Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:49
Static task
static1
Behavioral task
behavioral1
Sample
eab347c65c9bc0bdfac8eefc174f2aa7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab347c65c9bc0bdfac8eefc174f2aa7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab347c65c9bc0bdfac8eefc174f2aa7_JaffaCakes118.html
-
Size
77KB
-
MD5
eab347c65c9bc0bdfac8eefc174f2aa7
-
SHA1
7ba70a2a6b347414cb3d784225f5a98fbd37fe8b
-
SHA256
da189beac71e1d0ec77f750919ecb619b941e24a43b4574bd0babe379bada816
-
SHA512
9f9a9be779666f40853286715003864cd6c0a6c6022e43659291f147474c7405205ee85f6f0ab115f0f702057ffe421490d2d049a0d8aa272b67f750309092f9
-
SSDEEP
1536:S5YDhRfST8yW+JKCujGbc9kzILW8nQDuLweDGO:SOffS/bhcDN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8004b4bf570adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886819" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E44DE3B1-764A-11EF-AA6F-523A95B0E536} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000d19ed206efbf11c6e702ac158c46620d57ecb3ee11197f9dcd31469c95db8075000000000e80000000020000200000003fa831fb11403ee3c03b136f8bebc93af41062182c129e955ba7d8eb18ac015820000000eb8ff4d0c24705629c07e2ccb8a5ece1776ca837bc34ccd880b4e83b275b9cdb40000000c8ed1031c2c728f7233d44a4798b0c2ff510b9c12a86d1683801523513ddd42cd95745e0f52abfeb68ee2518f287d7a311615c52f7adb48fe9473e741d5ecb20 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1980 iexplore.exe 1980 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2856 1980 iexplore.exe 31 PID 1980 wrote to memory of 2856 1980 iexplore.exe 31 PID 1980 wrote to memory of 2856 1980 iexplore.exe 31 PID 1980 wrote to memory of 2856 1980 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab347c65c9bc0bdfac8eefc174f2aa7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546d968c4b85b513698523775c9de18ae
SHA1255c58cd7a4198dacadc8b949eef76b2ed9d7ba9
SHA256d894c32a6f44ee537ae05c790512f213ecbf550a46327aa43adb0ad04860f56b
SHA5121953b6bf999be4e0456ee417a3c6748dc93d6a6e063d98542c8938115d82dcadf80a54ffbd9b891815a80b917c4e526f067e351f0f529f32925294964f798e9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a9908b23e0ae90046ba552401c10438
SHA1dec3139115749ea951faf3f5330ce4ee49d01594
SHA256f18090eb632abc001f5a9cd50e5374e920a80250ad0151a4055de19b7f1a082e
SHA51201616826736e99a1c257a1f37a20b900182dee201799b05fc6c6f8480656ce173594461fb407ac17b86b3f8e2c0f58e658135af9637b23ac4af990fb42c03c36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5596f2067e17970fbf3b25a439200da34
SHA1da4f5a97bdb02de0b6ce7f8776fb29fcebb52416
SHA256c6c997b82df188abf1025b51235c7faed70b8db22b213c388c67d78e0e90864a
SHA5126bb62a8062570ccf56dec5585bf6d6168e7f27a19ce388710e9932fb738bcc0ba58958eeeb24b5fae73646a28ce26bb8147450976a749530d90829cebd350558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c95c07fca3390874e945af3a7216830
SHA1876da246c04989dad6f186117fbf1af4c2018241
SHA2569ad1a832031aee4b4fe47c75e1d1e16da7c76c03aa454de7469d3fbdd39a3394
