Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 05:57
Static task
static1
Behavioral task
behavioral1
Sample
ef300b9dca792ea1054fc8c8c1719166_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef300b9dca792ea1054fc8c8c1719166_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef300b9dca792ea1054fc8c8c1719166_JaffaCakes118.html
-
Size
570KB
-
MD5
ef300b9dca792ea1054fc8c8c1719166
-
SHA1
3ecbe0d5b3d7e51464eaad3b393979fb17e6fd9e
-
SHA256
d4c4ca2680dd03c2d565a6a0afec2b1f36ce757bf01ab6bdd238744effbdeb0f
-
SHA512
3aab78541291f5430869fba1c35525b44af0017371303ab1be68f12dc3ee179e6d0bd4dd58f0949b3ce96e86b6a3a4aea7d2bee8e9df2423c9b4ce264ec4c137
-
SSDEEP
6144:VsMYod+X3oI+YYsMYod+X3oI+YYsMYod+X3oI+YAsMYod+X3oI+YHsMYod+X3oIO:B5d+X3c5d+X3U5d+X3M5d+X3l5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433060124" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c027db3beb0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000b6e31adea420e2a636e1b7a7e7410e647350f75641007436ce592944fd480afb000000000e8000000002000020000000a8fc17747c338cebd2391ba22742412591b142195858d4c050ab7109e420b6fe20000000cd59ee7d5fe559b840c2a310934984d80439d7aab9c7069689b48d12e950784b40000000905f941e927d19850cc56a4e95a57dccc9d86551e8bb07b01a1960a3295ec28790a79843516d35e2d873a4d4074ab5ed8c8379c70241d30ac07ab73da513a800 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000b4715ab4aac2f9f154547d36de534c58ea8bdb9d4aa5998998484f0af5ec0b22000000000e80000000020000200000001a5eb2f9f3f878cdd29b772bfa5019fac1f1cf0ae8e3ca0a7d36553420a2db4390000000f2b5abdf9651e26057e4cac401818033c077a5c50b0f264237fa9185cd361b9bdaa5b848a3d12bfdd13699c0b321c8152567eb1d42b6a03493458a28fccdca7400c148c72f230c93dee170a2e8daf68d389f2c727717fb87da5f3fc7a9f26eddc3d63a7b5e527656b91968f14a463a47078bf0b18a4e6c12e26356b7612d79fca2357f0d94d9697b3f2bb77c7b5c693640000000e9ebb8b559c4280492040dce7eceaee1e3570ea7835397f2629c2fdf74ddebf82d97e936a04cfb846d75465f2c5c97d253083bf6fac54a51d44e1490365a69ed iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{675F3AD1-77DE-11EF-9747-6AA0EDE5A32F} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3020 3012 iexplore.exe 30 PID 3012 wrote to memory of 3020 3012 iexplore.exe 30 PID 3012 wrote to memory of 3020 3012 iexplore.exe 30 PID 3012 wrote to memory of 3020 3012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef300b9dca792ea1054fc8c8c1719166_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5575b51d6e988121a3bf05d110eccac73
SHA1c5045d0125847c6823e450e47722522e3fea360f
SHA2565dd951204358eac57b93b9930f44908abb2771ab98bf5ce5e1892450e3041402
SHA51238e53af3c4f6151616a1422b85174daa195f0d7df8f05178209eed12b20e7cfe56cb13c3e73e91164ab0de451c1b1ce9daf768fbe09338dbe7ac4411f0971ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560060a91e8dbc9ec7d3018858390a6c8
SHA136248a87ff0aeea7887f3ab903b0d435cac58a46
SHA256e393e3d3d297d163a38a861671699aebfdba95c90173db47e01850fa2dfce315
