Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
ce1bfd88db8c460c9b20bc2379ed183c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce1bfd88db8c460c9b20bc2379ed183c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce1bfd88db8c460c9b20bc2379ed183c_JaffaCakes118.html
-
Size
50KB
-
MD5
ce1bfd88db8c460c9b20bc2379ed183c
-
SHA1
6f8cc8d5e3abb1589d13a3c7e0c36a118ac53a14
-
SHA256
a337df740e10350cc2231f4323e546fde88a26d10ff86b664253620a4fb46d80
-
SHA512
976a3a30074ab9f8d3bf5118ec0c61566816adf8aae940029770c4ccba3de551a951a9ff9948a7ebd2e95d48a28ea3a74719262179f171ed5f9a701a55bf0fbb
-
SSDEEP
1536:SEVN2V4Xe20CCLFuM/lee0iD/r7XfyO2nDrnvTrEMIHT7n3bDT6sOFD+Le3Oh:SIR/iD/r7XfyO2nDrnvTrEMIHT7n3bDD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431739027" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c059ff54e7ffda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C3FEEF1-6BDA-11EF-9A35-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000766563a2ee5c47ac6dd94165103aecdb5f7c2082c0facbe34276ed13debd3764000000000e8000000002000020000000a82b11e325ff84e67c9b95844907d285063f3515b111ec21eeb0735c6e36094520000000c684cf64cb97032ca83775da7fa55abf1cda05e65daf0c52d7c758aacb75e54140000000197660727afcedc5993a14cd2e5d55d9afdb728fdb39e158d7106106a5b22fea6f52c108a2825a4e7d4b074c5a212a8d2712c6219dc6cc9501d40403b90e5c7e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000c98ba7e5cd958be582e0d945367f2dfa4a884756b328ba431b3fa60b92782679000000000e80000000020000200000007c0f1478875bd421c9463336874108dfae78c23520f9cd5ef8060bb97673a17490000000521bfa1689cfccbaf5387ba222162d82526a3d47be48024d5fc818acc7a38c823ca97bca1676808282b519fbe8fa1e4f18e6af2ace821ada2120a8b847d564fa3e5de053618fc6fcc41e69716d92b914e6f48afc8a68a59686468722df2549811af179771a289acc91c1a489fc0bc3c12ef7dce36ef01c1da6669de3b26e831797b5d3aacfcfe558e8a434f5b552752040000000c616d4340b1906013296c645787b534c60c732eacc01f65392605a73d60c3e8df2f8ba0a69959571f43868226aaf59159c94d3412b8ceb59966e8446481c6a90 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2372 1916 iexplore.exe 30 PID 1916 wrote to memory of 2372 1916 iexplore.exe 30 PID 1916 wrote to memory of 2372 1916 iexplore.exe 30 PID 1916 wrote to memory of 2372 1916 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce1bfd88db8c460c9b20bc2379ed183c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d27d4dad52b9bdc4cfb19c236ae2fdf
SHA11e78e2033944ab5d09f51a42814ebb8c772623a0
SHA256e1eb4560ca97d756b6a7149f46d3d153df4147cb54922d4c892291fe2639cc60
SHA5125a368edc63e539b7b5de02ca8be4b368d656b1fb41b23aa23a66ad239a75bba0705cad9ad518a1f8dc4d12e71adc0f40a8229d98f27805f8d3144c4f84ea69b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d1f193095099cd451c02dfc9cdbbe5c
SHA18af1dd4d5c5108c9265caf2e0d4d5341f525a8d7
SHA256102843cc2dfd00f76ca4323ad81c9bfa0b36dd19c293607888afd8050eabb0cb
