore.exe 28 PID 3068 wrote to memory of 2500 3068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e84b937dc843271cd2c6dce60bfe083_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a7df69478f0addd0b9804430ff97ed2
SHA1dd52e252cc246c65a2f17c1e10572294cf5820b9
SHA2561b624fad8f09dd5c2f39edf1899997bff495ed2102f650a104ae6e6c9df1c18c
SHA512aa0c5bdedf5d366ffd5c22747d7f9834d94a429b02783fea760ad5d67621e654e5a973213a365373a266121b29b180319ea4169c659724b5a90e58ca2a29f562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be1587b8d0d5cb344f103e8bc5e62874
SHA159864f932b7e5afbefd508a3856819d15c38a4a5
SHA256d03c37259aba8a59aef43a147cc5762e955259f7679dd596f42b2481e85c176f
SHA5121886ab481308870555b9488efb3bff4d93284928013949b8ffcf6d239256888fde677b7f8c9659e62d68175ba4899fdc20165f2b9a10d1fd6bd47ced78ce6777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5208d67f6eb556defa08626e43c892569
SHA1dd7236cb22024b8f4178d9ed0a1cbee26bdad41d
SHA256983f971b60313259f2188c624ad24f2a3abcf007a915d3942911c4c6298419a4
SHA5124f1c0d88bac6f5eebefb363bf7d09c8d03d71128760fbca1439a8a96fa0b3f6b4e53bb7ddc0d6e75c6607f444d46605a285cf096964f290df4391829995979e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea8039c0689bb9114c08a3896d3d1908
SHA179c7627cfc04df4d814e12650e61673db4618ff8
SHA25605c2da0c45d4b5b2b83d23ca8d57df9674c6de395079f9f345b0dd1a77c5cd41
SHA512394f4ec20871a535debca461ce2704177c44e8aa435151b634668d5461b5e7ecfd9d928c7492e844524a4eb3793268623b2db42ca42f68c81e66f73140fb0826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576457b5ae42b6356eef3b05c1dfacdae
SHA176d2d04ec32a05431425a694d9f22106493d05c7
SHA2561aec41684559602f5051e9d0a64e05008e58bdf62572cc157e473b0aecde4981
SHA512685ac6c005225728e4ed1eec7b15c76e8d79736427a489687456a7c76218f826633bae1f35cb1569ab9705ba81137bb48fa546a0b9bdd96434f6e482c695f57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc3f692b0c8a0524f2256f8460cb813c
SHA1a4ace96b25e73c15262ab04956c245fdd68796b4
SHA2560d85755855f9b0bc9bf68c37655b8dec0bf34c1216aee05e09c5ce624d45c6d3
SHA5125f8228893bd03a0021fac6d183af49ece5a9ad508017571d8089b3f1df728da439b7f98f2d0751ea24494df424471673bbe5278229193d61bd7b5756ef64c8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dd554285f82a33169dc1dfa90f12bf8
SHA10e4980b51441f1324b70d618772992522222af77
SHA2568e926bc529db0570dce48c2f76edcc5ea54f4e7fdda6637a83782345e946366f
SHA512d5c95f21639563b7f523eef5e24a9292ef46527966eba1d5a3db1fa379a3478187bda9d207f3723485f68d61ecbd39fe255afcf92ad9e78845b2181c9a0feb21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502f7ca5733a778a97a3c0064dd0364fa
SHA14d1e683222e2b9db2c91e1facb120d6bd549736e
SHA256d96310858aba3e7e6635519261fc34130df384e650a50dc826c8ecb2e902fb19
SHA5127b0089319b19b5ae27c49fe5064c504734aaf26d7107996d1fd8a452d05ca89083526752a41f781c5f7f3ac8ef409e99012d12e30149abed22d73ba2b8fc6ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568eb0bfd21ce6dc4a56d29927ee1bc00
SHA18293189abbb155cba4c0a3868f6efc65f1fe640e
SHA2561d2dda25b05a20781e24719e54acf58283d992c35e71e84f76a5242e3bac0a8f
SHA512be99bd2d471ee097d419df87fab7c227f18d00c76a1fd1d1dd3304c4ea9ee228843b95156128d0ec2abd21f493244a90d6399eb7bdcf3672efaf8760a368cdff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57466c7e1e70519f8c1c515eb0b2f03df
SHA19b1a499690e9d9dd688ee2a85966a283a0d1c711
