Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 15:37
Static task
static1
Behavioral task
behavioral1
Sample
40abd2457be83ca5dc9b3823f1b6830d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40abd2457be83ca5dc9b3823f1b6830d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
40abd2457be83ca5dc9b3823f1b6830d_JaffaCakes118.html
-
Size
9KB
-
MD5
40abd2457be83ca5dc9b3823f1b6830d
-
SHA1
b8f99bfcfebb0e7027bde534a839ad20bf2efd16
-
SHA256
a1a693e2907b215604d2f36fe0b33856b67b6f048e63388da7a30ae1eb408767
-
SHA512
7bb324ac646f53d15e3173943336aa18c57820b78c996f82a872bba7f5b564968436ca15ce126961977bbe416df92e16db674034c7b23f4e1abf4442654cd0ce
-
SSDEEP
192:HP06qYNPSnIooSGRv/JPD1zPC33uNpx8ikiuNphVa6eyS8:H6xW3NRDehVa668
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0dff8f7851ddb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000127a89bca7c4121beef8ec1dfc3bf442427a84781487654a066d9d7a2ddc14c8000000000e80000000020000200000006937c0caaefeeb2b478dc824a85c88eaf5b0abecee10eb36dcfd63ac3fba1c5d90000000a8f4276bc5a8548d332c9da0bd89df19091219cb803f2c72c000d03472bd1105b6c5e18b7d64ad7c884157d62d24b5c6280ba153a5ddda8c2be4cca398fce70cc21452eb44334d92339642b6b5704d0b7c6b7d9d52677563477d0ad7a6592051d7b7adda323ca929831d3494b933d97c44132fb6562218cff550be47d4713cb9261a6ef5ba8de68c6edb837cdff3b8ed4000000052fa41649e8eef3673218883d9b00329d5ad348fcb1ca80c354f9ca911ea4be9da60390db29a0eb80e9efc16b3394110d7f0934acfa2fd244ccf27e51154c880 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434995733" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17B36681-8979-11EF-A76B-E67A421F41DB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000006e1d1be7ad6718079097f08c0c011eac811f15eba4ca5291b33c57a87fd685fc000000000e8000000002000020000000895e61959af91ef07545879098e495311a6ea6c6804efeee60f4272707d98fb120000000a8be101a6e3b32e19ac3c43a8f1fa91b52aa609149450bb33a4482717fe115c440000000b3aef8de192e89c25ce444b5e22ba17c6bb0a54fb407faa2f93ba67fcc234120d35a9c842c60cc19f44a3240a5dd2771e4033c9d1b2ed2def42deca0b87e16d6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2208 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2208 2544 iexplore.exe 31 PID 2544 wrote to memory of 2208 2544 iexplore.exe 31 PID 2544 wrote to memory of 2208 2544 iexplore.exe 31 PID 2544 wrote to memory of 2208 2544 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40abd2457be83ca5dc9b3823f1b6830d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569fedf14e2dff1602b80a59cf2a59a39
SHA11490292e9cf54e3ea53eb04ae048d9f107ecc9f2
SHA2562ff045ac4014d80b5d57c75603e0567cda65126310cef6055bd952ae533b24f2
SHA512273d943108b112d216d85cb418e36bb89de54755174b1ef18f40ff4b61627b21cb9e16271cf933b18878580a6edeac3621611e1068fa619ee089087fb7cf64bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51458cd96f86be153b035c6074f2e658b
SHA17e5bfde031fbbd89beaebbd87a93a036e1c80a51
SHA256fe9ab097695ee3dd0983a1837219d3a14dff2fa513fc949175ac5819b1f2a131
