Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
d4e23bc30ed1d9dbf23e9df7283cd50c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4e23bc30ed1d9dbf23e9df7283cd50c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4e23bc30ed1d9dbf23e9df7283cd50c_JaffaCakes118.html
-
Size
27KB
-
MD5
d4e23bc30ed1d9dbf23e9df7283cd50c
-
SHA1
f769a6e4319e43f500fff683b34388fece31961f
-
SHA256
d5bf1b709c7cee46b32b28b69c683335a2d47bb910f23ab8abbc42f1a5996239
-
SHA512
7881fa928f5c654300156cb65587f9c85ba430e0d5c9da395f36bde8f252b6908ec7d6a77488ada9faffb39372ac2ac06c5dc8006f27f6de40fa82bb49dec11b
-
SSDEEP
768:UbQ5LjI0rCSC/Ncur5MiS8sR5+quO7zu4bLtk8e5wenEe7eie0/odF85:UbQ5LjI0rV+KuVMk8e5wenEe7eie0/oq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60629AA1-6E07-11EF-8CD4-527E38F5B48B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000000674f5a618c46a8d16280f95d0331577313b196adff36574927ee44942b2d039000000000e80000000020000200000003af2cdb01006c5c2a2717e7e16e3f1783922c6d1e6634e563b2938c3bdc59f63200000000c659386895afd4fabadacc816630463174ec51556c0ee60b1979fecdc62803f40000000e313079b0294aab30f5deb93a1f04737579bd81cc13728c0b7abecff7c93dc559a9ae078d33e003e90889abd404191df380f8827150650a7727b3566ccec2061 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000010b72e0975bfbfd1cd3219c63a64fde7eae4d6dd4425b22ab78d15a21a288462000000000e8000000002000020000000cbbb0d7eaf7d2252cf001170b294205b062505a4c88bde4dbdf9abf36cc3ac0190000000a963bc2ab6c2cc5089586e1a66bb94556c67764dd8b3e0be95a1dda5b59a414c494ab0629160f83a7dca4956c3b57996433df7a7f7e202c3a7b862821536a121f60e7a863414e623bf5890ce18c187c535befdeb5c143ec583a55207919752697c2e51193b19b57a3f9c585ebd21b0528c674dd646909670d2a6f6367b117df4bbdbcd2af44281341919d4c639ab2fde40000000c1e990315349e1352896e3f7b10c4494a8321e55d42f5a8e97ff02e1363be89785bf4272c1ddda700a2919e3c481f52188077a75fcaa9bd7d882ce930aec9385 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c56c3a1402db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431978211" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2676 iexplore.exe 2676 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2724 2676 iexplore.exe 30 PID 2676 wrote to memory of 2724 2676 iexplore.exe 30 PID 2676 wrote to memory of 2724 2676 iexplore.exe 30 PID 2676 wrote to memory of 2724 2676 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d4e23bc30ed1d9dbf23e9df7283cd50c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2bca52a2c5f508cc280fe531850153e
SHA1e5ff75e8d57022536782031d88f1f305ecb970b9
SHA256aa8aaa36a78ee53066f768381d4ce579d2b6d660f626a67b725e17e79bfac4b5
SHA51249158ef500a506adc61bacd6f3c38539a14da373de8779dcb6ec69fad18f5ef3119b673277900ff99e2db83e81da5605300e07696ee696cabcfab292ced7d5eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571c8d888f64e35a7bb3dae919649d11b
SHA167939e6d2bbc9ecaf45fe6a0d1586fcd40c0ee4e
SHA2568e621e04ae127d2fde0b56ea965c8ebdc1a06236dc57bfa0f1d8667bf5886f9d
