Analysis
-
max time kernel
118s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
a8c31b6b061fa2b32f6398d4c7f74e64_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a8c31b6b061fa2b32f6398d4c7f74e64_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a8c31b6b061fa2b32f6398d4c7f74e64_JaffaCakes118.html
-
Size
13KB
-
MD5
a8c31b6b061fa2b32f6398d4c7f74e64
-
SHA1
80dc9240ab9882fcf882d6e2ff979600e1bbafda
-
SHA256
117dbdd2c17beb806a8a4ecbf8fc357273c53ba08e050dd99091165162a7e48a
-
SHA512
8728e4d7ef428f93c87b3153c6fab81f5d8813607b88c7d5046151e2c7486baa625be9b78f8855b849522069fe1bdc6df1df98ecea60368747d475eb7c2e867a
-
SSDEEP
384:fIt7S+bJqY1lsjmA4IYZcZBZjwHiiK8f9fjgDQ/wJCszFULS7GIiEbwluM:fIt7pl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430187584" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DOMStorage\aquaelectrical.com\ = "45" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "6" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DOMStorage\aquaelectrical.com\Total = "45" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DOMStorage\aquaelectrical.com\ = "6" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "45" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DOMStorage\aquaelectrical.com\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3EF36291-5DBE-11EF-971E-EA452A02DA21} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DOMStorage\aquaelectrical.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DOMStorage\aquaelectrical.com\Total = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0da271ccbf1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DOMStorage\aquaelectrical.com\Total = "6" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DOMStorage\aquaelectrical.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000edbd246172d3dd6e1219cb6e816257e9eaa80ba294465f944605bc54b46ec9a1000000000e8000000002000020000000a2c32904f3190eb5627e543e40f5ded8802e12fd416308b5c732bf32c592d10120000000d6235e25f061a4656c210bf9c3cbdadda89707f92b24d5b094a27b6437f4bb6f40000000c90d886fc9aa637401191cf1f5a1c3a931248164f16527f310690d4af6e60d821fa8f4407c833811cfa73e386ef78f98df8c6248fcd23bda91ab0769988949d1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 1896 IEXPLORE.EXE 1896 IEXPLORE.EXE 1896 IEXPLORE.EXE 1896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1896 2084 iexplore.exe 30 PID 2084 wrote to memory of 1896 2084 iexplore.exe 30 PID 2084 wrote to memory of 1896 2084 iexplore.exe 30 PID 2084 wrote to memory of 1896 2084 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a8c31b6b061fa2b32f6398d4c7f74e64_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5407b584587f6becea7468783c6336fe7
SHA199ef34fa4bf58e24c21bde62e982abf05b671645
SHA25670c2eecd93d10162303ad2f0b9c2f79edeca219572974d330553955be9325fb3
SHA512e44b87412dd50af53f46d2fdb1fd10e3a49311da34a794041331b645443cd66ce123f58d0fc48ac847b0c6ce7287edb571837fd4739d0b76ee83fae9118e6c1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e1260474e4f38b6d33f90e2e4a400b
SHA141507686aa394a62dee72b0b1bd7140ed6c949a9
SHA256a9a2894c88f3946867926c6039de4f5e5d4bdd51f5bd6ddd01451c21bb882f46
SHA51256cdee4fb5d978b195fa82d7ca33ef5dfb05a74af190c520635927f40b9775d2dd7c9d1c6f4ceed467d27eeac7d95fce6220fdefb2eabbb9d6a9ead7d499057e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535250289564b20c6f28156a77d7635e2
SHA10b6839a15024f4e6e99a1052d7047da103b9165a
SHA2564e1d643a0e19de6b7c3039e212141695de16370ae720dabe422975086ebdee70
SHA512d87b7736cbd61d95f9fc3e51791138a4f2554f131b7024e375263635b79d8bb34e0d6fb6ca6798a388338aade605e5e299e364a6eb5f331df5edb0a53f5f8f23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5463a4b9509e9cbee96e0f272d6d86b