SHA5122f1ec136fbd8547137b7f572a72b482dec7ae5d64259192cd6111371a1da0265c849328b7f55170328c5ffc7833b6a3db8afb39fa06c68a6ba9876385d35595c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55420b70d6fa51627a02c9e98baed4dc3
SHA1bd489735911ac50ca33c8c5b791fd416bf7633c4
SHA256955c8ae31a325d3ed305b60455600336978172883f31c9b4299271d4d395bd1f
SHA512af66cdaa7cb2fa4db38946c034b38456a2d897323aefe6bb72950addd4d3f899bfafb96d33c59d897987f2e96f199e591f3e12f7a89562656f3037e144cf3516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c8fa686f5c0c6a98cb46bbc4a5d731e
SHA11e2128652f24b4f977ef968f62582eb57f5b8f78
SHA256893215ab3ea86f615b7139c3088bc9ee7a9423c622a586324836644a3a2a05a0
SHA5122c6a7eb5a185742c428b73b6b769cbd1199a7ef95eab0a9d9acc92be15a6b8ab1beb9c2e46e4bbbfd1656cb7781e7afd31eda93791d9b703aceda10b3bbcd277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a52795d76d9c7972e21196ce290d31c6
SHA195bfdbefe8a6b2445ba1f5fd14e356ee9bc5b6a0
SHA256ed7738795c36e4c1b395d25a68b3ad407999495875f11bb696cfcd1a8835c884
SHA51215c4c9543872a06935380bf669f0658dfd43954d55e94484427fc5e23ffbb6494753ec66e1525587e3ace538e07f221e400b325f592b18030b676b81a62199b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bb4b61b99fc0445e9d7d283135d056c
SHA1a9f0d3f2add2392b9105e39a4c1d1516204f69ce
SHA256bce67b90588b447c7b92cd0423e96f81fc94788113f521645d85ea7e462dd0b0
SHA512006ed2b56f7eb54c30e29ff86cb6c70db1aaa8e1dfadc942282929a88a76a1860de711d84949b1e9b6ca2c347b1e08b0d0a0fe673e5c343ab62902e784ab51a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5526356df9b58813e641219a5186bd717
SHA13f35864ce84efc2f0dc97cea7da2e48f676f2c0a
SHA2562161cea89035478d664a79825732edae2baa6fe31aab17a66438b767a03001f3
SHA512d8b7429d350018652e99a0e94fb740fd57e3c00bb0195bb4b62d2d1df03962f236edd66d6606163b9f40c84cacc5c26534e6963d299a5c07b0f416258b708534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3cbcf72edce00d56346169fce511776
SHA14fcb71c953cf2b804a499f5bf6137522016329bc
SHA256c9b3a38fc5bc7251fcab4bc46942a77e6fb2d7b4b082cdd675220c4ed74f966d
SHA51209e761a763fa4e391ee6ea96fc4e0e1628da51ecf64ee1b3bbbdd6efa93304d6df0ccc2abb5cf638e023a0bcee652b75fdd64ac275e648fc3bc52f8d55ef447a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57975ba7f28dd39990cd89ad153d0c996
SHA1c10fe94b4ddfe775c2d7456000edcbf288b30a3d
SHA256f9cedfae507e13229a02a50bbcfeb3b21b1616507c3606cb66df60b9ed3155f5
SHA51265042727fb3108370f66744fdfb3bf0c5f492b684d0017f30fb4fd4ca794184f4645127fb91e7fcee0169f7935f7a6544e5da9c47c21d20cfb06994c5ae076fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fed83bf23c7369012290be5f00ae1332
SHA1238435d1e9c3bfbd79e4585e2179f98ad1539519
SHA25683db13e005ebbe868b61266bd22ff04b0fa17fff32881d669a8341e55b4eb9ba
SHA51264ad8e152af23311c904db0a2971eb421bd2a44f2ab71fc58095c22d29a3e44eaeadaca72567590e5f8cd4cda6e82b28999085d6795bc37de7f7a2b931d1ddca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d43fa68b21c64309094ce64169974173
SHA14a15fc2dd5b9afe897fcbbea71829a8e3ac9e783
