Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 15:34
Static task
static1
Behavioral task
behavioral1
Sample
aa75b3546fa5fd3200124af5181ed0d6_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
aa75b3546fa5fd3200124af5181ed0d6_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
aa75b3546fa5fd3200124af5181ed0d6_JaffaCakes118.html
-
Size
461KB
-
MD5
aa75b3546fa5fd3200124af5181ed0d6
-
SHA1
5b48393134cebef15cd13010e5c132cb66958518
-
SHA256
6e52f3d1b4e2d86bb7ae9bc78c37b341cebbc8d3844d2899dfc50ea180d46567
-
SHA512
0193b2c4d7ab40c64c15cdfc88d1281a139669a8da25afb789023a7932d653a567a29fe55b0bba25ed6aac4ec3855957dfd2e167dc86f22b38aca71b9d8719b5
-
SSDEEP
6144:S8sMYod+X3oI+YOsMYod+X3oI+YksMYod+X3oI+YLsMYod+X3oI+YQ:h5d+X325d+X3g5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D6CF861-2A63-11EF-9BF8-4A0EF18FE26D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5031ee7570beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004a64f239517ba248816db56d7ee7478e00000000020000000000106600000001000020000000d832958d3238605649086c390d7d2412f1dd30aab018b0e5a8aa627ea2859d17000000000e80000000020000200000003785b0da14151af7dbea0a3a37e406c258c6e362583e271ced574b8aa08a74fe200000004e6d42f7d84755b5170eed261b7ee91c3fd0957ade8b1787ddb68898390081c640000000f0aeb5230f3d56aefccb9655e21166c89784f8921453f7e0a8b7bba24ef6f3c7f3bff380b592bd08c8c71c32051264e850791a4cb1578356b689b11d2aa91c23 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004a64f239517ba248816db56d7ee7478e0000000002000000000010660000000100002000000003bbc3b734e6942b356430e32642d4ccbf109a727c68196613716638a377b9c7000000000e80000000020000200000007cfa3b17a93fccec4e54fdc893fe601558eb3642ef77dbe0559d0c0e085a324290000000a69db52a38d307310d0a2fd94a4affaf02325836018f54c599908d236e2dddf4d0c8511ef599b0900a28005878b8aacb5ded5bde03a9195f798152b3ced4779d5d05c1932313d8a9e58de1d09865205d5905ac6069dd1af92a2ede051fdc588a9837ec657c5c8a2bc507b824d50f86ce1cb14dc6a4bbfb52df8747dc43e38732913af4def956ec9ec10a3c56ec2f217e400000003a999e57b5fe3ef51d7577fe504d72ef70df24832ccd90e7693744dc1502015bd3beb123f5ad59f028df6ac07f040368d208a80d2eef84a3fac111905ca2bf28 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424541148" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2040 2292 iexplore.exe 28 PID 2292 wrote to memory of 2040 2292 iexplore.exe 28 PID 2292 wrote to memory of 2040 2292 iexplore.exe 28 PID 2292 wrote to memory of 2040 2292 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aa75b3546fa5fd3200124af5181ed0d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b665c6fa26934a3e632e39520e29c4
SHA1f4f76dabba29fbc654488be791aa8eb98ea0f39d
SHA256189f0c617d9361a2d1518f0f4b7d423fb7d0b00ec951776115fddf8a9f0b461d
SHA5129fdf2c035c334c1f0765b23d19bfaee8169cf75feb04b016e1cda4e65a4a7c072f80a7435cccc0466923c3469f62f384ce7a48f1bea628857d8ff7d04c63222b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc096b4f7f7fa3a55b8f49d262464d16
SHA1c3d66c417d3670b73158fab5b5f01242e3df4721
