Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 12:36
Static task
static1
Behavioral task
behavioral1
Sample
fb905f623bbc196b2474f9d4e93e4b6d_JaffaCakes118.html
Resource
win7-20240903-en
General
-
Target
fb905f623bbc196b2474f9d4e93e4b6d_JaffaCakes118.html
-
Size
4KB
-
MD5
fb905f623bbc196b2474f9d4e93e4b6d
-
SHA1
ed66ae0f373fd6cb10477d17c4dd2cb5966d8759
-
SHA256
a632e962dfe9328489119feea166b3f5fcfffb770b169d32c218a2c95caee212
-
SHA512
415d364e36a71026db53be3ea04d044c5b2d3b29d371f1b6b7acd3da6df9dad65725472221bd0fc61e51279341ad471571e898adc595df50127a7ce05524a631
-
SSDEEP
48:t83ELTuda+KyvLUJZavtqd5uEOffG3qQk6kkmkTTi1Nakpn/2ZC1gZy:kE2dIKLU2tqd5uEIO3qM852cT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C2080E51-BD3C-11EF-A094-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ff23984951db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440687280" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000012af8cafeb2ec146970c5df09c0bd05d000000000200000000001066000000010000200000002311f6c860b97a556c0a68ea7bf90fc18a8cc640c26c807456d224438d516482000000000e80000000020000200000006871f3f7a77eb5388e4b478ef24e0fd917dcba1b59d6411b44559b9995757c1d2000000014023eacd0598e3729e65072048a1fc78dcfc59fdaf03ae1166e5d987e657b86400000005dbd5d4990415b254c403e2a7d92bb0d5a4d308ea1855820007a511f505a2c0e7c44bda61e131fb2b59c855d052b3233427fa94da33ba2151c843c969e11744b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2964 2128 iexplore.exe 31 PID 2128 wrote to memory of 2964 2128 iexplore.exe 31 PID 2128 wrote to memory of 2964 2128 iexplore.exe 31 PID 2128 wrote to memory of 2964 2128 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb905f623bbc196b2474f9d4e93e4b6d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545b17df6a4bba6c1eb946f34dfcfbce5
SHA100e687b03e53342ebb1c55c8bca192b7b9904403
SHA2567e700265c81570d508a899c03d501acfd8dd2a6d97b81c5240629679b43420ec
SHA5129038e82657fa20f5a979266293a3e26fffbed0c3020718dd435f1f60c7159fd46ac46e1c6fa68d5d34d51f5a2b9abef51841bfa6d1763f9709e4900f8cc69f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587632bb5d2067f327bc7b754ba8536fe
SHA1a5839e90b67e589a9beae3ae10dbddb9c8ce18a6
SHA256b62d2a35fbd22873908c664fd6d6c233c2e1c8d23a9dddb98f5d99934f403744
SHA5121e80ea3233e9219d5c2f18004c16458f4264123144e6a70d210ce6164d76b5d730c92bf3c76ce701372cec5dfc364b10526158c49965926dc24b40f65c8ef135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc1e9101a5188a3ec526e7d7bffb2071
SHA1d4fc6ccc1d238c37c6c80b83e77fe2e21958967d
SHA2569484a82499db2d1a0cac6aaba21f413d5db83f4a5f8b1139dd13ef6d99d0da30
SHA512b046abc7ca2971a01fba9310a079a3104be92567267830dc56dd4cbb3a289e4840fc85f416d3165823d4e05c227ca0a3dba48be53844326ed9513300880ed509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e66476ae667a3f9a3576f2362b14527
SHA10f9fd2e12c456c5459cdd7694fcde2198195d03f
SHA256e53890593aaa42694c2b0660d8e20aa4bb5522e5d66a59afb003cd07b60ff631
