Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 04:16
Static task
static1
Behavioral task
behavioral1
Sample
ef0d017c01f6209df6cc4c803a3353bb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef0d017c01f6209df6cc4c803a3353bb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef0d017c01f6209df6cc4c803a3353bb_JaffaCakes118.html
-
Size
45KB
-
MD5
ef0d017c01f6209df6cc4c803a3353bb
-
SHA1
fbfcb118e505166fa2365adb793a4bcdd5b2ab5c
-
SHA256
16f2a1bc78ba489db876dd312bfa26b5baa51e82a21e34fcea3312cfaf9b1d68
-
SHA512
2cea64261cd740705a2a0047925594f21b248b473806fddd55281a302c5bba6e9309d019e07ebec690020c2e7763eb5d5a00d69bebc839804f20f8d845f14ffb
-
SSDEEP
768:JprYb2c2l4raPkk/iEsC46Y4tQDevyXXm4pBRyw4jnikMxzHL/KgTT:Jpl4bk/tzvyXWyRvMn1yr/J
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000008701c544b0b9a6db05298bdc173425b3e0365ab80bf42f713e72abdc68beb374000000000e80000000020000200000008a92e12a31387d774948faa0907c04628daaea5847c5a9a81c88bc21bc6e06a1900000004a89763912c56fa6ea9426a22100b7a931a8fa363c13988d28d3a056b908e3b1d113a5046426b5f3ee8c2501eff1027d4b53e86ebd0d20a37787c7a87dbf54ebda32a594f99e8742afd73085d57c49d06206734b0e12e2ee2daeccdc9b4110bafc39fc7e9519a69fd9bbb48e9e90b01d2f0fd08b5c90f3a767b04a10125a698302db0ea7ef477661eee72bd1aded1dde4000000048f2c154c76c4b50ec255a3cb1953af541d823d4f3325aa95aafe09544a1d299d86cfcd1ca62f903878b305570bcfaebb13abd4a69eff9f325878e278cf514fa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d12228dd0bdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433054078" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{53B7FB61-77D0-11EF-A2A3-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000002ff9a3d1244251267afd04c5d0522a23a496f19fe624248b37301fbd206c0fa0000000000e80000000020000200000000157fcadec1b64f85563fabdc6c30a4885b6caa34f3865dc006f650e1b6801e22000000064f89a02a8a8ba72bfad0a4bf6fe01258f5e5576cdbff8d2296a6d1fe18d255040000000e482eadbc35ada167cc9f186f707269c3b08c2c9fad74fc8483f7ed2b70d92c52f6ca838eba40221f34693c72ceaf401c29390474827466ceb6df78f52f095b8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1388 iexplore.exe 1388 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1388 wrote to memory of 2808 1388 iexplore.exe 31 PID 1388 wrote to memory of 2808 1388 iexplore.exe 31 PID 1388 wrote to memory of 2808 1388 iexplore.exe 31 PID 1388 wrote to memory of 2808 1388 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef0d017c01f6209df6cc4c803a3353bb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567ba4e1f67684277286bd9844e75cc03
SHA1883e447572f763772a83d0ba5840e4a95f98ae9a
SHA256b9053173b66d6fa29fd1d01775ab5d8aa7865d4fb15a07b81270606e5a33d0b3
SHA51225098efb50cf8d3d827361062c6bd7e4e7f57849dd0b898633055a6f1533731dcdbbf8f045e72edccbbf5e7c58d85e9777257b4856732ed5129b88efaf3589da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cab6b7390d49b331a8d44f0228beb8e
SHA1fdae86b1d1948e78ea32c051e3eb03e7f12362c5
SHA256b851825d074a6e85898d0c8f1a1cf9838715cf421a33eac51dac5795d25a327f
