Analysis
-
max time kernel
122s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
0b3a270353d749e2e67ddfbf2680c939_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b3a270353d749e2e67ddfbf2680c939_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0b3a270353d749e2e67ddfbf2680c939_JaffaCakes118.html
-
Size
10KB
-
MD5
0b3a270353d749e2e67ddfbf2680c939
-
SHA1
bdb44d1da75a7f72b89be9aa04059abcae3799be
-
SHA256
b99a0c31ac27e74911bff1a0ac9f1a222c57077520811f45e0317c656a9d3fbb
-
SHA512
76c9c5cc100a0b0018a9557ec261da8fccd36f041132450359cecf949cc73b54c9517f179f8b2e0d054decd3f3288bc638299bef77bb3bd751e108039494a36b
-
SSDEEP
192:2VVrlIsr03gB8k/w1wvqLkZtBDOnCnVtlF01E6uBuLbdU8d:sVrlIcug7/gutBDOnCnVtlF0E6guLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434042719" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000008ebd4a877038d398cfbdd06f9b537e06066b3dbcb7cde1675c4f867e0839b713000000000e8000000002000020000000ea4d8869f05ab9ea9eacc98f91115d8bcb48fc75553e1d62bf06da1ae29643d0200000006f1ad195cba01f6cf2dd0181057e46c6c8877a83f06ea375b58e9649d2fd8fd1400000001fc3bbf1d04ae3bd5f4d7508017813c14e40e8d77d1374998f9f5a4e373d86b23b9956fe90e80af286c2c29565e13a975cc142efac8b72b82ce97e437265bcc9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000026829a8281dc3f2033112cf11f2fb44f8d4faa4f7b1be8e45c60bf2513c5e18f000000000e8000000002000020000000f6316df713ea8fb710871ddb1258c0a72c724b11673ecb10ab996c571e5a671e90000000266b16b12bfa73f7df188ef920883157cb87112ba76ebcd69e579e234807b2c22ef9e329407d1f45e895986f3a14cbe46af168d71808411d99c7594a6ea48b3fe3e16f2bfe3ce5f1135bd7f3b970fb3adac0d95a79b5e81a86c0acfcb0ebac39ba0657d1f5dea4736593313dcd5b248ffbc362d6098935ed8e7d5cf32eda227ac8abce20390a8406262b9040ae024d9a40000000ea242430e22ba0aed0ee8f52f1cd3723f81d96881e15faae51c52a0ece4c1d2ff6e17012269f11bc8c8f3e031f0b4ce5aa2d08bb7e0cfa9baf991a5118c8bfd8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2FA8E981-80CE-11EF-9A25-6E295C7D81A3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e095ef31db14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2776 3048 iexplore.exe 30 PID 3048 wrote to memory of 2776 3048 iexplore.exe 30 PID 3048 wrote to memory of 2776 3048 iexplore.exe 30 PID 3048 wrote to memory of 2776 3048 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b3a270353d749e2e67ddfbf2680c939_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d68f2950ad9b11cacef8eef23b57c4
SHA11808691f4c134a40c57132663df84077760d08ab
SHA2561cf5a016006ef9150ea71bb86205ca2fa9525088057fb503e1490639958077e9
SHA5123bc9321ec7a302f0d0d9eb6fabf955b37c22c386c5a9704ba7bdd243e426539378a63ef747135c0ef128c18434250df897112cfb6c35ba4cd2fb16165575d074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522121035e447ed8f5e0f9e5b466bf493
SHA1ee4ef64a9c411eb95c049ab0c24c1e6fea1ee164
SHA2564ab5dd2f31ad86ddc40cbe5fa04f127cc6989b7de76a34e39607c1b612612a6a
