Analysis
-
max time kernel
138s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 10:22
Static task
static1
Behavioral task
behavioral1
Sample
2f6310f853a431052ea1b243b037e37a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f6310f853a431052ea1b243b037e37a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2f6310f853a431052ea1b243b037e37a_JaffaCakes118.html
-
Size
139KB
-
MD5
2f6310f853a431052ea1b243b037e37a
-
SHA1
6b0c461825b190e0fe1b9bc7746d713bdd67ba1d
-
SHA256
8445d181e584462442802a4ad6ac61c05466ddc30f5a7ef925cd6002cf8a9723
-
SHA512
99440b08105080eb70baf51771e7e9e699e70296bcae5616c9b22d56185d38f5617cd517a3be2b618ce7e6c740a8c80c53e48d4c59731d39878a15681d103013
-
SSDEEP
1536:SyF9/+r2mMqPtXLflyp/4yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wd:SyF9YMqyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10de009ea31adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434678524" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000006ea21fe1315b4cd0e8f8ff23516ea101bf22eccd955fe640a0b27f4bcfa1d156000000000e8000000002000020000000459f9217957a91bc25899f5b7e9fdc69f0b593a374c213b0a55f3bd678867cfa20000000c721e949867a78e1e00f00c57e4664c318a94a7d95b5e4ecb11f88562d88c5b240000000c981cca5e6a3c057982f57ff99377e4d696d58044875654e6c45a184875096191adee5eb301d66ce0557839e3deba91ee91803c11bcf7054c90ec6a71d8ba268 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8901FD01-8696-11EF-8C8D-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1320 iexplore.exe 1320 iexplore.exe 1080 IEXPLORE.EXE 1080 IEXPLORE.EXE 1080 IEXPLORE.EXE 1080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1320 wrote to memory of 1080 1320 iexplore.exe 31 PID 1320 wrote to memory of 1080 1320 iexplore.exe 31 PID 1320 wrote to memory of 1080 1320 iexplore.exe 31 PID 1320 wrote to memory of 1080 1320 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f6310f853a431052ea1b243b037e37a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d2f7fc16e60c1730c84315c2771d98
SHA1d2804bd69c063b01b2dded1318330b1767eae2fc
SHA256e127fc0aa9577b838f655eeb1060494b014f573493382fabdcdeacf714c0a292
SHA5123baa81b28ea0dd04bc403de367afc06edd938259d338a1042dabdefc864f48571187849868671d86bc6072c43ab4d5dafb7fcbf3b703add8a5e4aa6165282886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53717bedb63a748383ac3bbad3d2a3e1f
SHA16ada486f8cb5ec52c6e60ae2617f5a232734d387
SHA256ec3c07ae1598ff2381a393bfc6649c2cd9b83f501a2f7fefc821f16ffec885ca
SHA512e1d6956b0d7f4703f2dbe6c981c9a627d4d7c4a7c3cb9b91b7c7632c413562aedf82a6f668daa2f680023562d9a1b00e539e5099327cb479ef87aea5a51637d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba7bcc0f0f6c999538799c2444b21f2b
SHA1e4f1823c7e5a98b4751236c34b425abf87385268
SHA2562b6fcafc7cd2c3c38ee19b11c85b08caebcacaaf66c2d0d4406f889e002de466
SHA512d4c8e61c93c993892f4a3cab7942422d2c72e321a863509cb100b95ae1d111ea97f2587d69bc59368bf5d7dd53eda89243c6c1fdbd5da44a0b08db5665e56ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b875a7814ed0f55fc98502714e61b27e
SHA1819f41bbcc289ea522122dbfc47ebc58c56ae8dc
SHA2565412398e26cceaaf6c492b71c511ebd9d1f6c8d1176d851099e10a9ea71f08f8
SHA512f31cf46dba8faac97cbf1a23af37e54e27bf6774d7b36f8264cf50bdc767e075010a0682904452ab5f04c613bad20d3e2df452b452311067fa5cc627cb056c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56304e2f0c38f39df08f8b8dda388a102
SHA1835ae65f3ad38a52f1142f4d70525eed571fc71a
SHA25666a3735449ee12096cdcb2d9eabda613e2e831aa54fe786098005a88b4628188
SHA5128717dead95ce341186e6985107ee85f1bfe44dd156f9c45c50fa7515a060dbd3ae10394b0ac85b3aac0089d643de50fb73b624f5c8f195efd5f6b1c5fb1ead4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e48e14f7e76a81360480b672d7ed492e
SHA16182d942a59e97e2a77fa861d0a5adc3b9a76152
SHA25600146c20336cc42201150656f8597f2626093662e278480a88a0ff5fafcbde81
SHA51221ba411b876ba82488ae90eaff0041eecf0a8961c68caaf14b86d8b6b801d6fede94129be5cf50abed7564702f82e3d37c22de5f88957da2bb3aefdc18b075d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ca2b2e63728d7448d1dd1ff543b42b8
SHA19d869f9b9c263318c0d78632df1d8a363d273f78
SHA2563971f9a34db982f9b9cd8892dc32c47aecf2376f65404971ad110f64d1965be4
