Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
fdd4d9c66dd9c655cd55adf806565688_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fdd4d9c66dd9c655cd55adf806565688_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fdd4d9c66dd9c655cd55adf806565688_JaffaCakes118.html
-
Size
70KB
-
MD5
fdd4d9c66dd9c655cd55adf806565688
-
SHA1
4e8cd1afb66c4801c26d87269ad2faf5d3b56e7a
-
SHA256
cbec70592bb6a2a74c9a6bf3d8489f6c4fbf3f9dfac85512029dac998d2dc915
-
SHA512
5f405d61c4bc9460a0a491286301df754e2bfaf0715b534b5d57f0b4266a7d8c90ce67be3586d975f943e2942f0a3d3609ff1013ccda6a48651903df2f6a7e53
-
SSDEEP
768:JiagcMiR3sI2PDDnX0g6sIz6grAEJKoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:JQEJrzTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B1CF041-7E1E-11EF-8705-5AE8573B0ABD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000074644ae5a4edbd512d3f2a2609996a1e65bb905d643c0fedbe8fac93e066ed5c000000000e8000000002000020000000e0cca20de5d891bc463fb11c4c39e7b83c5eaf84329a80185fccb08bef650558200000004f0800a1d6205f6dec8d394287255457706476aeb1b9d20179b954db8c59a64240000000d065050ac2ca5deb148d80725c3136653694e5281749d47c31f47a5d29a43d9e4691097ea46d25de438c8bf1b24533df0c07e6f074a0e3a6e770fe1b665a3246 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000007a21ce40ece09e01f1f4f6d51b4d8419a9307b2b0fecf475bcaadce57ce39d29000000000e8000000002000020000000f0bba6b15e93df38ce25df181e75942ef58f0874abda385e964ff855466f51aa9000000090afc586044124ec685283ce4dabe1a9e4ccb013c75467f9076efa4b0d8a4219861f4a6e98b16ebe5bd48ec911f624e10c30de9c2eabd86abb72132b7e269fe1235d6c59c9c29c1f79cb342fecb9508581a157fd2f30b7c642b850b2fd4795185c5b785ef48e2001c13e1b5e0c15fabafbb6306584d111ed019c0a2430316cdfe5505412ee8b71595ef9d9a451cec82a400000007842c55940ba055521ce2bf8e4b2c7835443fea146d9b729cdc62ac1adebfa5dca524137e0adb9830c8587c456f165119cb04930297ec895d716e9ce39862ea6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f1ca3f2b12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433747326" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2824 2164 iexplore.exe 30 PID 2164 wrote to memory of 2824 2164 iexplore.exe 30 PID 2164 wrote to memory of 2824 2164 iexplore.exe 30 PID 2164 wrote to memory of 2824 2164 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fdd4d9c66dd9c655cd55adf806565688_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab67844f306f7ca64c0474b6b1b011ac
SHA18046ca13b90ef285eefa900ee859344c0be346be
SHA2565f9545accc56c71a2f425e956cfbc6a1d9809f3ebc7e77af78985bff19f55cfa
SHA5126ee9ee6c8f5272a5db1f1262180d005e502272433c39045bc273aee7fce97fac05bba3641bddce589915f3430607bf360ec80836e576d0c1af2cd31fcfdd2ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d91b36b05e96ab2daad1e5ec8b226a09
SHA1939c2a4e69ac88869b7512d4bf48e9672b960096
SHA2561863478ae8767ac0effefbec6d2dc68002dda50746456b1a99bcd30a5e1361e1
