Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
3daa18ac4e6a9535dd8e01c7305e7c2a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3daa18ac4e6a9535dd8e01c7305e7c2a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3daa18ac4e6a9535dd8e01c7305e7c2a_JaffaCakes118.html
-
Size
88KB
-
MD5
3daa18ac4e6a9535dd8e01c7305e7c2a
-
SHA1
794dac8edfadb1a16ad16266b26b93179ea9a6bd
-
SHA256
9a3ca4c4db8b7f2b76b128fb974d9732ead1b919fa02e5422dc95dd726006427
-
SHA512
569f84c18ae3e618f5be5939224df43ff5c4cb7eb9d051230deb8cd4436976e255160c3d633804215f1e020dd2e15f94800337f23ae38d2fe95d7dde333aeba0
-
SSDEEP
1536:nm436ASWms3ASWmsmASWmsVf7ASWmskASWmsJkASWmsfASWms0ASWms7ASWmsVAk:m434fZGSui0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000174acd4e69dd7aa3c95e0b803ab9c0709d02b7a71eedf259568baddba0afb840000000000e8000000002000020000000fa15dbec316380602bc41cfcf53240bb4818dd1465b781de884e60f7cd34784790000000a7422112e3cdedb1d4f12a8e4a56a614ab6f23f4836b5f35ff76173a84b9e8d6f36fdfeac4c3865bfdafed505cb291b4acf8b8d38daa6a2ddfd97006034aaa09835cfd094cbbb0bd6264ba364480a7e24514f3f6f288d4b8df037c1395a789f6c2de352700b27035af8e9addd4e370e4e82a49d96517caa1427700085740dd449c49b6137eb39142a1850c1c6071f3b04000000053d2893ef25f3d41f8cbe28db1b2b3c49dd73b21e9053962c8453353b6abd05127d4bd61bb1ffffe66947cc80a3b3a5c41e0c61b57401e011a9f97a3c886b478 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434953719" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000bbd03228c6ccfe0afcbaa306cfa6d134f65e583f1b26016ad2104cc8a7822898000000000e8000000002000020000000a0cf0041d3b267e5da9b798e22465441dc5c6e3210ca96d396bbe68c9eb1bb7120000000ed769000a777a14952dfa6f0c2874d41a9a9011cb04eb7ba5517dd8f16d73d21400000006bbb4ff502516dca7144163061c16c9e68a21396025ea887cf3535d62908a3c1a47d0db1d5ea866336d298d56dba54fa18bad1d48e6afb3a4d853ac74d1f91d6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4565DF21-8917-11EF-9107-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3032431e241ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 iexplore.exe 2960 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2144 2960 iexplore.exe 30 PID 2960 wrote to memory of 2144 2960 iexplore.exe 30 PID 2960 wrote to memory of 2144 2960 iexplore.exe 30 PID 2960 wrote to memory of 2144 2960 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3daa18ac4e6a9535dd8e01c7305e7c2a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca3c172238d5b8554de3d90f08f4cdf0
SHA1ba5fabcc213d5d2e3c9046377d6260f436bb37b3
SHA256fee2af93656354887a5bb6f1eaee136bf4d049fd2d9d5094dba90d1783f3470e
SHA512267e257de1e890e409c57aba875948aa408f916a92f3b02158a11b2c985271610c098bc24489c37b2cb419d9f43a3bc4ddfa73f5b300945747d6b4475c966b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec9e9d33717e51e0d08d838b0f6c1f4b
SHA10ad4d8e36a04f16274de6a282f34743dbbca1f7e
SHA25675d6e35e4867020c1f7fd188423f23b73320401d13257e44a0ce8feadfd19813
