Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 08:09
Static task
static1
Behavioral task
behavioral1
Sample
b280f1b02a5ad43953bad3c2291f3857_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b280f1b02a5ad43953bad3c2291f3857_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b280f1b02a5ad43953bad3c2291f3857_JaffaCakes118.html
-
Size
214KB
-
MD5
b280f1b02a5ad43953bad3c2291f3857
-
SHA1
b98eedb48ee14e2805118d213fec6d4c915385b5
-
SHA256
e5df82073b389a0dff7608f166fd19d947f156a0f1191f96252e0e8be71f266b
-
SHA512
0eef9035ae3eb3227e25bf06322c42f05a914c68f806f6fda8924261b15439c2390e7a873f70d5836d83dc4208b7b5f293fe3b0d9488f927ebe5bff0b62ee49b
-
SSDEEP
3072:SWBZ8Pb0QyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:SqZK0NsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CE5C4611-2BB7-11EF-93E2-EEF45767FDFF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424687259" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90afe9a2c4bfda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009937ead2a2e27e42aecc87b01b21cfa2000000000200000000001066000000010000200000009002709495f525cf0c410da969f980716e9cf42018f855b6367aa59e69c1856a000000000e8000000002000020000000d55d5cd381f9a5442b583ca5cd64436351cac4068859a6a2133f000743d0618290000000a13d96187168390c0697f83557790213e5dbbca149d34c0c81130e84db9267f27b80e334436eb0709838980b86a9becce3b50b97fa3e5f07d1ce8dffd7739502d85a603334960f92c67972061c424489e5b5732da74fa4984555daf3da680e98c71a1f3b0dc425a70a8d02a2e154cb8c860132fdb05f6a7967a002d092df9c9acf769b973dd7bf18ad28594c01d505b5400000000081b9d584fb4b476a0ddf01c81d5eca797f6d8b43241d940160794409236dbb31a200e059f51a3bab7332f0c26afb612fd3bbea1f31148f93642052a56fdb06 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009937ead2a2e27e42aecc87b01b21cfa20000000002000000000010660000000100002000000091ad10a466f3a5f90109ca25e30a33daa16a7e3cdb033dc5c74b72bdeef4232f000000000e8000000002000020000000f9f34b2f4cea4fe3c1db9df1db03b3f9ddada755653d94f4f4190e89adcaf00a200000009d0af12b111f76c666b14f7bdb796283ac1d0f101f99407ed752563f3e8de5244000000019c44926d8e68fd1cb911cdb99fc8a7ca8c6f04b7840cbb35771407a323778c5b99f57a7a807cac26e7493fa0903c232d66cb93fbfc95a20e402859ea44a4fb7 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2444 2664 iexplore.exe 28 PID 2664 wrote to memory of 2444 2664 iexplore.exe 28 PID 2664 wrote to memory of 2444 2664 iexplore.exe 28 PID 2664 wrote to memory of 2444 2664 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b280f1b02a5ad43953bad3c2291f3857_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8124c221989aef4f16234b0d29b2dc9
SHA141196374a56ffec6a5cabab3bf0f0d48f66c700c
SHA256c87646a0614bc4d768c70bfb675f8be3153dd899246761ce4127dbca453bc091
SHA5125be3dbe78527c15dbe25a4e876e968db1af6a81e73d6fd5fa2e5e7cd7948b56d82138ba7053c24d024c76e486aa738aea629a0ea1fc5416978837376486c4145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ff739ef4a0d6b6afda6f9634d313f0c
SHA1ac4f7f9bb57c7c9cac5e92dfaa373ca551795fff
