Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 03:04
Behavioral task
behavioral1
Sample
0c32985134e728bfaa826bcd86e4dd1b_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0c32985134e728bfaa826bcd86e4dd1b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0c32985134e728bfaa826bcd86e4dd1b_JaffaCakes118.exe
-
Size
110KB
-
MD5
0c32985134e728bfaa826bcd86e4dd1b
-
SHA1
e66d5c282d9d57c8059b7b879a591209b2eb4874
-
SHA256
c51b34e96fd62448b29ff6cb4792a5f2e28d4d3f479d059a4beff8302846bb3a
-
SHA512
5f98e604ea88205ae2dfe2da3899443f143e1b547e72771b074f0d67084149fda3fa686f4281d01d28bc663d63292447bb357fded25be034ec298b97f224a521
-
SSDEEP
3072:Yo5sqDh0ITgdk9M9OeEs3eyueEX0tQxgqmY:15sqDhbTgdIM9OeFuB5Oo
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2076-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2076-1-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2076-4-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000007be3557e6de62e0a3353271a003c781e179537d54340a44f139b54f5cc2b983a000000000e8000000002000020000000a230fa72a8db0b147c22271bee543b8c44e98d85396cf6e1a569c6dfe6c445cc20000000545588aa2f1575abaf11f9646e768809546a95c2e9e342c78ab75a5c976fe7df4000000019a7d7427da7a4d41794907bfe34a6099446190d23b709d1b3f987aaf824f03b5fb353e37e3239a8ad52b6a27a4eb14a3f7523e13b89f48c73c02b9c83997d2a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA83D6F1-329F-11EF-B5B3-EE05037B2B23} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d251a8acc6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425446575" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2704 iexplore.exe 2704 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2704 2076 0c32985134e728bfaa826bcd86e4dd1b_JaffaCakes118.exe 29 PID 2076 wrote to memory of 2704 2076 0c32985134e728bfaa826bcd86e4dd1b_JaffaCakes118.exe 29 PID 2076 wrote to memory of 2704 2076 0c32985134e728bfaa826bcd86e4dd1b_JaffaCakes118.exe 29 PID 2076 wrote to memory of 2704 2076 0c32985134e728bfaa826bcd86e4dd1b_JaffaCakes118.exe 29 PID 2704 wrote to memory of 2408 2704 iexplore.exe 31 PID 2704 wrote to memory of 2408 2704 iexplore.exe 31 PID 2704 wrote to memory of 2408 2704 iexplore.exe 31 PID 2704 wrote to memory of 2408 2704 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c32985134e728bfaa826bcd86e4dd1b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c32985134e728bfaa826bcd86e4dd1b_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://broker4.gotoassist.com/ds/downloadManual.tmpl?SessionInfo=115199782:F2621CD2E2C8775:5&Portal=dell-us-gts&QueryKey=100000000069048344&FullDL=true2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56448bef252b7ac80e716af44ed1f39b6
SHA17f1437f74e5829429dc9f05c9d2d4445df39bef5
SHA256613f2a168e543f411112950aae721f7653c7f4b2a37e8f55ec3f5d8a3ac57c58
SHA512048baa559232d50c7673a7f6cfbaf4685a4557969413ae852959ce570acbedd285c037db3d02b46f8ec417ae8ecbd106a548d7a0e758c95457c4ee2067bdd460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD504cfc62206a9b576e81cd417f1633668