SHA2569e7527abf02a9bf31987cdeb48e7a7de8f6842b58aa514fb93f92c96ac18fc1f
SHA51288545d861022a63d84c108362ad050323cb2eba724a559afa852cd185e02306d60a0f670a52095f83788f0703f6fd78150f54432b2a39d9d3bd31b49e83b132e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b66a89029957065588a46c23a653f58b
SHA1537d2534fb2a8a318ece2999b40e9133ae2158c4
SHA25651c45d5c272f1e76d7e29018ff0dbbc985e53e3a954c50e8cccb8623b1f36ca6
SHA512c995544bd5f880c9c3b26e48abf89a1c8cecc95e70629f87bea2f188df8a36ede23470ed4b62796556cfc53cf5cb273cfba29cec7d64f2acac38ef65611433bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cebe9602c5f8b70fdee28bd86709a2d1
SHA1b3f52764e4d6540d371f4049d46fc22cf9868f32
SHA256666e3f0b690459ca9a1f103cfa0ce82b1b7009402693f92496df12256bcf9155
SHA512ebd83772f564cdeb768e43c8ec831e5c4a7cb7455153827f81de6af6a0e6b661e9f9759757c4824755c844bc65f39329e90b9d131194ae729d6bd86a55fd4efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589810c676480c1f4b01652221f8a3b4d
SHA111ea63c431c2b7a23d3c42a1900b39740f71a8dd
SHA256fbe8a8f163c73d88517142aeb05de6fb73bccd2866757e12da1623263a0b882c
SHA512ce56b9cdaeae757dd4a114a397c42e0cbe2a4a26c84793fc54db3661e2fc87f3aea6d3c2afcd55e947116b32b032ab711716d848f7e4694149fa53d0e8aa0e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e5f25a8c14c6bd346a413ceb11e671
SHA1aa27ebe46072dd0695e0520375d9a6e4a94d0316
SHA256dcca6bb14a99c3f02d49f83b76c267f2a942c5e2284736eeffa312e4a93816ec
SHA51267ab5d916fa67bab8bf5522fa4df13ce9040050881c5f6342266b5292965d2928a9a08b23982aed069d98350d7de0c2dd69399dde7ca204df9c222c8805d18f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea9411eac758625f96a27ca1a70f66d
SHA131f262f4fcba4da47dfe373b38003d01ef12d74c
SHA2569d43eeb160e579db2bc4316128eaa05a0da0d20ef77f1c469a88a680468f8580
SHA512c49ba26d9138d219430072c3edfa991f5ad9f62f3673584039fd750bf341a7e218dcfe824d13bcac316d6c641f480d8730472699142bef15d5c37429fcf7e438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5573a7230aa6f333aeda94267c9da7d44
SHA1a1aada4ea8031b6d0ed9ae13144a8022beb782f5
SHA2561ea6a4bc63682bf68c5069ef6ef99655c77fd04a1ced69f2026cacffc2093094
SHA5125a958d8304b130a7aa4639e34573569ce05d94591a8aa9a48da9fadb02ff3abace747ccc41c7d5beef14e6b9974b09acce7837360e8451b0980d7124107f51a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548490e3be0c3b5e047d7731a8eaef217
SHA1fa9ae5b24ab655bd2fca78eaa82c92e8202677f5
SHA256ed52c234d6e24faf33b99ef96192a832d48f256c7a84ad7e04b784420d381d06
SHA5128cd2ba967f67aef7344522ff8dbb0556579e447932ea474de4e4f0c55494279fc50212bb53fd864438a6d2434d8828e1fc249de6ec65ea7cdffbc36b7b379e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542f87e60b4290101190cca29df98a1f4
SHA1e08bdeef51c68819bd30bb28f557d719e5e1afb9
SHA2565a3982fa10b8c8830867983a5ac1b4aa3c268274a0588a8d54f58fb995e14305
SHA51275c8c74288909ba4ddabf245e1e3fd681fb1a86a4f126afa641cb672cf9b4a9bbf0b83baba5953c94e0407082893e9dce8906c305cc18df235bcdc2f88605aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a749053ae9745a161a05b6ae80565138
