Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:39
Static task
static1
Behavioral task
behavioral1
Sample
eaaff685013e177039181a4d567ee516_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaaff685013e177039181a4d567ee516_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaaff685013e177039181a4d567ee516_JaffaCakes118.html
-
Size
10KB
-
MD5
eaaff685013e177039181a4d567ee516
-
SHA1
bb104f11ad374618b1883c05c2c456ad1a59ad46
-
SHA256
e9e8ddd87a748f9ef7e63bc6d6f4e09c562444a93cc73a994abc18f3d0882b1f
-
SHA512
536f352a1258991f192e95428ba646436d98a079ca25b35bd4857e9182102337cfb28ee3dcd699b275b7a2c96149c9f2ec4a775351f992e206496819b952b05a
-
SSDEEP
96:lez84ZsM1UiVPzsCKMXqbvycTpIJ83bDnFuzhgk/9/WF/pHU6jFAZNXHi1ZFAd+o:oz84ZhxhjQW9aZ51yfrnSHVc9scud8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000ffc75560adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886267" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000f5d4684e56e80626848ae1637e31ebbf9b01afe09c280d1b177eafad9fadbe2e000000000e80000000020000200000006f4b861a77efa01dca709fcd7b6014d67b5ad400705e378f436bb3bc5cfbe9cc200000001429ecec0b29e7438be136dbf9a7c75c8f82d68374b0242cb1fab1b31bcdcf344000000065f69a24d301ba9cb4c49f73b11735c5e3f5e614c1faa3543f03e04682fd8357e2612e05f05d0a37cffff3e78b1916bc1a772fe6bf86a983500b1062250271c5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C892AE1-7649-11EF-80CF-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2148 2316 iexplore.exe 31 PID 2316 wrote to memory of 2148 2316 iexplore.exe 31 PID 2316 wrote to memory of 2148 2316 iexplore.exe 31 PID 2316 wrote to memory of 2148 2316 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaaff685013e177039181a4d567ee516_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f5c1abe1a02517aa6fa302098ac3e15
SHA184f937ecc0d0711bb4c27f1dbe760e833bec4cb2
SHA256385aa0bf093316095b2a051c00808b58cb5d6ddda24837b7ce4b17222782b9ff
SHA512fd2d6eacc0c831fb2e233caf745698a4e64390cca2bf3d436db37d695b98f1a09ca8bebea6dc37930b76c6462cc0cb55b34142da2740f4d55eaa9e64ff8782d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5649ac93ae6eb473f89e80b6cda69c8fb
SHA1a1cd0f69dbff6fc3c273c7b066335966d6fbb818
SHA2564931a9591d71a904005b6877b09a3257a2aa2ddb653d1fc976b759c81a08b54e
SHA51288721452515d16b3f8ebbd5c752aff3f0a8abc7951497e81dc896cc12ae9e4ba8f2698462b7ebaf50cf8bb91c501724923d82d0eb3a94982fd661b5e42c508e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b28b7a1772fb7bbc39b98cc3ddfa0459
SHA1a213006ec3b4520956fa82871d75f232d1c9cfb9
SHA256ef4c295d325f45c6fb46abde0bdfab35b1c3aae8c948f45ce9275e447213354a
SHA5121334606ea1ca86e51451e07dc44cd6907a996add38561dfc0374644be767e275abd5fbb523908ef6c57f1ac7c30e912575a7bb92933fd46e2d0c2e940bfbf6d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9b5207a94c228686267574003bf34f4
SHA1a45e5ef6f69fe6890822724cee50e9eb04bd58c8
SHA2565184588a6367dee1eecead34021adec5f7bd88b6200be7b92779f07ccc0b81ab
SHA51263f02a3995b86aacc8b302741ff4c1b93985bf53f3f878c2b72efdb0e06fa4131766313c3e5928b9789a2af7a577b16522edc41f7cbf3c63222e4a6cb40dc44b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5998c7e2e7f072902b1d04257fa5e9cf3
SHA103681234613fe7225ebc7b8dfbf70e119d8d85c1
SHA256930c2cd68ea565b0a1ca2054a94465d2309eec30f49969962a34439c837e4971
SHA51238279d13e8352d2cbb304345605b776049c29ad4b5601aa4e2e42f29fe8b2f3c75aac71205c06756f78acc7d6c78ff79057ef620a46b2bbb1a31dadea5481d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56806635b8f10edf4f369bed55c720244
SHA1a0aa7c6c879bd613b4d00c2c94d3f0c4a2a3673a
SHA2568913b421e6fac0ca21ff5196098d1a8708c7d767c290210dbb217018ebaa25d0
SHA51221860178868f78f2c7dc83cef6ef15225a5cc0782e112119263df8627bb7fee0f5932befbf973ebbe0bccdb65c3f9862e4ebd23d1878374807eef8880d920202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e5b852e2f13299ef9f69fd313e47368
SHA127421f91b2577a981fdab9619e577cbf5f820b06
SHA256319176ea3d980d4c3b226510dc0ba555882dfd78726b57b9ff8ff5e17da1506e
SHA512df7040f139d4e7e5bccc0552841a07f33e3eadf6174435f31ba220875fff71e0b9818eacb69a12ebb196321da73f76a4a6e577edc7f15b1184190d663bb9624e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a93d02c72a0e58468489517f052dc04
