Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 09:02
Static task
static1
Behavioral task
behavioral1
Sample
89c55e75e28c94e810e38f3d08591b1f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
89c55e75e28c94e810e38f3d08591b1f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89c55e75e28c94e810e38f3d08591b1f_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
89c55e75e28c94e810e38f3d08591b1f
-
SHA1
ba57c94631ce721483d051d5657f9c1a1164a422
-
SHA256
81fb2f0ed31fd7b500f803de54e2f1d4a9b43af71c7d2279744a50543e947d92
-
SHA512
f26da19a158233bda4f4f61d6b7a906d96262f50bbaccb4c2b6bfbdee4effda93970e950ed658b95a097218f7e0627b0664770d9de7712f2a93388ec6739a733
-
SSDEEP
24576:cejDKKiDkY2+AhEcy1BirYZqXMrDjUm84QeP3CqkkkkkkkC:ceUDeyLZqcn3C0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89c55e75e28c94e810e38f3d08591b1f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429528806" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000ca68cb72c4f2c3af05046b8a88c497781368581663b2b262c9c86fa977c9fa25000000000e8000000002000020000000e234828fe2eb9d7adb7ea81d6a41e5a70ae570684e21042b1bf80b87689e2626200000007e9995e8825a2ededfeca9249ef316b56b19f3634431651e8d7c196e79d2864c40000000389adc3e9a9ed55d1f20259c6aaaeadc364402c051f9d74c3a543c790f3d6f2ba5d7c2be4754ef02f947b580f7672a6d63ccd474cfd2745ab791e1cc28d18f44 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3066823dcdebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c00000000000000010000000083ffff0083ffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{682B3471-57C0-11EF-A251-667598992E52} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2776 wrote to memory of 1952 2776 89c55e75e28c94e810e38f3d08591b1f_JaffaCakes118.exe 30 PID 2776 wrote to memory of 1952 2776 89c55e75e28c94e810e38f3d08591b1f_JaffaCakes118.exe 30 PID 2776 wrote to memory of 1952 2776 89c55e75e28c94e810e38f3d08591b1f_JaffaCakes118.exe 30 PID 2776 wrote to memory of 1952 2776 89c55e75e28c94e810e38f3d08591b1f_JaffaCakes118.exe 30 PID 1952 wrote to memory of 2944 1952 iexplore.exe 31 PID 1952 wrote to memory of 2944 1952 iexplore.exe 31 PID 1952 wrote to memory of 2944 1952 iexplore.exe 31 PID 1952 wrote to memory of 2944 1952 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\89c55e75e28c94e810e38f3d08591b1f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89c55e75e28c94e810e38f3d08591b1f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://makeasymoneyx.com/redir153.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c2bb5105762e75c4e2d8ac686e378ad
SHA18521a58f9495c5281df74872727e641757ba305c
SHA2566fafdf766df7670e0d51feef88023ce81560584b980be83c4b4711a67b56fe7e
SHA51233d1fd81d27c3addc6ab464590f07558e69597b6288d6b4910547e30a938763ce5b267f76800d53403ee35be3feb362b48b1cefd13635aa56ceabf30b7351880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e50b336d475eb85614177b1ba452a189
SHA1c796c71cbe1bf7b034471aa21bd9bd4030e624f2
SHA2567d87d70f06932bc19651dfc65c327941cb400efef2d9754295dbce32f0eb62f4
