Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 03:58
Static task
static1
Behavioral task
behavioral1
Sample
bff0b5759fd1effe426a19a0155913dd_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bff0b5759fd1effe426a19a0155913dd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bff0b5759fd1effe426a19a0155913dd_JaffaCakes118.html
-
Size
69KB
-
MD5
bff0b5759fd1effe426a19a0155913dd
-
SHA1
b022ab6e5df6bab0c3df0d042a610a3ec6ea79fe
-
SHA256
18439134a4c894040ecfd8a7e860a5f1d79545541572194a29600d2d8ee5fb6d
-
SHA512
bd16f88e259a7c21e2d6491300aae158f3639c51d3e7ec2466ca4d9cee9bccde1e6a7e55f4578831c3ce3edf90fd733e032858b19e0f7d1c0cec2bfc0a65b605
-
SSDEEP
768:JirgcMWR3sI2PDDnd0g6rrvZX2uWoTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFA:JrkTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49B0E181-6296-11EF-9BD3-424588269AE0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b4d11fa3f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000004f50009c249c0a1ba72f9f49bd1129214dbc623f13b0ea2c639ca9166a864f29000000000e80000000020000200000001b95e566f6190ccc33b40ccbe09f67616b20c124238037793605d7614055893a20000000ab85dac0732f599187fc24450f160979a1626c8c7aed1d3b677a5a1f13cf48eb40000000f8e4e0bdd69671f79fba0f68668d12fe5fa1b87fe88473f10ad29ba42e1a30a6c0305a5a1f58f5990bd0014d12444a9655d4bae824ca655e3eb5cd1710dd0067 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430720176" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2552 3032 iexplore.exe 30 PID 3032 wrote to memory of 2552 3032 iexplore.exe 30 PID 3032 wrote to memory of 2552 3032 iexplore.exe 30 PID 3032 wrote to memory of 2552 3032 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bff0b5759fd1effe426a19a0155913dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5544604493e10bfc5284898841c3f5740
SHA11c3c27373fd90c7ec2b0e4ece9d46f80ac04700b
SHA2568fcbf261f05bb3f2867ccfc571ca3b3bfd0d37386e6084a4338f9ef6c047c6b9
SHA512c8ce1964e898b80b6b8001664bdf8f5100cc490288e34a35a0b4cbe8d744d63c1c450de4cb1dcfc11cce430dc4b12b836561247346c412bb8eae2c0d8f64f444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f3a330859b32fc5f1e7630653c828a0
SHA1cc6d425f5965b0f8aaaf430c4bc1531cf1aed15b
SHA2560d56d16db72ece06d6b35025093b781bc10a15153341fd9ee8f774035ee6ce61
SHA512e957e4530c16050b3a7c83a731edf5f88d173c0bf78ca9d49a90548b5cd945cfdfde7ce60258e7bd49e82ae452c5d6bb95fc39ab82a3b7fe0e08a074e786c386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532650c46e0fb45ca427dae8c9629ca97
SHA1a0e70af35ac5fcd3c43615a20661923465a6ef63
SHA256eecf6e1768ce7655dddc04635d4b237eb0e3d8a04457a39666932584d46150dd
SHA51291326bd818663376f183d3b51dd7d5db20ec192c29ab6edfff55e58420d7b01cba058597239f11de47d50994ac7fd0f216db12267b79e069c668c1ad81284d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534efce14fe21f3f87dbfe29f4611767a
SHA16186263c895853443d41e6c47fa48e480e8ef546
SHA25613023407dfa2235329c158fc81c0dded1b72f6ff215e70ced4fc05a6e50899ce