SHA51283df5bdca085e4f48a96eacde11b5af253941db3a0bc023e00c3bf2c5f7e2893e9026bcec4301cee82e64179b9338c7970c8402d5e2f5a0a51958514b68d0899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534a1aeba662b46a7779d549e6870fd2c
SHA11f7f8f52a6f1f9ae1b50026780cca469da4bb95d
SHA25642999164658fd9e13795bdb8565e52c2fd6e736b09d04cceced69cb681ae4ecf
SHA51232f8ffc899c715d690f4eb5623026205074d3e2f44d9a733daa756b490e5fdd58cfe18e7ffba55d6d8f683ce92f7e13c303c9c66acb888ef944adda61c2f361a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e58c1ca3aaa08920d453818032204bf
SHA109e9c8a1ba680294b4e3090bcd19563ff52cf5be
SHA256a1a75bcfff0b6da8749dccd8084df970c6f70483f1e5ba6b4afa83a306dc9f99
SHA512e5d897e824e59d1a84732678f0c56517c04be5155fefd82f0ec9c36e8b685d1d65b73b2326acfed975bb94d9d12edce9efc24966133b362e19e514457113a383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f7694372ae7c40233c34f924238fc43
SHA1fc991dc9cc79edd273ad232af675494ec5383a48
SHA2563dd903aa5936c3b5d17cbb7d797120be2fd463149470c9b1630c4fa1abd4c22b
SHA512a15a178de8459a962df8c9e64b032b54aae6408dbd2d6d42e6a4c50b430df62998195910ccfd9897a905e44708bbb635fe2004650f118d9a54daa8af4d1a4ce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503b2e399122e67c1d8e6b767d5a09efc
SHA1175c7efcd4ce20ece039af88168fa9397bdb470e
SHA256eecbdc89e8482282c5a41142f3c95a4fb05bffeb0632bdcb4403e30e87ff0171
SHA512cca2a82ec3003bf1af79f9829846fce8130326de75a5c5c7eef595325e7066397a13f35ab02af8c6c1b1a9bdf9d0eaee5d7a2b6b6e1e3d0f65af88ed781478c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b29eafc1fe5aad0977c2533837513245
SHA1a9fbbe285a0a9de4e441b96b0e60c83754722947
SHA256066329d6c457cf6de81c8bbe9bf6f5cb0f372cd150c2f592a9265a7a564c8220
SHA5120848ad84a4237a1982839badc8f920335836422478fc6988f0294bb92b13a79fc8edf673402ff22754edec6755b376a74aaf6be2e7990d7981f7583d4ead397f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550295f7e8e0b50ccb54414bfd73dbc97
SHA1251f247a66b002751301db54113dd1d3bd072009
SHA25660214bd185187248ac02349829188e3e1615b6811a9c826ca89ebc5f8b44b096
SHA512798ac57ee115cbeefafea8d8cf16575461a42bedc0ee008ae5e83de9709f8089300fab9a20831bf8e6c3480f1e11fac35134e67f62ca0832e78ab1e8cb69f11a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f05eb777e04ba5b0f0d1b603abb5698b
SHA1385c8a2404e69d51a7d1f57fc6b9bbed173f5b58
SHA25638af88aac1509c26ecc5ac402ce3ddc4f31bb6b4110c7598c32719675dc4c2b7
SHA5127578968e19a88b803132d0b20e1573431dd56d9defb8449a0699b1f8d5a6e16a3d0b8e516f6fc04c54f1b72646bd5444ddf4560e8240295222458e08e3fa87ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562fcd703d568c2de59d9b11cc701f71f
SHA1f6b841e78dfaaa5dcb1a476d2d4cf21d9bd11048
SHA256c8d5967e1fc1c09bb00871ecef39df631cadfaa287158147d9803e673fada282
SHA512db279ced6aebbf56ddfa9e897f94f1ac8cacf0bcee975eb0c29a1563888669bb8985ae0f02053e0c38591a32324162659896d3979065d3cba71143539ee2e574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4e3b658d3436fc07ef31fd35b1232ed
SHA139468195ec0b629b5a2163146168d1f7bb8ad889