SHA512d379a4f180774301ce5c65d3300e3dd586a44cd841de073994ffac68ec659fc9cc73426f6f1f133213e097b0963927127c0e63b98208c546f624ba43702f2c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b8670c95da8211b3ed0e386fe6a4dd1
SHA1df420ad6ce02e8aac68f7b467a761bd8c7103b87
SHA256355063c93010c63e0ba29f8784d11f53e01cc4dfbfb31c5dce028f3b15ab1a93
SHA51281bda4804c2b21922b45a5a634866fcc592af8c21e833f26ce18633d997cfe17e7e44aeaf5d7a458c871987717d8700224fd74cf6b98c0f18f0d7b4696a22191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5649080b3893fe9b5d1275aac7bc0940f
SHA109f49d7d0e20284ad88231a1649bbc07e16b206b
SHA256d404c8b639ad4c098e6a7117faa1cd15313281de05b9a41875b9077f39402a49
SHA5123dc7cd5a78d96dc35b7ba05741babca5d22e2342bad1ca62ee903cb111737973a20f940b274f96ad0af6e59849b98baf15850b2f91203f0ff2b1be8ca4452701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5975957587a4c1e0512527c13ea49db49
SHA1302ef86d31b22325504e75fc32fcce08bba2a251
SHA256e537b480d2ca8363a23c540d0aee9a76cb4909d76f6d0fc7d9dc35e9d69c0b74
SHA512da7fecb49a6f55fb8831f2b18a525f40bcb0e218715d84c7dd6f48d8f691aab3f9ac425abbcefe265c059a138e208d62cb668fd68183ea2bdb737845b1d7ac22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564afe99c29b58c18ccd5dc333c3db351
SHA142e3fa3eda3f04de420fd860faadaa619096bb2d
SHA2561bec5eba9c8a78743f9e48dd322570bbe734858b048941dfd43ed5a87fda076f
SHA51213098bf9c75b57c36e3ee432342b6476b78b202f069bdf1547269e511c41b643bcb1ba8040593359c4debb8bafad0d4eedeb512262148a92877dd630e73c7729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd48e67850f7affbabcb85ea5d117a4c
SHA11fa9a259cf4fd01da7c4c4251085e538508b36ae
SHA25697add2a990b3ae2a7d0938b4afe2870019d2aea61a20108e356ff8b35bb3242e
SHA5129438287b27a637a08a433b9a28219868d0d9972188ab01c719f3b3366cf00d165f3312d18ddda052fb819001687cc17e96f8cac23a83e928bf700bc567d2ce9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56398b7756a9a42ff5b55f7a676d0be85
SHA1e6fc4b060ec247cace19430c05ebd6f85aab2b9e
SHA25663271963af14665b0bc774be1895388eec945a3781fbf3a74188ab83c291dbd1
SHA5120fa63aa1fd90793673e05b852259e3295fcde1795f25a0e266118b82028b856a30bdd07befb789ae214f6df6667ed5562c42144f9ab2a7887447d022c9e1cc3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50768197c53c3d568b0bcfac2f259c302
SHA161ee1cdbf591575f82ad65a49fc437758c6b2829
SHA256c5a4d8eeb391f5153110cd88b981e7adcca7b40221ded6d6d62f81c9438f2b39
SHA5128512eb0b5c414955f5479f2ed8ef9e9a3f8ca46687b3645df8998a83f5d9275b9f37ed8d99955c2340f212cfa987b5315973680bf56bb8bbf0cec12ae0fe2417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bda32c931c8a74eebdbca364590d2f44
SHA1cc649a6e289984b30025abd83b7a4bcba93b7116
SHA256cc2943fd78073fd6afb8aef102ced98c36201cbaa6ba3446cff0fdf1b7a04769
SHA512ba4291743a01b32fbd976bbb6405c81f6da5727c355237978646e9e968cf0c2aa66c48608ef56e3aeb209915cebabcfe181f59ab76e427f76df9b07aaf1a0bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd392871a92aea8309db043651f1a93
SHA156d13b9056d9d631bcfc2c37c64f0bf03214c64d
SHA25693cd3641654a28e32b4ff7c31e17c2197dacada471be587443d0fbaebc4f355f
SHA51242b63d2dcb298833d91eb32af9a70d14c2bf36ca67f70f5d71a981648c24c4b05d264f1fea2306b752e24d64df0bdee6f48bf500291f5d0128e94d595d8ac4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a97b6ac9a59eec648c2a9cdadcaea3f1
