Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 03:01
Static task
static1
Behavioral task
behavioral1
Sample
ba1a339b8a60eb88fae656d7b5e7559f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ba1a339b8a60eb88fae656d7b5e7559f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ba1a339b8a60eb88fae656d7b5e7559f_JaffaCakes118.html
-
Size
11KB
-
MD5
ba1a339b8a60eb88fae656d7b5e7559f
-
SHA1
7e7a3e2832af0b0cfadc4f5387f993598d2d685f
-
SHA256
90cb98cacd6a339db86baa619d1ca097f0c847f8f3067115c8cb74bc1424842f
-
SHA512
4153a2c01112bba61b4de2f1fa4f245a6a62427f3bb3914d8ee81a97e25d61437d3ceed56ee24a49179f021fa833e6bd5622dbce5e15eca12e5aec3a4bc86bff
-
SSDEEP
192:2ValIsr0r57M4SxazT8I6/w1wvqVkt16auBuLbdU8d:salIcIQ4Sxa76/g86aguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{03C0BA11-60FC-11EF-9CB4-D238DC34531D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430543966" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000f59409bf663c37e3335fc6bdcae95ef2a2913ab6f7e8ef2341600b080017cc04000000000e8000000002000020000000b8cb9a049324e3d137a9d72efbb313013dac036bc0cfe3ff41a49b918bf8e82590000000f5de24a31949fa09db5c538cadd97058a455ac33f76b0d3e4f08bf39cca6e0111e0de7c7caa6b8abbb94bfe8a963fb4dbd4aa786c416e24ddd0170eb45f82d9a83cfc84fbb07a6fee9437596707f30b611e32a6b593e3a4319d3be09ed14d19d00c9214686b125107cafea59e84bbc273175c2eae8b6907cf279d10486ce306685e59bd4f6ad5fee0507be0cc560a21640000000347756628f99b9cf226a514974451b2d5324a25bfcccdb4fec681788777983a071a6cb1e158360ce42b499a14611e4cd9732ce7aae6a50ef5d1811ffb546edec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000c4cd4a9a2058d6574219a1643917afbb7db0b0e5e76eea1a73dce79f269c2bfc000000000e80000000020000200000009817929122c03e11cdd8b99599efb21af3d79b5098e731a3e8093bab61a25b5e2000000050f8bfab2f6a51dad93587ee75ca968ac7f0a2b29d9016b5269b01ce30580a5340000000621219a4bc93efb4da83010eff74a962569eca3ae8696b493c2fc07ac8f12f6e251db3c61db71ae0a9b8ef1afd4156bf6104042580e65c657a4e79f1f1ee52aa iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30406bf908f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 1928 2324 iexplore.exe 31 PID 2324 wrote to memory of 1928 2324 iexplore.exe 31 PID 2324 wrote to memory of 1928 2324 iexplore.exe 31 PID 2324 wrote to memory of 1928 2324 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ba1a339b8a60eb88fae656d7b5e7559f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d088299e0417290a0a050b38f625915
SHA17f7ffb88f309ff824020680862440bfb6fc04491
SHA256c22c98030867c1453bd3b2cc4cf6d5760dd9345395cb04137efa980180262045
SHA512b4bd37169122c30299570ceeb2baea763950310a7532eb3238ba6748da8bdff738c139198102836a1558060792fa1e3d18e455e6ac0b6f2cf3b65a1bbb8aec71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5614f04b5095f14d8978a5fee2f3867af
SHA1e158ba32755fbff665f26385421a44bb4b6a0364
SHA2563e76e6a08645406e9ecdd1be3832617e6b9bd96d2fe622f194ba8e91511a4eef
