Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
26033ce225ca1aab10df826e78eb407b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
26033ce225ca1aab10df826e78eb407b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
26033ce225ca1aab10df826e78eb407b_JaffaCakes118.html
-
Size
53KB
-
MD5
26033ce225ca1aab10df826e78eb407b
-
SHA1
8aec77365ae1e5a975d81d8cd40419ed5b3dc102
-
SHA256
a6c13ae2f5631ee4f8719bf3cbcac13deb3c973ade04dadb98c7e845f14dcb64
-
SHA512
eb7c47830037eee8aa8fa4a7544da48551c1ffcbf4b900f05832adf22e4b6c8b8ef6236f69bb811631babd0b959e201e08f26df7970fdd0ff6adefe3d5a69d9a
-
SSDEEP
1536:CkgUiIakTqGivi+PyUrrunlY763Nj+q5VyvR0w2AzTICbbUow/t9M/dNwIUTDmD0:CkgUiIakTqGivi+PyUrrunlY763Nj+qD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000993689bc769a284898daf7bf8e85e3d00000000002000000000010660000000100002000000057095167b75028f4af30f97174734f3aa901c307df975bd36dd00e00a9054042000000000e80000000020000200000008cd4235bc011333a19ad714fc3025922a21e83b79f2cb716ac962abc24c7c8172000000056d3e8b119937fb102bedf357e37d2d4f1e58fb8e49f89b69cf049b2d07dffd6400000002cc0e4fbc25146fd2783991fc16bd85d3294f4d2f4cbda894bdd11bfbeebd0b88975633d27dcc17ecd72a9701ea29c4678a97924f05fe61a3330062c9f305f69 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434609667" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000993689bc769a284898daf7bf8e85e3d0000000000200000000001066000000010000200000003d39699144770fbc5d094da1ee5b2bc5cbb50f6746049a58ec5a5f9facf7e4b7000000000e800000000200002000000037377afffb86a500cf357a477ccb9f7cfd23ff43c9c695775887770eaebe1bad9000000054bd9e3b8d340284f3f3158c762dee469fecbc2150f9647d73acb12af615eff406b62c2bcb65cc26f179c8c43626c83fe2896baff11555f2a44d97f199999d0df0bf87f9cdf12a1142b9e21977f7bf7b97cc1d0ee87adaf17fe3974d7e4fe07acb697d1778e02deeee42da00d19b482def89955526fbd74a555d37e9c0f94c4e34b49b1163d9723573f388fac256ef4a40000000bca9822a06de9759a5912eaf1351e8674b0f9935813838a45a4c8246da7f124dda59727376fee2c3f32210a6eb4a83f29703f303726da6cc4e98215bb3bd385c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10f8d10d031adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3669A931-85F6-11EF-93F3-6E739D7B0BBB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1568 3032 iexplore.exe 31 PID 3032 wrote to memory of 1568 3032 iexplore.exe 31 PID 3032 wrote to memory of 1568 3032 iexplore.exe 31 PID 3032 wrote to memory of 1568 3032 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26033ce225ca1aab10df826e78eb407b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5937ff071021fd18b939ec1c86411109d
SHA18e2698a0444cc4147d3d7a9285f95263daaec1a0
SHA256644567a9c06ea387e6ee2b6bb28ece769d8c67fe1cf93d0d638326a4f6cc8bb3
SHA512771a54a3aa78ffc65b1f424b0db4ed8b3dfd05001926e2ccf86627d27cefa8b9dcea3f4a259ba97619ac1928ed04838d9e66c547a0af17fb96f66aff45727d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e3c0a7ba27d980de1993e0235c6589