SHA51229021392411fcec03871917add60137515344e7b0cbf84db0df21e15d314c4d54abfc29ad41985f2e560e0e89f8005539e17b94082864789abd1822c5a9fa0f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f38423579fa3bd5356ec8982b4e3b12
SHA1bdbbb8f0ff66f75f7dfb70dd63aa7962411fdf7a
SHA25671b56cb0141ee489dc2b733ec749e920557a098d63f33924dbd597ab356ecfb2
SHA512d8d3cf5e237480dc9f673ffd9918482bf96391f66618d377061bd99baf3d187adc9374ca0ed61f316a78bf941344c89903b1acdb67a76c328a3c9319ead54f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551cb511882ae15e17d7732b3db48d136
SHA17d01f6d9069d9237b441c59f4dbe9aced03afa94
SHA25609c8ebd35b8329f44c0979096e0f787c911e148cbb4bad25d01280e2a9d7f572
SHA512a123338e07497c7a24fec9dc1ff1476ef2adab05fcde2fa7f4816afbccb4af1eb1642e817e50c2733ac506dd17ee1b8340e22c5c7bc8b1d63463075d888b37cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569da6e9bfee174ed6401e0d703e55103
SHA144e45137c40d6a8cb772ddbc0af6190ce22f0fdc
SHA2560767fa5ab78d651bd585d85f24025deb977ca5bae80ac8dcd28252d2f37112ee
SHA5129b7a4b579ad564f2cd62413e00d4d21ac1a1edc34394c823e13c050c225948e04a41dd124fbdea3b8128617fa70a2ee5f957d4617fc2506c82d9eaa6beff18e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d82ee5eae95d2e14271d54b72bfb8ad8
SHA1fd88827451c72e1e93599efcc92c17de4a1d0870
SHA256de0f7dd86ec97b0462b9033765b75bf9932e3b472a20922f006a5e25abdcaad7
SHA51200bf495b088c2c0aea1c653e7fd615d4139e660fd9ef7ab0399cd8f01352eabcac75894ea1873f43660f60b0bff0a725ef3b8ccbdfb306e53bdd7b9bb9efb770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bee587a8355f09bbd189c9f35a029fbc
SHA1ec775f3862ab5f809c6448094921b5514c61b753
SHA2562d68aca25e1e13191d5e48ca1f635822fa823e1b7641145e819a0b6634df6e3b
SHA5120d8c2ae8d6b493546268364a6f99a5399fd91e4a47e202256ab405d8a5c18f68ee9e5963554fddbc172940218a9c0988f1c17795611d63a5231285a36cdf9d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f595b04832eaebc53caac237ebaab0d
SHA180e85f1676ddb6f864cdaea872344513a4096e60
SHA2561a6de42babba7ad9eae4fcfd5bc7dd02ad662ac9a4712b5a9b3959d1ef1b3412
SHA5127ba0852ddc83f5203de5e9794218a81a3dce6c85082a2213b89fdd13f13772a91d5eda2cb14adfbb64485ce2d076ef60f7e85d9c0cc51d605dde6c53ca306680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291655ad2f9d29b4f81ab660758e8910
SHA10a8db3341cad2d2cffd44e3e39431d628b198277
SHA256a0d2abb3eb4de3ec427320bb4226cd9af5f744b8b5de23b0993d7e3160b3e81e
SHA512dbf80bc8b0a2dadd2d094d70c90154a3a229b6ffdb046985f7db1364ef3447584e5ab6b3104b1d02fa96a2f8a168e0808d7d12ebf27f3de83b3fa55857c624f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579776c8657ca0829147930f5127b95e6
SHA13df8e47d8c562dbeab4f9113c959768bff6bbada
SHA256a0cca51d874f6095794149f4c7b8c0ebbd72db6f78f1a4de0608e1be26b888c2
SHA5124c6463e792065f856d437b75b6e7f9bb1999289d5eef66200d3a45527a431c740e721b49bbc868af33439daf41bd6bcf922f5aff9b7ae232e7f588be0a24e9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef013ce5abea984c41046a3c76a1f882
SHA10c9da64722df5642aec2d6f4a94abda143872777
