Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 21:07
Static task
static1
Behavioral task
behavioral1
Sample
f6dc1aaddd48ff45f57e2b1600002eeb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f6dc1aaddd48ff45f57e2b1600002eeb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6dc1aaddd48ff45f57e2b1600002eeb_JaffaCakes118.html
-
Size
139KB
-
MD5
f6dc1aaddd48ff45f57e2b1600002eeb
-
SHA1
efcfede857906a274c4531910cebc83401e93ee5
-
SHA256
b6e0b7ce290e254326d9bd8a48b5ec4b80068ba8f47bc067eda473be29da8183
-
SHA512
8cc9ad5191f4f898db11568d615e44483838f8853e256900a0db415efee0d3256d00accefc3a4ed3c85025660065a893824e14ff6210894f75facce1e585d7c0
-
SSDEEP
1536:Sy/NHwJUDlZbMyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:Sy//IyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433460300" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3034943b8f0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2249BEF1-7B82-11EF-B5D6-4625F4E6DDF6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000003ed33181df0288854c25a84bcb5b51980f9e9f4f0273cb49df6e7252a0e18276000000000e80000000020000200000006247f14a9f20b41efd140baf061169c6ffd472dd37d355df8e252fcea230504120000000f680793402e31b70acb9d337abdb8083e2739a354d4e544a61a52b3f2332c00f400000004dddccfd38acaddeda56f420ccc27e910772d692d1a33af1695fc835c74786307c12db9f4a59751b74e924384e15dcf38a94ed85bf181d08c20ff105528e575c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2392 2296 iexplore.exe 28 PID 2296 wrote to memory of 2392 2296 iexplore.exe 28 PID 2296 wrote to memory of 2392 2296 iexplore.exe 28 PID 2296 wrote to memory of 2392 2296 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6dc1aaddd48ff45f57e2b1600002eeb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee72ec7f4ebb713566ceed90c6c6440c
SHA17002dde8f4b08f089ff5f5a15721e0d4a8d17d60
SHA25613a5ca564c57dbb5f8e23efc2d9ca411b6130fc7d9db6205cedd5203a18a3a71
SHA512f58bdfde9b3834e49f3ac0c5bbe84bbdffd96e3f16a1f661b0bba269b2e5de772faed1a2e688cfd71a13e6161e8379a59e079f4ca5498e5de9ea344778ee9266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5722dbf11ccd9e7b2ccc73ae1f4368e2b
SHA1b2b0dc374ea99fbb048e1d27a4d8577d7c391151
SHA2562477f493fbd5fd9e4c86c79ddb39430ea1c440aec2ec7326e7de051692dfc787
SHA512fc63ef9aa4f1b66941a63a324d690817f3e49935b793db34731950cc169b74bbf80fd8c1a31ca83d6cc75f840a0af3b178468d25afc135f1fcf0beb5a87f9ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c2ff827024f1d25e2d24bbf2dfb6ff5
SHA166d7c6e5e8b658f616c0789f5ed39612fa519061
SHA256986fa27fb6f5384f65e9b48e98640530c688da3f278a1534f6d3f8a2ff841104
SHA5125a3fb6e5f3c27f667ad465d8e3711fbddc614e876d8c15c72a149a3c2d598e39d732d238c6a71c28bb34981e7662f3b97bd5b34400edcc809bcb7ebf0dd085e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6196be393b21f0a27e16f664af15fd8
SHA1ae39de274a1e5c29402fd8a8b8835011152ceaa1
SHA2563e9cf6c99fd196c6b657c17571c6050b3a411402e2bad004c963242ae19aa0f0
SHA512db34bb49467f5e3da0e0ccb0c92c6928d8add2852ff54f6ca9523e42a244821f75f55190cd2ece5381a6ac75f72df1fb0fa60f6a074e3a1d42acc5c2cdcbed26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c96887116d2cdbdc21cc62a6319352a
SHA19dfa9c632004cdcef1058993f7d742efcf8f5992
SHA256464c3fe6a93e8c79a130d0be9ee1e5b5d955f02931e6db46b89161457d51d447
SHA512a8e3e5e9a27661c40fd80513cd730a11afeb2acd213e5e4254661443517210d98719359fa5e9a8b9ed018e67c126bd9d094ca44efeceea3f8459c36328813f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5baffdc3b561f19bd7046fe6c82dd25
SHA17562ac356065f55508a0dc021c37f49d337801d3
SHA2563c4facd3600dfccf93562416f22fa9341e097d61f13f0308fa1c239b5f4d74af
SHA512e9a3b59eb72be369047d7bfcdc6fb401379e34d2654fc99067d7a95f03acfaa604677effb9c09ac990a1290f1497c4d1af3d0d91935ac12f8e6efc356765f211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5206b3fa4e6060b333f182e9a66d28511
SHA1fe6ac420e03ab513b9003ceecbd7185717d5c504
SHA256fc29ca2bdf39cf2545adccffd0605e735b5df3c94bc383515a4bf251dc995f3e
SHA5122b227eac913825faeb3ddc123b5e22fd075caba810eeab6282f5c7e160a1bfea7560555c7b1b0a41af71eea39d32d971788a80f121737fdc166d4b70c01fa805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520348699cd3d5b37c64483b3ee9efe08