SHA1a3b0c617f98c5de87418cc4ae08c8f3d9352d26f
SHA2560a307f855c74edc51a2700655efd9341dfe1f616e84027945eceb1c383b1adab
SHA51225384c7687d66b17ebacc06849b69803ebfd908ec8a02ad25efcae417f1834a40ba61a9193a1cc3452f137decc1c491bbea210fe16eca922b61e38c710252770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD593acdd495a12838c6a3c42c4efb07ae2
SHA16080b22d0083dde2511769ba4bcb4cf54aca3732
SHA256d2adbd0690aae551584aea35849af85f98a0fb4d5542145c3d274809f1bcc1a1
SHA5126ac05900c00c07e5fc9399823d04b96df1c938baa2c373293890dedddb9e1b3849a6e07a72cd407cf1e5213412a249ca9553ade97e6a9a104de849f327cb475b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD580ddc91c0f5eebe307b865c61a297887
SHA1ac79e4b4fa854f8b5e65005d7afb5dd0f230facb
SHA25604773d9bc259f5e07ebd3721933c75a27fa62b01b96352993f2aba612c76812a
SHA5125eae96dbc7dc244e4d9e3ef261313a107a148444e306444b1fa4158821a2eab3a37bed772ae4974bb21e1402b27d0d59d325c9a374d4c25947fdd685dab0d965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dfe7cd30c582e5a99c8fa73aa62aaa03
SHA18e1ee11bd46a26f502921cd242d6b7cb66c9badf
SHA256ac85e8aadf61cee955fe81804ea964e8313a81b459d08645dbae85468cf39bbc
SHA512e73e8a8fdc05beb52b8b7ab9cf95d47967f899d5fefd01dd186b1e24f9e893e2baa78fe60a086ba52a830b33e8a66cde406c25da781d44dc5bc1ee34eb2d2ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e8835a526039ff75500b6fd1ad506658
SHA12941ce011dde57737e21761af234ef634b082143
SHA256b405213b7bfdde1568b5c307c26e834fbf5164b4913fac51db4062c2daf2339f
SHA512ce5352d9a3605c3accfb83482a390d79531a087260613c8e0cdfd4f8f70f93afb8f477cdfb6060f9079c156343faa0e22e6bfccf1dee5269122600516b7fb4fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD525868a1cb1ec94a095f4822fd5ebb2f4
SHA1549bbccb9002ade37ae2e6860bda66d4ea4c41a3
SHA256141e123ace81a112751385f9bc9a03da9b78d1726c12ae0070e6d1398e8e0743
SHA51275ca1d1fab05975a87b7cb0d83dea37a08292fc0dd299a132b05e3901dacf094839c1ee79b37e74c9430e654bc4e2096941cda0011fc0b21851a531e3444787c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5220a1b8a20b704b53ea9157c90b1e497
SHA1d72269a0b0dd01372f4d4320562f9316e6715d1c
SHA256f86bb7ea80b7dc7092da1e002fdfd370eb6713ca7a81da4a02702c0dd568f72a
SHA5120025b12c9ce3074f57c55486a8ef5d26094323c20f674cc6ac3c4ff60a2d5d9ce0507b080fa5a3a246156a9daefc0cd15b34c506f52575ce1762c8cf042e71c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52f59ef55edd2f6d10b5bf44c3ed08fcf
SHA1ae31551a4721e93239d7f3a7e4679ff27b93fb43
SHA25651a89195cf0966740c0de7fde6c4252ce84fb031247cc526f64f98afabfc9fd0
SHA512f7c1f3d222f55a73b2a13c675f3de6d1c920bb83d4397fcc2424c085aaa278e8f1dbf399c6e75ddc5bb60df91a76338b2d680de944f8017f60dc32bd71203d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5669992ef9169fdf93542d0edf0e60be8
SHA127373bbbe569b22ee43794d8ff67726735c6ba02
SHA2568ebffcc6ecadbaea47402e56b7f094b12993d3abbf488bdba1e5f6cbe2a8fea2
SHA5126fbd3a42989ec3fc38e716c6cbc48199d38b1f2b96f7c9cac072deeed3f5c17d79071b412b3977d0b5ec28affb44faf2e98a8b20b5cbea76c9ab958ec15dde32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59bc3821e21822585df96b015363d5e8d