SHA512e0a3a50c8a20225797c2dc0a0be1f7056c96a8e6f7c266777a9cd52aea26a4391064cce9d51042aacde2482ae5ff0d9280ecd5a14d6cfc8eba7d2343a6cf140f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53de0a20f1754f704855ee8f146962590
SHA1f24b2620b0930be9f6090de3c5dc21fc8a2217a6
SHA256d4ecb62bfa7b188c82b2c45ee679815c482415d88ba2a2137428fcd2a75f0387
SHA5127d846e241d4765393d2747b2843ed2596dd78844e42842c5052bffac5ed7df4a38dca8bdfc09ce3095f6627405b67ab9488eacbb1cdd6cf1ece1da0c644e5280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b5d757c85ec63153909973ad8bde098
SHA1bf6de585943aa567ac3a4f21b5dc93ce11ac6489
SHA256741a7620ae8a6bbdec22087be333e08d1fc470eae4db51c98760ebc61d6dce2c
SHA512142f78c09b7fb04acf7069e85f7db1b628b611c672fd12d2e29dc5a676a0d51a0f528d7281aa7912262696d0bbf969e30732744f51317dc6fd93d9d6e8bfe16f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4913a9590dc82a66cd4f627670d9bd9
SHA115498747c36c494ea7001595da221acf1db6803f
SHA256fe99e42f061c4951f3e60066607890de6b024c0f6229535bfe5c1e044e647f37
SHA512b1343ae9a961b2e2c93c4609cf56191133d0bbff415ec57f991d13a6a68f37abf6a8bf85a7e18a68d6adace3d28be9fe2346fcb4e2880f57b105d789c5556aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0204abc08dacd66ca19bbf08e3ee310
SHA1863f2c2c0d1e272a9a9bdd7186d8097aed07e808
SHA256fe4a934a18fd8ff82e2618ede1d9a5aa0bd21b0c2a828fdf620757a1a8690cfa
SHA512467876532f5d497d7808d8be3e75c616b4354e39d881b48efeccd2a65ec0b258714c3d0f37fe4a47484b47c26d63b7f549d88235442f7d6fa6f6b3104b7d9900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595b4baa955ce61a6d82126887fd968f0
SHA168e2aadd55af3e5fc2f0f4f7fd61e3ebadc6c77e
SHA256a4e4722e05d85e12d67967fea8e25ac1d114748780c72c6b569c0e3632763fbd
SHA512ab6391aed294bbf66ce4cc75c6cc9cbfc7d44768a72b2525dea557bfedb0fa6d51365a77d561cd48f7a698c312912c1d07a53c72e8af54bec77e3a13048dc003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c26072005b2a755d95e3ff356e20ffb7
SHA1f5a2ba89500c6ad09a40152cb1a97b70a6f35c7e
SHA256ea63e2eebb9224def368bb515ff8881c72e870818532155785f72e25b2b52461
SHA512dcef4b4fe45f60d52984ba385baa58298875038218c9c673f4c343f5458663b4e2fe9e65eb8ddaee3112aea65fede88a6355ad78460c36c0b21442f1df76ee41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59145bb2805fa775d7422bc794a31a5b3
SHA12627a319cf30e5a86bfe512094dc894e5f591ff9
SHA256cf1d220a0b14e5df6f69bae51e56ec01cf5b9d12a29240bb40e30b3d1fea8c4f
SHA5123969f219fac77aa69e0a8111ba3774aa590f8f8bb8f4c3c8e123647cbc4deee55a46c8cc4bb3bc4211098e1b8942d14c61cb037db280d8d5f26d7baff5611f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512f3041a3920be10a8fe9ee719d2b31f
SHA16df2364972fe1fea80c7112987c07ed611741448
SHA256e06490ad079616ff203046379a18ce41e02d4eb593631f44efa10123846f066f
SHA5125f000b7f5b9a216097aa130066b696d34f8fd88c4e8a66ddc0b82ea2c2113111066a75384712b2603acec9ea01278ad89825fd113f2d62a4b5359c8843ea1544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be03b17fa54839cf7fea2b60d4ab871d
SHA1a2346f36b62eab820ddbb29d52b508876fc7b79b