SHA512fd206a4778613b5eb822d29232973dbf8e84337e13693fd056e5f9c9bcb087c85acd058afc215687852ffee4fa3db1df8f05a0ad3a2ae0815236aa8775d45832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5289e55cdb6b1a5e54c5619173a0140a0
SHA1e46a82496f1e0dc0035dd1cf95adfff54d16f365
SHA256a1bc7268e1a9fe070a3d4b6fbb743ee6a85d7c0b17491c2ad972fdb464d3afd5
SHA51284bbf1cac4220e844701f44acbb3cbba4c9d2d466710cfb334cb70263c517054f25829461ff64fb7075d0962fae7ae1ed9322c88e45ce2e786b6cb3f59ed6c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5779c2c19efa9945cbdb886d715a77a73
SHA164f5a912d10e6c3dd7110ec345f38521baa600ac
SHA256aa86192eb8df3ba2958ddd4fb798bdd622f132d74a4078333d5d2579b2205bf6
SHA5124f944c6e3567c1641accf52380a63a3b29cc19fca19626379d1dc6ce1c339a9e9d174032a491a317e6b04676ff787c242b2deb29f87cb52af4d9d6de6df8c538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe7c79e30a0c46fe5875a46653955b3
SHA1c588c8646179335b909755496b9433d7e18f419b
SHA2567bb79d806f6e3b7412e9e7721e071904595951834cb8fe055d7a7ab332b78e3e
SHA512a1ee60b0ab7f77f745bfd50f12914b5943edc4c1572eb9725eabd9ba4ebf097f3c64b98c602db4593bedc50dea5b0384f2e1b5dd16d92d41fc77d8409cd9385c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5353a2cc763803d426755217a83d2241d
SHA157744e9b7f7373c266a7a70f0e96795d7cbad8df
SHA256957a1268965aba5e114601e61e651ff698bbb7ab3fd3460dfbaad4aeb9d053dc
SHA51236dd298a15fa31bd6ad036490caed37e9960d0a61aaf6d90b40dad33555da3ddae1d86ce328f15d6c625bd414503d3a46f80e9157d6373efce8854f8199f8e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d13f5d6851ded37b956166a634df4c7
SHA12378e1cb82497ae303da7087cbd918a84caa72ab
SHA256bff6d436c66920fb04af71bac70a0fc855a09b98f90223df10597dacd79f1c50
SHA512dccee1f3ef433c2d0470f5fd577c8b187a940ad3ed095cff0659bd5729a06245c8520bb1c8527b0eeec65ff6a4f46ed64fdb547bb510526da60c3aa06238fcda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d8e9bd40b0364e35aeeb8ccb5022a4
SHA13e92dc00311fb00cc968ab405918be7b01d0228c
SHA25609cb429d98d81c07c690cfd0ad11fee44deb5b2412c89bf3661842d3fcc70368
SHA512b3be3fd9c169d803cc7f98bc92fed16a6a1b0f7578138e1507e37483c90a0ebde45f201e876b84882382e7281352ad47f01f069f63c088df772d28e61994cdd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec009e85874bf1db4be8d65bc8d2ca4
SHA1fdf53e5a9ff686f2d53e6e1dfef38479a9421630
SHA256d384ed8ccd2f2fdc90e5f67cbabf2e607f13bcbc907715e63d012ea2a3b97c1e
SHA51250c533bfa9d47f786b69e35fa6591366a6ec847fc9dfa4d5567ee269f61c81abbad790f294293e701718f95210390737561873f97626aa579947fb46a96259dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591f3a257c470d1af8e51101360ad9b7f
SHA1b95ecdade12b293c61a38a5671a9302de1e596d1
SHA256ae70f5f9049dcaf5b021f0412489d2fafedde1eede71b7fe1989effa6a04613f
SHA512ff6cffe1cf3fc2937f419d83c50161e475bcc6f9af8b775a83236a3307c8a28685ed306d392b877d17486b9a32210708ab850a70940fd36c63713cfce310da90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ece31ab4f2b9f423fcfadebf78a2b62
SHA14a0c8479b7f84654b9f54a73b1a9a5a476f69b4b