SHA512a0a338fbc4f745c9685c73f1a305a753d0f87fe9b860e5e69e693739c4a8fd6ab0983c3b82e7809093f32688a2d2a51657cf097db90a9704f786c867c734a6d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ebe76f187256c4c360104fa8fc36404
SHA11830a2305895703f672e55c64e208bc2a976df58
SHA2561b2515e6012233561c2d2f2df5390780b4ff101b29853f5dcbaa561ea5b293ea
SHA5128a23a0b173d18b68e51f47c3c8c7b30ad3be85b06a9d3e6b4daa32710ef522eeefd4348632303c3110d10b29389a33e61df52e3045c8a82d5c944abfeac6251e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9c77fb662e9994dcc68c8b67a81ea71
SHA1b90b06442e35028545f728b659b6f1aa0531f6f6
SHA256490a1dec44299e4cee8f23d7088579aed111695f49db86b04d7a5cda90d71cca
SHA512a2537a70864d30491ac1575d3508c95dbb49c7d28074d623bda4e52158ed967b064c41df55b739c8467f8670abe79d075ecf2bbbb2aa3f0a6071dc04f30ce99a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f75133b7592ee9b9f9ee310b0741c50
SHA119636b6552049986a4adf43070510a66b7aff36f
SHA256d60778413d9a52f3ef9a546144e220a3c5352608d6edcfb1922ec5793f985fbb
SHA51296ec749f3a1ea21c9ddd95d9122158ba0b1b5470762ebc3be81e5c05509bb64b5061b87078dd484cb3ab2447cd2a20fd5db1914d455935ff928e28762279a9be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5239d34d196af73a3d935f4056c6d4982
SHA1d4b09a057e20358882a03b0deeb3eb6cb1e07621
SHA2562de798ff67042101976013248ade3cce8e627ae7bd7f6614a139e5dd545f97ca
SHA5126c936cf418f1a00a74368f4fa6190013d2b31d720bf49d132a6b25c5913575eea07e8b135bd117109c603aea3c8877b1e33faa1c071cfd3c05299ef77176803a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567295ab9d14a912545feb7671e589608
SHA1348911992f5f58c70bc1fcc920c944a7aa9e733d
SHA2569a0d58dcb96b6d877bed77d233f8633e39868edbcc8584029968b69b81420c15
SHA512ce1b14dc1c26f2c394540a393e4165705a8dd0abeb03f3888a2f6d041ad779a5dbe301d3978189a87702b3a68fafb484b80d0485bf8b1c01e70c2dd715dc2e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19e39c6dc82a07d43aaa3ecfe81d091
SHA1d468eb63684ae166a1e8bef72ca1326d1d3013e4
SHA25624081edff5842cd010347c5a944c1cb58d53734d83d0bb9ba92925d5bb4b133b
SHA512aabf4c4ecedcdce3cb0f6aef54452d2e5690f82390250c321bcb9cf4028bca6c2f258eaf2b9c008d65fbd85eb75811744f4cbab01dcca97b278360615587e41e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8ef64bb6c9abcd5441b0a35d4b8a4bd
SHA129c91930eb98ad8b51a96591e04decc5a9a9c7e7
SHA25695976bbe925540edd008b3f195d9db38116a9d7e3492579e6d4bdb07b9b51041
SHA51218a509172bd548eb327a096c331521fb0afa182face4fc0c450f7b249e4d35d8d851705160079661060edcc15e71c734c1b53c00eda63b2b98efee8fcd6317fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab8d1beeb4f7aae35cf8e6aa7d4c0db
SHA16ad84fabb9b68085bc61ccf31bb4997da5ac4c9f
SHA256207b821421d88df2b8e92a08a837143d38fb8dfc227a4e40791d846bd81b6ff0
SHA512a97d16e2c3d87300bc8e3edb45eefa640b9369ecc80017cebcd42131ec1331306746cb37d9ddb0b5cd0ede0f458d43bf085a79d8c87b0301381f879fe541d70a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27b037b6de439fd98ae0f6792d65f1f
SHA1931e0ba6fd2ee88c0191f6fa8b4d4dfd5ba1d0f8
