Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:21
Static task
static1
Behavioral task
behavioral1
Sample
b4f5f3021e9fcf972d4b0fe046b653ea_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b4f5f3021e9fcf972d4b0fe046b653ea_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4f5f3021e9fcf972d4b0fe046b653ea_JaffaCakes118.html
-
Size
13KB
-
MD5
b4f5f3021e9fcf972d4b0fe046b653ea
-
SHA1
b67120501be04d7ae943adf0e1a077cf588a0e37
-
SHA256
481fb1966986fa069490e9f8269a120872b64957e9d5a711faece156691576cb
-
SHA512
69789f6e07cf46682d77e7d63d726cf5659b23017028ab8aa06a3eae7817d15c0d967c4cb7af5a5778aa0bdf7f562ab15af1fb8c02f4fc1594e9831f8fe61762
-
SSDEEP
192:CJufTCyLoqEivkMxRBCpuTV83gKDJsWnQ63hVPsfTD9L9N7ljuHY:CuDOm7TVrKDJsWnpxVEfTD9LbwHY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439105966" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000003d03872ba94f446bdadf70f13877b31000000000200000000001066000000010000200000005f46b92f2c2fed6e469b0558a66d72e6c92d6b7052b0ddcde5b45327c37565c0000000000e80000000020000200000003e8a7b71e9e58efba2491c485ae007c8169ff47227303a5e97a68341d3c0e2ce90000000afc5513baece0c894b4b1c98861ce292b315acc2c78eeecb87a5950844ae64e41bb767cc1c311610f768657b850727b0106e5dba4584bcf7e4862824af27293acdf912892d02f9089bf1b1a5ba16c4d64ba3eb73e66e161be8a8ac5f908e9a37c944dae0423a3ccebd8a8fbf6c9f1208d695bbc1f6e1a8e5c2b9560245236c56d208ca9888ded3738aca103099fb2843400000009e16a22bf5b4a29118aec7caf237c1b939fb9869b13947688c747628234aa404819fd3444ffc416cf930684bb73dc9df6cd00211ecc8dcb1ed978dc04fb9649f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA0E27F1-AEDA-11EF-9E5F-7A7F57CBBBB1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e781cee742db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000003d03872ba94f446bdadf70f13877b3100000000020000000000106600000001000020000000e87a00d548ec4ff2a93bd8bc7b9e48064fe43a46ac07d079f14540d2f0662789000000000e8000000002000020000000bb522351eb441af5b3b665e80dd77e249697d0f23c1120d272ce35cb2ccdceea20000000c043fb426819ada7feb3df57a6a801d51bb5824b6a82874db71c74150270ab5640000000de10c539ce095654a7250f55574768a47c0bfc507a7a13ec60224411eb25f12ebf81496f8313acd1800905e49a411e66b69fc96347f4f7ee4ca0950d381aef3c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2772 2240 iexplore.exe 30 PID 2240 wrote to memory of 2772 2240 iexplore.exe 30 PID 2240 wrote to memory of 2772 2240 iexplore.exe 30 PID 2240 wrote to memory of 2772 2240 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4f5f3021e9fcf972d4b0fe046b653ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586ce255bd2ee59e87aadb3bfaabc06d6
SHA122e02c6257b631c8ec328a2d7f1600e7b04d8a2e
SHA256e9791ebceb063c3845439b0d02a6d91993bdb8c89a10a076baab09f249e5b929
SHA51215f7d5886232148454d93149f3027b88d691f1149bd6977cdb82eaa6bd0b6d16e814cec6f615c7dfa3008201ea162cdd98c408963e351f1f142ae29cdc50bbbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51695b2ec5a176e6481c1ee44bd3db4c5
SHA19827c6b5a423aa51ac5d5a6360060dae33324767