SHA2568525779970187261c71c34b1690b6034601339b53a29e1babd1a67928e5b0e71
SHA512b16d2bb47a760361cb611420f7ae73154626f2c13c8ab621da4c747cd4496197c3b77b7a55d1fedcebd04df2feece7fd09849c450a5e70a7a752bd6b8fcf7089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d00b05de095c7b3d46197786825badd
SHA1c8a08cedc19d8bd3cd687a92bd506fceb7c5df52
SHA256fd6c54c1bc6ddd4afcb11658aa7864ebde1fc87e5cb511311213515e83c02ec4
SHA5124e3b57ad940768abbdbee1e783d421f57b0006b8e9e80c8a008edcafeac9f08c0f8d7d2f2329e8b7bd4cd237a29fe1a8fbb5aab6fed58f1462e21a5688598ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeb7c0c3d582295d4185e7050ccb3b40
SHA1e83de49ae2007ac33811bd19c5ab0305c70d7a67
SHA256f0223ebd2104ac6a9c867cd321c737c7d4060bea278169e69c62beedf6335ab1
SHA5124be2963c5c2c202a69b1016148eb1b8d21e5e55adf1587290d624e90aef1f11038b062a80cf79f5ef15bf3de1b3342f6112a8069ed9e77a587b029d332a581fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516f7196f3e6a6a7f4f01fb9b9b718739
SHA12befee43147d760783c55d57fd3b2dfac3964875
SHA256e87749f71f8a851def1d4da8318670d74c6d6371daec3e00c8de25cfcbc21117
SHA512ad8ca46ca6695b4f5fe957f1a92afa6bc2ae285938d031671bbc998d0287b3b713c4ad53052b91dc77df375031133a97933f36a858ffa8e86c10e3eea733d2fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5002c7f0ce8535c6b8698fabaa84e1cbd
SHA1a8998900fda04756f303d20fae15495be210dc24
SHA25612c5a5d81951ff2f93ae829a184374f71e3f40df7669a96aea958a1e8e87b6f5
SHA51255f1d89126ae5a233002ac5850715c3be5cf73bdf55d69250a2320aaa1d701a0ae48306e1fd743471975ed4c30bd2196de586ee50bb1483ce97d80a65d8658e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f97432e5b53607e2976718c43c75330
SHA136fb3521f8bc27065dc6deff87ea9bef1d5f63a8
SHA2568d5c4d1a8441344daa0aac4534c50c9ed45816a9b5fa6db57069a87a7b0dbd4f
SHA5126fa82415a79d86a07ad6ee24a2e8551551bbd10b551fde64111015d559c3a4c8a7aeb37871ea5a5107ab7c968e6de9a670c82b9f48a3ec0f594e76b1962852c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f01564d05abaa80e6543d7819ab0b549
SHA1c994c5e1bd4551cb06c911cf4fdc3e5aa5459751
SHA25653a54b43ba40869e918705a1e46535366e0947ea3497e410522e02dd022424bf
SHA51236dec7e4b56647d78e047a37a5c8c96fa801329947d1b39b841b95c7ae0b2b87361729a1b146b6fd5839b733943f8ddd9c2ffebb7831200012cb3eb3fb8473f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae75b1ddcd07f445f68925cdb555a2bc
SHA13926c431ad5e428057f4288312c99ea6958a8bbb
SHA2568b1ea0c051a2d9a6f0b7799ed97fc77479cd604de170d4286303720a7fa60d0b
SHA51291b3813110e3546d52beeddb8d53911731a478ad82f2578773847ebd2c180efb7a8d508a7cadebc367f9650393e367c7074d2780c0d391c2c9cad33de9b01b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595896943bf8d96138aed2092f18f4b16
SHA1786e47178fcf55521c7b4a9eebc48f8c53ee5237
SHA2565e01d1011fd1ade4bb7de20e0b77c42ef9022dcca30a169c1bc1fa9bb06057b8
SHA51202557a339c09eb288b3c375d18b3f4395ad4122d6ada1bee8238c3547eddda1dace25a77dd5a37e96ff6b938e87185774a867dbd41d1a87b5f4838f4896ea65b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b