Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:12
Static task
static1
Behavioral task
behavioral1
Sample
b4eeecc50b7046bdde5dced7cd4c9173_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4eeecc50b7046bdde5dced7cd4c9173_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4eeecc50b7046bdde5dced7cd4c9173_JaffaCakes118.html
-
Size
139KB
-
MD5
b4eeecc50b7046bdde5dced7cd4c9173
-
SHA1
33e7b1e1254e387e1e4e9aeb50fc67018477149a
-
SHA256
f854950f7d80e9d13bbdfb199f563e084a22fc994d8b35108ce5c0edde47d5ae
-
SHA512
efed14230566e3e289cafecbee51666317dd8a75fff68f72f318131868f21e186e1a2c83fcab404945a96bb84ddee1e1860e1df5a4468014f8ce5869e3a02d15
-
SSDEEP
1536:SRHu0HClktlvT5OHyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:SRGlkVOHyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 006b59d5e642db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000084522f0d083e66b726ec4988a9a14c655757aba850f27e7ab17e19815516c237000000000e8000000002000020000000ea7297e330bbbc694e27c4e21c92199b92323b543e1f5c7b4d85fbb2bd9119362000000059614cf0d0b0ef4adea65218e7a89c4214a044634fb073a957b519db69c2be9c40000000b4658f948d868bae261e2e5023e4016cbd29d275ca255bb6c646505fc38bbb92c3140a6d896758b2bb80f7120699faa1d765042e3c3a36b89c22ecc38dab72e4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD9128F1-AED9-11EF-9733-46BBF83CD43C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439105436" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2688 2340 iexplore.exe 30 PID 2340 wrote to memory of 2688 2340 iexplore.exe 30 PID 2340 wrote to memory of 2688 2340 iexplore.exe 30 PID 2340 wrote to memory of 2688 2340 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4eeecc50b7046bdde5dced7cd4c9173_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d63cbbfcdc2c59d03f8aaa6ba3d3f66c
SHA118fa87a50ee8e1b073f69ec0c067cde60029f0e6
SHA25669933407794c5e1c0b13fe91d088e22e7a0580c4d4aafdf31bb550651da5ac43
SHA512a6482d3320a3daf6ce1c3125ff0501e2c0269017a7abcade0f262002b3d53e856deaa81f33eaf96025d2c81cb5284c5540e0dc4af26052f1ef3992637dc3765d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3a7c5766d091b25038a8d53ca86bf99
SHA11163362143e1f8af713c0b3d66dab39cf05b3bff
SHA256bb2c58ee9e405228e3fe493c875eef0b48679dd426f1dbe6e3240ca8d0e9e6b8
SHA512271688c1fc53c7218efb5e9c8cf88573e15214efb555c8214204e533440566f90c66c29ead0d9653f087d2bdf0c0de529fba31fa0d347dc9cdd824d3bc62b677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f5c254b3b12c05ec55f2a8ae9c14555
SHA16e258748ced55c35af319d02e74a04b84f4b6102
SHA256fc3a8c664d047728a67c4a68f4343db6185cbc00dedf95598664f4b603c2e3d4
SHA5122724b72fb2f08dba537254aec57e51b6208acf0d8dafdfc01c69ce56b070599c84f8f273d0dac46ca83ed70eb56143f208d26f5966e1303e16782502b46a027d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8c9efd9f9041633f07988cb40479fdd
SHA1046f4dafc899804e144e9bd4a315fa48dd039a0f
SHA256e6f2d3bedab3930a5dea4fba646f5aa1111c19b6ed00e0b0a49fd10828f16b48
SHA512869823a11f9d8ad3718b7f8fd4c8ad89572a51e144587e5cbeffb206c2e3d7b7d97fcfc2ce86957a084d85ccf66e16f2bcb71276eb018d9bacfcf4481a1e63d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538116cb03588f5907ad9edd647e7df5a
SHA13288a09601057a9a09220f25b857beb6d3da2d04
SHA2568f8ae91fd0b921f1a6c87fabd47da6b6475e2254c72b62f3d4407acfb1ad49ab
SHA5123eadc19a389a6056d11769c3b7b654060ff4730f1588b4e58af475d07f09a2216047f297f92ce9dd0d60869a969fcb4b0abebcc0a2faccc0a05feb2f444d30fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9d92147383743e2ce62bce6f08466e7
SHA1352f86765abca090e4231f11bc85cb5e50a9de56
SHA256eec948ad7a7e18515f7d0c0c1bcd058203d5dea0208f1cdeef76b3a5f85274d5
SHA512bbf462a4ce00a528d2ee088daa4dceeebdde0cf7082142d1344127844422079f2d6ae46d757b1ed9b9a164148d27d285352b84790e80881eb1a575c25c52de53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5320682706aff31ccb99b5a81272209e9
SHA15d3130e8c919593e696fb548c87b696fab7334f8
SHA25613f7994da564cb8c447cfaa809022b8d596070b3eedec8369335a5204ad9756d
SHA512d5c6fa77a84b1d3ad1257ad9fcc643e552ffe3f1b1a10737f9b3bee50e7eb45464a572adf51af01ff91fe1fe6e5414c4ac6bbff77c30f07dda870bbe717ee936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c186dce94afce24d58a9bed5f06ca83
