Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 06:22
Static task
static1
Behavioral task
behavioral1
Sample
ddd8f6694bb97c607d5b08a187f1cf09_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddd8f6694bb97c607d5b08a187f1cf09_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ddd8f6694bb97c607d5b08a187f1cf09_JaffaCakes118.html
-
Size
40KB
-
MD5
ddd8f6694bb97c607d5b08a187f1cf09
-
SHA1
7f06ced9b9e0beed8e8413fdb6d6a710b00afd16
-
SHA256
6632a37abcebfe5a50ae7cb40e36ac08727c6ec928d31b42315b16ea3a81f0f0
-
SHA512
729bc0748acca5920799c26175e8a0fc451b5b4ad2f172ab9564e0415d80aadef71f6f6adf8410885121467009f2a5303e1741bce29cc7f1deff0957f53882ac
-
SSDEEP
768:jLc4SXRUoCibGkQg61aktkGR6RMbmqmEuWn:5SXLCiis61pyGUCmLy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000005a1b717bec080a99fb5b01df8ea477d58ef964ed80d528982b30fdceb68b26e3000000000e8000000002000020000000e472b37a55ea029b04d40a74faacbb3cc5339fefc1e0d3cac7a3e276dd04ba9b20000000e3ead9564054f51952dc3077ed855dc16cf1d63444208b795354e97137cc5c13400000009ea080c90e61d032dca3e43f45c57737dddea9b65a87787949cc582b69d462c0b79a27930c24d60fc4d20a35289eb9d50c4bf6ea33618f027c826023316c58c2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0bc9a7ca505db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{965FDFC1-7198-11EF-9C5B-523A95B0E536} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432370432" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2804 2668 iexplore.exe 30 PID 2668 wrote to memory of 2804 2668 iexplore.exe 30 PID 2668 wrote to memory of 2804 2668 iexplore.exe 30 PID 2668 wrote to memory of 2804 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ddd8f6694bb97c607d5b08a187f1cf09_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ad454a8e8eead43fc8f2db40620b32
SHA1c922427df2cef817e880d5d2fdd348a20fb8b0ae
SHA2567101b9c7baa5688be3545a3a3ad33cc4be655b81b005a121388ca39b5769c161
SHA51202ea9b2dbca03dc13d2154da59cf1ef748779988e75ab1b951bef20d342dfa5e2430e0ea1b3e2e803c1c8982deb8212bbc2f2925606a1a77e127f625ed06a4fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c68f37e2b6f15b2d8c9c54ce95ffe4a6
SHA17feadbee6ee9b8873ee8c69f1453ff7c05bc67eb
SHA256fd87e2a3c53b41712e10f248176b05c057eb1dcf3b268a4bce00f53a5fc1dc40
SHA512cb975126e9a334778b1a15fe71f92efa2dd1bde517c5a044a0fcbe377bb1d24b9ce343a6cf3fc34da0c0b2fc347075c8b35ffdc723d3b4393f97e20b97208dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50088e7a16423134d5dee26d6e2d6f5e6
SHA104d1a3f3960e784a8c0f179b6c32fb84beac5b4e
SHA25610d6ebea4a1457ad36a77e9272a4da7d03e3248e49b6a144a75593fde7e44e0d
SHA512acf784da9fc560b77333b53caac6785f1d5709388e1d93e9046c46a5dad72ab51a4d0adf04b08235e7d43c716c17b43a1ab354d3a69b7be87a295d0d71f59f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f9fecb238bcc52aa6470ebed956868
SHA1783239d57153bfd3eeff2293778d21cd6f1a2a9a
SHA256b8a4d4ae8ced80c95ca37a7bf832ed312d0b975f113899fe167e6511a26e8cb7
SHA5127545365f3604c728c503b43590526de5fac7a47b10b6e1b718514baaaff0db411dc2a6e9e8b34fda414db44e1e5f5b567092188bc57a645f4d5ad88a4ec99f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1a4402ec317573ca0595c9e9708c77
SHA1a4f0cbe65c286a8e267f46ebff2666f618bf3ac7
SHA256567b93f88af130ab62a5aed918df929d1b32ab40e768968836799a52dcf25033
SHA51280ee863bbdd9305d25a44d71f2c4e78aa1877e99c6dd0367fa20305efad459d7f5933bc23e9bd2190fecf0e68da9cce4e826076740dcfaa9c401f68f41e85600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a0508adc91ec35a02f5caaa1077fcfc
SHA15eca2d656b4de30ef50e807baf74b71fa1a01a83
SHA256c7d5e752ac98030daa26b434ead1df43b751f29401992c99b98bea5845baea83
SHA512981748f0d8164804d087466aa8009fa547f4f44a8b360c058b0bf7c05354a6240564a1895425ee13c5e3ec23843da59a38bc4fd4fc36771f5bbe1d5836b953b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aee59cff40b633532e0583d0c08473c8
SHA1033835fac1aa41dbff441955f5aa2cefe13e8dec
SHA256ba885a23995ecc41a916ea636aa42429012afeb373575c4efbf8e317a4e47f1e
SHA512ea9bfa45123a654f015d021585293d8e1f02879f9e2e85eaa045a8640b360993b2fdbbfd88212fb441339b5e1cce57e9e327aca638d1c5971d04eb5b34d34dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5453f14279633c558606842b2b0c4b714