SHA5121385c51940e5c68eb1a80b8b66c21f88c6756cd0b5f7723804a4f93cab8c4318ba635afe9ee7c68df695f8e1ca27ec537bb38a77c49606d0ee630a58c0c3e2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebe7666869b9a05d42a9d139a8c420ad
SHA10fa847998d8fc2365ed6b378c461da9626d93864
SHA256cc22425478d05f207b548b1ecbd3abfbb914ba9c0563898225f51deacaa12f35
SHA512d860636af168d2a6b18f26a345538cdb04be0469a89d959c32e728383a0653075172c670e31f6e1fc3009eeec378f7c84f162cfdf377540b0c0cdaabd39b6409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d98b27194da591983f50650f413ff789
SHA109ce4348ab0e7f4a9d7db887e34dc11e6616797e
SHA256d0cfc1e84cfd36f8e9fd9c3a33c23dfe45984091e2312899c40d65c4f26cc6d8
SHA51257d74669b467f649451c8f8e9438a8b602aa232e80622eb3abf10d25fa282cb872f60cda4913c65ec8afb764973a145e7ac88ec89a84559636cea1cdaeef197a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5338eab363b80d1f4bce3e9d5eab7f8
SHA179e328c7fa66fa8bb64471660b4226aa85dc3987
SHA2565492f7f7195d0bc05a9efff599a3660f6abb058506a73b81e654c6b01d6dc156
SHA512ad6320a4a8ffb48a759dcf2ec5bbc2587db88ee34095496d9ea5eab39b77f59388b03be24acf1b8e85e1209d556c7662bc4f515bc50f6947c2f8008cd5f3c36c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa1992ae1e89a676fac7f094b36b44d6
SHA125a0afd85e00569ddf30210a9baf241170ebdf4d
SHA256038322147ba173c7e4fbc6e1edc0dedd1ae719dbfbf49a3a25404a3c980a213b
SHA51290afeaf8418ba68d008daf10a1e755749a2ee417d4d1037b94acc9e974e9c4f7ed83aeeab3dd973411a21cf9e93d3b5690d8970355b2d3f3caa5238a9b848ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b4b9c22eef92acc658f474df4a8e273
SHA17705d5332b62b8b6c86367ec93644fad40b5ec8f
SHA256c540bc5b850b46a9178c264d8d994c67e0014755cf83f41a173492130bab5601
SHA5120ab41db0644c406e8052d50cd12cbf727e066cc40871e5517ea95e4ba84c791457dfda51eb6dea37b4df3f5b0fb7e5b61962b09880e410f2015531f7cf860e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ed999ef75874405ff3f79faec41b2f1
SHA1b3d17ffcecaedbb21f01a9d77e2d6a70af2ba8f8
SHA256c9ca21ca85ebb9281332074da2049d9787a1acfdf514487c96b812f62a096ddf
SHA51222ca9bf65860d5cef139d1d4a8d572d41e4c1a6205e1a9d4da73eac776a033031617d12caffe8bee596b734beaca994e4329247397fecd628265130e52d2aa3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536baf6047b8a0ff86fcc0daacad447f2
SHA190f598c350bd640f6a96b08345240261448f839b
SHA256caf1cd53324830a243f237a27d688fc22168fefdde1ffd6f8676bac092e4a298
SHA512ae7796021da9e7e4de122bb652467ed5884ecbd49dba54a1bef665d193e28084e57cb71858f3ee4964003f2c9519b5229eda982b75f4b36a7e6a9825081c90d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a53bc0c227ad11c0d39867cc7417fde0
SHA11ddf0258c0151f23b0c50db222a61be03f7afbed
SHA25663eaacdcc043de9f549f35053b24dcbc810c7a2f505428fd339716c1afb34012
SHA51239225557b4f5b2bda7e662021c6a72161b7c542982231be9ab0f6993efb618dd256bbdb2de294aff759e02e01139925dfa40c7f6c31dd0fd439d873087fc672d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccf3b0c36a87be7a42f3201308d76703
SHA146ecb526ae87f4899ab69c38c483feb541d09b4c
SHA256aa253d32d4967cc64728d41cd22c1df9c647899e4f33eedbdfb8784eb31676f3