SHA1ee85808c4fdfaa82f019584cf9e5d568462f3592
SHA256ab3e05488194220842211e4e7ec1b08e49d7e3076acd198d40f23a52b287da22
SHA51230fbb7b232fe5a3f6f377004763db46a36299303f4edb003ce634e44666a2f4fce95bc797bc5550c122820f2f8917f12a7f2a6333f4106c822e25391069111ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c255a0ee0caa2e1035fbdae5c2d62c0c
SHA1b70a64d39d7407068b31278b9f8326dadec07710
SHA25658f4c8f4010aafb88c7d70b60cef09e8b0c07d2985895822f01fbc8d6e87b278
SHA512f83ce85d2a20c8a1210398ecb4b7da6262760a290a526696a41f2da5c7cea501f3534a5176229fe0ecfba840ee9030eab9b8504ce47ba0254da4b7835ccd4266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee9727d7e7ab2f52b2762c4439efdd1a
SHA1bf7a54c94930767587ed4a8a132c4f70c35cc624
SHA256db2752261a971ac548aed4ff829659e430cd431b226c22148612ead19c7825a1
SHA5127009bdd876bd02d327bec71138180e4738f3e73266e4f80ff7067fb141fc54af8784de74cd8ab922322df2785ce8cd3d5209629d927721b1dbc28ff1ac3b73cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ece476f6dc305f7b23dd940de80f10f
SHA19f740995f0d93418dfbf7831cff20ed419d12395
SHA25611eb2e09ae75a8ab1af325b5c27cd75c0e3954ec9ec17fcab15c155cf173eb12
SHA512eb5a88b4caa47b8fbc35536319e724d2078772585026d85a3b81ad7aac6f3b13fa1e75ee21a0760ae739e8e3151e843dbf5c5570c7e71c1dff5776900181b7d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531d358a4a996e7238df534d1ba277c20
SHA16a28cb0d44435f05bbca3addf07cf2752141d953
SHA256d275bcdfacc81f6c7b16c20328a942329bed1a215862160fd29d8979c46861ce
SHA51250ddb1248c00ef0382e155def29d9e952220befbb0a8bf944ecb4c28647223506d509fbb0bf2c8c9a247a19a0fbfdb17604e5c060a4d9b3504fe4ffd69b08f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a46a47aeb7a077b66d5ef0a7e9997036
SHA1735189f1e4044d33239e9b33db46329ecccdbfe4
SHA256c18d8d3b54b90355204940cc4907fc83895fd15f0f4af4a3fa5138d3d60562b3
SHA512e1ae9d318faddd5fcfd2be7d137af0f81e864a6514145f8ebc7ee18085363ebf9683c0dc0b17644bb379e82c1525b039f36e3b98638510bfd5cfa5437568061e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e076f243a5085ff024f8414293e30ea
SHA154cdefbdf9b1476120466d1ee679ad5aee69c9c9
SHA2569664b857d546fc62bebec70ef50cc9737dd891978acda414f3e6c81c248a9ed9
SHA51291f56040b3020cd4d38fd5bd5826c7848f68b7de4187d335d59e61e4ea76f1520d87f8e5ebfcf950effce712bf53b051ebe853b13301b7b53b4b52ecdb4166df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ec85eba3614c454d230ea046ad7ce2f
SHA19f537223b87965be397ce5336f44a0848711ad34
SHA256d4923db1fadaff8b8c164637488f937bf1e37f49d8a28afbe522b22a183642de
SHA512a64ece4fe2a8ccacc4be235c87c31cef70903ad525a198d8ea5152711e869278945e7b577ee0626c703c5236eacd5aba05c818967016ce4215ed76b6e258e209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b9eaf7ffe5d3dadc5c2bdfbd8e2cd26
SHA1a95c8506c1f67aa317aa821bed2d3d00b202e933
SHA256ab9b7ffd64f23a77eea5abbf9076389f3c4235cb44fe4d09698fd3bbcba8dc5b