SHA512e4f8387975d4f7637aa16fe5688e2d27e48c67e71df09ac3c43d9da0705b106b91154e74fc127a67833d250fbee5c134e9cfcf1bb9b07cffddfd961b7814ee37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c2eb488fee6773131cb5b93e6a2b2f3
SHA100580fa818a1f09c09255fc9d5799142aae93cbb
SHA256ae6fc6fbecee4e00f6e2a1a8bca2fc6660cceb0ab6c4b280d3b67d345e179395
SHA5125810cf83bfd1d2224cdc5f83f4dc5c187d133a4386306e92438be66226af6456797f600701e59290edb8168f20e6281d9c9fa944de48865d67484c4dcc7273a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543fc46ae87fe09fd93683cce6b69f32b
SHA1a95c73bdace6f68197808b8ddb4055a0a07b9674
SHA256e399700abde58eae5a87df047d4acb3a7a635e97142f7eaee69e278831085d8f
SHA51210081098f48a797b3b95cba7cc66fe563487737bb97684fa63d8504939bf6e292b27204ab992bdfd6752eb131d4e59ef1a40e6704b39780916923763515893ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546d1196157526ca78c1b9a88b7a3035a
SHA127f42828304c31959a2abda8dbc6345c2d8e1acf
SHA25696364767f01072d468aa3a77c1fa82531a7225d037ad69d7d90cd8ec9cf6373a
SHA5126c291e25eb55d8da5579a7a1c44332e4d43d9b3a68294ddc3a93411561a81a08386a0b65f4597c89a99cf24fe4b26dee1c1133908ec78c926896d6639961853e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b5113c0ecadb2d46098f04058797869
SHA1b65ab9a76a3ed1696095f4327c00881df3f4428f
SHA2567281e5aa9c25c9826c885b828e4385e34ace4b99af450c1095b3b8a0a7c2971a
SHA512d8be7bf8cb961509e62c2163290d6f74bcc7b1034e9234e9d04790a491527df71c388c15436a5681c209e067b00efcfa6e96d8cbfc6fcb93aa5e115af42a4bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f09fee5a2c9f23040a9cd010b349a1f
SHA1f2bc97492f6fb8c07b68ce0d9d1e301e23472880
SHA25652f1f009bfccd8e7de550d5b87bbdd60a89235ee3a539e877c37d06ee45dc8c8
SHA512640f1ae72bc792881d473ef749043d2326f96f84e32595fe7266d1f7485cb46fb36a73681ad8d273cc315d8614af6f2d0a9a8089e684dcc81f30714cb9e10c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a72058d9b6f4043326e0442cf1f4952b
SHA1eb1d5036681ab334699874ce488706512045f515
SHA2566c4832d43bc309ee2378406e20a19f5d4fce7f8e4dfe69bf79e7e37b4a91ce1f
SHA5122d656c1f0def4dfca756357c816ace7832d9e5a4495c289bad51d18f3adeafbeecbfe254b27f6250df91da658c428d8b600a4abfe65ad55c541b13196647ab58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449116b745749bc2dfcabcbdb21a8c33
SHA1b9dee6b694ced093aebf6d266320ff2defb78fc4
SHA2565a614f0250fdabb0bb1ff0c055a12904d589244268bd7b15bf1efd22ad734786
SHA512a3f67da6e54f2e6daa1a8f79b9cbed22e98b6829d9f4787c05dd885d7bbb93f9f5bd1d86ee9ca9cbc0f25b1101ae426f483365555a58b1e2857bac0c13d7c0df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3c329173304acf33192a96f4cd646c5
SHA1a914b7bdeb6723b35158c3bbdee5596fe610b984
SHA256e0f0ab141d4472aa1fdacb956401f0936feb2bb9a506b4c66a736de747dc3a4f
SHA512c7eab9d3a2a8a2f51f13a6d46a1bfdc6a4964419870eabb09782704cbf514a73f898025d822c4157d48d779e9801c424639695d3759475dabd01d30d38513f04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51436bffb45312651e29adbc8f7240c25
SHA1a2cd8a92a5681b1ca5aabc6dd4650a4487854a86