SHA1bd35519a9ed7df3666909b802d91f43035c58032
SHA256716610404bf16fbcb62f7577b44ffb78616e59c57746979cb51f7e461446221d
SHA512b86bf09dd33362d75f1d4f755232ad276f98d940b33d0791b87130bad55c23e273cadbd98f7db3eae39f6c8ce3712650571d13169c75b6bccac2f4c8d5ccdb32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e606202b49bfffa1f7a3cd8e05444f1b
SHA1df35a465af871468e667d89f89c58b602b4288ae
SHA256ff0d73d6cb7ea846fba3eb70d8d2f161242d861924c9d8a356b7a2c5221f3a98
SHA5126949ac7952497073e24e1c1d7f546d4b9f98bb9db301cc893a36a4e7c6868e6fa9cc52749e315bac7572af39f198d9f15f1d607a0e155dd8951351a5d0f9b411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59de53b819ae0d03ef3fe3daa092f9ad1
SHA190dd150809fcac4bd6936630d3bdc11b6106a1f4
SHA256f230481ad4039f75368c10f3a3932c94e2f2e74bc5dd6f19b8e07567496e004d
SHA512d471d55a70e8d174ce1e2db20c91cca45c62e811c2b4cb6f1df14b7f15d85251f69d6cb75bcb47d7bf0617c1f48e37bf44a7555251a08cd6d5e380566c605410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a66dc1fb5cd481fb6e2889d1e75052e8
SHA1d104015d0df8347fa471f7ba3ca6bcc51cc5002f
SHA256e1f0447a9b6c16d3b5ec777c45cb19a752c1cbec72995b8e2d3b805995a3c9d2
SHA512eb238e8e04979437f30d375b40f14dfcdaff030a98a30c3a4fe2909f83113b0c5ccebb887fd998f9404d43e7db3fbee85ee20b2cc91135c5609195961cd25a31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e96286caebf1fa5e838cf92e7e1f725
SHA15cf37414910fa7e7cd3c3ac9fd00fb15e8ae610f
SHA25661d3c91c6200a9d627652b00627cc35071cfb51a8c181a412d3cd717f488baaf
SHA512c4ebb601590b75853139b461ae4cd26454d9150cdf1b3abf4b736479547c94b5b7b034768554f7932b20214cabc54b725625d28e6d008080c40e2f3a88a02e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a603afe33c654e99fe4fe261aa1c8856
SHA1dc7c9b3b5e95bd5abaf55f1cf682b15ccd45c8e6
SHA256220875a28b76c3190264c194d0fc42775b14a65c12794310893a8d7bd2fd3146
SHA5122249df97aca86a90fe83fbe01baa7209e5d35cd9be0cf3838d68c338f37248a88b6fd11a062eddb019aba51824f2da13235fadf77d0a60b1cfa2454892604158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f8242eccafaf1741db3fafcdc3ea379
SHA156cda5e62fe887b55fdb557394737a4c6527fe24
SHA2560ed2a5b1cbaf3ff9ef176a0477fc57d8d36c88347600727a7e9a7eceeed34f98
SHA512da64b2c6eba7333d9dc4fb6f629dfc1ee833911f831aa463f6f857ad330e0abe3388242affb6d395361d1380b40da7e070d642eddcbb4eb39cd71e216e133e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5434a1917176df0acb6048bc428a62c92
SHA12a82e84c2b343620d7190550c38e7a69b6cba089
SHA2560026ddc4d066c189d45c197ee94ee712b4cf91f63c5541069c67ecc52eed0b65
SHA51280efb77c199d73ece3df79c50f4dcedaaed63434a2d57b58c5f72450dd5534956bd2edfeef5b4014e261d6ab94a4db56918c15a44782a6f481aa6538cd396910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eae8f8ea64e94e268e02be30121f4ba
SHA166fc926e358c588a31277d5e610bd668feb8fde0
SHA2566bbabe5c675120d937ade3b8f5bddb8d350b94d18df18b5e4068b9ac43bdb2a4
SHA5127190d633b6302d4ae0072f48821bf1203081cac4ab105ffb2c974c75c05eed45b7a637e2cfbf382308c39e574cc7af316eb67bd83308fb099e191e817c862a7e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b