Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 02:02
Static task
static1
Behavioral task
behavioral1
Sample
f4ee06bd8358ae994765692d9c3b406e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4ee06bd8358ae994765692d9c3b406e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f4ee06bd8358ae994765692d9c3b406e_JaffaCakes118.html
-
Size
461KB
-
MD5
f4ee06bd8358ae994765692d9c3b406e
-
SHA1
08605e88e2c045788c70ff0f80b554d1927b40fb
-
SHA256
7882ee0fcd2fd93f6fa28f3896739b518f89b6961723d1611b60972f82ab0a2d
-
SHA512
042c41f5ac6eb06c806f5875bd964eafa3998893d924da5d0db882c4f348bc10cd348b25939f4395830755e2929556ba12a8ec652edfc7c9c32ac46c5d6c56c0
-
SSDEEP
6144:SasMYod+X3oI+Y1QdsMYod+X3oI+YosMYod+X3oI+YLsMYod+X3oI+YQ:55d+X345d+X3Y5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7031d003ef0edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433391593" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000099ca40797a9f004b530637b7a19863e3961401646243c1a8a54c0324865fe947000000000e8000000002000020000000f6600278ab1e989ae58a439a264b9cb56d3d3fcbe4a8ef37dd429e64795dcb7920000000ebfebce2e2d7416b355449942ec19d1de4997b39ed8aa3f4bea26b7e306ee7ff40000000b98a874b949f958aaf75c87292b1f92743c26d29bc4a6df167659de79a5a74fa0b9d62b225bf20ce110834fa909d60bdbe1145b3b4dd18c2cdf9f386705843c6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000006d0c208dd9748b7a8fa510ce6cb950ba9a46b0d67a84af7467701b868597eea0000000000e800000000200002000000037f2a181016eae2de8e00f40a9b0c3700f16ae78b4cd5e6536f89e198846ccf590000000c7b898d2bf5b01b95d25622edee2359769383afd290735d7f334252f7e5ba2d10d4c8072334660b4d658175d1bce6d25bf5d640e317bd689c54a37ab13c7388597ee23abdc6833589acf652295fc6d0609d50912fc3f66b66fd48540f2383b940f8883af30e5ab7db5e8f4a4d0f59222ae6accb3fd4ad4669736425937a7ddeed4c759be5b2db18a0baf585d0168b9a2400000001c06a0b65ce47d8de76212a5a76af6b0a10a1e1a4457f3589e92d573d4ae2b63ae197baaee9d66ae3edbfdffa386253cd8697c2878d511cec07162296ce52e41 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{29BBD561-7AE2-11EF-9109-7694D31B45CA} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2220 2420 iexplore.exe 30 PID 2420 wrote to memory of 2220 2420 iexplore.exe 30 PID 2420 wrote to memory of 2220 2420 iexplore.exe 30 PID 2420 wrote to memory of 2220 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f4ee06bd8358ae994765692d9c3b406e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c382e452fae0e7229e08f58c9ff92593
SHA19d307e007448ff78e127f9345e43f7c7942d594f
SHA256590ce73c5c58e14ffb3b1fb6f922580f73c2b3e75a7916c0d77ed58d00e498d6
SHA512cea2aea267f2c2916ab50e88dd7afe6281e3da469c25a863fcef3dad1e7871f64972e366d88ff3121888615c6a6bf08dfd1efa65a7115894e7b0acdb5717971a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5476768230bc3f9ab200fd1ee9941c591
SHA1e79ef30e2f912737baa3d3c75e400447aca87921
SHA25681d1edcb6a4ecf6bdaf380e3decb3308d6b08283428a5a1e01dfb694f1010d42