SHA1582d791472cf3d938b3277f6f9bea37d2487f0d8
SHA2568ca6ea31de67b0a987dab60b0c0a84d7d56dc7bd8af18c646f52f70f4af421f9
SHA51234ca8f628f4814bfcb755fd170a943628af994bab0b255fde1d2ba2c9d421b35d3c3c4c35a29e7f91fbcf6e6fbbd75b1838ad2489a583cf06802f4f70cb6a138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561b83e049786534f178d657c7a2aced3
SHA16bfc0ed32ade8d32220f02ff470a748991c8c808
SHA25628c188fd98b2edfe6e42b7c5d72eb93493edd90b62ae91d5496c6e28d8f388a4
SHA5127a33b3200e72e4e4b5cfd1d00d120007ec12bf9bf268737f539e557f2f976af931ddafe01be17bc7f18d62beb66ac8991fa8c12408696110ae03ee70ee4b7edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ca308acbd7888f2b13f4c4dd76feeb4
SHA1de2657635af71c0aec9a8c770a29dd988776670b
SHA256df05c98247bf662e156d1119ef1c83986e28295c1395c467c8349b8f171d9aad
SHA5128c6d3ad664d14426153f5cb7f6aa730f2bb17442c5af8fe263ba921fbf74287de6271012b6ad814bb5de654010bf4bda54675a6bfe9f990d3f901706637ad319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a715bb048e09ddebe888a884d7b539d9
SHA14f25d70de02efdf1b960727bad9a16139186ba0a
SHA2562b2d23cfe47bab263824d8b062c9d9396083aebc224562ede0314e7264b1a1d1
SHA512ec4c360a126a9ea2f464fb8c76164e4465bdf472d7510886187f58868feca3115c485b98f42eeeb245b73670880132594d0cc0c04c752930fc9fe5efa5b7cd17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52438a0d8257442169aaaa18e0960db4e
SHA17284401659b991446eb2dc735198437981333ce2
SHA25642cd6f4560c313f09f83560e784f7a95379259224f0c8780bc323f207f7f112c
SHA51269bd7698db608f544041fbfc002190fef5f24dc04b7249b135b4c5c1341a8d449ac96d2772147fdc09e758ba159cd2a52f36de68b6b798043916c04924b4b1a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ca7e0fa0edb3739ae2b4e30b1c160a4
SHA12e5d9baf65bc4e5bb69e3f8c58a95b162a1d390f
SHA2564394750868e6ab207e949b29900269ec890164c931617a2965d6619a45885770
SHA51256478a7d21816567de2c2ff819dae0d42735edf8bd9e026f3f38288232f20037a09a976dd7898acf2bcddfe10f7d78248efd2e949e3e6158fc39bb0ff65b3531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d32312f7371e63a503db170632176bcc
SHA1c70f4ea67b487cd462c511c4b9ec2b634cfd3fad
SHA2560ad549a303d4d778a5c8f1990e2d100ebc8b01103a3422918850b1e8e196c9c6
SHA5124de2782637c582ad5db7db3262a77171825180893d1c2ac861c704ac527484cc164ed6d90e13bb97405e993bdb1ce7ce9a04ee5068d6029d73a6dcc971847fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d0680a782451ef130afbee90128cc36
SHA18109eb95cd4ec63afde18e59cedb4c5f1f7f64da
SHA256e113f04a62accb5f5811544fb7ba3edc93f34fd6f0d9ee2c53642772dd739a70
SHA512592064c192fc567bae4b310380a5634f86e0c1af1206aba700d373683433eafefc69094d59cc9e7c834ef2cedaf43cb09d72f54e8d2db6e1708920771bb7f495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539fff97c5b1f231f1a40e90b72e97fed
SHA1fd8b740ef6d8545575673e7cc086aa67275a700e
SHA2561a44776751dedbed5ad7d10256bcadf1736f4f1699aa68b70b605641c06b08f8
SHA512983eb0543678c1971e5ebcd48c30aad1fd2a2d1ce01c12ee13969a4272da1a3ab85d73a742d028bfdf5a0e700ff59092a13f00119b631358df95ed011203ecc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535e44fce403191f4492292b926ba6ae7
SHA1dea74875e03d6d5a254de094a5eb9c3caad38080
SHA256714408c090e91ce78aff9370c3506ed96357f25a9664b80cf563cea5e111e717
SHA512ad9e4c0ea8b2ec68c780369c25ddba09a6e6fb622c4ae58f2d73ab5bb77e45b02abc56a8b8f531591ef70bba96203d2bf48236903d39004b3996fdfa556636cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c28dff0c2481055aa8038a0099047107
SHA179bdb3d951820586309c1d72f772ebc3b32c0c16
SHA256976ec38a7aa6d5baca5425c164da27ed29833df1f3f3b5e52e951732d4b8099b
SHA512602b289e4c3fbfb10159f46e9cddc614cb8b8135df24252c50db41bbcad86a9117c23f407db44b25dcea723a4e8288f4419e38f11faf1108a81306b0d74d12b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdb29801ea1fa1307a046c367eff4799
SHA19b2b0778dec7644237bd58f85cfd2b9611e37095
SHA2560fbe0b1d6cf5fad462be107842b000221f55527ca072e540943a9fe22a1dde1c
SHA5126eb8755bc5601ed27bfdeed1d12d119f64e15353ab6be030cd897bac03bb3528290f46e139432b87b985d04a92c1f4d48fae6496e9347537331a7abda7c443c1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b