SHA256f156eabcb16701c5fa15ce52b254a55afdad95727782944132ab4b437c533073
SHA51236d690fbd992e41e3bfda5de08753cd4be4468112f02f969a7400cd6e0b16fd0ccb8882aaee49d2d568d82d0d638a664765b53fceaf50a41bd8708729a899c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6378e95a9d05da6c38c1bbb369d91b8
SHA13f763783ebc9049d65f2ebe19323bb7d08c9dd6b
SHA256161893112ed1357538e8f920e54255b17a349af01a43683dbb514c5f7f24bfc5
SHA512632ed9b758902e6fe2233e3d0ffc603f51e967d0a576acf3e40646cfe2b6a284ed202aa6f7ee5194e15f18647c2db588c938bfa978f87825d4252964e01cc086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5244ac0175dc074ee6601edf3d5481d58
SHA1c3edf1cfa3dc7a266b728753abb0ac6dc0bed141
SHA256d6ba4a3b71327b0dca13ba036fb16e30b4e3acf95b46f9521f1e69a06c4e52a5
SHA51263b687b20c49cf189f919b1b6992f6c85d76624c71ee2dacae40ed54e3ec667c3c04c94b55bf00022783a9a68c5728381ac3c63441b9ad6aeb26271fab8b8a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505333a385e700b79b7b2b9f9f70cd76d
SHA1c92c50af2008e55c4667d5b25e05937965a66393
SHA256f13237f4922df0d1914b20f3f6e2e0679f785c651deb677c8f75a444aaf4ccb7
SHA51218d748d52fd5e3c76922bbbe454a999877f53df86ff091c3f3b1ac6292a7bc08e5f6635bb06c495fd1451c2b2ae144c7811e0ae846a6e2811191567cabd213d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3de64a2a0c8d57aa10d9754ecdf5e82
SHA19206b54a3de7d6d1f94087ab206a90986006e13e
SHA256c2b404024ba4f94cc36f31f39ce3baadb8f9b71e111f99194ae34e3e55847325
SHA51221ededbcc3ec4d7716fa9721b730784c4efc44cc92a49928e4da121817f20392ed2cc8b8d9eca8ed22ab44313bc3f35c530ac25b2a8f36f6346ae702bf271302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f27fbe6e2cf3c4cacc3646323227e963
SHA12aff791979408283f2254a52fa8243a5a055ecbc
SHA2565148d2151d1c762fd4ecd8c3c4f5fdf956d7250d0d41e6ae21d4f8464be1b73c
SHA512f9e0dff5575a3de7fd95ad729ef2d26487c24692831b6b1b4dc19c383312c44a422b91bacf140e242cc4560502d2ce3f20ee4bcd54348cd870ed68b864d9e587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a100545f2a7e95aa1f198824c0bc9188
SHA1fc37c05458f013eafa3d75c7b25382149f4d899e
SHA2562e6018e052773fcc1682c4d9badc68460311276e22bbfacc92f65b161265f374
SHA51257c3703f928578aa09818ad574141d4c0c18af5652800e7a68316ceffb2551db6e1b687f434e12f7353ef79a6e916c06b149f8c98236b0e758501780909a97f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572e0b4915f148bc2e872e29ce5edafa6
SHA126b936447822ffb5ec499a055f8407af1a4930de
SHA2568f05f85215e31fcd2297534572fe68ad4ceb34910c35241950f1f0ca30266d11
SHA512c6179626f7023cd65372e34c0b5993232ca8023e0683c8477da1a8918076a7e166de668ebaf67bfcba6514c7843056bbb21ea54a62d7277371154a3a1445cffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cfd5153566c7c2f3a86fec8344fef29
SHA17040392717235ec91b5b545e5cb42a55054f94ce
SHA2560b8b769a37d74aa6ca5d9facd05567de4a4be5a5eea1bae86b1026100757c372
SHA512ac602476d05919e6e3418d7c063e7c048eb563f8b25a2df31ba1ee1b71977fd7957a0fe3f08f2fff1f8996b2de13a2ef34f8ba848097f6b44f8eab5582778b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ff48871f6881acb40cb66a83779d496
SHA1ce0dcb461cd83eec4f7221832665280ec849067e
SHA256dbd27774e4a68327ca27d2547d446920ad88f4e5e59638da6aace418c350b61e
SHA512dced54ed41b0b13778fc50b8f1f0481397550a08ffe94c6dc10a82d4a3370e45e71d5b876fe769672ce5cd9d783872ecc12258bbe2141cd5b32e5bb157eddf64
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b