SHA256b4a41ee7801e071a0668b30ded6b6e83bfaabab04bb86ab77157b14db42ffdbb
SHA5127c98595880c3b5c917e37f807177f36ffeb510c707ef8a85199484428a2cc5b58dbe35d7cc8c28684b2fa37fd31a786f22f12077b40356a7812b27112231b58a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef6b968d05dea08c970069f2e35747f
SHA1fcee048f0c132d16d2391586db72590df7e6b1a8
SHA256e8f04c0003f1fcf4d083eda9052ef94a3b9ab89f9e2f5ac9bb39b93212b9e1d0
SHA51293b2d9c316a64aa10ef4bb400edeabac94b897241879aede296ec7cdb12b1d8d0242bd8f2b589dcc6469a2381203432363ced42791209cf159bd0b4545831baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54280b5a39f6755914b04b794214c9d3e
SHA1e1e70f2a7c387e68965221ee9e471518f552444b
SHA256a25d5953d021b81b80f88c1196943f813761a38c8e50962650e64df7fb445620
SHA51268183ef5cd923b9555c8e65ef8c79adc2e30df652192f94bb9605b51b37bca0667581afb7ff99b26bd4dda64f3b712d59f7deb3e1378fb547f690d763fce9937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5795c0b9e03d6268dda2589133455ae49
SHA1fad2f71f4251eb3e3d185de7443f8da3996c0aed
SHA256f3083c8cc14a4d7e3cbb0d6b86c2cf99f5fcc08af0ffa94817cb918d5433a30f
SHA5121fc96d4f4c509731b4ae990cd5940344b0a9a5e9e7fb6b77ee8f42894d19a46c33a67810ac301c16522c3d012ec213df3d913791813365a6fc83ae868de0f8af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533f46250ab35ca2f9a3ec640660f9cba
SHA12cd1cb92c4f983c612f00e5d1a7d5f05963cf792
SHA25617a9f1831e72ded79450684e1b18f7ab5cb550663de991ef4ab0c1777295a2c4
SHA512d7e53cefacf2829004e8f81239aebc11b549f0b04c1f28132b7b0123bf25f55ebbc3159e91e2d8fb931db3e4bf57802b0b24693dbc015014e922269a50869056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a79aef772420f5d4e66e3c8417b23a0
SHA16aaa3bb41c325d280da2d17aaec15134b143d630
SHA25693459ee3ad578568a98c9c0273b4d48550e850a5c1953ff778e0af303a5311ce
SHA512b4037362ee0b40c30ba5da67964acc0723d9224637057ab9747fe0b35105f2b030d450c6744eb4724057b4a2d7b72e327786e0b060a5d8c918de7ae4fc618c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1c7dd693ae5e2a01095cb030f4fdd44
SHA1f3eca1809b0265f6b06f2c521090fa0b4358e517
SHA25659b80d2c18199a825d5e3c24b604c5dc781a3fca3d52a6b9687ec13818e8bc2c
SHA51274564663f8ace1c463d4c49babaf3af8333eec546bafcc02d8ff128d498d6a73b5bd3fb3bcbba1b5615a47e35de9f21edf6d56b6f84ae8bc05943693d9b47679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b227fc9310eef6302f2aeee091d9ac9e
SHA1550e44877c65df7216b7afa91e461368b20f3ee9
SHA2561b0f6814a9df2eaa9486d1619fbdb32d910e718d64e5b9b71d9538f663e37be5
SHA5127d197b3c575d65d759108a992e01614f862e8acdbf74806c3735602f1172faa1745aeb43184c7dc503f53fe3e5ddb1bab92f187345f0be1302e09ba7fde461e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59555abad9387eca79c9fa3a668fc3941
SHA116411c16fd7572f3dd5d7af9bd8dee762cb9c2de
SHA2565e04df575bd6d54026141428d561800f50626c2126a88c8ad49e4c9c23be406b
SHA512eb97838e4474c9bcd1eab743291967902560cf7cbc2f6df3bcce199736e3fcab704f23c39a9b737988eaa2d5d1e4c553a2dedaed04e6bbe55ad8bb8f6c56149e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b