SHA19cfc7108df3518d7bb92e7b4ad44b4602bced8c1
SHA256e972087f15f266501c8df02a8b72808792d40743b9243a01962e1ddcf4b6ff0c
SHA51273f49487851848599260e927bd11d30aca36825ea83cfac41c196563c3c84f72dfeb98a435b1421d8dd338884967c4417d16b832000584209b72caeb4d8f643f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51727b06639610ca53b9770e115feb872
SHA1a930a7c8ce4c6a7b5f8052de633741aaf9bcf7cb
SHA2562523905bbd333da1e255d3e5897e8f06effe40728930c4cb85a0847df805cda7
SHA512f73f771ac3968024dc5c7abe59abb1c903205d5e3e3ea8e069e962ffb839b4c425ded72121c9783ec3f218322df5bb18f558b9e875a6180a3695413b6fea3bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58330454bd1c7cde9d523b82a45bf619b
SHA1ba53ecb7bbca2d51a57b7a8e33a1f74e61570a5c
SHA256959a53b90ffaea25a87c2bf715265e527b8dd5da371012c31dc9a0ea88ada744
SHA5123e8039bfde86fa339c12c86fec782a276aed407b54e018abf0d980dc0fd80b0d91f3ba33eaddcd86ccad8072feab65421479230dca6a799b9b47647a56245a71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbc6ed860461b1b301928c245d8826c2
SHA1915a1c7917f40a4f781f217605843f9604b03ffb
SHA256c3386ce0851a4f6f3c7ec7f6301da14987038cc63c206723c7bc7542069bfec1
SHA51226aff4bb598d66bd4dd198639b7e2cef81097596b8c28a2fa466f35c4513d508c6b11698ac614fc6c38eb96089c94edefe4aeeb19701b777526cbf4376e3bbf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53404e90f323de97e389792f2d8b1689e
SHA13ae7580a6bf9a81517d51d5f70429e5a08723ad2
SHA256f58e198c4b4dcef770d9af936ea25152804404350d214ee6f991bafb06c83ff1
SHA512371ab535f54cf2f59b2533686936aa22fc940f7757c963411c54d693e9a347f2d669242febacfd0875006880503f09b4f9d8c04469a443da13d86da3e550c8f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dacff7d502dbac2f4ccbefc584330d97
SHA1325f7ffb981a71a37af89ff8e6c7b796d3842340
SHA2560699094889fcdc77fc1942b8d64e3252524160ade8eef3d1cd75592c64b227f6
SHA512adb9e9da79d8cac1e88e26c89521f2479e5d55f14f1649e1902ddd13e9ee5ddb40617c3267be01bc09758b8f30b65c3a6a93816b720303a859b26f8c21f2edce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583722d83bd11ab2bf414684cc7b8110b
SHA1d6bff6eed960fb1b1a848f91f286367df6b4f08c
SHA256429d65437915966508b70bcc6bdf4e558ce1e4471229835dd2f72a717ceae6eb
SHA512f2a132a5731daa05460eb96e961afa8501b1671dc21034f09b91c62a1a61f0e8b720304ccc80f71862ba822e7aed052c1848e605a0c15639c665131a021dea3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56661b6d4725f537b60efb16ac67ee0f7
SHA1c6d9f5d82ba188fb1afcac6d86c73232c5f0e5ba
SHA2567d86f0c20c080bd5f656aeb2c3fbb92bbdfa5f0f97f5eb224e7fa6e12006020a
SHA512942dc95abbb286d3fcda02f813dbee2b5b10d7ab5b77f45d34bf915f38f539fe2d99f354e502bfca7d08a34d4afb6c2e776fb88b142d18fbbf3cf69243db8920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427c7e2943ef80e8da2413d4a802df9d
SHA1ea20c32863b15d8a037c321667f3e9279b009c8f
SHA2566a63e9eea0e4f6e67abf1ed0a3babbfeba4014b3f54f23f581a191b0793f886e
SHA5121e423215b34210e157b136d2968544b6a9e3d06b7bf4926b49e486426dc161558167723d70d4ff54c6dc1f75a5a6cb64713995eda2ac3d2159b03a8a8912631f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b