SHA5127c3df2fc5886feb74cc0fe8e213c48d40ba416b521e74c0914d1fb0fac5856b3c896f88d2bf2489316fdc69a302d76d98907f1318768e2801dc6f4771bb42e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5814ceb125847273d2704e8faa33a4816
SHA113d38b25e02666f41aaa2401838c744bf8cc3c27
SHA25692f54af54ba3ba182b528b6026944e791f8ecbc67e261227a352a20ae6555dea
SHA5126fb8eeca80f769e2c86b614ddabb5d042f7b798a47dbf1b5b5533d7662d085951cfbc6604e94c11d528b966e00eb8f2a83631f37bf97784d801d5f30fd815e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cffb89d3cb8e12699ce305b7ee2755a
SHA1f280ff00243a4df471c3d29a1916ff5ad39e35b0
SHA256cd7637d89ad1d7b080299f64c5fac52a2bdb855b32612f64ba822775e0bd63c7
SHA512e3420bbe82f89fea968fb2be1bd92b5e42de736ec1a65c698e27c3469c4e3eace3c6e7897ee212ac4c4220a5fb4447d514b9b8a03ea244abecb5d05bfde141a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f01d5e7f47ccd57fd7bb733b6bebda9b
SHA19dbba9b2f2de8962483585932a5120d666745295
SHA256be320b29bc4e4190ee9e487e7b74cec9dce420583e4ec8ab864e8108233cdd57
SHA512f5204b65200281e5d351f8d6f663409d10319f38ca339586c6ce1a6461419584a7811d709c820ecafb570de6e907cfa65cd36388823b48f56be8ad12e3b818f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f44b9bf3c998c7855597bf9fce540bb6
SHA14c43d6a75e94c5d6fdf73259024aede2ded5a0f1
SHA25694a76111966b30f116f3b6a119e0482f362669b8ab52efd41f5daa90d43fbf69
SHA5125b03a2cb6282a7606d70f11b15ad8b8ad0c73380a5bd311eb4037cb186901625ca514c0136b5654bd56aeaca160b4b522ecb44f6a0e1d6e4987ceaa4d2b91552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528c765d01e60518aec9c61352b3292db
SHA174a3e8bf99d64ac59283cc5f43a13147f8c09ef3
SHA256ea2868a3e947df85fd2bfdfcf768b11165a73d55a78d84bab39193c257fe246b
SHA512948df40380efe03b3da9e93e81017ec5044105ec8ec65c5c0fc9dd45453b0597e01cee832fa81c41aba8bd32b78234c3644ee8423bca3f8cb38b36e1e634c032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5276afe6e014af1ca3d50be71dd90855d
SHA160c01297431f7712ff8a5b3aa02ee2cfa01bbc14
SHA256bf1b86650743008ae2c9d4711380d91f171546c979779d2f10925fc473e74b0c
SHA5123ee53d24d6c8e25324a6aae488593cf9101330d5893ec92f864c37300b5eff26844ed4c1b3df733e5ec0c3859faf99a5679e707e473779b9c61c799192ac7989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d70f31b16f97b04cf3e904c2495a844
SHA17e957f0ddd8a01b2629e40cfbcd9ca1a6690c570
SHA256f9deb29c4ea15d879e7cc46423d92b4ebd3aae1e9b71c7d266752e0a2c7a39c5
SHA51247b9198e43ac2908cf7810cea43a448ebcea527819cd3dae5ee7658d6de7d5eb3d4e434a81b0c47c7583f1ddff448350ccc5c195de03e1500cab813fa02e6fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b291c21023ca83e3e72e031b12486613
SHA1c64b551b654a2d864b01905573103206389538d1
SHA256b144e9548a9567e312a4d376eb52113a7546fdcd82518fcd2d0806ee407dab16
SHA5120fe5715adfd2db2cf5996cd2b06c345b892f297a8840d828d67542b0be8773ff4cd49ceeb32bad2ccb1f63361923828eecbfde98f64ee209f81e429285dfe06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad09beafcde6fee7c350928b0ef28b89
SHA1847e404de5ae9d2565cfd007e66d0ba3b3e677a2