SHA5125ad9155247949544ac42778b4316cece7cc34d721bed465124251f1378728f3fa175d3eec84a602f5fabb8e6fc8b1f1c8e3af0698f232578e2bfdeb066509a18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba32b84f150fba7bffec1797ad7ccc6d
SHA15768ace97a2642b098aa7ccc767dceea76086fad
SHA25673c8803b5c4a1331c1874f2bc7ecca8ab41085a7e4378a35889e54a7e9794061
SHA512b839e6b69eacf81f2a4c8b23553fbdef6241c7d81eae0689be1e390526cd9b9af3454291693a6f84bc11fc98d4e4c68b7a634ecf1ec272c2c8ceb30e77fbb421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceefa014482c08f3be43cb014bd331a1
SHA1231441d8d3dca3a424c9aa1c94e93690f34db992
SHA256ec42edd5c1862ee64985b929705296e4f5c67185a31f588f5d39eda75f39c767
SHA5127f2391de1033c964d1948d1db7e591d0e5e47cbe4ed271a9cd1692d5161e06db22f9ab5301d522e33f88ee706a6d0a5c636062a7f769028f10b93b43c38e77ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6e5a63515b16662adb23207c202daf3
SHA1a067940a41462141a1f26578c42516d570a78cf7
SHA256dc74e5af892f52561e236e8ba1b2ad42bb1acafbb453d7f8c156d90f4eb8733b
SHA5123293817b28e4904fc2713d4dcfb98a9f07ba98c62c185cd2f213245d4779ece517e76b308bd396436494ecd7ad7cce060f0164804db5bedd39ab8eb66c343bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e20c09f6611416219b79d750f61fbe2c
SHA19d4c1ab64d79e8785cb5e4ed3e922ead2ed2c1b1
SHA2565bbe389d0233c1101eca3c2cb70d59d07c3a6e98646742513de71f9d109bba63
SHA512c76d0c74a9b3c7b0220f6f9340da427c5c530211e048a5825821ce231b2c65b0ba93ba39716a6901f03f6ed53e5e97d3944395b718a6a8ae9d4b5e0fe07aa048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5890de8fe9054a528e1c43b23d6ad5a08
SHA1aab04aa0aa0290b9a88435787a110cad5400b6b8
SHA256b93918388582e6da3cdbb831f528b589ea0b9ea601640993e5cce9c4968c2a4d
SHA5129aaf5e9c39de8338f3862ef40a2b270ed2aa35fd098a8f2eedaf610ed77307b0b5c895a361a618d5574d5baf7aadac8704987a7b1e115f8ec02b126e54d7c806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e16242ab1af5735421437e3eb1295bc
SHA1034aa625bc719ead6d0101696f97e5a0e61e8305
SHA256abcd025e6677bed74600fb5a4f679aa5d063cced88bf30101a62e67011daa5d0
SHA5127bcc80edea8b7740b9dff0f3239ca41ac8912e9884051bad90abf18c6b51f58f8596b6539a244326b5f2b61922e0c637217b4c539c37cab349116e78dd373f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b707ada3c07754659855e377033f8bd5
SHA1a0108ea33f4a58b5ba6892ab2f94329a798a7c08
SHA2564857fbdb60d47a4396707f46045786706c432f9917d09c528f4a0f5c718f0260
SHA5121e8185485dae41339b0d48875fc956682de3e9644fdbd100ccf64b7b067618dd1e269807e839a2d8669a526987733b1bd44a15699ae1456237972e24d7673b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ad8c4d00b8fc07cbb6c4649cf4f82d
SHA14475839a1cf135ce8f7f812eb4ae84ebca209b8b
SHA256fa3bee9e52d484311b906fc4cbaf650ddd8a3e86cc29cb1f0d5bf6a938a024e5
SHA5127e17afa3957d70307e8206b19eb390455433513641f8b321d6d79d56429888eb76d7ae92a03c2bf88a4a73932974b993b47240b9fc6115cd7c68e820f137dc86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508bc232a96435a73b406d7b148832a25
SHA1b897a06c658a9c348b047c18d7101129037597c2
