Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
fa7d2ee7025696cfd114eff293a5892f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fa7d2ee7025696cfd114eff293a5892f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa7d2ee7025696cfd114eff293a5892f_JaffaCakes118.html
-
Size
128KB
-
MD5
fa7d2ee7025696cfd114eff293a5892f
-
SHA1
6bf03035e97a9c82e70055e497b2e4855c718e20
-
SHA256
feb9181e2b169d1c951c276a5036c300da5218199a300b4786b75b6e97290885
-
SHA512
9bad9823c4e0806593578d1f9e8782c8d4d21516d832298cbe6f0c4731f352adc477cf83219b77d51717b7d8a33b0eadf88afb0600eb9ccf24bb769629b02599
-
SSDEEP
1536:SZU6gkwJCBG+c+JYxTOGiRxYyCQR6LO2KURKlcNchR40J1iPlNWSKyLi+rffMxqN:Sl5yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{998E0091-7CD4-11EF-B4E2-F64010A3169C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433605669" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70601a6ee110db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000036e41e287b5db5ba967694407b33cfdd66fe2a376fb62c05fc4187d7c631f84b000000000e8000000002000020000000d44e68dd02a43958c5e529825b8ab0a542bbd158c5ad056232a862893683ac56200000006d4f2f3f93fbb12aac9029c83eec9a5a31bfc8df2325eb7a2c546a1cccde38574000000003554f4ce9329a46ab41a13ceb6bd11e46c4ca21237d66b225b1bf8c6bf2f90023a60dd032901e3bae0fdf5aae3fe046114c830ef7977d8a71a27858ee580ab9 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2700 2860 iexplore.exe 31 PID 2860 wrote to memory of 2700 2860 iexplore.exe 31 PID 2860 wrote to memory of 2700 2860 iexplore.exe 31 PID 2860 wrote to memory of 2700 2860 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa7d2ee7025696cfd114eff293a5892f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f27a7bc4851418986695357d61adb0c4
SHA1b51c4719fafb1e9f80a4f5a1c928184f523360a2
SHA2560f10b0bf70d8b66deb970bb6b63fdfa0f52b761a97c7712b0f7d8c1bf5311b87
SHA5121f1b20fd7d9a8d772908966755e72d45e7605f24433a6a7e6af1b924a6a22e45f42cf66dca1e1cdd1035c6700dd71dab50b9ae6742710e39661a90010517ca46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a099415b2d9691d3bc98030122fe4f8
SHA104815dc5c4e5bdc4897628c4ef66cb00e8f7fb1f
SHA25618104f61c4e379ca9647cd76e3c0d41260ceb1985a5e2da9b998a1dc9ad1f8d0
SHA51276412d2650b8e23a8329138d64390e0285b6697015c030bd703ea5497d2ecf57fe3b5c80b942eb73bdcf1788d00b7f722dd30030ebedb2fc7aa5fcf11aad4a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51698cd84f6f14c5e1178bb283dcaa755
SHA1f34b9d3b7ce618792256f6eab3430f1f87eed99b
SHA2568e11d540f09838a0779ec072893c7db07ea31356bbc6268ca4d7930d9fc8683c
SHA512a71eb890d5ad6da206af54935c034b1ee9dd209c083093bd07b799e8abdaf38bbfb806de6525f751c784fbe51856cd14e1fa239584239793c3cc5ee5cb3317f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8a601f3606a616d083603da18758dfc
SHA1512625e5bd2c8a29f7d06e8521362876b361f80c
SHA256c637c4f483c7c1e4a3eb3764e9df1729d8dd654bb75b945de1749882ba5044fc
SHA5123acbe86aa18b7d36dc19af3c0907dbbc303cff621eabd069e14b3d4d8f5e7d11ff051dc9cd231909e44c773feb524407fde83d74b8c02fcf45305ba955146245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5725f54c6583cd6dfbc3761079be2561d
SHA13be2d3f2e33d5db12f41dcf4c482e27e71f8c82a
SHA2562e4212a3ae354be61fbb725d6066d89deeeaff69f2378268d5a0c2c42806341f
SHA512d8d91dcf9b175565f08d8ba654bf77e4ea5293aa077285828689ad1902c716f2e8277eb437cbf0fa1143f37953181cfee85eb5dc07fdd0a528d82cb4e35090e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf88777f68ab741cb9dfee71ba2a33f9
SHA19cc513c1f7b4516207b4688d7c6f20193a04db38
SHA256b997b3389fd014331a415410a963efa88891e288d0bd14bcaa07bc879a3395db
SHA512f1129795a6b616dbcd823e0dc022a1e103b2e0cf6f310b559ad3f60e42eef1e31a26ab2985f6098b25b15eeabf1165ff74ce72fefb3c15bf71df6aee77cbf640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acb845f2573d5805a59e6ce862d99310
SHA17d8fd75172acbd4633cd8fe2387bd9dd08f4a35c
SHA256203429e36b142e82266073986fb792335f26ae79060e77dc50669bd3d2a6d539
SHA512044c3de003ec254dd727907889890dffb53baa8e0f1aab1a41ea11f0c27fa55cb93b52ab850e3152fbc08b1d28a74fabe379f800d185d0126b0b5cee32790d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f24fcfcd05e75a1606f5115e1230314