SHA256ea9532f01424a7dd89785ec39f6b7c25b7944f6b5b4a74a424bcdce1f0bed93c
SHA512b3506d1e3a51ecf01a6f2314e3dd333b4216745404e8ba8bbba161aa0e9101d2c4881e3023e68422db47f5b0e767581906c69a428e431b1f3a6b45ec002705dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55587779a647c07aea6fbd57a4a818190
SHA1244a08101c42fccaf3978df63b8c22fe68a0d4f0
SHA256d9783baff833b4de543b98d5356c72a97ca2922f914712ffc760d3151529b664
SHA512495c4cc7e1b2715435e29eff275e024f706d22c3d43830ef105e16f43c341f5796dde13d11fc95b3aca5f5ad91de3950728b70d0ce6eeb8a694f546692e6f969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50376965542d5c65824d2377ec9b4a964
SHA170279b608f38414df64a3784499ce30733e37211
SHA256f75115891ab59caa877d5ca38ace0bb74f720a202dae14d6796129cfc87b76e8
SHA5126ecd20bca520605f6adaa9b850b6a0edb935cb93873a31b96d244cf4947c54eca698e598ad9502d533d9e2a44a7149cb5a6fa8bcab83b5135167becc0d9d70bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4e7368d9737d5a801c6f920a4724802
SHA1c36b9db5eae04901dd32e57f9869ddce399484e4
SHA25683d4c651cc565ec79212b97db16888d859038cb8eabd721511d758b5b8e8ca4b
SHA512b1518dd8dfe901ad340c22d8f039a216cc6faae5d30bd60bf7b46b74a721aa3518b4d259a56f7a7206b1d4dc3ef160e78be36507c83fc36f1727fc2e681db625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c186f5fb34399ad04f32a76b1544b73c
SHA11ba224938d5e966ad3af9f2487e01eed9e7afffb
SHA2569d67f02a838e65a1c92ab86974c2bd244e935a5a6833595edb6a73a03d6b1162
SHA5120f58072d031405a1b0d9383259516aa0c9d1a316330413c45e0b8bc9b74861b5d3fae16a59f503eacee4bb0610c073ac3452fc7263cf3399d4650abf4b4d3fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f244aff358c6f9e7a54fcca83827d712
SHA16e349ebd296cf43eb067c5440b2556dfb5191908
SHA256f1954ed4ae677fa4b0212f42652ddba8b3f0df8279c051e0e363b4da4f038d50
SHA512bbb112bb698ed137819f45003f0c7e21c58faec5c203d5f550dfbf07a39aacda5e53e5196ebb65e4965f540e81bfffbd92dc83e716e5a458932b9db1e05bd4ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510a11076d6328fd765fd6bf82be59630
SHA1afd411e9c215a8bc20f1b62cad9b2e532f8c321f
SHA256120d19dc1da35af9cbd80cba7fdc8fb7dbf8b71e64e1eef51e4dce0d4fb6451a
SHA5125956dbf8bef9e559dcd9408b64264e337412c5540c5600b7cb8658d802398b12d74f18510b64dd68700d22774f6c5211864b8b5bfecb8a8a76ac39dba08ac312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7f33fd5eb63d14d2005878a3acab6a9
SHA1e4e2fd994870c74929c7b8fdfda8d106a30a846b
SHA25673ae1e7052527f3154edb2b111870be8cc8e2bcd1ea86765b23457709d73e22f
SHA512b0150ac59b909035382ec9d607eb270b72a53e911af9413e0c11b0accf6d794956509575eac88d3884d4460816578c989f2b49bdd42087a4b220c4b53a233219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e341a847c76c4694ec8460095ba0c3
SHA1e5b8ffc9bbbcef9c3a847012193c5edb770dfb3c
SHA256cd2b66c468ba00a08898bba66594a27e96b14512e0180204a9f0626831ae9a78
SHA5121becd0ad211a361ea16ef881db0aa194c7abc7ecc9ed93c4987c13975c1d629ddcfcd95bcbeeda1ec645905154fa6150a2787328dcbcc110a5386a66f3b5c77c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b