SHA25668578e429080e834d0f0ad2d7f49ef79d1864678a15da24929d78b8cec780fc5
SHA5126b3078e7a6efb3fc4841f0a601f0d5f8b53e262581dd250a7eb07fb29dfa9b1b4927a2f8c7a8804c79ecd18ed5968eff214b934063ac3f20ee51cdf443aed0bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5197ab8eb2f5a672f7d3d9bbdfcb6f21d
SHA15d7746a93eb9edef9e5359e8add1cef25baa54b5
SHA25647edf7b2374bbce788fb53a9aa87eddf7acaf4596e3a23caea409be544cce3de
SHA5123c75bea0cfd55b1adb396526d4defe013a31f56a5c166eca34b472d1a0bf41ef2e0cc20fe32573d7492f2fed1fca24ab9aa064dfdaa57787b33c64ea2d2b4a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50891aaed7948ea6add6a29d8a00b2a78
SHA1c85a09d9e6c96e2720db759e76f099a0247a41a8
SHA256ff15d677aae61b49e059b3efce58f11ab7af72ec547ec7d397a688dfb762a9ff
SHA512f39e52325ce23b71584830aff9bca581962ad91a1995f132cab3f3b0e3909317e7fc1c625dbd76897c497c3a22bc72c2fcaac68596e829562cbe4911697dbc0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521ac3df594429c76f3d6f92d926c1fe7
SHA11d7c219d12fc2722a9ce1a1f21aa1b0280039183
SHA2560c7d1d5c602172c2ddd96b76f32a9087b7755f913d225256c0aff40ac73e7c41
SHA512ab2b5ece0c03ee18f00e432f0c40e3fa6636fff58f1a484da763d16c33d1c8d358d7995e415a1a2579bb8b67ae8b8789018ffbd47bd541364df5d6795e64e764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403724b66c6c7f65d15f7b9896a271c5
SHA10728c105a0a412a6a8940d8926336ee4aa455afd
SHA256ba9e3a7c6b2d78f4c0c8e847d0f4bb54999961b2299965d7018e9a683cc9fda3
SHA51231968c64d76b7c40fb0ced4dfc1affa4fb07d4913d5ea43402de84ed196cf9723c9a5f50c683362dd2f2c1c97b95d1ca543b76e0ec81f6e84cb5f136f86c0476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f179b79035cdd589da907720757b7f1
SHA1652ae8b3ccf600b9df64c912bf446597dbb40cb8
SHA2567a3a39662948858393001f462dfb47c2c3dab61e93ab0ce169eb5f55b24e5908
SHA512faa61948f20cf7b010b09b47bef99eec45f6859172afae2a74c65921dc49768846181226c9d4d342b387100b84608df928f2c72e4b8318707e75eee90ad50d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ba4d2d1271f829e42f1e1934e634abb
SHA130264774333619a53e5b8ddbc700ccbcdd65e1b0
SHA2566bd423a4a380e0232c0b95bdf0869f6055a873fc6cc0677f4a855afe58424260
SHA512074bbb5896cae7285053adeeb2944e9cd0553f5a9af07f8b182755fc20c3671a725b6adb643dedd20d4742e5f5c5fc064948cb93c8cc4452398d920d8977dfb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e152ddb6c2dbeb7aac210ceec9fc2a46
SHA1b694834e66f9867c389a8a764a7a0bff0bde8103
SHA25692d668f48366aadd3e811dfd72266363a53ec4ceae0b17a40c33fc633b70ec05
SHA5125dc7b3508e83767bfdbd16e8746748dc9815ca50cdd511723d84bf52a5af3adba45d8ec02b2b252c46c7d619ce56d94c80fbd05a34a8f5cb08c68ef4e440d714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de326420122368c67e5b191c24474bdc
SHA176a957f7b53e1ec0a2da22d36cf3c809fab7e4c0
SHA256157381903c954500a4f38f8036c80e0b9ce88485d3637bcd57fa81cdcfd51995
SHA51235381bf1298072f2b097ec12860d6ada669236daa8143ed0d62d9555a42d460fe27af32eeff25d38e86643667f4f7d42b1cd72a889877c57ea7bd247b6851be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513bb7b755e2f7de9d452c326a17f76c5