SHA256dbcd5e8d83ed33b9d3570fab9a3f84afe4b8df9c4942674d312ce23581a20c7e
SHA512e26220a5e4ba27c98a9c882b56e19ea1e0ca83fc13df1a24921acb954601595b2d8e866965d2d4a11868659895122c9b61a4587e626003988ebfa59abae9652f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7bf8d8512c668895e3728dacfd15335
SHA190ab0f7237f788fc7136aaae759c708d61bd5d04
SHA256cf04db5e5a8eaa48d597d74b17c304bc49e62b76d7713d90e78d8488027bfd5c
SHA512c0599fb1d803acd7bff0d56230250ef2366eb88d734a57423483a12ed58be5dad879727cb251fa5a8bffd39026f2e4cc257abc8d9c057279f50ebd99bcd596d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a781690bb153ada7e94a9ab7822e2b00
SHA1a00b8bb9a0047a9443fdf6fe340106e9c2f9bd94
SHA256debac0bf8285c0bbc20674ad3c2e316a4c275f9bd101af6121a5061f5fe80ed2
SHA5124fe3e89d4c387765e5d1c950d4514d251c1db329dee136833308c70d2ccebde95a876252b819fa8fbe17f13c44605d8d299ced0d09f8bbcbf6fa6cbda3e5ed69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d656a6f995e600b152f005d28f674ec
SHA18944de711a003d8e93ec65ea6f4247e9aaa5ed7e
SHA256ab27668707c98025de1ecaaea19ca783103fab8e9649838a5648833fa05c9c06
SHA512b03dbe8b16bed2612a0b5fe92cc61ceb3643b5bc00fb4b0d0ba9afdf07062d3c8292177d9008d169a8afb6966381e926284e1fe7a0c32dd1a543489d613bdc68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd43198706a0035f949a682d279b4b9b
SHA185c8d67453af404b4a026142c386907063b0ceab
SHA25612c3b3fadf2a9da526fbb79ea7c72b8c5a7d5fad53d113863e8bf24919da349f
SHA512d1b48e5ff557f475e40e2caba0efe8a2f6e038fc458a9d97a2b6d82b5219282f15061f94cdf55fdb2962731e831caa41830278eb7868766c9c813802069e1180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e083f6d29c26add3d840218b45b2840
SHA14a8c6edfe74eb12a0295e0eb8521c4791df87370
SHA256c1bdf8183a1844be21ca70c60136c91e5983a9239bc54be071532af053eca833
SHA512db36e658593cd662e0a12b03509fe47ea8ed58e0e1357c025f8602edd98f81cc5ef2255fc1cd8f0fc3bc9ae2160959f6174eed397655d8cba33113c1d7ce5d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee62c1283f3fee62c85de61c675f8339
SHA1915b6f5be4ad0eac15650ea704cdf1bd941ab529
SHA256492ec954f3ebd6607d61ffd6bd7629a8bb3ac77cfde28f0ddf0f6caa016394bb
SHA512909477e1e5f1c8f436133da0b9dd9b33a58a9e0c69281fd32a253102c82d31740fab41576ed6116fa1f8a4f52030510986ad4a75a4e6e4d0d39f7c25533aa413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c37b92eeb06939f0fb81f9df3101ad8c
SHA133fdac289d6a4a6c3839b73b51e55ff052122923
SHA25667d103368f550105f2c0c3ad7378d5318eeaff7e57623ee80a159dc1d0e4da39
SHA512f50848467b4f46402102634774d5c720e06592a42fd56e970c2b708c114a115dd88dd016a837528ecc3c90e4ead95c8063273922f4c4bf8e957cc64180642496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f1fe349575becf39883cf31822336a4
SHA16933ae9642d1421343a42f6d32d7b440efcfb4ce
SHA2560292d8d9a6d92c2035a37c21cc2015e4f7f4e4553ef37535a90e012c56b752c2
SHA512b39fbc98270ceae701a45f2941f187b35e8f270b95007486d90df64359af2035f1537de401be2278c18ca376e5c0aeb91beb596390c5396d1a7159a6af9876ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54705e7c11b05dfff77814ba3deaf3cee