SHA256313dccc00454f653f27f4dc0ff0ee78a38e331b2685574206248fb37f9f41541
SHA512cceb9e0a5c5ee7e32894307704aa9be8a8aeac762fca388efa783034b916fe745181c1dc5dc9cc9f0570d4b14b0e405648f1c36bb6156b74af5e1779c1f9831d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ea2150d1c626587ae6a96fcd1383dcb
SHA19e24484499bc9b86e130ae2b4f3663efa0ba1bef
SHA256638a652a26edfc8975347656b9e7a873c84370eb1151c4ab7b38f4ab0da96830
SHA51237bb94d0ceec48eb91885905bc8ddca57d0da3b2e6efa697d53f322619b205f748b93238b6a1589746ab14630037543ad8a654cba96df3edeb8ecd6cac8bda50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53788815ceef1e99deeaf96763f41520e
SHA11004aa783cdfc69151a0af8ddc98c4b0a6a9b5eb
SHA25668e54f1c39988305e17d26c75dd75d8c1aeecf9c1400cb9691d3ebc2c86d7f5f
SHA512a2be96c9df76b7b74b24ae6d3a6a417bd5cd9bb4b30a2c607e8a7dfcce3d50e61c39f084a611fbe9338a6765707a1d1a92fe23c5126dec3056e29560200c9dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b20254f3a86198ba43c9fcaf32b748d4
SHA1eba31c5c6bc5f314247b646f676062892263d97f
SHA25631f8034f03152953fcf9a25fd8043a0d687d289966e0f2c93c0f2c86a63caece
SHA5125e3831243178ddff5d540e3cc2d2814b57a86b863c86caedac05104974605b3d881404162816d8e630b2ff3e95985e094d297c9a1f144b2a2702a36237fa4734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518effb330e7f947b65e6b44e9c30dd28
SHA198f03d424ebf139f6802d177b9398f6f44d88cc9
SHA2562168644e6b5e74ed3892c3ab6924638502af199b0289e03680ab1597cda0cf5b
SHA512de4f8fa259d7fb489222dcd3830e595da44e8360576606b4e72b39cc40589a3c2b93a47ba94db9a6a41d685284df36349291aee8f1d373d68a68acce0031ec33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d211cdb43c8986dafed63fc539f29fb7
SHA1181c980f4df2fbf9787385da7306c5836f62d1b5
SHA256dadba911848f84a379d8a464e331c8b5b26422dba496d10f75c716a76a79eaa7
SHA5128e5563ed8f4e6500a9e683388c6f3aed8e50926e32417ea63fe7019838f904c4e726e9d36c86e7dfd1783046d22a1b87eb955458d30aea9da4600d6c0510ed44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dce6b170fa14accf4e797b45d9d0847c
SHA1ea5dd828e6a9c98104ffadd0c11b720749da48d4
SHA2564ef866b37516cf29a6b134d7f92db3a089bb8b66903260e7b32387057f6141fe
SHA51282af43f88a5db5f58259a05b93d7370ac5bedab43389be312cdc4ac679c927072ddfd6cda53e887ca00654e343fb8f6b6c0f1b9ca773d5436c7fc2c11c3130c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d9e19c91c2ad4ac9c1a0a82c855bb42
SHA1da1a25a542602f849be2bafeab3d1c8f9980ea74
SHA25626fe07b3b0c715e8967bf025f3e81f779d633c18056d89b4b2e2ca0ecce14746
SHA512bd3024acfdfb07f10674d26c76a63a8b04a49c33f9786badee2827c723ff964df06f124103ad40a8fb3c6e11ba54d9998c63ab189bcdacc6e2977c79e5d7f4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae211c0d9acdab17c385bd7162720a36
SHA1d76da6f97e71d25a49223e78fb096ce160b33ae8
SHA256e2badad69d16f913b110697b60a1cf2ba5610044a618122eaeff3f9d5dca0f76
SHA51248e9fd72aed331544f27593ba0500d24a711c999c1b6e4b0c901db68a96498dfcdb9fbdcae4682caba09cf960b359d6d9ae9a32d43def30884ea24c2d5c5c866
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b