SHA1fb30b7ca93343e8859069c7cb6ed2099ff1d5dfe
SHA2562c1d02af4c7ef2b00e037ffc9fc5247fe8fd7ecab7b6d4a56b531527fbbad6c7
SHA512443fb6f101ba35fe7945e8ff81c6dc375b89f16ea3b77dc5a6ee119d8b634e118fd33dc7c2d45c1a3f13a402bc90d3858ed52c2794dd70d76b4f9dc5ed6f4365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53570963211adfbccaf1bd7ae9db372d3
SHA1003f9c125eeb64149c1495eb90e8534369991af8
SHA2565c1095f58da75a26e58ad04e7b2b39a9f6f527352510bcb777f3d18790eab6d2
SHA5120ccfe4506ee68a8c38ff34ec645960419373ef2b3f85c93c23fd3f26665f3fb2b5acaba54e4dceacd37fad82458bd21c059aa54628c70d7a3014c0db3a2daa74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a0f971b59eb30bc85be7b7ff9d53d7
SHA1ee8280bc800b7ea7f9959626f8d90744bf1a10b6
SHA256d3cf6c8b91b685e92014879e3301687d4708bf5936fe0f83c396efce32d13d1a
SHA5124ba0b02e1ea0ec03d577e02326d656a633637674945fbb3f7070fe5d538d8daab1f47a9db230bd6b971641eab7c660c2dad2049738b9c9d5d17afe28991546fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57da6d1a6b0085ef7952361d270b89668
SHA14b47117589a212ad62e2371898cb88c8330b81d8
SHA256690a07800de32098b1eb69b2f88304a849d7ef9593012426b004536ed1525b64
SHA512a5545c81a4a6bd82c6e3340a29d47ff7f7094782f1d6093df7d43ed10dc5c3be2b79472fe2e4bef2645539984d123bfc5e48eeac6ab5e7f5b50d38ef57773296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517e402e357810e06170f187761dd595a
SHA1b47bcc744e5bb84f6c38450d554c1ead52620761
SHA25651e7feebc5d5b9b9c6e286e03cd02c6b344b8fcbf2cade41cb2e6b5a50cfaf4e
SHA51295fd6cb016d92a94fb864b9bad9c3838f2cae97f8c763774d1370e58568c18ac48d774fe33ef1fff1a0ea5ff08e91ee855e03290f9a5ed702ce64dd1470a0198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da7d17b64ada0891128cb73c7a583635
SHA110fd405d9cba3f6cd08293040db88d60d24ce1ed
SHA256dc3cfe9a6a9999a3b6b7f20d3eb3de7036f827c53a87a764569ecb0ad9cfdf11
SHA5126893958aa99272d44e256070a5eb61e5b614120abf02bf2048a507550089b9216d9e284e913e479dcb05249b065d0366ed3905e979d240c735555b52a032ccc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57931271a6ff8f8d7f595be285ac20d56
SHA1e74337914efe41d652d9f99ec231211f5bc0004f
SHA256992ee0ee3d6f4c2cf2a6e0c5d81fa703d85d3c51dccfce3e8fd9ac3b5729f333
SHA512e2276e57c9abc445a9ed7bacfa53ec559d116893343e7923ba960ce63a54fef412f7382ac07958fd1ad320f8bd5faaba086b4723b4c2aae7e63a4e969988d4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5289b5f3ad996f47bd5ea5c1011421721
SHA16569c28418fc95426825644ab145f2ffd4157727
SHA256fc8b7a5be521755647a9c3685409f194074a03ff13e195db7a193c003ad5bffa
SHA512c40df42d22b6ba33e7413b88af42d5ffe883f1b88cb3baaec31909e03191fa0e51716c694f2488e75b467199b5cc722eb85b390fcf52f5dee454399db9a47f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59651a683fe4183171acf7444b2f5e535
SHA111565570642158ff4b92ac7a118589a31b78e208
SHA256c2ee23bbd44c0dcbf8d6707e1fb5ffae4475ce6d7def1598923c896ac71ae137
SHA512050542b9cfe5e4bbeaa09a2a7196a554b0ed8f5f8aaff0e832215227ae3d35abb10cc13d65d6daf583159fbffc03f8dd530a6a6ada6d9968a3ff48b1ef3a3720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5385cf75a284c084ecf494d86b2a11bf3
SHA1e7a98ca8c3152c7bdc6ccf0dea03bce893daf93b
SHA25674d017e8212fea192a9153c40ebb3eec2a5b8e0816addf7d38623c3174361415
SHA5126ddbea1d7cd43bf88054da5134b83fd770b071050193c6aac1203400034c6d0eeaaf11b7238d3ea84588c4d91880beeb18a61d1075c000412f8c624850faa62c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c0eb0b2af21e6cd9f27f88eb86d57d0
SHA19030828ac803dad9d87c6e7af18c3db6ae117d40
SHA25676b2f39e1ad487fff8b55117de80f220d9bb05755239e906088087ba5dce5806
SHA512345ea3dadbf3245c8be97127b0e11eb04fc0350c4d3fa2ead817cc9c7f90627282c753a6ca0f3b8f9f68bcfdb6cbb3e6cc47763c73e7ae5045e39d63ec46d6bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51612a364dbfbfa8318fc332f70660dc9
SHA1e566ea8983c41ae07a9a2043a0ac3f1389226366
SHA25645c9fff6b28a869e253fb40c640d5ee653329c3aeaf73b3e498043429a47f84d
SHA51238f157a7b0d55e86e030b20bb11a0a6ad34b1cbf58ae448b62159722a7e87f2eea6e9d1d53b387161acd82d78e05fee92e5482fc231fe8d8f8fb41591273759f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b