Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 09:29
Static task
static1
Behavioral task
behavioral1
Sample
d19e10276cfd2fc9f655148437cd07ae_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d19e10276cfd2fc9f655148437cd07ae_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d19e10276cfd2fc9f655148437cd07ae_JaffaCakes118.html
-
Size
4KB
-
MD5
d19e10276cfd2fc9f655148437cd07ae
-
SHA1
d5579288f443dc49e13552e1a5a15531f0b75e56
-
SHA256
8ea30b5ae97a50a3de236ad5e375cdedfc9d4c6d53339c3ba68e8a0ebb535aa0
-
SHA512
c0dfc10049bbf72528631eb6251fefb4756e1288bd4b8dc66defae87fcd9bd1684c644c3ad271e6a4e33c576a54fcd14d0319a973862866dd42e520da00eb391
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ornLnOd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102c81980801db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4097541-6CFB-11EF-BA16-7E918DD97D05} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000007b038523afe8cbe63f9caf187b09482301877b7c97284f75be2cc2bc6ab59fd6000000000e8000000002000020000000139086d3491b15174af0304ae4a62ba43faacce2b190620eb25e58a2469ee7a090000000688ca294cdfc4d703c542a7d1abd51eb5fcbf98d80c69b176dc4956f921595d11e69baa0d994d6be516690c5146900cc3df562317a7da82a63b66c58559c35c043b0e8ac9e8d017826ded4f45d244976e39bba7a4f3dd771efc2abcc0a3dea68df3ce89b01c614bc046a6a6df77ae035b40a01c2fdf3f30de657f59078aa5031d58a4281b0ff91e7214b56b46182135e4000000074ebd6a1414ed118d36363be2c5aff94ecd80eb3ddaded46d903e985eeb8e92aafc860ebf0bc84ac5ce4695fbbfd06e5280aa2bc21e6567f970ec5da97eb1dda iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000001c7eac9ddda102e106dbc4c7047f6c6d026d282d2aaaf9f47a1b19b0957d82fd000000000e8000000002000020000000a59a7c34c49b2a1a43d05899cc28e7a2f7865418fca0cb6f293066c6585faa8020000000afe41408bd432a391ee0ef41eb65c31cb6ead90c4fbd0ecdf274ca6b8df93bf24000000003c7cbfc753ae9824ba1d2b4ea4aad1b808d25a7393332032dbf9341f9ea569401dc93dbdef0e654c787ba0e0875f70c3101631186e0dccebab92e003ebb4098 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431863275" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2612 iexplore.exe 2612 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2612 wrote to memory of 3024 2612 iexplore.exe 30 PID 2612 wrote to memory of 3024 2612 iexplore.exe 30 PID 2612 wrote to memory of 3024 2612 iexplore.exe 30 PID 2612 wrote to memory of 3024 2612 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d19e10276cfd2fc9f655148437cd07ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500d3acfabad08a6f73906486cc559ee7
SHA18a7e5192b5b0a40d337f2e184b3227f681dc6a87
SHA25691ac4e8c6e9abffa3a58cdafa912c3d7ffae9413ee30bb8b1fe57a068d3a032a
SHA512816ed05deb522cde1b4f0f6b09016ea86cbdb5feaf3b1c9efc4a8c58443381dbf1429bfdad2bafb17fa57606ffcf34054ac36003e525dc86ce6ca1946ccd8188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad3fd639349d93147152ebfec2d6a94a
SHA1bc0d4807861623817a5f7a77542606f9873f5dba
SHA256dc078dd8c9376ec145b8c22427ad90004468f828ed7229e64ec7d401965e51ed
