Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 09:56
Static task
static1
Behavioral task
behavioral1
Sample
97cbbfa38bca4b2f6ccea6d62cd4e35c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
97cbbfa38bca4b2f6ccea6d62cd4e35c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
97cbbfa38bca4b2f6ccea6d62cd4e35c_JaffaCakes118.html
-
Size
4KB
-
MD5
97cbbfa38bca4b2f6ccea6d62cd4e35c
-
SHA1
386d02061cd18a4b6593796199fa8a3f98699130
-
SHA256
167a34cd5a72ff85b6a3479c9b431268b77f8af810d89255114052628a55467b
-
SHA512
325d9b5f2f1cb6bbe2a0b06257a49a5b9f57fe5af159583e1ecf7c36d735aec7f07cd20b5146942681743b523d023b45900d23a72fc57696969f028376503d18
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ofNPQ/d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDN
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1035c0ab2eb7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000001dbaa1628111445953e6b30a0c54d51000000000200000000001066000000010000200000006c194beead1198e3cda379e76b5cf705143dab6b2848337db46f4439b9cc37ae000000000e80000000020000200000005549042e490f969e73c0d440a2dff3a0fd31191e285aa49f1902c87c4997f85d900000003fc06ce7aa81c76e88b4cc9ea2ca69d6db93a2579de67fa06e293c9dc5f1d0945f7d3cfabc6f0a345f67e5b174184d1c274fe1d73d02982733e73bcaa89ca99292503f3dd18c325c7ede968febf4f5115da7b707bd881f0067db75032e9ceda2cf589c63c3da1bf37b64a41aec765012daa204c697b215d9d63eafd0ab7a7dc7fe504bb277e93421264802e4d4d9176a40000000b4299bf33effdc7fbbd79e328624cce9153b6773321d19d4eb2a96ea8c13e71dc0b84e4df13e48656524ff7d51059925ba093d435da4a5ef8c6ec832e014f375 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000001dbaa1628111445953e6b30a0c54d5100000000020000000000106600000001000020000000918f05f11a39625296b3184c8c86968a829ffff3544d1e2ac13da7daad1aab93000000000e80000000020000200000006239f31f81404ccdf3e082f96c273a5b69bb16f6a0eb93794ee2b0108d1219c6200000003cd569bfbd5ea2d9a5bd21a286edcd065caa444e7a69e9fafd6b81ed5d03e084400000000b444064fa6b437feac1794502882213dad205ef94664e3278132f6ac75ef9637977670890b2ddfbecf9ae4070a28f959b95bfac2de43157cc761d610b34530d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D73DC811-2321-11EF-A1AD-46837A41B3D6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423743240" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2176 2220 iexplore.exe 28 PID 2220 wrote to memory of 2176 2220 iexplore.exe 28 PID 2220 wrote to memory of 2176 2220 iexplore.exe 28 PID 2220 wrote to memory of 2176 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\97cbbfa38bca4b2f6ccea6d62cd4e35c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50d34fe0bc8970971575021310db0a0e2
SHA18d70fc8af998fbf602a2b78cc31010db5b9be391
SHA2568e6f8213787b69fada1f9acff56d8081538a02840883e9c9f96f3a9b8f41e392
SHA512ecb8da508bb91a302664cddc7ef19215ec491f4b33eb84c33405787c40960eaefdcc59df801b8dc7c008fbcda55c4616da7bfead5d4182c54419f6f2cc946fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b41003d126f92922a13e587c908cc92a
SHA1492012238dfd38425e121137bb4756a661dd8d39