SHA51252900d4cfa85c14b9d428b4bfabcc0fde2f607fd86bf52a4ed896d0beee117615564bdfc703a6ceebb26050e38589e04b77a92fe38c8a4f63623fca260d2f280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dd1fc47e08a70d66d6945b0f4902674
SHA1afc80d07040013463d89f0b9594a1f2bc33f3e80
SHA25642db7338925a2f6f7427938588c3e3e3afb56553fe693e545a33d94cfcd790ce
SHA51275a802ea0aaa553ea8e8d3e8b2091d9b54fcdefc8f3340304475ae9d95b7846cbd2961ccb7532805e2bfacd70e84e6781ae1a5b8786d242ebb6eec4b5c6f094f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ac963823ab53e9354a4c0c66580e9f4
SHA1a376e60304cd45919f795d9158f11f5559a9d6d7
SHA25635d4ca859b734fa05ef80c44ac7399f3218ee11997d238d35720347f92a6a93f
SHA512663abe829c68301f6c3ea338f71e2182672a0a903ea103a11d9b64673133f009f4b07c112f609b9332e48bbb1a88e732954a804e2e6e4002f51a4b63bbc87a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5934194be054d87f74603ec0207ee8b21
SHA1a339eaf526ec5973350adaec0b5426a42a4bd54c
SHA256d228fb51ae92ac0b30d786b1468fb58b993267061198686ea16d313dd0fc40e6
SHA51228220e299326b5e08703dbcee4dac241bf4e107e61e9845f8c4feb8ff9671be16ee0f69413218d4744163073c5b1ad62481552cbc2aa9dc742ebaef7a03b6e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b689a85ed1b10da7170321c9f0f1f3
SHA1f479e4d34c9d9c95421981039f304607fa141780
SHA2564a05221b75ced9dcbb81eee3d14396113e5d824264441c62aad9eb5eb193fa80
SHA512b1e8d6d5631c0efa1d35a2d217ee1f3cfa58958fee8768774399ef9382855407472aaf0e029448367fcb19c21965c057b2d8d6ab5b734bf1ab52eab8d08b00fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53737cb98783166c8424f15512f93bf11
SHA1ba3b232636a1766ce4aa9c05d287e1a8aca709fb
SHA256e4ff4fd7c186ec281d3f9ce44501cb70c9a3d8e10e4d326fa78c0d5a9cd9b575
SHA512b827ea4710e4ffe456a9ad1de886693e1dee5f3f3362350a79574d659687694ca76a7134cbb2b1baa0c8b7698bf6fb07d3b8d8aa43c8d83a1e5e172ca744566a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b1cc62e47082ae79577eaf6fd6299cd
SHA1b0aa993f4fa79e983b349bec1b97ef7a426e07fc
SHA256229ab08dc22e456d457ee751af56b97dfd94dbd16c1f705b744583d69a6e84ba
SHA51283a10746c8a52ae661731f1debbd5c9c952ded2173fe9425fdce36f737b014c5d0b3d6c6ee931f588af3fbc5a11581d7937352e6491377c046cb600ef193f308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583775612a788143312b4a636b01aa382
SHA19c90d7f30a9a6471d003ba34025920e1a07e4b4a
SHA25633b57f0a530f81d559269c62bf8da928d6e745a96a3575579c8d04668535c763
SHA5123d56043b253029fba9fa3d3d7635998b90d658c57b2889d7298cadd4e3c0baddee038c1fe3d423bbad5e23709dd8c74bae234c0c22f73eea9784bf46e7db4623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d31bc925c232d521d5074793b6a9686
SHA1b92f87e98d32c73b2490cc519f5c4dc0466aef5a
SHA256869e48c394b00ed888d803edf99b93ff145378128438c5ed98d507ad1d2416f4
SHA512b35ddb14ca135788e17c5f2df671d53e6121e459f069ca0fd6652334fd6f6e57b0c94f995f4bd3ea7422964c6af3ccbf7838fd1ee2dbac73f45cb0b212a54c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7a00dbd63a97757e2034b567289b0a6
SHA1f79244e69488532bad99bb35b5b7c847d1a0ee8d