SHA1b6b61abe12f9ef9b602a012bbc3e12a6115f374a
SHA2565c35f3448001f39a5e8e325f050a61f06b1b2d8883b8a00735d3e7a23df671d2
SHA5126714f491bcc457ba86d74276abdd142e740bd8a32e19f9a08acd6ca87db70fd00245ed28bc60040aa1dc357552e520c457db48aad070ec4840077e9cf07a1f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b84fd4ca556aa4345ac5973a08d8ac0
SHA1a7be667cbd9b99bf2b7ed8a8a33741141aca2d78
SHA25661cc91929b9085b89a18e9984d9489c06e051ca038b1dee35506fe28c77c6918
SHA512a6dcf35e4e203cc10b3ab0a05316c4d1c5fdbe827150e843064f9b219fb0e14e96b4fcd2a914ebee32683230a4a9c709bc2c17edc98ccf241c10ae6454ba2d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530047a74006ba645e84af7380c6cf2ae
SHA11d015005223419fc1ae0ada4cd984a7f0bd39b5d
SHA2565b96f7b4fdf8fb19500be381c5f0ff3fa23e7231a6d7e2afc7ca27a3e90d640e
SHA51267f3f052c9a2f8788896ec4d7c824f089f0ff08e97ad5461081d6e4af564061dd1ee624f8bf3175cdf42dbd432cd9004133f468b71dec3aa33f547e9b8af7399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae86341cd1e670d817cd88be020123f7
SHA1fc32508800d15fbf23a4fdb69dc2ce502add1a0c
SHA25693d4467893202a33bf028b1fe25d1d84dd4f31fb00e4c009342c792cea790374
SHA512372be190f84181b5a4c5fe487d3c9ea5a1680ea54d6fcfac037359e9ebb9858f91f3508aaa7697b90c1825dac00cd52fe96ca19576f7446c74fdc8e364a40b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503290a615518c012eca6c300e1577006
SHA16bd5b2beee001b0af0f954fe436121e7c531a61a
SHA256ba7a4a53a6f743d4ffb09e8816c24a29f1530a23f66af96a248301a90da4ab7f
SHA5126621237943d61d3f0f26e4f1943ee2a1bfe369605a8c7f74d3715ac0cf0bac55638c526b963083ec170ea633a58686deb8d3b4b3bba3f44e747294bde33a2871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512727c538f31c3726c90504e1fb50ed5
SHA1c531dd32bb7683fb79b3857099fc4a340561e2c2
SHA25614ab84609b955641e500856f73c341b74a911c8eee199628138894e4ef579c44
SHA512b82b6c0302cdb2241de37f6e5965ad0059fc1e6c6690e1b94b0f37ac1d650520f1d8540d8208e4d23509fb12a9ef9d7c553df1b09ff5ef5fe825912cda0608eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b44c7879e7ecd50a146cf9dfd825f39
SHA13308039e7fd14cae1449571606b115327bf01bc2
SHA2560c58ddfd5fb14f892c6e6469591f70c024f6b169bf960d23c5ede996b6a9c455
SHA51225dd7cd02d7b3f670404e7a0dfec21633e7a29667937318eba8ac8ab0199123437eef0610d05c47de19ba19abd10a54f58a583417d3c1bcc77153e7117e6f84f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad5e8572d39e66e6f05f3a291978eaa3
SHA1d678530426633d48af11078038969f92411a934b
SHA25602b512f0ca605b502bfeb1da76e539a23d973f536ead4125237b7f38528e9d49
SHA512002b54fd61300483c2c44bbb8c687edca7984714eaa2065b7636d1c6f0471de47cd2ee5565c49409b01fb0746446229030872532c298a015ca5104d73e855336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c34c3e954619348d6295935852a889ef
SHA19dc940ca39fa1add27ddae70b3801e4c692c2d3c
SHA2560e6193a22964ceb1d8db866492684f926488f69db0b3f11e06ae98761d093390
SHA512294aca8cca871fa8b8cf9f522b13f7544ebca5b07f11527d888c523787482e3a69fb97dcba59e3abc34883e551970423bf80c9062621d66bea182a35a735a69e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505ce06b8fe7424434267a3623422acb5
SHA14985aaec35589412f59ea85098e4b7d4f08afe3a
SHA2562c598bdcabbffe976764269838b0ade024057a32159d42b9ef0e06aeb613f3cb
SHA512c66bd63768fb06b8ba2fb990e4735b2486bff5a9f8aeeda9cec0e7c286e08ef488e05aab004e789bcf54bca9a2f1e9511c918fff31566fe4e7dcb1ce381d789d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f23cf27830d72ac80b9ca23dca5deed9
SHA10133c805b2662df7c559af6bd9d73ce164fd1cf0
SHA256227cef71eb972e27568067eac00aa087ea8a86e0a84c548a00d079a5413559bf
SHA51262593b7e1d745bc516be0b5dfb61506b1bb480ac122f291462c5c750ace915e1f2ee191aa96f88c0307179c078ee36994b5850cebc4f424852e26525a4f356bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea9eda3f8da32e6202b37570777614ac
SHA11141ffeb879d32a022bd430cfe7c4dcd7dd1a191
SHA2568e619075141de5f2404a5266b6da9ffda42a7aa7cf98d1a0975c22d33333a476
SHA512100c317cbe1865e6111d3a419c8f52adbbadcfff61cebe51a0dca3ff3b7e04f40a39b980acfaf52388fd9502184ea0339f79788df6666eaf079a4a2b548b40e6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b