SHA256cdb526b6687f76bb8079a4b51f52fbabc8ea45ad63e33e67d65f8f92bc7f7bdc
SHA5122d916f52508bdf8a8476099954d4bddce51b751bbfe050e7b33525796101ed88387681457e2f86786fb2948a84228652604603809eb2a8b185e06e28119644e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eda01fbca072b7d0f1ab6885093630d
SHA16d39fecef3eb0878e55c266e543e5b57eaa2ff3f
SHA2565b262a8c4e31c39052c77090c53a9713f19bf3c29e3a43cee2ecbe5307924b2e
SHA512b086395fbe88c2c1cfb34b118dbcecd106059db17ad96cd9c605225b7c550e7d828a98e4eb1a5ab9532805606cccdbdf7089d4062229b1fafe93168ebe3f3c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521dcba7e74c6b6638dd668b0bf519839
SHA1f286d4ae1a61e045bd43b5816c8df5d58f566fde
SHA25667ef65d1abfe29feee444f2e6d61353a9970724ee7fb9c23c17a02c8ed223a15
SHA512f05ebccb6aaa9547cb08c2969e819400715cb9cb271f1771816b30d83da9032ddcfef28902559e5dfba48a66d23eeea0f22179abaab4e8572586bcc7d27456f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8d0791d53344ec075d8990a91f587da
SHA1bf6ddfd13dbf93a48afc90322f351606e4a9adf5
SHA2569f0eaf8ed964f6dbadc56e28e2c920b1e93541e45cf85d3910d0ed3c84d80897
SHA5125a829525bedd8e2bfb186f972491e4421af46e518659e446e406eee04b66c74b3ee0b510692ccd5ac326cc90aa30b5d71648a8cbbfeb34eccd9ffd47e2d61074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d04196ca07da96f685c8bdb94d280761
SHA1e6893f169652f05eafb7884588d2df4b7301fb23
SHA256b55f531e55a667ea40c1f84f7c9158982239ad6da34f8db5329c8de3fcac7c4c
SHA5120742a1911f74607e4b3fc819d970f8548d969bc73f89173a6c1f0b8a0b19580c2f7641c678116b9b57210924171fbfb7f1407adaeab0d98c4a4b7fa254524383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4a44cd98bc07f73fbb4644afd034cbe
SHA13313f7c97c3d31c65470a0f0b335f3c07baacb38
SHA25654db553c51f4763f81c22a275d6f65f874bd4c3d7f523b166077ea8ed184e444
SHA512526419edad32448821fd531b0119645748c334bddb469a8da180f00ce9d883f777c37cdc34f80de652085256b7b0fb2121b9392afcc19a6f21c4978a0d2472b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b30965584a86704a608dba9235fc14
SHA1f14390586b4b541e1c36617335b7903850377875
SHA256e8989fef56ed8a93a51ece0d1003f8295108069efb36472f3db9db15a86767fc
SHA5121a7bfe59332223e6033638892008163508992f72513798b0dc5501bffe8e2c6ba8854ce27f24141a1fab969fc6a3b5b145e465797faadb1c250280767d91dbdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b11eab6f0a034c9442fee509b2966a51
SHA1ba9a654d635342e6c7d3aef5b459c50fcfaba0e0
SHA256e7fefcbee31e15117df6ccc118ddc578f9c8e33633db519a055bba15f57bf799
SHA512dc65e8b6516d69c690522e0bd1e1e07b61bc606d53fd48c97439ef2aa7b15f081f5e2f8912841e77f98b9b40f01dcaadf7a4028ac20161f936e7106edf794bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec26a81c378356b03250d769fb7a9b56
SHA1d5ce0f0b4878e0a0c5928e68b942023819092c44
SHA256f8181a9144fd4eb4014d302ea9325f1bbc4eb4bebf60ad24d164245bd2e96d97
SHA512e2b8455dc2274a9897d2d14ef9335e09cdda2b187018d2e8f380b0f754a9973b22b07ea7aa152fad402c83b1108681b96f355499b758d9a1d10c5cdee96af3fd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b