Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 05:40
Static task
static1
Behavioral task
behavioral1
Sample
ba8fa153ff141cba2f211b3d4c01b647_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba8fa153ff141cba2f211b3d4c01b647_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ba8fa153ff141cba2f211b3d4c01b647_JaffaCakes118.html
-
Size
17KB
-
MD5
ba8fa153ff141cba2f211b3d4c01b647
-
SHA1
5d4e6d0f5af9297270017eccd62630f09bde4592
-
SHA256
7fd6cc7432bda326160774fdcdffe44dacbd589f334299e69d13900d42e502ff
-
SHA512
317e52d861e4104ccd9eb2f8631d1f0cced3081920046ad0f9463e41b80de1dc875529e9cce82df37172c92c5bec5463b0a83d3a8eceafe19bef98b511136f79
-
SSDEEP
192:1IpuEr0u6jv5MDwHjp9rR86iESQ1EI5HTAg0RAMf5XzlsV0KNd3q0IZj1NL4Rr+r:1IA5RFvTHcQETZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d29d1b1ff5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430553525" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000c8dace4508d3809bcff14c8189858d2d785822e65fe199cc9ab2beaa59f07670000000000e8000000002000020000000420b92a98258ebd3c0e658e290bb7bbb1e20e0ad7b699af0a3f45a5499ab7e202000000057fd41f139afbfcdf34ddb8d6a500fc5110a3856e2f082e0f4444bc47fd9f73740000000b3cc001a72114bee0f52226a61e0682e8ec8a28e932cd5b1b83256eed9781fd55ef1d9533d7d739e6230fd5464174f4b7bfd42edeab53c3bf7b5aba758d7dc23 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44D2B561-6112-11EF-BD32-F6C828CC4EA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1356 iexplore.exe 1356 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1356 wrote to memory of 2700 1356 iexplore.exe 30 PID 1356 wrote to memory of 2700 1356 iexplore.exe 30 PID 1356 wrote to memory of 2700 1356 iexplore.exe 30 PID 1356 wrote to memory of 2700 1356 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ba8fa153ff141cba2f211b3d4c01b647_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1356 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbfa051097fe274989512849c57691e4
SHA16d42a397b0355061d826d1c17c25aa128a992565
SHA2564f4bbe8f728c614256d34d5e64560d0e2615c43fc496e29e749a13850176b756
SHA512906704cfec8f08b8ec46ffbb20f172d729e41f0991a1cefcde5aba6fb0a58c3750afa5820184b8f84f081e2bedc55c4bd29658f79256a9f5d6057c8daca3a735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ffbbe4da9273a3cad4b2ad03c9e033
SHA1d8fb8274eba204ff7ce128c768e70fa8aef2876a
SHA2563762e4c131aed078d87510493ecbcaa0b03fd4f1d7a368154adf8f3d3b63eb5e
SHA512162b9942e4c411d5563dc1265ac85137da8ccd857ec04c1fbad8c9dc24e2a6375242f208f2e44a44672b5d6e5d2434709fc0784769a623630a0c8102702f825a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7efc6a9ac350088c53e83ad4927deaa
SHA1be6046d3111712c8a2d183bef503f868c99e9eb6
SHA2568a6959d01b1855d5dcf9b7e3f3c0dbd9ab6cd2c5ecb4d535e5ec8f649ab27209
SHA512322e2071c735d45732de836ad565f397405d9f06ce159933c74d669ddaee32fbfaf159f4b1dc820a3399e434e43ea7fbe346a42d393d1f7028adf5b33b49d054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df6092c3d97af17ba5aecd881a00a59f
SHA1643357ac4a5bf05d8ff580fc568e82f13ccc5029
SHA256d6a1cc42041b8e47f26cc0eab7d983f1ef551013ef87a6941bf4ec39bf3e91ab
SHA512625d75c39f025e2ceb1af7fdb75d2637eb1cc37dead34c3c7ffa55c670a4028d97cbd8c1c6fabd70bba1e92577c9dfe16314548e070e032f7c404577568db121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59da95cf02fb551483126561bc74eebd6
SHA1916b7c86bd6d3b04b8af425b3efbca22dc0bbc8c
SHA256ddcc2b787bf4bb263df89c030e142bccad23c2aabc5cdbe1c055173affc21cb5
SHA512212368a651a595be23b50041d3538dff26d81e19ec507a34a0a505d36ed2c9bb5e85fadf633ee9e3c36355775a38620878f3390b0776995c8f98ab8d05078b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b638298ef94c7460039f685c04591be2
SHA13cabcfddffe9e3e5a35c56ae1da9bb314051f204
SHA256b1d25999a151b5e368742fca01c3af24df83f0d32ea59050a19486804f98b52f
SHA51268568bcbb7a8da30884e38771f50c47c95e666508a57b248c1d64d48861fe206fc2be7764c8d16e22540d10fadbcb76ce2271970ad7021f72cb36a705a01b3c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50031b6625521bf93b015a4f48e26a0cd
SHA16404fd71c1291da7ef9c35ccb3a5a13b3d61010a
SHA256ca386254f777d03e084746ed1fda5a60c22b130ba049e8d1411ae783453f5c02