SHA1ee0082a73c5a6ceff76fe77eec7df695439f00d5
SHA25670f75d2376b084424b312f245da8c8d12e0f9fc7427fc74c0aae3a230fdf0b04
SHA5125d8ca2636df7b9cac5951be6f08a20b2a7a7bfd843485305c411ac88860223c357c6bb737ac4ad79d370ca4439fec7c233c2d41b23a71c77137689c63477fd72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4250fe50d473ecb7e7cab1dcfb93114
SHA10bc03b2aa40b40715f6fa0340199fbceb41b86ad
SHA2564908fbc23cd1cd317eb5889d67f73cb8a66f7d4d869ee575c233f89738937464
SHA512e3cabcbb0cb393e0a1eab682bf911197ea6bf44557730f46f1db18685680d9556f6c64a5402db96185e0192a46a0d29951d30b25a00f06e88c8408624886ebd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136ffdf1cf221b2c9f419cc44ba4dc7f
SHA1f29e5ddee27446650a1f7601940647a0a5490478
SHA256e763787d6706caf68d0c30129e303b6a9f0ad9560a27705d7a88dc8e223c7968
SHA5127535def3abd5f9b157cdcf68616405fb3b0a9bd8936773d3090d0e5aa63334bf7ed7499b826c0628a48c566519348a4c37dac05a5a7f10312668bd9754953c7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf52e487d0a168b6be84d5d7e0eceb35
SHA1839b2d1581987efb3fa186a4c32243bd1ea77119
SHA256412c8a39113a58183b6f2f58b5571dd7ebdf8ceadadf424a939238085854403b
SHA512ff7530e952467913a18cc6ac54b9a1de0fd11ec07b06b90b093f040a5feb0fc95db159d47d936826074e2d7d7ece257b005731f2f05b737d04a807192c0b8039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ca54208cc4fc3c782f9b6ea15b5262
SHA145154c6f8571f2ea02f1ca821b48d77c19508be3
SHA256248ddee2f35e6ea33d3a263fdd2437afd46203dbcc2caa0fb24195631485a311
SHA5121a062ec9dbb85d9231e65f298b22c577362e244bfb97b64f82687fbf8b62e4e57bfd4ae6cbc451cf7de089d438cb7a922de6170430b1b608f2189ef7bf38f56f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a48d319521c53019a929274ae16f0c5f
SHA1d6d05b1ac9089b7fdb0c5b4c8e4d8d38b795700b
SHA2566f7fc5e9ca3f4649089fbb3fa3e80acc1c7d2ec173c17f9a73ef86dbbba1da57
SHA512cb95e0a0c8121c0970ff6bbd94db0f139e070cf2050e0f139987a889c8ffada201c365218e5e723fd92d744ea715ce8a05013a9f316fee2cf6ee2808fd68c634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec438519ea1ccbfa79f737e88e7b8093
SHA1bd3e329b1fe6c0dcad38c0a9f2e8bb85f9b996ed
SHA25630211a692892c1c80671d030ffbd387bd9ba307134bd217130bfa1c86892897a
SHA51294b797d95711993f67733ee7c16a1c642b7d30517891bfdc2d1639fdcbac28818389bddaf718a0b773af6b991b230d7c752c743737d06c358ec973069d271151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b7aaab7d3dfe851be03e3acd3a0ec6
SHA1cbf06b252748168d70d3bad0169a90e471fcf289
SHA25676c921a83e86dd6dc5dd7399d5f5bc7a7583834781b083449fa04a2ccaf02e5d
SHA5120e089acd026ee3b35e0a9b058c1cfaf7729c2801fb9ff9f2d3c24c6c375678cbaa44ad400a0fd5c949a8f89be2dd88543b2205898e27fc306238284c5e50c8f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542f3b1ad13aba8bf7efa1c4ced4c2306
SHA14f4fd6d454c8b8623bc0eb66eae7b1b4e3f71e7d
SHA256dbc136fa865bea27c387fa9c4920942dd7f932b632101ab36fac4159f86778f0
SHA512f228b2a65a36950b17c8bf4f51b39ec0956c2f55b272f7c1c7b06778f3132ea3db78b63205b854ce9b4e830dfb3e441168f2c7cfb3efbfc694d40677a48f970f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b