SHA19bc78e0e29e4f0c07652fbaf180c749f76d7963d
SHA256c609390b6b004968f2c15bc0641b7a31b07bd2b18e3cdffbb118d74b3891c17c
SHA512833a24ec42b66bb60cc2f49570f4a5d75f048255125849fa6a2528d746bd47c2b65f8ba06192f36af245893e2e54fae31c1bfdc1d6d1abf481dc9248b9229be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dccc3f3d6aa2fbb27dbdc7ad5b8528b
SHA159a08f8388e7f830ff94103f507f56e58552c97f
SHA2568f33d8e3092316b7ea0757b7d0d342babb417d783fd1841ca3bcd96ddf02b0b2
SHA512c0876ea6a0a63a3d206275820722fcc1eb7d2214141313b8ba7ed8511648b90c14ac209c0cf22f95147ff002ad89a188666fef85a8694369da587614a02022e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3f0e1d9ce397198170240368a470ddd
SHA15628070d8246e6b43f25cba6acda7bbe7b4ad5ca
SHA256e54599cb187ccacaea5c05bea80161054e784002d20a9c2a764c6d5787287f6e
SHA512f054e6a92f78bf9765e3238b08320a65c030e4147c97affbb974789c24b0cfa148a2c0919be2741a0093d43a129642b9e7724ee9463b4d7e5b9816240134b29d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4918da5b71c1f7ee96bdf9a377d0730
SHA1a834126a9f2f92d08ade1b6eb9ae2598de6b2281
SHA2565dd6a7408d7278977e43fa431b7df28dd75f3e7142dab6550b33cc03d511535f
SHA512c901cf9875bc6906dc6803e07191ee60ba566705414b62193e3740ccd27c7615e92ebc32c2c4b86e1d059a7963bd755771c2c3fe13054da632ad9c7daef5a2c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552d6bdd882edcf7c7e8f847886ec7e30
SHA1dc5a9cba7d7cb05facdeb3bd6716c8baae255771
SHA256c71dc9258aec457698f15a9073b459f9885df30e06ba55ceea5764c445dda16f
SHA512d4e0fdbdb5dc5928fb7c214c4ddfdebfab29d01d81d033e45bee2b5e91aff6af6907aa057d84bd027c1fe6f6d5a2ddce242717c02209efc65c8e4a003558e170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebb6bd6af8d4c2ae085ea6090e2281e3
SHA1030b596e7cec2ded990f38fe44177dd5c41e7895
SHA256d410da96f282829d6b21ce7c10bc33ef0be1f76873ec72a1584c626c4f97a39d
SHA512d9ac31d45531bfb4780c32c86e1fca702b1355b7aace2b972be5b7123dee521e39ce2d93d0a982fff2e1b2e2ce6e252ef1905aff20e7944cb126ac33fadc404f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5017a1aeb8ef424bc74da92a5eb90bbea
SHA1f63014dcba37bef76032aa1141ad22cff07e06f0
SHA2563d3f9475052739e9fa1809be1ba0756ae970f58d8300e676826c9f088daaec87
SHA512bf9fd0d94acd8723f2aee1565934623a43647c5dd19a857c0237a9f6439e01487f549c7ecfaaaf5ed9810bdabd4f52f7939a46cbb906f994ff1be30bb60be985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e243cc24b8cdd158974ea0e58b6d464
SHA16ac4255e85b2822c356ff2fc5aa8187391328805
SHA256574c5ac0a33c676f6d4ab6b278c40b5b42bc01f4a66c75bb342168a2fa0862a4
SHA512e46cb121a748160a0b711b0666f90442820acc7baceefddfece2568e45a3d800ae54d01a48650d7847fd2b131dbc6e70e10413e4fda3341ff2cf53e19ac4ac49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505a8962f6ff7acc024fe50c8fbb67cdf
SHA1e917b5c69fb95e5a6c2e10d5e9c7dd65049c912c
SHA256b621e59d121059a8accc1238900fd0e25703441375a8d67da26b2f08da32542f
SHA512f78a00670ebb822f127be5f01350f0f0043edc39e6009a37c41bb853fd0c3c1780213586a121e49b0095f304892a20c467a348b162d1dda8d61551a63ab11f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e326b29846a820442a07017f6df352a4
SHA15875cb6d7036f0958511cc82c9af3a645d88c056
SHA2568391ee1ea42a79a3fcba4961ead16962aaa4eed2b47220c748b76b0fab3f6d51
SHA512f14eca49000c44d3ffacc1ea8c4cc95fa6074def5d316b28b7d1aa64fb9404b4379d37dfb2a9ac35f56e3dc930d31a98a7a951664100a1d13e514bfee2254ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597b696a213bd5aacb72e4a62731c6cb2
SHA1cfb8fb5f8664b19fc84688887db35d991d537711
SHA25635d447ff0af1141407c29133b175cf1abef707fa629eb3b7fe67d3bb0cce1bf9
SHA51234c91899697209ae10761493353fcd8b61280a1e912bbf04c57a7a2226feaeb356bd4189e7c0279f7be50b322de3394339f3fd67f008dbf89b13e8d3ef4a95fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feb305cbc12fa1a2844c5145508226f2
SHA1e4b952c7cb904e77c7d5fd84add0f53ee591573a
SHA25601151ab12278edc5cabb08d0ed53bca24c772bac3c90a0ffcf420aea7822f2b3
SHA512daae5dcfc585427fe0cca967d676ac4256f0698b0314920ce79ac900d9d67b5cff4e688a91b1a588294f9670ad72d7ccd620740f764a63d9d59ac70ee859f78f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b