SHA25685815380c30c33a4a773dab1e7fc51a027f5c4d56d942f9f726aef4c93cded18
SHA512be5a2b90d613a028a1fea268babec225801c294e00fd8abb3ad5a29398149a5b60dd92ac6995e206d91c72be6a2a29542276e19f7b3db2c0920a85bc8cfc3597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dfabae9a0286007e3ba219ace2621ae5
SHA15d58b57b1323b2e06655a5fb57b79d7c17aa8f54
SHA256602d8c09d7c00646c22535b577ea6436cd48342384df3bc93b3478f8641726f2
SHA512d97f06d603d4ef06b46ac46f7b972f17db8a79d0c619943d2231b498069a39b98be2cd8a067e47c9651c4a2729dc8bc8729ca464b462ba67ee29b3b10163f395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56925e34873b523173b8f45843bb99228
SHA1c0f9deed331dd01abda3e52a4ad03ef55e5f0011
SHA2563a0c6d641cb353517164fce268c63abfbf199b1b85adb8d8560d353596a28802
SHA5127276106d7d5d9e6b9f61076fa8773b0bbcf06db2abbb22b986a5655af95d1284276a58d0f4fd099a1f1c596c0e4db8089aee156d7c82f9f41e53b337f026f6ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51bb3dbabfadccd6f0303d41d7a91b68b
SHA1a0b70f194f430cc2481976de181a47c3891489e0
SHA256a6e5ac92589d0614d79291cea059b8ac71092c6e96e9681531b122b7effcb79e
SHA512b04807eb344baba1061f67ad8e3542f8a9138829961022e91cabd1e19d95be57b530396f7b5bd8cbbdaf8a3ad100bd79e7e3605094b4c2b9c9b8d17b730cf101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5204bc1fe5a3e69cbfb836bb39474de70
SHA1062b62da86f2692a5902f2f1c70b3ff9a62d6e01
SHA256786b87e4c452ade82ee557722e73774702a49e95af392073df7fe7a3ae95b6b7
SHA512a909872c796fa923ed3bfe78a1e5b224ca3505354a699cc22c92416a9f8de49c21c9aa32ba62da4d5ba79b5620e4f2e6d8e04a68b95be4248c5541692cc0d59b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53025c1be52574d64f07246bc8c9924b7
SHA19a4999427d764ed42385c68b6931495e2b43b70e
SHA256999453c3afac3fae94fdc9a3af0db33c7f0aab0b158efcb5331e1643c1b231dd
SHA5126adf06592d0b9d0bda6ed7a2cc66ded0b31afc3c7e17ec0498422448e432e8f07580775c792ff2860f40da2c6eedc4eef49b95e913e81924baf91a634a7aa5ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5996292e2be2ac499d713820a6ae3d839
SHA104d95aef1eda2d237e90d02e83ef6366a916dd76
SHA25683c008156c9939b71b4f8180f9fd05ef7b290e57f77bf4ebb138dc2a2d75b4aa
SHA512b9f8a95165ea74e2528a08e998a47ede9fcbd79d77c0326cd61a37f564d4b192cdb239f814682898e1f692bd0f7266ea8c7b4b5f2e443d202cb57242ff2bd3ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54282127d42e803c50dcc98cf3cef56c6
SHA1396fc9345ce96b9a38ccfbc57ffd1a5ac9d228a8
SHA256fc6198ba1e34530221bba78b64c555c523e52a3edf70c6f06768ef3fbf3ac843
SHA512a95fa53201b435cdafa9eec791143e54de3c2015e35106b039cc6ef93833f09af301163fbf4ffcb013c903308017bb52d8cff686bf146c72b5e8a77dac0ff548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ae1af79089fcf81474378fadbeadf917
SHA16d78ab43e43a096132658e5a7e18fc275fbbaa47
SHA256ff897ef1a3459ca14bd8f85eac2fc0586559a82fdf05c8ae850937c8976ea569
SHA512730f05defdb053c20cd8b301617fb95c4ed7279953e2ff7dae3baad5c2dde719a4094abeed17cc0f2c22c41ef1ca7b8059d1c55d4450fdb9452bce8575ac5035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5618ec8aac1353e28ea0e3a90e693ffb8