SHA5127dc495ff79eed85e0beca6580e90d0d2914c8ea6d74ad8a8d877808610b55a564c213b94802b2f16b899993171f8f6c8e060b63ed9c7dfef944a3af6defd527d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f23af96911bf2be256650f0529557f5c
SHA186c9314fd4f80d851eb918938e8f3528026d23ca
SHA25632fd9242e42db24e46ee48426563e3130a08371a602c7e859c97468fdcd955e0
SHA5120c7b8e1415954719fd7c0f435b54c030df91b92fc0eb2fa3cb489bf19cd6c91e212ae18601e2c4e261c2c7cdf51c0dc2fb5c8a20c66c7f97658220aee406b6cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518fa2e2e1973969729b884687653472b
SHA1a619da9607dc8c6eaae06b70bf97dc94cdaa1e2f
SHA2566e212b0f34888a8c4c5f582251c664f214a938202f8c16bb5ec5d89436c9364e
SHA5124ed68fa43a8570669783a65aeaceaf283fa90f6892f9de2b02969a9a9e79423e870bdd9484910ec26a77c1c79f55d63ed0a9a12fc47ceb355e527d017fa497c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce4bb7ee0ee07ac81cd3a9b87c53a00
SHA14bbb0073ce9fc1e74b17b0701562ff07b8563f13
SHA256915dc190f22f87ed72eadd38cd8f41966cdfc47b73ba1741577cbf72df954e0a
SHA51270299dec6bad117d10db9c8c07fe2caf3090339c7c9933a6b579a69b8fc6bd6fba52df9f15ecbb93aa4241b6b5d564a93ebd988407da9e078f2c0cdb83b6c289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1ba7b3f88c2f0d333e12ea084bc141a
SHA1954c8c565d49aef1e3c95ad22b6fa4ebcb49f17d
SHA256e770bc430297c2d0eaba19c722af0a4d56a0c3906a4dc286b552ebaadee70a4d
SHA512191e01133cfb354d9fe509ed382063a85fc3299d72a65dfa7d398185dc9ae9b126e04c0fdf32442e5b2169fa7ce831b86cb81a1e75732cc601e74890617235a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5979a9ad6eb643c774d84a019646a0c48
SHA1541ce4e4029fc13ceefaccb97ae15167b672b3cf
SHA256dfd1a2d839a75682a9a6abecf157aee44ef1d1da53994e5d5b73b645960fede1
SHA512cef2e4fe3fe055783a1fa3e7fd90652319de464bb51f5ae51ebd4f4383feb35b4ac351a1687fa617b366e57b1a884bad72b2f9369f7a50acd7e78d903fb52480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50620194da2fc73d2353a0d5d01371397
SHA1b97ded56171a52bb1622c0ee3cc797799b7dce60
SHA2561122c92ca4b6341601712a072cec4774e3529b570c38fa8728e6cc51ae87f7c6
SHA512542266a780f1eb3b5b372bd04fbe8c4aac53f27a1e3cad70fe6862c488be9a422202e3d628c094dbbbe530eb907c6a2ed755dc83fbabe59359933d8d7e78ff43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f9265bb6ad7e69e92bcc03679368e9
SHA1e9c7ef154267f943777fb6574601f9538b0f6bbe
SHA256d5c089e1ae2c4050f8d3b5449ba07fa6f7efc9f0edaad67418838638cea64930
SHA512bf805ec09a84cac760ec7af2084a6ed01ed4999ffe174aacdd37cf94478b1575d5c466421038ad3e2fc72e989c9daa710be85b675326e004ca868b2d9a601a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e02bf09ed96b765e37e2f50876c7d73
SHA1500ae9454a4795e2c1523be51e3a9191a8dc55b5
SHA2561d796ee138b05d72669cde152a4eda5347264a2d1a348d1f7ac766500fbf6827
SHA5129200bec8293c6ac37b27df15c7cd159d91ee731a8bba109b90651218f17191446c62c31e4fb4d74b3667ea171a5f8ebe2e8926938f6c628d4121efaf41ce8a1c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b