SHA512f62356f4546cdcd710da6fad9bf7b25975641ab6281a70217f497cba86d226d5e0c2c341fc095fd3dd31344e7619c7008f35e97844902e55ab21463d686ac5d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf9371da2b95aae5f723b8e23483fa3a
SHA1f891b4b9108ca7b69059c90b8aff452106cc406f
SHA256a4c3bc61a0979ca2d2fbd56a92305409e017c872fe66eccad11d404bbbf305a1
SHA512e28104a7102c0b2f02b4a570ed75c4263597f85010cc9b6456d44e45f1dd072a11d504b2623017b0eb5c26a62c2105d345de9f9dc3e911234eda42a2b6c2b455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c96af6b6b0c160fd167fa21cbf2f51
SHA1543f0754f2eb43ba0b24f72765d2e41fbea6ac31
SHA256614bf50209739006b648c4e8f9d0dac919008507314c46d0ceee980241d272da
SHA512047505f8771ebe5d71032ed5598eb07bc68a20c3164466bd41515fd1228d77970a013a8c1942dfe842135ed148aaa5ed745d73a83f5398306bbc549869f14a3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd48658f406ac1090767f9a93f4fbc51
SHA17dd4d61a3c034f46f3798e30ed037f0b9381f793
SHA2568a71c53e0973398a83b8b03619234184e47a56093d07e7a2d4fc40576bba4185
SHA51226e26c8ebb4aa7aa29393712b26ae96d8c766280611ad0f05e8adf242a0fab1b8c08bde3e0d05d593184d0afe8355ec23deaada0c2b72002d3767a94e6b4bafd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5608cc137f5638c70c696a3124bc7fa
SHA1a4552192b988bba7b89c9961e61306bca5640dd0
SHA256c4ab3b7ff95ec6b4299793d99c505f56ecdbe30a42c6cdf41117df7074afb9ca
SHA512b8f45bb82107c94fb95c9f2fbdb5d474c649fbfd4ff38bba85c47e7c773bf19bfd3f11d582352e2778d0f463944d75990710fd4c3827f0f0a8d510e245f9357f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb8100454023100cbaeefec823a18da2
SHA1ddfe29d68ae9d55f9658ede4d71ff6664ede0fe4
SHA25618780a6a1ba28eaabb475ff86b04bd35d9ca8ebf92bc71d76bd9525e544accb5
SHA51264c67b8b76abd8630d6184966c43f1b3e56803473bed62ce5222f7afb36d39065631346d9b9c793f30b1d459ce300baf375f03c0dc37c34e992193330327dcf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e83905d49cf4c448e30e2fe22f3b2f47
SHA17921f6f8cf1e8ad2eea5b7a95851621fc855619e
SHA256dcc7e5e50fcc7e53d03ee7cf67bdd4a4a4ab08e8ef733d2e5447e7e52c5e214a
SHA512fd6926f3fabed293514ec5ef1d235dcc521ce4b888deb221d8778d5158c36ea4144c0ee7ef5575684895102cedf773fb7f963c0d01cedb8563d61ca141089614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed3214bf6d84c7656d84e1e54a8df1e6
SHA1fe4a1c5e289d0efe8fdb756fbab83715f8f13431
SHA256ea6183c5e82c388a70f6de8319179fbc140bf65a71e79a71398d84289d4d19b1
SHA512193e04329c5a4532de3251d16974e51fc731e2b2d71d31de0c540668962affc107577ec27ad640da2b4acf77e489279b5708b5e14cb5746b39fd56aea50d3df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564901ebe3bc237398083a245e4debf5f
SHA1746369e5326ec033e8bfb45ccaebb6c7cc08bc38
SHA2568936c8f583a34b6796316a481d9bb78f330c6f217f69ed4c1a00731e6a569d3d
SHA5121d38f9a9bbf2f93aa7f1a8f09d7ec1014d4d814ea249f9feec7562fc39a8ae1c5a123e71f5886ede946772471f56e964d77ec5c570ff62e44695d11377e44b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de57b32cb1560fe008f7f123c3bbbbe1
SHA10d4f1ef056d4c7b4b7221de5f07f15c48b967ad6
SHA256c378d448db0ccbf61182cb327e5fe3f5ed971819671e5b194222945b48382423