SHA51249b86ae7ea0ac96d8d267093c03871ea94014171aa296fa7e7f41a9abe008b6374fd23a837312f76df633db2ce157011f71367fe66fad81bee2872793b865310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5238f40a577c2eea4fd5af1af16caa57e
SHA1177ce7fae24fd2fb7b9d3f66b13b4b4f51676274
SHA2567373c4d251278d2755e5628e2ac4232e3d0172f39ab8037ba26c51d5d3171a33
SHA51266ad1d4e25dbab6fd649ff1cf420169400a49780709c15776027d6f2cd5f5acfa0a306c17ce2e235a325a789f11b20bd3ef4801ccfcd15f84c190576c7e2f507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8b091be751d22dd05de70047d3d2d20
SHA19ead31e6cd0d3c3b2b91d96d7113bc9a18c41922
SHA256d1211618ebf08d42ec57e53460949fc1551dd9f221c97953db4f2aef628e92a6
SHA512d187026717a8f4ea57527ec32a895b077d30c569157ff81d9cfcf30be48d6995249a201114b19e64eceaae3cb06a1a663afd2ac467f6b589e3d80e4796d74844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e9d1ddfdb2c76fa35b7ed5fe40ff39e
SHA1ad0a8028a62d09c466d221a2054d90702ff97f52
SHA2561334b78e611048c1d4ba68952c6c7d15742fd09f591b635a36ea442eafb5244c
SHA512a36f564cd87de58d801eb7f03e74fc311006af60d10a6f508a51548d9ca780d7c077ab7ee3b589b99c3f5cef288456ebfcfbd4f640ad2322b3e32a3a04924916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df6ab60527f51b4221070e7dd6cd3f79
SHA10335562109c10b7fc1659222bbfbdd5a6b8df20d
SHA256f2c255c0ed1cf4f41139696bb66470b3ac792da839d565cee26ceecdaf61e5ed
SHA512a5e0acf78bbb52df42992e482adb45417749a79cfccc1e63aa0edcff1b69bc9e953424649d726846e0a9bf2d043a0b1259aef604988bfccbe31584dc7fff044a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503b502ff06e822c04b174453d6bd7865
SHA18b049a29f4d4aadc0d2a124473921fd192dccb2e
SHA256c31c2ae60dcad8b45a1f0fad50aeee517aeb95ba2dd6d27b867fdb6c3b949a17
SHA5122990e2dea6c421187c555699435efcb9ba21c513442692f9de64691bc55d8218ca74ecb8f708dcc837e97ed12e74458c88730b63db839dd4a9bb42d2c14addbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5049ee90ab878cbf61aa01ad873b90633
SHA12dec001a14c5dd5cb5ef9b4723295f1cf45ddfe2
SHA2561e2952a15097d2a424fde778fe445e9143d06f30ab0e70d3346a10c8feee241b
SHA51246f3dc0c3ddc5b2c3da732823f6979ee3288f14d7571265a5bff03a2e5e6e7410beaf5b04237b63fb873d5a9c5e6c70694127630b07f713b3b5d70c226e84f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a178adb7b0e52afb5d8f83b58285834
SHA16e78c552ebd44e13966ec517f6786cf23f87114c
SHA25680a21f0f42af47d8e277f604216edd4a7c2b93a61512511fa6013a3b4b7c0c8e
SHA51259e8b8604ae82969fc5e1fd3223f89c48079ba8f7e72fe16826bb30f44e6e973b4dbdeeb413c807ced65459a7ec6f9ce65c7f7138d086b20b80200295396e6ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f78741a2abfe60360c618e359c8b7bf6
SHA1840cf64cf378866d4732240bfba4ad297d7b764b
SHA256ac64f72e8255b0f2f65c4100046c038becf5ce6dd56d2fe255e7b37918b68f93
SHA5124968cbfe05afccd24cb258e2cd3ce8c881b910fbbdd27ba4c006fe7bfd0e6952a215db1ca24a4f9f4c4d976aeaf311d741770ee608f3ba5af3c8b118adc14118
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\sha1[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b