SHA51290f6da273a387664aceb7d110a4a0491d53c26d0947b2f839756861c6c006aec5d8183d4418cd13599d0a0df1c8433e46c1c72b8cbe367eb67ad11b3061d45c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a4e24b8fca2264e481d2d926c072905
SHA159add8137a11b93de6d9fdc8ad50833987e2a191
SHA256d562b4d38dd3cc8611d9dcfac9faeb6bd9bd2b1d6c8619d4aed8ea57ad8104ca
SHA51217e93f3084463dd840d9e1432ac2c3c69ad7b0c7b30e92f627f0dad80e2e32279c7baed302ca108162daf8891fedf38c66e02022d8e652a21decfa704d60fafc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b7f2ade50de264fcecf501a4c33e426
SHA10b981c65d237dcb7020cc1532ffa48b61e91c32c
SHA2563d95c80227f64851ea88d3762da94168ff0fb6b506d72d1151b5c648dba32a66
SHA512441728d2649efdaf91f36fa28b83d9d74de071b745b5fef4231bfb08003feffaaa2bcf472e2b578283ee1eb00da78c7090729e4e147e25df1eeedc436610eae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f83cc83bd599f51d082cd80b144666b5
SHA172dd3e79a482f20b5124deaddf86a0af2c7bf236
SHA2563275deb1fcf2122bee32c6319be3dbcfa9f05ef9e18fe39c256b5a1fc07de2ce
SHA512c81d89bae32f99345305782b0360d167aac59b5ba4554dda7a822edfe5ff8eb134d4e5bb2667c7b7c15791a8f951999084f858027c86f425531e21dbbfdaf3ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5754c390690e0030ed8aee12bdfc646b2
SHA1b2b0c34b8ca4c694cec1c657759986325b76d1fd
SHA25635a6b5f42eb75b22cdbde71beb3b136e3f6cb4078af4c43f0f220f9ebdcf71d7
SHA5121375d2a2aed15ad5ac97001c598039a0e3aa41d0e04d4223ccdb288264257651fda13306cc871589ca0f78fd662a2a985fb122b398340127747e57154e61f02d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ac425c0f33c91b1631f941b7600319b
SHA10196cdfcc6659143ece0e7fb1af1d1e699685e6f
SHA256a05101ff83d4653dedea3b64a5991d3b1e0b81fb0162b9aa0206aa132a04efc9
SHA512b183db1829e3678fcc7f126255601dd930ac94bedd2a04a80aca4a755356fa7ca9422f85e2adac2771a9d8922d4778e0fa416b8aadece3a376ce95458ad6bdd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0d7c50d55eb5fa55865b7aae479ca86
SHA1d0b1c91b21b4b79502ad36f17cf7d1304c7cf0fd
SHA2565555a77df800a84c8e2271e40653608597eadd590522828e1ffb764a19d1232c
SHA5125e97b5b12aba9e0ca694cf4cfa8b93a7de0a9d1a56fec4a788390d3aa35c6017ab8deccb3336142796e63baba6485ef110d2fedf2175cbfe3feac5fa317e3b0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcb79aa8a60d79f946856f703b6b3e04
SHA19aa10644f3da310caa37d56a5b743c0bc3ee2d1f
SHA256e613703d34e1c8a47ed6af6df91bdb3438e0f5124d59074c8f0a8fad0bd2a93a
SHA512509e498422a1d3153bf4cdd0f6a7412c0cca003a7438b05bab827d6f3aee53c955a733b58d13f83d7b8027402bbe4309e9c2185fdc6a1dbc69d7f2f872549e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf01df63accdaf3987e0226ae6b55605
SHA15bae916af17965c7928ba7c2edd661d4ea6a4b79
SHA256aa84a8e1b1ffd8d866455d3fc2f1dfb16cb923b773a673314ac2d2536d6188e0
SHA5124447ea60b2e1658662f662ba4021016b9382f8f5019ce14e5944ea0864bdda5b026371c246fa427bff9c3091e77246babffd9be97dc77f5d18e7c621b8484599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a11798d30fa9974a9040c83fe4e1da
SHA13391af355c32218b2f22ab8f8533c193d09df6dc
SHA25683612b2fd334613d022592d608ca185df78b7495ba026d6f1f05aa3841774b42
SHA512698d7430543f46f35fd4c394535e2a399819147247aef802e3ec140c0e66e93dfe8446acd4567cccb6a2c96747c8ac2e7dab61c780d3a1e391a436ea8aca177a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f3337be97afdbcf2380c68184644977
SHA131ca0da3346a9dedfbbaed8730c75db64bc57efc
SHA25663734413375f6cf1663975940109ada481e5babd2a3afc3ac77505d31682000e
SHA512995b95c1dad3243129de83641a8f3f7228b1e56432af0d095aef05ce2d37cc4ee580633335fee9fa16d6296532d42dd8cf10d2defb05f3d97defec7c97ddc146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580626123273e28d956b1dcad7d09fb13
SHA1d7972ed4cea12a8ce7dc547e660491a832197b82
SHA256c862752441f84a5f76440d322da3cc577da8fbf4ed805ac7acd6d7fc4a67ca40
SHA512da840dd8200da7ae3e0ba781eabc7b9f11c8eb400b7e86c958a976d49c5d9fb8e24b674cf374739a7a7a5d3122dbaa40a9e2226f0face449771a85825436d507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e02e3deca62978edbd189d7701e4a07
SHA1a7b0c2411e33bcb8c24f8e57e378acdf749b4a3a
SHA256f435cb94b046d9099e09d302a5addff7a9891a716f81b7ed5b0a1d53eefdc06b
SHA5125d7ecf082cbd76203365f981d1268c88bd400f9ac521922f5f6ef6077281c680cc2d54f1f593edf4dba9d1722dc779f9caf29d400faf64f847aa582f3b39cbc6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b