SHA256a179e9f82d786fd52be984bcd5239212f66457b1f7cf3418597bff81d3b01897
SHA5128ba7401d490b00fce976a4adc916c0f61e854a7119b53693f441c6be4e3d8c58fcd277164cfff66de4cc8b7bb4733488e4bc788c2d6811488d2891de7515b00d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578112b8515a739a77ff2814fccdd5a8f
SHA16697c8b0ad4a243f1d5a268a140b483a7ec7b63e
SHA2561e26b0a3951ede57a91569bc8d31f2f6f369642e0c6909de448b52cc1d015a6d
SHA51235683ffc3fc2ca4e7d827052168f08f66da4cbd3b72b13bfb715cab9d24ee5e1c41636cefcf0e3eb0bde70bb795b7e39e22e6a8dee317a69aac7d66d43b9cea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583798a7e2c495c791dbeb5af910f4f2c
SHA1080f331ca8a5fed2a8ce40070e31a4b86a58eb16
SHA2560643f23384307c7c9cf7f6779d1b88ce5da45d599882ed64b609d1bddc094ec9
SHA5121bd432bcd5c838c1750040267e50e300969d82ec483764b6972d484d835e715b0046579c1fa00184858c35f6c99c2c72a5f7fceedb3d230fb0092bba1c46a8b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af27db40d222e5f1fac9b957ed906b00
SHA14eedaa779180e5740c9f2a9f7f576dbc68fc2980
SHA2567320c07ec1e3735e31a34634ee5a61e66d864289b4be66a19d57df9479996993
SHA5124a222387328458b2a78362cb57b6bd4a315af692709d78f1b4dfc93d0b2050780867c22e85838f106010bcd72942e665b81a59a7e2bf17a9cb32f9d0e195b9cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de52b64ba88d94b681cccb47c812cac8
SHA19fd15f86949a51219fbc70de16d356265282c8f4
SHA2568e60732b53e894f82dfc3d54f000b8831329d7d8b04e64f1decad43f395238e9
SHA512e6b0f9be0192887093848e38680d88faa70f922bb272ebd0a4685a28b669430833d7ad43383f9dc523aba83e11655aeaccadbcf85166ec3c9414e7cf395ab49f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55298a54b59ddc53afb9abd1ba73d02ba
SHA1d4fff0107b792637b0606f6fcc80d1754c03e018
SHA256f642477473a6a7609db4f0722e9e23b6fc76301815176d7c76bf2e6907ad192f
SHA512036e3b027c517e2f2e0234054eaab86c714e4d3ac0ba8117e7b118ee98fd08b995a53c2613b49d0f777ee8d62a40ef8a5ad441cad8ff88f4e3c1688414a1ab6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5207a2d3fd1955949bc757366d58dcf8b
SHA16fd95bbf29b0cf882d82cd986328100c8027e1c3
SHA256439a5b6a4123673f0a5fc170cc0a93fb8cb0ec45837e230a86b6297187bd2363
SHA512ec12536102a0cfaaad0b5fb715fb8193612d36916b90f8f71986ab81693337ae3e0858b194223605e430264c2c031c386f3eb1136279b54e8c0bda5871b96471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb921972960888175166d7e1a84cb9c
SHA1a6799603fc4ba0f57a94c932b840d441feeef236
SHA256f890dff5d4dafa9b456719173541d24b94dcd921275489765ef0aeb6652f6038
SHA51248c662c29153ee79251f199661864c431c315eb5d8068a993c60d4cdd7a4e1ae1c1e2bd85444b6cdee050d0d8f83b4fb653bcba9dde5e3cdd5beb5d375597027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51968ec4833f9810eeb0cf0651c2d77bb
SHA13fe50deedd79d179bd20c096b8e7bd7a0ef3a3e9
SHA2564b6cfe76c246c012feb7f3d73a34d24ff7605696c1edb4b463ba813227308225
SHA51282efb0bff82c6ae582090d71c634b5fdec3685cf61f5f17c525c1dfde5101e13ad8f95348064b0377093de9b019a7e1985c52dc57c9a4f42b3f713d111da4384
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b