SHA17c59253620b7491e5810264522058714085d54df
SHA256b14fff3ffc5cc7903a7041d34dec78b89b46974cc354c6d8d3f4e6e6107d5276
SHA5126ddfa20e3ee1e8308ed643f6562d4c8e9e40380e8e2b355449ee2df92ce60349ebb0478ecab6dcd605e793db0f679067809cf0eb0f575f316191b29f71abf74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ae46593f78d9af8c58be137f9f16005
SHA10c199dd16f16662c8fe8c2e210c396d6b8f755b9
SHA2565cc3aaaf9d4a9782d35f9fc742696bc16296bbe5b0a85609528cb410b07ab453
SHA51243c99f11967bb1ee2e4de9573cc4f0026f30c831ba47fe95cf083a034b8cd0d3c2ca70d7929524631b70e66904010ad3c3d5ece80039d223533b1fcbf1246fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb9a6b2b04bca2d17152147e4168dfdc
SHA1c453090b5f3ade2a001697464d614bfdd10b6306
SHA2565d3194472e020d7d48b1345daaed76ad78774c5278226c53acaa95dc7b0e0464
SHA51234806a20e272cde11506c83dd306f1bd4220bc3d85bcc59da9705469733d1df174f7450a8cf118d984af962f20beb5237987866786996af1b79eea4933926b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a9d8895fbb8ae30e107459a8dd8bffc
SHA1dd36318c5cc2c0ca4023472634acdd051f691b5d
SHA25620043a24cd58932aa7a5f8c24c432436c499dafc1ca1e384c320846f8a242688
SHA5122deaf86a3707ae8688e6b39a0763ac8078f9d4a01debca47992abfe9929a2436fb81955ccb2f740654ff68b5d5a02d84e22fabc1c3ae31345627138ced0c13ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595723d0f720048c30fe38eed7e4386c5
SHA1451545c1ce5fdf5d752988dd420b02d1e194c498
SHA2563d1080cf849f342b1388a17cb1274c1ef4063e569305f90dddc88141e376ae5e
SHA5121aa20240b6f48382b7328c44f5d2e7dc6478e3eda0afb62527483172ebb8bc6359ec88696aa1e2c64d9a23d9a9376e8e069580c15466c1f6af3941edd31d4bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537c9c9e0d9b069ee12894567260cffa5
SHA14e05a80ba3d305506b69359fe6cc9f4614ba721c
SHA256bface1eb5dd44c4a876b365d8d3186d2a1a4e9f9d1b824bb3814755b8542d608
SHA51299b00cffb3b4013b68b215f857998648111accbf64eb3bba6e36a79103b7ff48b97166bbccc88b65f5187a8d9418b483bea4118f0d75c8ee75ad6beca06eeaec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5247cbf1bee7e03f465398b6feef7b7f4
SHA192bd3ac9195e4e6920b2a380040c7c2279a226bf
SHA2569c831d30f883779d43c6223eee63bacc98160a70c31bda7090dbb5361ce5669a
SHA5123d472279531f15c0cbfc6f2a271b1a08f6f844e4ff8d0e957b3921f4d7d7ffa5a4577a78e0e5426d65199f52966576cdf26fb2da20d8232373aa273124f1a8c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5469770c91a65d90488168620e350961a
SHA15660d57626dea20a6a7059912322daccb6cdf5e2
SHA2561f972d966428eb44072cd8b626b76b408e084013acbef8bf2572a8f4ab70c556
SHA512072724379870e11079ea6a62b939746ccd7f0637c9539ed90d5e315e30ca03cf9c9b0bd6f71bf2de9353c15376b3d8f002b7080441d3d2f4519e08e0e2accf1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f12dc3b79f697ded74011114fa5b95c
SHA118b6295d9c62ccc7819ed0ca31c670327735810a
SHA256c0bc9fcf0f7fbcd6c14c304f0432d488f8120912cbfec32a3e5b7e98d61c9b1d
SHA5124e835de7c90232b8118139dd3010a823540aa2030c20373d11721f680d1afd1a01273709d1b0e4834744b1b1116072e4223efa31400c44d1c814b157f4b40419
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b