SHA256f83af9666486f7773f0fdc22d66be0119331d1b2163a3e2a7f71b4e6d3e6f028
SHA5129d6e07e690c38dd39c9503ee7dbe190d5d7903b5709a6df279a9d26a2e343636549f55bf8ad20ff77e2b07e0094d30e613c7ec84a21e2c7eed11f6ac3539ea76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ebedf9567feaf9928cc8b1e80ff1a94
SHA143bcc7881ac1013a3a5d3c9af825e22684aa0dc4
SHA2564e814ec871c47a6fa8c9ff859c3c22bff61aa002fe41cd11c57f995d930a5df8
SHA51278cd77798910e90ab539fa204670019a56f9ca75a1fa75d8cb114acb492644361511e03ec77a23b3ceb6de226422d0af19aff055bb6babd976d42404889ffe85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2f1c63f39c3f9d6c5650dc589583978
SHA15c8035fdeda7c8bc11fd0d15e1d9d0dc88d56963
SHA256dea7df04e2ee69524306758795e0f0c621d6e4e699cd377cb49a7102d443b05b
SHA512574c9007dd4d73bea57c95c2aa5d7fdec60c945e82dec4c1c80e798070a35126197e9b90cf413713a005b3b7c56f56108766df520ea5463a58ce0df3468135c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58befb1f461a563fb3c09ab5692cf2ffa
SHA19f1d67a199fd4714981d40b047203310bfd938f7
SHA256934c6dd8192768d5f86c183d726826d5856d5aba8ce26fa0b1d38b36d55c2748
SHA5128f3e3d1d7f078de82b06c513e83675529ea2fb314df0bdd24be1b01b8a46f5c143beae18d13153214ad6b214a4671947743b083e800125c22266ebcf29cfd3b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e1a2c79377c943481e6bf1c1a091f2
SHA1c46445f532f3b7b64c9b8f14695b59eeea22c02a
SHA256d1586f4515e2a8041ce9a1613d61eda2e83f97bbecfc9de9318c7374f2762f39
SHA51225fa968dce13de53bb3b7de68ce41997a7d719e26fede8748f4904074a195e87c5fe56c38d07ce628e57e7c721f42094042c332fbf043d18344f0fbdd4a7c49b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598ed9b2ece971296216e292cf9cb2ca6
SHA1d77fdb45ef68807757b8fe8769d6d7e20cbf3d70
SHA256d64e2867a9376d065bd4bf09e72d49d136d9905e08574582cfb58734b6f0ebf2
SHA51256d606f3bfb5b0ec6fecb027d31d89f480b9eeca77c278cb3ebb04f1c9182fb8e4135c8ba338ba6da0c52ca7e711cf16758a29e635af8c81a70c878a0a7779ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f004fa9d9931b117a0f7566a475d6568
SHA1c4715c98b8f28c313cb5f555afe88b1b94e0ddd1
SHA25613f15399d11a188f628bcf8af759e51e70978536eed98d8a5ae7b02774666af5
SHA512dacf66de0ad1cba35de006391082da53c4c55da19e64d624c9511ac45c2bd7f7e78127f1acca396fe2ef5e90d7cd30b7e91b12baa455715d21d2827b1e5877d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557633a3511fe0ff5f14adf7c1f26bc0a
SHA159be920955fcc0b026f31d3bcba7dea740630cab
SHA2563dbb5afd76319c148fe991442e77702b0f6e10179f0a46e01f3df90e2dc4c2d1
SHA512e2b6553b8cf856df3ae38631cba9fb92d9b9c5fccf57d6fd221bd46b13bc367cdea3a6fc398c4d632278cbf42a2c9b1485686f69cd89ad3e8b9976ea4e587ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b427962ac338f291a3c631ca77b5c10
SHA1a740ca72f46f33d92749a8425eb0d656892e6957
SHA2563eb5f57fe319126e1e7bd42c6e078006ddd9716f8200f4244c88315c6aca11c0
SHA5129acfaa62700c5d9e7ace04151a5caf41db21a3162de848e316cc730d2f0327543ca8760ea29c4e72c3fd4063cc9b1c65ce6de3e4499799de1e26dae008430a8e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b