SHA19dbf1ac1365dbccb68cd542afed83d29e891125d
SHA256f4be42c4b34e4c705b4f5f42a6806c963189d67d2aab5eda99fd6f174d4120da
SHA51295deb21418b1505cde0c0b9b0439fb3318a63673a463a39c34d950ab14312dd869297753277594fb7a0509fc18e3e901a64a6495a67b4f4891c314cef6cb4ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f7a95249980bab05caf29cab49eba82
SHA17b4b6cc8e8874b700e03170f071d42b393ca016a
SHA256e5c0e15e3a71e75abdb08a1304ec45fe5c53bcef9a794dbbd79ceeda0056d9d5
SHA51202a8fc8b940df41f60d5c3afd41db7f41d36bc1f07e23205ceeb3894ab6df9241c235f04b2f526f2e2affca9edf078bc2deb65c296b1819f45cc61b7a77f07f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb3ca62f5de925674a9c0f2fa9f791e2
SHA1be9c4a72d3c2cb3af3f68c9cb8a9b30d1b7a9bf9
SHA2560f43aa0c54bb8e642b85a85670e9c613e97736d1b227d4b73d6cd0ec6ee4724f
SHA5127443db4d49a9edd2ea254a6566e6e2a53de2a132109496b70bde93e548521d989b72c1dad369b0297462d1342e931f80a9f14df6d745b84290e7e9525859c25c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dddfa37dd4e4104ef174038d5a646f6f
SHA18b94f93704e1008af1b7686e55fba9e512c84ca3
SHA2564eac3994c83f628ca3e70962179099dbd42db4382479bdc8206c33f489eb7173
SHA51220712a1de7b6a7c89af946bc73ee540ba45aba6000c8a1bb3eec9cab42580d53f5a95edadc8b96606abb5bd45535bf67c6cb58df433c8741b6d018fa9e963179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec8dbf6011ac1125c998cb9a92ef08fb
SHA1f673985b688275dc7d13dc793dac34f33097233a
SHA256118da0c8e6029cf8dc8d56c310fdbd5d866c6574d85bbe1b904a03861d8c19fe
SHA512c592231068f83dcf52889a604743f7fe0da8d056b07df34a621bd6797ac0203bbfeba9424282bb626be5c8c8e3d190dfe98566539a5fa6e78ad8812f441fbce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9fdd0d95b37d258b5f3b0362dbb606b
SHA1e15eea3cde0147179bc124fe669de2a7c1261c91
SHA25625e05992dceca536e52f6ef0e8c50fe8981dfbb61a94dd9a5412e8cbe9ded786
SHA512bc1271ec6ab3e4ba99d1c4e1791548900df74ff7417d1759c796e07fb5aa36ed8e5c6f195698edbe34c5aabb0a7bf38d990a03e461a715b608006e5318137b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdc24b04ebab09002274e4b5f8efb2f2
SHA16b6f4f2133fc813c944620c390a67a164727541f
SHA25690eede9cffeeb397c66e16e0874c502e931e3f07cf2e15a519d3d30e196c8d86
SHA512ec86c2dbff25cf28f71b46f1a101ead7382157165fbbd656319cae98d2cd2ba9c6f0981dbf86d927c809312c8776f6d973ee0ba7ceca5a00db093761a532a9f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5337f48d1e4f4ab4a3f11b45c3fd825c7
SHA166f43f8cb1a3692aeb9eb4ddeafbb026bb7258e2
SHA2568f7c057e8606b9953b0cc0bd8d6fc866bc95090c2bb34e35ce71bbef1b589068
SHA51295cfefe5038e618a1f5376700d40dc42d33a34c4c316ed68e50913eb56b0cfe6f809cad9b931392388f4c6bd9031323ecfaec321ca1ea640bf320ec308ef4e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3fb64206e998bd7640ac66584e487a3
SHA10ade22dc5f94f373a4e57b0adec36be098d2d844
SHA2563b3f848e17acaeaac4bcfd8a25f36bc4c91f6e35274b967cd8553f009ccf411f
SHA5124e5b95d84f64ea79cc71885a997e2e32b23c8afe39d55b94946b8308d2a5ac504f96c4f62e6ce3756814312909f4b373fd49f4a3569f37c2b197c0ca8cba122c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597dd78136a2e63c0ee2f50dadbdb149e
SHA1b85600405ef506d0437164bb107049e708ce6868
SHA256b993a788d48da00411bd9f3666f8094b7beba89ac5c1e514633f6c49bfee7839
SHA512d225ed8dc11b1ba4f31412113bfcdc7d0886816634e5960b458f925516d5af17bd9c871b4c0efd20c86c7ac22238ebfde16f6e92a7b4ff2824afb46095b6d9a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abdaf848d72d6e298d819fa5f3f6737a
SHA19c9819949aaaca14c1406439997bfe155e3b31d1
SHA256e06daa45ed09f2a85bccc2567b8b31b90a417a74c5944e75aee087586eaf9e40
SHA5121425aac5753e17e08e5021778c99caaeae2ac630c93bbe37f3795b9b5381e4bd2721e4198404cef1928d0b2c1e77c9c97351351538725fcb313ec030fea56609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5209d78b42c0b7bebf666cef7df75982f
SHA14a2a82179e8b8dad3792b9426640400dcb1367a1
SHA256741a8136cd08e6fe5cd277abb4e06209b9bdd27e9025c958b5f8cf3d8034336a
SHA512c02c4b70f5547f5ac7306385c0ce6e951790d18b9a624430165b7defb2f08ea0a791e7a9185b2bad6ea93c69b84f36b19ec3ab78fd771e97b19a132821380cc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b