SHA51226ac0aa4361e5d74ab44d5db79495aa8ae14a2c375442ad0f5591b00f6de56c4fbdcfe477c4ece33ba8b8e102207167b3b23ee5a48c472de0f639c9cf8a10811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5327d2bee7c2f2c99c20bb95c693b208b
SHA18ba59ba6c79abf4955a86a1a67803bb1a7d22509
SHA2567b0f2471a4d962f5aa10d8abed27740e8e307cfbf8cf0f39a10ee283749f9f15
SHA512d7a45259382c263141727b1d9d9e8c715e3cdf3c702c613002ce052123e4e80a68a328760be8171bff70fe5d40f3e818f0399d79e6f2f049e06ec77a673e6ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5013de6ff5ea3c2ec567cea9ca7bd9dad
SHA172e337372d5cb6c0ebfe820a0beaed01236ec89f
SHA256bd8a0c35fcd6d9e3979a521bf45b3ab8e9ad08a332f4146ada26fe2e4b0afaa1
SHA512359ebbd1054efb3a28ca258c96be97a9d979873af30eb8847f80f26dcdc872606cf8b0f7845dd65ec24e5a91f7e79e0f07fa5fd20a0cfb8b16bf89a406e40f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540612efa1ddf1b358cb4646ef2d246ba
SHA1f92f4ddc8b497123274b7794b28179d1a6c2d0f2
SHA256a085343f758bd8612befc317dc432463f89f85906a28c4590734a24741031c95
SHA5129b8825e3598dda563914dc1f334fca585656069b39aa53fd493e8d0f349a4e336ccf615d428d6e0c4ae655d2b1eb3bb82288631f4dca8359ad6f8b5412077c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fb1ff6789d2d8d15a5468787502ebb1
SHA197176ad931d178691e8daf2b0f4ff70c21f9830c
SHA25674e8a485acb4543c9ee02d431442194c4f776f67b257bcb92ec3e8db25252204
SHA512c8bcbd73ce8c9aab04624c56a02d1da40e17e5918893aff731b146398db2f4545f58d352c3f7e9e1f2f050efeb1782d6517613e45c15bf5bb241cee9e00b31b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5394c07f27cd8efefc8659d1bb9b60aa9
SHA1ceb410e9c15468c1004623bda8498b3023de376e
SHA25607054d184dffeb7f61accf2d0de2c6947f5e4d17716e133007cda8ee699215dd
SHA512d9e382d0a163fc603a6a22ca025ff3c2da92fa57556049c7d16ed191c4bf7d556f075c90d3fb1bcf1c91c1f69ba169817716f25071f322599e4ab6cf47860592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50350a9644e203d8c4853e02d880c1448
SHA17264eee15c5c523506d84c390e93ba32673bc8ab
SHA256fce3856402202c30adf342a4897531852ba3acd3a3440df1ed44added54c5757
SHA512bee666a431ddc6187b5589c657a39e52ceb0abd2ca81e5fd3df0580191e2009b2ccd4e87d03e82ff3153560078213d7238f9ceaf18912dc5c0beae56e7feb969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5241df7395b2a2cb3a2b74a8405e5ca40
SHA19f18cbba6206c9849650efe94015250c1aa5f1fd
SHA2568816ebc39fe0715027b4d89b56dbfa1d291afdf122fc8f305fe554604c3374f1
SHA512807bdc30bf67f0db21af070c536247c5efb553bfc0b179a892e24547218c19d76d6d237f4ea462e4f3e0a7ed341a2feeabeea46aaba5b31bf1fca4956b065cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f58c9acb44eea8fdf56da0c85dd538b2
SHA1e4c9ac48f9c48384ddfd45b588ff15f724aa9f08
SHA256584645127f580fbb935813ee4f03d22362b0e866d568b8b633e0bd54b172a971
SHA512bf82d905083b206ecdfe2eca78fdf069c732caf05ba3129b377fdf1f7b65ae5877953268211e56e9a8a5314a024ceff9c362e650a67a4c977361ba4a93bc338a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e8c1dba64e740f246b9b9fa2e1e2b66
SHA19962978585c79d7423501e662f8fcfdbe412e538