SHA256123e35bb577ba58c2c1eb927e86040e16c4b16c2ad817a1d32fe7620930fe330
SHA512151636d239bda210bae844bd4724a1d307ef906c73164d5dafef553836f46c0059795c0c524037c7ecb4c54aae2af4f6097add2b5c6303fe20a287d9e0afc373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510ce6f1b74953333e5f6fe532f4d63ae
SHA17b9ff357c2a041349421cd5d094e6593ea6e6d04
SHA25640fdc14a679caa2e73d3d179dcadaf6979c95a3e1553853bd1e8d9f8a9c07994
SHA51220c89644b91c4005256db00caf31ee751c2ff443dd7830365c6f900abb3ce41e012c95c029164c0619fd1f395d664b57b5f6335daeb593cfb947601554112c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513f25e294b532479ac09e473cae6ff74
SHA1dde2f29a53b57847b625a7d84dedc466762b3537
SHA256f83c83205563601611bd68fe34f9708cc70b1d154fe40cef287056fb27015ead
SHA5129e8493151a13057cc0f7f0a9465be1611ca2e8670f87b34208ca7c27938b85f1397d5e6f60a60fbc9d7d67d3aad8159b539be51e4cfc23ae239ccba1be5d47ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0ac750f98e9408888a946b8ed905c8f
SHA1d9ce4b874a031bc184f3344003b620988c1b7110
SHA2567057bb3e3cfc5209f493c1f96e14ad66f1858651f35583ddb69eccaa0144ccbf
SHA512188a73d77dcf6f1fc816db4b90398e62e1976a46fe7c18cfcbfcf67b44cbc09b388d7f36012a29455244c72b14f55589c89e1738f1487ced8344d0f51ba7dd7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c66dfae089e8852a02f453fb85e1a819
SHA1bb24159dc0e927819668c41cee23381634dce7a0
SHA256da0a4da4681dba663c9afa576d2c167f6b50907800e3844e0d6ce1fcb40db7ad
SHA51215ececb4b31a2856d76f9be2ec0b63b5ba2fdc9239e38c6cbbbc294f33f3585d2b9126f88e5ea2c071d4baa7c11ee018581ffc20b08b3d8be47c5000016012f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b9a8ca208cb600f9ac50952fbaab9ce
SHA158e5a025598bb5f20b677e0c069b07d7da974732
SHA256cc651315ede6a7c9525970c4d0e6d3543c6757736ca9e1d21d45e5727cf27db0
SHA512f843a6401a88f52ab445937d0168aa56b39136de986b481ea987712c8c307ef8979496df9cc3080a4c219b67d91dd13ef7f7ab5fb777f517f349c1f395812652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53555c13c637dcd609c90456eaba65256
SHA1a7e52b671b28e4f4e1179cca48c3143df69e9d86
SHA256ac890cc9c8cae68fd678530c009be6ad2ca71d82cff3bc6bae82ac3a865bdb76
SHA512443ef91368fdcb410a671b1775e9b199c57ef987734512bccb677137aa2186a6c6a4cb2550bf713216184a7dd7a3b65bf800a2526f9fb7fb0fa1e27509fdbadb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532103cb7b3b157d2bdb6ecf8e56b9486
SHA10668535488e8f29a0409c5be27da6161a248fe72
SHA256f5584c0b519d2f8897260e8623fb2a0a92f7b4d9d3b1e62cae27c41a7e1cbc29
SHA512a54b8b5ecfff1c6fea30aefb70a710dce1dc41d8ae43f55f2f58ae74b0966486b08040fa529f96236caaf02e7e8d418e584f8bfa93e56035b5e682f1335fd0ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8743f4e39a4c14df056cdf9af5af858
SHA1a00b8e4cc99f4f202f304932d02415949f558b89
SHA256604a25d700ecc1f58d3e3d6441a719e5315e5859380b209fb51a6adb0e00fd36
SHA512d7fc849a7548d4a49e1ee38d308a7eeb1c49b9515c1abae31bf9e3e265ffc60bb95a2ddd93b2068e1a1953908e1bd0dc933b84c0753f4e6badf7e0a45cc6c8c0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b