SHA512fdb7af7e28ea111c832d55f7a150dc1409a4d6b28417807a81c10d62c18d06e2b555a93d19a25a159e46fb15f1be2fc222b8f907383e9a09a33d78d90fa8d261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562c319871000e844b140492c3308ea8a
SHA1ead69a8d64cf647b464dd4620be2f0c0f97b3da3
SHA256c19d0b25ede03158e992a3ee4281896356cc915444543c1e53da142caf6f1580
SHA512d6d15a52e75eb1367293a5741f22e5f7034f050a14370584efd37f58b2d0b3c447f30c72e3761353d1e8964010525430cd8dbfe18d9ac8f3314e353db6717f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5889135cc646c0b8a3b2653d00637dcfe
SHA1216893ad08b400ce2656e5c37fff70b666f1831b
SHA256a2246a2c27ebc32359b6bc76a9a0f2af2371179b69c3000ac296b73d0899cb66
SHA51245d2f9f24cfa45ac9b7747cc924a1eba14c96acad2213e25e57c82d94d73169110e1528dc47336eb174f4088ab3fb97527f9d4a8ec44805320448cd8bb4f841b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa93f1cf79e407ad8b9128bd133f3f7
SHA109389d4fa43d77b80f45004a9ffb338910cc5867
SHA256bf2d9e9f63c6e020c47bb2d6101439f86cdb76b97b4aa27e042fd8b623deabca
SHA512018dddec93e1df3229f9dbcc688052067ed6660d0c84a7bd0ee2ecf45eb4dc4eb6629fc21889c3dfb0022df7990333dce65cd2da56ca053fcd24a787b9147238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afba9e8045bd135d61afa2b538a439e7
SHA1b15e6b04603692daca4448a51329e5d5c8612dd9
SHA256d4790e7aeac8195e1b62e189a81496f2273c5733009c5ce92bf1de99640f12d4
SHA512702512b01e61eaad2f5acb1e341e04658e3de25590fba84f54c540123a8aec3b0b21150f8321b46826f0b7dc6536f758b1a6f9257476953400abc485e91ec981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d28df929d623153472bab61110744f4
SHA1e2f3fbda43ec4a6b8e24d192e1608bbeb9d4329f
SHA256fe4651116bc773c8de7100180ded47af89d67dbc6bbe5145faa16f56f26c6509
SHA512dfc1e7ee96961a9fcf354a6571e193b28328487f35d90f05eb01efacc46b0fc2fef3f080696726c1c1ef2341fe794131bf682cfe8444715522e7c2e438174858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e451fa43bd340a9f19790c51433f8b
SHA171021a0a300042a8449a18284a32f602203938da
SHA256088d6536144b34a9da1ba317dbaeb878425950807f8ed4125e4bcf8d5fe14273
SHA5129b7dabdcdf71c1e76e84318aac3f48138b77f628f57c419d1cf4da60ea91255913c611af2c9ba67ad3a88905823a17be7d521419d383edc31b2b8b4a2a72c81b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a4af8f1858dba9d2b2f9420f09c8b0b
SHA12ad2a0f76c543e42cedc54f8295bddebc8b14b9c
SHA2566c21ec44e2fdabf48e23266295928559fb446e7e4540f2ba870cc405d96c4f52
SHA5125d00fdc5541213be7b0dac654500091328a312cfb19d717d53fb623d332d7c2e88ea1406c9e0d4182aac763c5e624854ee8ed90416eae5a5b483351926bf38b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a08a6c5cb5ab873e211bf26e1ad6d3
SHA1252b33091f85bc09eeda6e1eb3d6f2d152332c24
SHA2566121a0ba610f4f633cd332106898bb11d248c3c3cc597ea540d239dd84408a8b
SHA5122169ebe7b3d9fddb4e3784b2d946bd135d2986d05024242759c111c15401e937148e4fc6e2d132d15aab80becf10cb09956c978cc4a8b2c941d8959b861a95ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538c01327c68e7c034a7de434e187d348
SHA1dac22bb1cc35909a1a31d54fa01c70c55b436ae7
SHA256888a1b4cfac7ae9c3e7dbc41844f3aee6c9ef692d8a4fb01c829c22e40fb2f07
SHA51269246d31648a5ba3a47125dfee815f4821a512a18b6d04316ec31d8c944568c433ad9e977147b167ac2e5e799effa7f19f76a4340c4ac531de006101101686e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585befdc4ce8fd61a28c58eebac6b0d20
SHA1e86d3e1e4c78cb3658acdaedaa3482218d2626f3
SHA25612d45a49e900e4836676869fd9256caf4116ab29336207e0dd798a6baead3998
SHA512e6e0c53d9730e5adc4f279087be20a0c66593c4f0a0a3bc8ecdf314ec423f101a95403fb51af6c6c06647b599a61e77653af66117ffa945d7b6c0711184da856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571831c251b1102f1b7e82329a5b7476d
SHA1349aaf6854f8e2cde1615f24973d31aac58e82f4
SHA25644b5fd3b4799794f9e92b1e3f74cd8d0497a5e4d8a810f1ff8a68b42612f97ba
SHA51260b1feff659b2eba13f19b79bdbaf6f0f7f15eb6d3918366b28daec68a7eacb1bdf3956167a189fc83efaf4e91b4ba02caebdbf73a3378b62d8e25a4e6e3fac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff3fb88b671b2acab7cb80ae1e840081
SHA1b213a5c72b9bbe18e9f96d8f34d8dfed78bfb18a
SHA2567979eb6227ff5eb5a5b0c64acd7f3653047b65e2fccc47a9acaee8c81afef2aa
SHA51223af4c209714cdfb09a9c291c94be5512307d7c756b005756730dee8a9357c3cd6e40c354140107e13a42b1138069145cafcf5db9f7631eea8ece741071d15b5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b