SHA51278bd2dca1082964b42a77573fa7dce5b00ad6d0050fa9f85f5297b876948eac79b3b77eaae27373a62344bbfe613ed1fe3e3b7d128d9ddd445491577b0853e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5465b2995c05d78e1892a40d7f60a5ecf
SHA13c68bcbe64c3b8d5f2a02006db6ea2a266a5636a
SHA2567741aeaf2815e0f670eec7c26a607a88e0acd31e7eb5f4d523af17f9b350ee7e
SHA512a72e736d568de702fb7e6ebfb9b844cbe79b37a03c59bc733350086a3432d798c8707d0f5da4e2bd509c3714097c55fd4aba373c420eaa5f7e26d7644a4419de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f85b58b1041465c59fb74cd13622755
SHA14511a1301f4854b57bf0408d8796b6d9d0079c07
SHA256281a337a44f6b6732581ebf656cc5717cefa5a9cfdfe4598132ab3129a1efb6a
SHA51270c475d56b1c368572b401fdf3497ccd70865fc8f35de0ff71c48d378678588675ba1154b70d156b197e1e6d30391b55a241f6ab425d1329a72064b7b177ef96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581b7665d9a403ae394dac5f0301d944e
SHA1c142e7b08a70a4bd3ea42aedc5064f6fb3e03440
SHA2569a006199c6f75a66e0bee95ed59d63c7a924a3f4316a8eeffb5aa8f1386657ca
SHA512814aca267f2f9c0445a9fce114dc67ea6624ff0701b2cd68cea7fa66706e52d5c982d7425a8e6aeeb9d68f240ddc1f87bc9f1debb292d2368d4f805a9dc1f7d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fc4d0564beaf320d4974cc2d31770c4
SHA1efcf8da0618ad4f9142889f0381f3d6669bdd95f
SHA25648bab8f52be5578add145b525e8aa340b1984f6a85dd24763b685dd90f44e9cf
SHA512bddb5add2a5049baf748e6d2e4c635c944a8974c9cb2eea9fc2449a6f1719c4d9fa2646440171fcef9c97d203c9f3a886f67d5745449a11f09aa0f71e195245d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cfd916def52590c1023660c01134ff7
SHA1330981fd160236cf3e77b41a6348080f07c73ac0
SHA25644fbeff2f129ce0b9628a1ca2f798551f7b080a38262650d39bc9eb6cf493672
SHA5123efd5e57216d3f7aca09f259567fe463de1ba026361fc304899b18506abf700370ab57a8c6e56b39d20f1f9f9337af8124d66f4cefb8e482de7bb976f051032e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580e0761e3e800dfb0aeaecf4944a4b53
SHA152babf58ba0da4c59b4eb6fc49e0b71bf028f084
SHA2562cbcf235107ea13264e466f886930113c968ce2e91c164782be412907fb452ae
SHA512b6039aaa8b97851c7a3792766ad082f9d9e989ab6adedf9895dc387bf3dcf2aac283b6a037c932d5110865893efaef1b9bb075ce9c1a1170c7e796138e22aea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfa8f4627523297b92b2bb7e1a50be4d
SHA12f29f5ef5590c35cb9a3362222358a5e079de3cf
SHA2560fc6ada76c1852c82f8d6fbe57cc08f86410fb5e51347dba61772170648aec14
SHA51213d909f39b0f7280cb0a3a998308b94bfe6ebe2404caa50eb11cf1d61e42c10332b9773c696a2b0e49b1da54e598b9a1b5b2faa6d8a85a795e118bf5d41fc785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b965f2042e34324f56940f1513a210b0
SHA12db1c2d93cb2eef508e27ea69028a32c00d7e0c7
SHA256a0aeccc53d77bb087b082b79450ff215ace5a41599996385229cc778c615228a
SHA512f1aee4f9aeafe3d7e0bc46617c475293d9396935be7c200de12ee4aef89725c1d63658409041deb768e919b82623f017a1d07f85130506310f712cf27e470d7f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b