SHA13664d4b39494a07745001ed7a96d8487c70cd009
SHA256c0f1c26b603771c62fab92e4bba0ae772685a6e6f6300f781ef52848d557b7d6
SHA512caf57b2cd9b8c681cf1d5d1b5399633ff610d0ae614f992b9005d3388471e4648a908c9ecb1bd803dc82457612c07ceba49e262d19c56e807319ddb8bf11978c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b4c688a9b869f81c686b7bf4154c125
SHA1a0daa925823f59f0a154897b72e15961e975641c
SHA25660c87afc1eb37be0fb5e9e89a8b3ddd4bd93f1f864d5de675ddf2ae76e3873bf
SHA512c354780caa5ddeaba8fcf5448c3e207a88c793bf1cb673c4e145fd971cded07a794a4737d84edbb9f2f5cc4bee542e63946254de3861a9ab74ff2cfbd64a8b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5925ef25fb470f24ea9efa8eb57654030
SHA1c3dad50605e46a991d0797dfae291c96e66cf910
SHA256f4d2378baf48e64e8af2ac22a3b739559547e77dda81fe91e3e10b38822d6ead
SHA512a82b9005e014a4f74198aa6a0fc5ffb6b0ac11de126f7aad3b10616a1e4c0ab15b81b38a6e0d02e07370b55daffc19644f25809236ed40b65c4815f0bfdde9b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ac8128ace48ecacb3a493316ee218f7
SHA143ececfd5f3f735fcb0a2cd0d76fb60ed6b8181c
SHA25641e7a8c86bc206771f3ab02f6dcf1d335ccf11d857f542cfed2d6ec37a79b869
SHA5125fc3030087c3141b43fb590eb208262a363af62317abab49a3f7b57af9043856650d6a25190336b24b3f9278d2007528fd1e718ef53cdaa59b87f9b52580d6c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51daf56756c703282f041f7d0c71a7c64
SHA12d858fc7fc76c88d3c92a17b5355ab27eebca32d
SHA2560cf50fedb622ef212b20e182d22a396ba034dd8034df5dae5e8c33758727bf23
SHA51265abef060c4650ed21befec0e94d4d0e9e35f630d2ce4fb78f7b11da97267bfb6f0a1ca5da71fd470e71e97b93557c38fbf910fbeef4a5d03748e51bb6d486b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd0e8f39631d254eebc1138551f25bc
SHA130ac3a0458eef7cf19e6925703602468e389bed0
SHA256e3cdb9693bfad0401046745de8fea425c07176090345548467edd11c571f7105
SHA512b19254993fadcd056881440f42445ca29cf5e98887eebb929fd48230acf20e8173cc8f607d4cf0e3c3a9627bd59bcb665ab503e44967330ee59f6659b4b8cd97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a117f22edcc0c39547f686e28decb33
SHA1ae14ac7d10748da3d68dafb0d5146c013d28b328
SHA256fb71f28b56f88c7a302b464726c03585ce7f639af9d54dd0c54cf56ded09a83e
SHA5128985b28df27940cdb2490234604c0f3ca80256a10be02cb6382108dea9c4d16f0fe8273dd57ca8a449ac6ee41dee8fb560730e7a4d6634e6eeea25f887977bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5921992cbd7c2adb403d29cbfcdbe76b8
SHA1bf334771ef2b5429320e5d1f0b6344ebbea9a589
SHA2562e84d8f551471a0775ee4c96fba8d7aa25e3fb8d2b05ba2facfad50dc941b7b6
SHA512dbcb3e16c4584e73d3550a15eeb2d54155d441a7fbb9b22b924a3f8df14bec754b98caed9abf190c87824a605b4541b1017ffa8e73422021f4349111d9b5fd05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba986ca23b47671649a5483cec438529
SHA1d8ea75cbfff54779c37a69ace187b14e1a333c8d
SHA25605cfdbc20c5b18258e86b8a0888feb66e3d3f468c5a2758c641b72abad7731ee
SHA512ae87e0123672245d3ae6527f6148d1247fcdc5d8b1fb9be4eab3e2506397472937b67a860226011e0fd3b1a54c3bc9cdeded538055155eb5eb1d49ca2e9ad47e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5bf866d0f93f7701501ced38720ebacb1
SHA1b4ce60d39b498412d9228aac4449fbc830dd355c
SHA25624f1f830a0349fa8c677fea9e4ef8b61d6003be871598b8e56ffd44b69e0d119
SHA512195d94dec3ffcccc20c561d0c34f30fcfd05fc9b1845043eee31ca26a7364847102710159c033a32483b2d167e6d6070e1cc14de4e533d77d0b44d7935edc313
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
118B
MD5a7f67335cde6e8d9df3910aa73ed19a8
SHA17091f7e0bc2dd466ea8f47c8c48d16c25cc25e79
SHA256d79420b85937136907bcba5d12d56594f79132d8c18f13b91d12c2cedb88c5b2
SHA5123204fff85b1e016610c6ed87104f6a0896645d0ffa6c10bc5dc46a32d587bf1974bdcc2908b144e45d731bcb2b176fdd569422fc9956e194b64937ec01c6b500
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b