SHA2566b5d94359d470246c6066e1734b80f01444db824db1ad4bbcba98e0368738af0
SHA51233fd9025d92affac57e5f5ab590c30bdc9d7f8cd83e79e6bf1aa3142a8f340d568fb3a780fdbb4047b61bf584d6f290ab238457d1f24747a676aedbd628f9ee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52679205faf210dfab288f11a6566a689
SHA1c20dffc3a19739b50f2f8e02ae0e889699285d4a
SHA2565d25a88855b49bde93954883bdce78997cb0fb9a92a1993933bf5dd6dfe39caa
SHA51228b34e0c0a53034368d6d6eebc558e792538205a7a4a51f8cbd954d2e1ae1c307aabda8f86c763317ed3042a9ac15c40b2606b7fa5cd2bb8cdb96e9873342d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56693e930b27bd0e71800e9de3b3d1bf6
SHA1242d1e9bc74ef650169d59e238029c3e54fd3995
SHA256a236624bf63ec92f0df08d482b9357bb874661b0d9fe562491b26ecb1d804459
SHA512dec3edc1964dbb15346703114e454d34cf1f6abc9ad866a747eac78b20fac1fea1a5dfeb38258cadcfc08a2a6a3ef18a39fe3b6d94cb19cbad6f1859c2b0f296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa365cea8e2ef0fa07967c0f32afd8ce
SHA109cfe43e5c4e5acdd8351975968ab7d9abbf777b
SHA256671dce741fd81c4e175f2ba3f8eca3d339e9f076997a02cefceed4935aa3f92f
SHA512db86b641599c12de985ee20fa888a2b503e3cef126ed28d59a6e65cd567bba87dfcd4474a0030cd624f4dc0fd7088710ad82b1bdd862a67c8046ffc55ab20fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f964ba86cd7006a89f8dc51e13aabf44
SHA151199297a74c4350147bb68bc3f00b59ca5014b2
SHA256e668cc09d6728b412f808f5d93ffaa17c045bbf30fec6db1e2ebfc21250d4052
SHA5123b762f821c07813787e91edac3d3268abd550f5816adc60154be16e5e7c99507d57ae2ffc6c4a15cbf83f90a8781d20591ef410c77598b672b8668fc3f0c857f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e8caecc89ca957458e4c3e846ee56b7
SHA1254fd8a970ca0a3b09202717e3f1636ee747e58a
SHA25614c166e1a2a0c41908c19267b740e9d67963af2682ba1b0ea5490e3112bf0de8
SHA51299fefb8cb05a368e3b576020112045928eeff701657fab60db75186ae2963f57e10ff185d98728090afcd11e3e4a6053b100c44fe905b1b6b6724c2e1f851e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5129f2694ce16c35c0ced14351a300c43
SHA1ee55f8e16c4c83c5bae8e5af8a1ee7d0ea532b73
SHA2561237d794c927ae36e54b5c5d68dfecc2ee43bd2308836bc57fdb46339743eb8f
SHA512d77af4da95d15e7f588a35bdf56db70332b9df3031ee585356c84252980a0bd15d842cb3c631c52e0ae11bb4d4d3bcd77ebfbc2bdbf6b51b271b27386cee2dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546acc52a593fd434f4fbc21d4d7f34fc
SHA1667248cb754e21763f355a02da17297a3afb0b18
SHA25649ce1fa7c82803f78d0254e5dcd4c5e623346e941866c43fe9a7b0458f193c23
SHA51279625063dc14e6251c2e57617c5843928d8999e23e19f1954accf1ca84dcb3a67c0f3b1cacaa28055bbd37dfe99172c666ba488ce9f68f13dc9e41486e366bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f268f4a0fd725437c9f19adf8404943f
SHA1b8c29be33a916843acb8a768e99755ccb42d31fa
SHA256bb58fc0e6b751141071341425114d113fd98d8339bd666074c25eba533636546
SHA512fe1d2927c16907c07e05abdc6d093e562eb47721d64d3fa041af0f0ee127b331bf949fed6ce38b4cc8411f6ad3dd65674bb221fa18fc10b5bb6d68526386f8c8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b