SHA1af44fbdb04c12c09b705b76a16dbbc8ca4c7d422
SHA25645c7710cf2b4ec50e31210267f8a5a769d1692e3986b739b80d347900543850e
SHA5129ebf383eb83108652ea7446d56afc4a6e1c77aecc1f1fd738615eb57178b8c1c2d0b5fc05e52d99f1dd5963d92388f54555569884aa5ca6d44d9cfa2007e76ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59593abc246ade51310df5da1e6c15793
SHA15b266646088c366fcafd90fc57e33bce394f1600
SHA256b6567929283d3460382a9d9d742911cdff5456a886cd1d7ad76b559bbb8d1b39
SHA5127c20c2543045e4472f274847098f19688ea32a0e3461e5116a5151d43ce9efcdae51c4fe9e6857c16ef53799d56455519e1979dab5533f64cd93812c86c3f0f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d531a8b49ab00d29fbbfcaafd52351f
SHA15979272e1fe7abb0d834482b69af98b284013a4c
SHA256963b6b2c601e511b241892507e78b0d29fb0e566e3cf26a9675d58750f711e10
SHA51293d34a1e1436ec4a9b24a73b04993d39d3c50f185f6e4563aabc3fa4aac03105e97c246889ab92fea70287eb88e8e75ba7ace001af4fd5bf4b08a793758c8d3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58ea76a126ddacd650bceec5123cd83a8
SHA1f12d255a4d71765048c95b1ab99ac4d5e4e3378f
SHA25640016cde363e2b2f145d147d7ec82afcc39187aedbdb1f654551c92ba582bb09
SHA512e2decda579cf17464a841137cb422b75902a0f2fc5157249de288b075b64d26b4fd2faa87d991c0c0453456167b255ad6f374e47c3a12bfea804c981652d59ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fc197d98c348c07ce195065318827c9f
SHA1465755fea6ab5cb994d847a7f205b0039676da13
SHA256fd57b4b73a750d76a6d494d0f7b3c9ae54a3e5f439d1aca8074e398823af440d
SHA5128aefe376677c5eb830129dfaa814737506bfed1ba749d1b0eff51fd23aa66678c069f2b5b454aca4ce9c7935256c681711b9dab7adb1cb5df49a9e72c25240af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD579a6fbc913385909d1b748b05c714f29
SHA1c4a34e1dedf80d94a64494c3e1303c6ebe0aca1c
SHA256845cf2b9db8aeecc5727465edc400f4f65515ded4c50e3bfb11916b23992fb56
SHA5127cf8cc1905e5c60d0a4496fc59cc295789c9b01345a2f4cea140c0eef72d3c865ce813484802254fdcf5a9da8e311b01b554191b6536a40558deaf4b36a56953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c71a368fe3d48abc491af18816bb15f3
SHA14628e50fa1ec91fe0f3cbcf446a376a4043940c8
SHA25616562d2202647070f3c141a376ddd4923b439750547201ab597fbc6c5d027a5b
SHA512c87bd09a8ef1d947558c410e5687be352fc1057228f7fdaa9f33f9013de46f31f062823fd5a5e9470c2a5a612d98fdea112fd341d441390b81ff294f693b4336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bc5a80925e19b69df6b85d738e7840bd
SHA10d89ec1cf7d35351787d2f990d198921caaf3771
SHA2564bf608d3540da93dbff9564275cae748c61697fb9cb216b410cd062bebadf246
SHA51225b998dd03d62c8b66251c6b01121d2d9441e4078e5ee04881dad0a5aca8d14331cc4d802deb18126c85ffc76b7a6c6df85855a0fcdd5f52fea5fa35caf98d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59e156dc96e91b36e8a44789814ab13e4
SHA11f642b3e5591922c4b218b4e75e8342350db8fad
SHA2566634fe7e8aae5cf79cc50a99d7bd9f8e97e581d9c671073bdff690a6daf57458
SHA5121c5d1bd30e32173f3e627c5697dbb9e73c58d5d807685b1677339894160eb178f85da03a9704bd461d32d5a21c0512f627b16c14252b55bb88be2985f524b7d1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b