SHA256c78440e1dca76580f03d5dc5c906218f928bba2b77c09147cb737a8832fb436c
SHA512e3aa7840e8810c5fc6057937be94c12ab70705ced9a5262d48ab0516a42d2c622928cbca8dbc95e19417f23f999d743d0dba5c8535c152c7b43fdc992762cd7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df00786ff96aa0ada8b3f7c4b9cb4e41
SHA1e216f925750ee08a60821f8ba4b2a0d8b4dd92d3
SHA2560614573305c5979437488aacd27c1c3e641cdc2b9180bd71e72c5f6714982317
SHA51250d079144623cc679802a9d8ab8ce70db29286543ec5b8cbb6af1184bdfb03b5b7df4cfffad377b221535af160f6c80e1a5f0a258518e159277dd77e1c68026c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd519cc64fc7a547f7b6aaae29c106eb
SHA1ba436b9e5f6e8fce6cb671e35d94d71a5d02f2c4
SHA2564a87fff408d2010ef9a982acc408996f4746d85ae7f719cfbcfc5c3afb7f743b
SHA5124932302b945c330a8ba0bf433019210b0c8cd3846a00f2111312c8d8d4c7df1e20168604b089251068044d8ccdf9e4a735223fd9806bfa99804290a67f53548f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c95d7ae28407482bec9a1cf15bdbed0f
SHA15eb31e9c31e1a43f67859250e58820bf3056236c
SHA2567adbf1a09b0c9f54bf6be1ff18d96791bb0fb79498ab8c8d2a2a0ae1a6988b8e
SHA512ceeab3e9c4309c9a39302a86d7ae7b4afc1459d97643f7f5f9e6cf4238c0b7e59121b931d1b2891529498938b7f081b37f2cb17c9d39cecc72ef0f491f69f816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4ce509d15d45dcf2c659503770d4337
SHA109c0eb0e5e295ca0315e028d3a1b47f33453c8aa
SHA256cd43c475ac953d16523e2e4d9c04456b38ab3199871e3b2e82025c1d598f6316
SHA5125bf2dd5f1066c15af716f543cd00e4f7b1dfedfa64cf38fb6cd54d4868afb52311fcae42c6a59be955af71357ad94c92ab0f20780e5186eb2f4e9fb151533953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f57d0e72f70f753dd659bb9a915abc5
SHA1b475a12ec1b6f1fac67e3b4f1963e637dc2974c8
SHA256e2c9e191212fb2ee0c56cd9e1d923e843b4cca7d4f47d504a5b52e336e0285f9
SHA512a80b111a9f77a58164770be4dc9e79b1ce84af90e643281fc56264e9ae9656640c84fd8dac7dc33cedf2214f408956ab525fd96c1be9513b6f1d489d4b6d51de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5100e8cca274fa874bbf0aa7d8b7d832d
SHA1cea8cca9dee28aefd3e0371abdeef7ebca3637de
SHA2560dafa417dd76a884d1582c84974e08388fe9bb85b642b82bfad7a51b8500cf24
SHA512dc51b9bea1ba61932c31bdd172bc04b43aa3bb26b054d5133db86b0db74c50e4951637c3cad7ea9824a72c7e1328ac5f04dd219271b026bb22386828bb44d037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbb0c62e26822b1d47db6a10988ba809
SHA13f8ad204b29f5d28b2f0264557e0204ecfa46039
SHA25674253b4acf6dea7343070f5edf67147cf9b5814aa8c5b06c2dddb7663cc02228
SHA5126bda7f65f6e20d03ab010b0634bff0f77c745ededbfe38ec35e6e1fb618f4dc793bf3d6ef44b1a626a5cfb1542546e84f79dabcfb94f64a6f58264020b57b11f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aad567692ba562070a963bc04a097bb9
SHA18d706e79065b62ac978d21327f8378d2a3c883ea
SHA256cd64df4b9f60da2407d501801ac2787e2b691b213351dbb3b948d7a27f298307
SHA512cdcd24a051af2edff1cd83cb582a65f2e294d70a9995f74c555debc6abe5ff8a84d638022215b137bf47a24ef128c45d6574e22c59484cfee6e9ab2fbf2193df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b