Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
0b18d8075dc3d5bd2e36e1fcea9b72a0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0b18d8075dc3d5bd2e36e1fcea9b72a0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0b18d8075dc3d5bd2e36e1fcea9b72a0_JaffaCakes118.html
-
Size
110KB
-
MD5
0b18d8075dc3d5bd2e36e1fcea9b72a0
-
SHA1
d8ca08a465e92fc9f11de4395ad90b0fc6b055da
-
SHA256
2923989ecf560477186f520e8da4f56f71aba619fedd31ba870c340c32852cde
-
SHA512
5241b8b9c0f02d3ad028f0b188f38ab48443ed627f8b50cdf2ef5d263a9d1a3f37f780510cbadaa15081a4549f347df8426269e716afbd0bac4d65ad7c226875
-
SSDEEP
1536:uyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQSz:uyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000676aa5a76bbffe9c1848d3151693f44ce1bcd0138f3a365b280353979eee596d000000000e8000000002000020000000a183bc3bf4dabd6236b44f256af86baad6347d300a2805d9825dd5b613bbe32120000000bf5741f1e4f8c3ed3c61a33cd4012377bc459eac3f3868544362c57039efc15740000000d561a9dde8fc349229b714fb187765547a7b26c8cda540da139d0e19570bba50868e5b016b7a6206d1bcf2d3d6e7e56e9528bb480544b2030240d010b9e26bd9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04c9778d614db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434040767" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A4299891-80C9-11EF-9A0C-EE33E2B06AA8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2556 iexplore.exe 2556 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2116 2556 iexplore.exe 30 PID 2556 wrote to memory of 2116 2556 iexplore.exe 30 PID 2556 wrote to memory of 2116 2556 iexplore.exe 30 PID 2556 wrote to memory of 2116 2556 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b18d8075dc3d5bd2e36e1fcea9b72a0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d6798df29685ab081531824e0856ffe
SHA1f7e7a41140072371cd60a47047b616a794f36a39
SHA256d57687a7f78f0ef289ca1cbc8c8cc60dcc93a70868e15abf1e88e5339c9f0720
SHA512fda638675d0fcb3716a85f1658c06c7a52b0c3b568b4d4ddfbc7d29513488f6335edbf20a73a49d9b87b408cb912b6c3f7a5f68f1c7c3d9c6796619bd4f718d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d3913cf8660ff986f0c7530a2ed3209
SHA1949e01543c9633108a4df3ebade987b2a0283c9a
SHA256d10e8937af986fff68563936daa41f1329b44db07414dc4ece16676326709b8b
SHA51289f19eefc18bef260d422ad5b8c3cf19b635285f32c1287f6d34eafa2e12f265ec33df28bcc4427ee6c07081c93dfd5f097897c56d313cbb8859995f3a4b72a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b14b759333b54ab0cea16bc265151999
SHA1a3a75329040f6c3f64d12f4dcb273544788767e6
SHA256fdaaf5770baef71513ca8e1de6d62694bb03f859110c23b60cc8bd4bba5a53ea
SHA5122913ae6df5b58339bcfad6b3bb40a94b81521217585b66dd82ed4e4d2f5efbab018bfb599fff904d74dce8c1987c790913244d8c93f2d3f71e4e3e3f43099ee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ad345310e3fd5e64c0edfc03f1d002
SHA10d12f24e00a6c4a6c7bb9f5a86cb4da8efaa946c
SHA256b59de6d1b1e89ac2a9ecb61c4627ee30c6bc63391e01956515b9c25c8764c839
SHA51221bcd66f7baa29698c1c4328d3f3e4a9fb0cbe83938354c7cefaa7036dc5555018042298e43b063251b3d4e775c0cfd7f8949d06e59d73c071ef7882305aa449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5254bc6ccc308e18aff584e681ba663cd
SHA11228e15f2b873a9d03313f042c8218235dd719cc
SHA256452e369650dfa01db518a9fb80d6a34e30418e2c80a8e663b89ca30b5846e10d
SHA512e211c1a1e5761496aec28e37f36710b9df786ec09774b8d2522316c0d9b442ca95d4ef7a0edbcd15152c1987ef836d22bc6a1ad14702e2e4779cef42d1b97afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560f7f04e6768c5d97298b69bf2b26953
SHA1646c3a438fdf667826310d6105aa69519d55fd43
SHA25674702cae5ccc654197d62f276759fab6ce42de14e25f01af0c36c65f48af662b
SHA512e776b6663605bc8dd4b30542f0685d833c6bcf71c7e49a6c806af87f9e3f912179e36eea6182174a0168056cef3e4ddff5d328cbb1e03b335cce9f635f5a8de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59544cc3a55c30841583bc7d415ae4173
SHA1080f49f77f2f37dc5e38bfb1c3c8965cf49ed940
SHA25651ff2f673f2dc3ec6d59ff5d745655e055518b99c0d849ff4e5edc51bcd989f9
SHA512b4b5b4a2f0f7a26d281e0fcbe7f983ece214aa99708df9a09879ee8032b000c9d73587cf34390ecca58cfadb7ba91ccad5225e87b47eff192ea4490459363f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6328e25f519e6de0c96ca7be8b8e57c