SHA5122ba4de4c717e520f5c65580118d7397b4aecf000d140f9c012e2131876786afa90205782ca136b66cdaa9695ac909ce3d5fb8e5639d9e24f91445f75521115e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdaf74f2fbc43877ef56adbdf9af32e5
SHA1f3796819dc8824080243923b6bd95b636d61a7a4
SHA2561141492894219a1513c942f4bf58f649eae7c865627ecdf2a3a0eb9ab02359a6
SHA51246fa93c7ee1f35d4d6634434d6c1a906463c10fa29236aa3e142eb7742100fae3004172ecc13d3ac1fa8a2bc1f10bbff9c6d57dd7686dade840102f2949d0b6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2b014d19acc3a05f6b14e0e0f53c3b5
SHA1f17c71ea6b3afdba638a40b3b1aa08f19ea91bbf
SHA256753779f806eee719ca02028b4cab08121c2f7ac6594ce927c5de59330262ad26
SHA512db3d2e585d29a911faccf5277777bc4b5b0c186ae5ed374b56436865ea8f3795e3b15863290268fa1df9b5a29012507518535af3e3ae42ea93958d647f9261be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5596cd8ec45a9f392377ab9eb37f4a0e4
SHA180e61ab7848261347ee15a9d24655df6fa9f1746
SHA25689c16270696ce4ab37107abd1bc3480add0eeb93f017c5309ff3077a0f42cc28
SHA512b3e3b5c39a7439aaa726bca249186a906a4188acbbe8a50b4758674cdb20849e46f3025312820f74a1f33ebd027d3a7189c495858f73e285add061381277cc37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e89cc9de037ce0c1e4d5f450bc6ee583
SHA12bd37689ef71965262a40322d646f939125682bc
SHA256ff9dc97503313897fce2fc0582d393c91152117f681e6add3bae4034c370e418
SHA512d5550ed7cef322dbed9af509312b838478cc1a480f63fae5b147eec74baab83789e59eea23d9abf2d86e0735173ee89feeb341615697aa173817655d081c0320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2e46d80c1681f3a05d7558efee01dbb
SHA1f6ea7ceeb073aca3c741544ee7380c0f2e3e1b47
SHA2566a09f81ff21cd449b60be5c3b8b5f88121ae34e8924094b61c7844234cafd851
SHA512d15fec237284a8e7001d36cec208c83ce45c3f8fc566b25fae9948103072ff99fc33649b9e7a948a9a5416f60f40b0189434d576ec0c2122a6d2ee47172f1a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da535a83bcbe01435655071479379ca
SHA17ecde72615861371293e1620331db7ec6130f180
SHA256da132144a3074216dafd60add9f89a40501d3d17386e98bc731b3c5f67deb220
SHA5123f572147d157fd12f991e0a48c909c114bcb0b5756d2a56bc7bbe171427082633fb33f202276969a817ae769a22d8b10f693f4cb5d12a12efda4c21e840bdb9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5067ce4b80e3084c9e7465c6aff175e11
SHA1fc8908aef4778379036491caacd96f2f3b1c5569
SHA256c5989615a997b52d37eda54cbd610e55afd40a894f99c6252940f169f054b81a
SHA512b664aeaa78e03c9645a46e917e196be8e3e05b7c2e7e0601b325e89d984e3584a448c40fabd50beded1004f31b6b82a097efd7c2bc52a186d4a13a0fc9a676ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc874784ebeaa6fe6661f5395055625
SHA1178091714d765d3de2c2eee8ecd4b9fd730dffbb
SHA2564400ffe48a803490111231f6cce04ac6dd53e01001c5423b89dda8f1ece5e551
SHA512e562915be25976057ef7185b8d6dc2dd7cacef14574247d3cc55ff3de80aba3563f43dce5f24dd5ab9be8ef822dc0bee4bed958a0b8a328312c0a2fb738e44f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ecf8eea24b5e493beb8cf41aa8378db
SHA1f114ca025053cb996067939051ed482ef50d4e68