SHA2563ecd6ef6cfe6021e2fb397120e40f8e77d02533af3ca058ae3d4816245eedf90
SHA5129878e31c92ae336cd4eaba4fb70ffca55cecd41106551ef457487d018a426d19ab2c066011c788579ec6bc3af650a250f32d4a9032fd487042e41fef6b17f2a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a1e66c29ba12eef532b57649ef1e548
SHA127b2c7a20f3c52b6b5db70e9040c0f1c862956bf
SHA2565a438e6bed86687b0b2baac100b054aadf1df42dd7396c180aa2b2485448f54b
SHA51250db2b6130b4bd01fb18334b3e307e9e0ecc186c246ade267021bfffa0e47200bfabaa07fc0ce93408e177557d6113c41677eff403dc4b764c58c370edd1c549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f862ba01fa15d67a3cbfd005b08a0091
SHA1c4f25bcc8aee6599914fe0818b22deb0d3a1ded7
SHA25612e317107768da341cae726e9f775c3114131695b261b690beb5876aae4f42b8
SHA512a34eb247fe4d7a2e6ee96b127bf7a6328a920ee583f1da878963d64e26e1416b7b5e4146b47911fa359d223ba5c06377a027de91d4ae36b55dbf22859e0fc0e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f02fde5e3c83226ae65ab13ebf3354c
SHA10063e0ae4a78c0c6b9bce88ce627a6ddca5fdc9b
SHA25628767f2c83d42e17bf39e7281f68986dd9eac7d63244c6ebb5be25c7544f00e0
SHA51230c0f46e8b0fee5fcd692857871a9b12e67879a2763744e1f631ae85897d3dace74a947e81f73070c24e8d3f97504e9c3f536b807de8a60b1b40d86e1162905c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509781dc9c6e22ea4582bd1b319239564
SHA117a82b043dd5ec606133eec2f50f2d9a5bffe2d2
SHA256de2ab1d693a8cd8a34695720ceef457e7be66552a2c678d91434a50245ba6bfb
SHA5120ab20c6e72f04e3f4500659973dd387593a573ad9e89f4fd147adb65bd679fbf25df9958320838cb7c83c66876fe7e0affd66686ef911369e3a20d986b3de4be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5867d7031c06f37d9d933aae67faec2f0
SHA191eadacc7053b2f67320747aabd5eb96e9747ecf
SHA25679bfe3194995e11c566832e1b987807f3eaf0f0c3c27133b9aad624a5eeccf86
SHA5126bed1041aac41b94e37fc9d6d5fae4218ebd2a185b7dfe2b44ffe8583e462016c57a128bcf32418245c4eb5536e1010ce59b2c8de4878f91af4fc2a98caa3d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7a31f16b9dc4934f227cf05bd39d02a
SHA114bfae3938b95cf113d2a8b826c69626cdef44c1
SHA2560a9bfce8755fee406d23d432886a3f1963b946825e5819b20913f6409c7a9979
SHA512f3eab595340b4062bc582abe53fee9e975d8257dffd0026c5b5e827e67a7fc996d04b3943e24cc3e418d44c00ce4786bc5d53aa3856cf64f4c76bc2b3650e4d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5903c06dbd90ea3752ea8920934683ea7
SHA1e14a24f01007c2ef62b34f1425656a5e33956ac1
SHA2562b8a72437ed57f7924aa304f2e97dfc23755480bd8a8e04589a3de0b33a564f4
SHA5126e160726f9905bb27b2a5aa50e482fff854a4bd7a824bc78a859e763403b1ff6fb06e6e27462b13c2eea2b20e4d2ecca0a4ea66add663acb03075743f864db94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584b5294a29af824319f98e2c5cf8a0ca
SHA174795c5453aed769256b74a6181896b8c4cdbde6
SHA2569cc8d9d23b04a3896aae1ac54b7d7d80a7ecf4b294c9ed3a767d9341e5ba3996
SHA512a1e6f61c12320508ed94de70c7a861daa9b2c7e1afb8ce3e98e16618d2967a474fcabf4cf64df03fcfd47c390b0047eea8829d8bf058cd410c750952dc1787aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b