SHA1a52b075d211bf323ab952623aa0c20580b254a13
SHA2561896819c208c51e62c0e52fe4d651af866dc4b90d5ce0655716f4155e95fd302
SHA512c3e0bf466fe1ea4973d3a54ec792d197317b80fec346dfee23c21cd2ebb5f734c311ed6b113e6ba8d52fef8996a78628b546ac63cbd4074b6f13151bb9d306b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5582c4154c4aa0935851af93771c3d88f
SHA14dbd436f347596b96e5b4aa973d333a997bc7225
SHA256884b1020e5208bbada10815978ec3245b7c4bba2394ed9bd1a3dfb542a7047c1
SHA512d95573bc5b435c46085ae017cd5b58672ea9fdabde09dbb32ebc0a8cce5b5cd0b642aa1d3b7fa71333b2c03e465815c6831c8eaba4fb45efbc1a3ad8d3011d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ac775b8fdf026c4fed7a7b81fd580891
SHA11aa2da9a9beefe212ab65be83f5b4d2f7988f66d
SHA25615f36aca9065082ebaacacbbbe998e339ad1a302cd414b2645c11f5ed8787788
SHA51212ec8477b9500a06785f274fc916678b5a3ad043cbd55a5e75648abe4c857ec9152288a9b257721e3873358e0d7912ecd4d62b8ed381c312d2da9aa7e7e20f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e4f9e05ee54c803d05cc48c2583c434a
SHA1be48c3f821580651ea7f792a1754340e64f185e5
SHA2565a981bf2cf549b84101c86e51e8576547fe5e7682626f18c83a7ece202842701
SHA5120ca6ad4c2506bc30bb84a82d6ae2f38f7b9284dca5091f1f6ebd335e5de015175b03d4cc10b3a508b47c7a6f45a7866f761ddbd06460278354425d06dafa4677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54079b1a0e33eedfb6765ec4983bfc9a5
SHA180dac292703d4998ced9fd3b5ba526016b774db5
SHA256ac914d8a4bee028becd647b46b28c01e1931e5a849b50c0dcf651da656d0def6
SHA5125e74e644adc8a610b540250442ef9ffd5b4e4cb7d398987d79407ae55fed108bc4e744b226fe88862546e69cdaa88ce01b459e77865079eb86e8107b468a3198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d52bbd96eeba922b905c286f333c31c0
SHA12404802f0ee7c1f9e0308c127ace882c3feecfee
SHA2565b165a6299e0968e4f4d0875f7e6f6062f513e7027c2295827c70d64f8631a2c
SHA5129b92efe3f643ab81b82ca28f80be4d2ff05f1a1f2c496e7fcd08781d5f80ff535d28d1a782af4b6489e186293d2e21295e3081e2012bd1135cdadf895af54a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d44e3f6ca7313b523ce19b525e43e3fb
SHA1cbb55bd1155f6df6d408b810cd17963818f4a811
SHA2564416d262f2e0d980c917cea9cc0e0910edbd45b741de0b17e987d4f26c8b982b
SHA51221c40226c58194ec91a1fba6833a5f78ac098aad653bcc3d59763f0b552b9b766057db90a880133486adc6dce440fdf0fcb6020294402014442753e9bc30a3ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59704f7750d8fe9ce175160b7f9a66cd9
SHA1a2cb1538b07570ad17e736d709411dd0719220df
SHA25682a2f2a9fde36c55367dc6dbfb854743b5a9ba4fef223006906a12d4cf405d30
SHA5129243532bb47398de2fa7e93789415292f2aa29d85be7a86dfc92ea1b3cc9d4377eae4a7d563b6629e153ed6263363f91e6eaf6c0bc8023eee3829ef75b150e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b82c47cc599f92658279f5eda17ea917
SHA1e54ac5107b2b60f229ffbdd7d524a6c5f1fa1dfb
SHA2568e7b223f5fa58acd410417c086b7cffc87d069fa7e06e9744ef457d79ef3b44d
SHA512090a691261e819d67619b85158848c25a7fde7b112f14f7eadbbd875617beb684a306963fbd7c8cfd405f338b5e40b07d42db3b6b57e1052cd6de45026d913c1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b