SHA1d90ad74858cc23cae2278057169e3a5294110f02
SHA256dd4662795bb29b0026cd42c0246b76a5c7f0d76cb7e862f43f8239b4f93c23ec
SHA51290b005c4586d975ea9b147c29d505554f3a96fec8609ab64bf9ed15e638ee05166c46b25a5e8e4e95601dc6f3cba3c82f1335bd108d0bdd5a329b3957e6cab0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b50ebddbe191d771de51b9a8406404
SHA1a2e5dbb0a2574ac76eb61205cb3a3b5579234f77
SHA2569d4e9dbec4ec8166355ffa19dcd77a255bc39d9a1eb87781ff286deee96bbb03
SHA51231adf1802d84629a48782105e2cadc88c356a40159d32d73d17252ef1e65d2f7a6fa415ec91da480cf58216272cfd7189f6d4d9cecbba293fe99e945c009b564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fff5982c3843a60c8b5ff525a57df34e
SHA186b055733228fb951db10e046504064f33c38d98
SHA256ff626dd0a320fe1423b4c264db0495305214cc414be480c09eead984b92f6340
SHA5121599be6bb59573959999957ab6a8b379a11df9a83d988999ef7a138cde367ed710f7cd7ee61118ed84f4fea67e6620276c594170e0f00e7788a8dc519e398091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b868a93a1bceab21c60f6952db6ee35
SHA15eb3d29196242e97e562657b7513a086bdc34cee
SHA256c938d650cf38a1814ad1fe16fcdf3a6349c9b9c43143c571f95c1e71f7ebe57f
SHA5123596ad1f17aa041700c512152e191e4891c7b3fd05aa3ad44b03e31d0d71187f84e03309bc81868a1b8b928db354245cdea401ec141972b36828bdcaac6c651f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5252360513cafa6d970e650dfc111f145
SHA14ef06ad5e1244bfce084232a41e22e57ea9b8bed
SHA25623cc44889ef995479df655df1f0c8a5e448d27831b2e5e4767052614cb521850
SHA5127716f39e2214b7c5e8303246d8dcd4a64fec708b3ffb1fbd360ba9b4d9d39f92db67f4cf677d9daaedf175ff86f08f42a7f112ce86eb5ea573bd892f73ea18e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c59f8abc1983e684bded36b1f7e06e49
SHA100cc54e7eb5d47e1a0ede33cf97b49c420d36eac
SHA256a889873730c9ecb373a67315b9295de6bb271ce707caf7180d349d3b3b2ab73c
SHA5121ed1ba4696390fc210da4628575f74fc6acc770e7ec20b4600899fc0d7fcfdd33be18fb5dfdbc86b1b3354b3126fb7cf1cd86b95d44447c7f17552d5ce4fc2dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0492840780ddeac6af3bb88090851ca
SHA11276b88f974f2563967394fe65389ade180ac645
SHA2566a729015e54255b699d5385c8d1e9d8b2321a23477cf9f1467235a61e5b9b7be
SHA512c1032426a543a099ad30b7b66dc925884afc9bd35ac0a41812f13db1413ec2c876150fb7ecb9f13c960783e8eafbfe64f345186a06febd78b4207e1e15fb6720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce00c85efe10e004007d1762c76ce374
SHA1a1498f48b40525429b5dfc59602a5e1ae751ed89
SHA25612098faa2cba7cbd8e0fb7fd829b8abc3ccb34665c4f3fea86fac4bd81228f3c
SHA51258e437f219a2ebbc322f4587d8307889aa2d39e9dd914088a185514ce770e82a7711a9ada2a730519cb96361f13340a34b658b04ceab64c4965293bd370d87ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2d606594c2e3b2acb94c12234f9b0ad
SHA1d58a814776ec2673e68cc30cc80e5307a8c8426f
SHA256efefb7208bb4da916631e034fd3dc9ee3fce32aeb3034c65316e4a257596f81a
SHA512a1ac667a9d210458b8571bf3aee69199803b2c270ba513e42ccf403f1473157208b25d40e41eef89aa2b81ca62e1d2093a7530c0677fab869a1fbb2af0a887a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5670e555aebd275fdde4cd9718f20065c
SHA133fc0c041488df57ed39d97b08b6e096283fad2f
SHA25600474ec68662da6e4eb7de6f06303f0a87c90e04a1dd4962ec22afeefa2375ce
SHA51271d908d71d6363f17f1641cda23d7cca309d55517e461028c2c488b34b3a1f9592a2f75d659d9f3cdefe542eb21f44e7df81e44d68297cf5e3e453ee77486195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509e7f01d0ac9014bb04c6b9d52901885
SHA194d2390e8438d80d1140ee7c3b58d2a9ec274199
SHA256479ef3663927de97f20c2c37e6b982981c30fbec230a2569c9c81bd80f4cbf1b
SHA51293350bf9ffe1ea8bd15510f2f562d478c09dbaa267c45898439c22e9d4a0d680820b89751f89723f77176f596bc4322393b6e2c3a33316fb16d9f7c02344ea5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f7cc35f0b63eed9ae37638a8d36723b
SHA154cb2e7b5b9212a2757c1711d33c326dd277b3d3
SHA2562de26191058d2a0688e14ae15b5c6141fa204c5473ae61785953e19d46906d79
SHA512693fd29b9af8602ad51cf2f91c2b0ae11f18aae75c69c56623b86563654cedb3a6e4888845756f6e2acb36bbd1781615ca344d2e3a26afcf262f93a3f1b7f048
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b