SHA256d6681d019f33fa0ea5e27ea332232594d1817ceed88df659c4a4ad180d545b5c
SHA5120b651c5ba731a387ed646bb1cb761ec03f8ef70c6e5e564b437791ab48759b0413fde45c50952313ac86253d46153ac20325f5e7e9108718e57e7832dfc616f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d7619c61be7450ff2861d804e48edf5
SHA1d64a3c8186819da06acf4245cd91bdaf3e395919
SHA256a5985863a2260a623ea4dbff6307b96d0a928ac308051f2225480aa6a9433e6c
SHA512c671ede9b438d7c6fbef082412ff06df501e2eff2c0f8e7d53d52b7810a02df24bf39898dd968903f033ce189aa3a80385b486c3d3a0ca09dcd20c9eecf089b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cae18061702cae1213776df177c14bf2
SHA12cabcb888ac55694e20450337be47be88630fa08
SHA25622410f49ad0e3c714e64f623612a344adc7f443cb80a257b1fdb8b05a8c90db8
SHA51285d4337cec3c64c14bec1a7938f034391faca0834120833451d8f8c98e98cd40158a565428a30c82331b0f92530247f432dea2a647abc1c69dccd7b0a406a6ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589b469ae576b2bb44e4b7fd378edcb86
SHA1c5d71314fe9bdb4b177bdbd057ce5cc489fb6d0d
SHA25620e7b711a0175f072e27513244fde4c769960d6a6c44ece2551d136f391f9ca9
SHA512706d621b0a3c29904004df9562f7bc27dd3ee363458f348a74e58440e192318875f00ea09aeb53ee448d8ca9e40a0681e0bc30722be9d17d90ba2ba5a87ade87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589d6e94cf489109308a1b6fa238d5141
SHA106f33ef0c4531e86140ca5800653a847897bbc6f
SHA2561fbe681ae2673857e66570ec2a4c46e61f46004ec54f093b1d963b506c5ce56c
SHA51217d59fe83ec6332c64e147c84f3b97a152f4655717cc0d3c2ee9cc20bd9f5e347143e614a424da86b6f42dc38c1134a275b08cbafa11df2e8b8d43e0325157b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556207ffc587ba236935d3b410e6c6073
SHA169d023176e2dce9821b5fc193845c3689e0577b0
SHA256630a19b641ad1d9af75ac71035225b64ecec64864d5986034297adcece4399ba
SHA5121e27847f285d4c1bcb7f9a929e551bada5c95e1669960cae2f75edf1d06252ecd7bcc78085a61f9c62c0edcca56c37afcb9671f0807337fac5468f0d33c12fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55daf092ed0514ef581b3eddd4043bacc
SHA158a7f022b220cab0b51b042f0768c6af59d32475
SHA2565b7f1a11e561304fe3c038bdf9b9e7cf9bd44daf8f1db81d6e933dd3e8015bff
SHA512281aab09577eeb4ba58cdf1b766d6e70de5eed3b73787cea990ddd91bcce06a526b36f5b2cf2f0b340e8d55268ec58a7ca2a04564f3232bf70bd588851b108ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c41d787f5ec1077874fd74d14373f4c8
SHA1f2983d9f45facb99ffb731fdcb630e28277c6524
SHA256bd9e32f54ab2eb27f47683e1f27321075018f654e837c2d945683baf853677a5
SHA512629cd5a5dc72a95ce5ffa03dc75ab1f58aaeb196b626b06065ea90d6d1523a03ffc776a2ebdd5eb245a72271911fd9efc8b05bff558c44a4caacb079156b8b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa754b828081a604e641c6cad0f42b0
SHA10cf436ecce5d7fcf35325c578f954a16eefc37c1
SHA256b7a939be26044760ce5abe3f04651977754de4375e60f72790fb0585c798e816
SHA512e967f713a6703a1e4e70e23e24fc9360bc381feb3f3752278c11ad6a0be60eb1667c50153112525ecff416f6a671caf3e88198adf0b9a333db7ac906c50bf374
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b