Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 05:52
Static task
static1
Behavioral task
behavioral1
Sample
3e292abc3aa80514fdcc8bdfa294e47e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e292abc3aa80514fdcc8bdfa294e47e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3e292abc3aa80514fdcc8bdfa294e47e_JaffaCakes118.html
-
Size
6KB
-
MD5
3e292abc3aa80514fdcc8bdfa294e47e
-
SHA1
86367dc0a540a0911ae1ed09d13919f974a191e9
-
SHA256
7622da7323fd67bbfe3dd99462170b7e2d5b6666512e5afe6d29832f9186f354
-
SHA512
905250b4c7368c2388eb8f2d7f09d781cc76208e1a55e25ebd3fc88276dace316b77b0f265ba8906430eb9201035cbd86a8eb1cde12291b225829541ecb2f2c9
-
SSDEEP
96:uzVs+ux7XjLLY1k9o84d12ef7CSTUkZcEZ7ru7f:csz7XjAYS/Xb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F8C6EA1-8927-11EF-9DE0-EE9D5ADBD8E3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000a37d0a0493b5f0d28515fbfa087162403a456c4a94c6c2629218909648e0028b000000000e8000000002000020000000478e32d1e3b03d96687e735f8844d13722344387b877d62d0a56b317e0d3062820000000649f22231f0bcb64f75d19df8fcc2f7e2c10f6876592e9e27ed22001b09f2f4240000000df9dd92a674e410c474f00b32bc47f7b64d93b5ee35125a9755f2785e15fc75369d5dc1bb4e25281a7c782e60eefde36d4e4e2ea29b979913175f41fdfc91108 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102e0e26341ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434960611" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000000054279c1e71169a6a43f44c4c11f295317cda33f2a6775e1580d8e04d1885f0000000000e800000000200002000000042b91a276aad8898dcfc8b9c81c00d3d1093e03ecae8c8c119c8c7b4058e01e29000000048c03c96ebf91d542a4a33824886a618306ecc9a566ccc7fe1ae0a29152106189ffb6accd30be39cd7d5585d698641529ec33beea72d158858b8396c3ad895965b055b8c3b2d4d4b97a6fc95f97a6bf188238dcc2c6b880aab894e5f765e685ecf7b18462d5a9b2e09708c8b4e9f74194331d7a456a5119cfc9f6ceadf2b99f4632dbcf19c34ad2b8678ba5c53bb542d400000002ee0992bba8256f5c4560c996106f8ed320be388b3d30ff1c9ded23a48dcef15f41c121c2409f39e881538ddf27db9d103d18c7506c9115ab22da3eb580bc723 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2292 2356 iexplore.exe 30 PID 2356 wrote to memory of 2292 2356 iexplore.exe 30 PID 2356 wrote to memory of 2292 2356 iexplore.exe 30 PID 2356 wrote to memory of 2292 2356 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e292abc3aa80514fdcc8bdfa294e47e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bc0c42d7188a54023eb86c79b9bcca5
SHA15b162431fc7dae75e8d0d7cdc09f10ab4a45eb1d
SHA2560d36540b72d2384a4747b478e376749900475e65da440179233c177b8b0d5696
SHA512a2425a6bc0592d9319b4b4b5e4daa7024a8f958f3328f807306c0ce9727113086a15857236afbf853104ac67392d15f549dbebca93084f866d4f039073a6504f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e101b7422aaf12a6cb06106d0f15c7ea
SHA16eca100d936687b8dfbf72a4a00f0b20ef0c14d0
SHA256b287eaac9a23f68dfc3d5a32bff21ea8a270d7742c8cfc8768e4fd0b7dd91d52
SHA5120768e64b0d0273cecff499fe63869e393abe01d3786164bb46bda37feb469e4459d72891ebf2f1776e81ab7c6e67d1afff866487d450034f156f71476e4c3d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b24eef9f0276206bac9a895362c428fd
SHA1725e871bdb1a889be2cadcb7d9491db589dbbc54
SHA25669b462e07c50d52fd8336342770075ea9ba9ff0212d98ffed49182e2e5c86789
SHA512c7183d6d601df2f5876db73288d705a712fbecd19886731427a23685d4a855d18fd628ce695262f4a31feccc01c0d5a1db514857214eb9ba96b5b4a630f7dc3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5363466b85e5f2c68838033c5cae451a9
SHA1e488c0c5a6bb126b8ba1f6f20368d4589ef6e78d
SHA2563d7467364093611aced91d7945a3338e9e9a16f9543d37ede43bff21039c023d
SHA512a456200a0cc3a9f4c80a1380a98f2ac7c5ac40636a34ad9736c179c02857d2ac1d57ec27aa83103b164fa953b32b5f499acb30c8c229254091947a0d98259da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d70ac261c1940f47dd4af3c8a087e239
SHA1d87ceb2632e86c3f88c7bd694b16c826900db7ac
SHA25682ba67f10725a85192fef80c0cf742f04a7e2200a8635b79f2ac2e19a22e9b34
SHA512d991fb9e5c061597d9eea9d6d33ab711e6f76fb6fcd5f93e025854d97d5b752ff8bb94ffb682afdb142fb9dffe0ce5af7f958fcff6281511685e1eeb472d659f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576242cc91169cd4246f263215c36ad65
SHA12327a337a97eb3c3b5d74697df24c0f8fe45c508
SHA256d2a667a27a19eb7a752e92379557666f1d8c611ba8ce899c477afb77da791c67
SHA5120477a74059b9bbeb0160baf80d0076216cf210f4b9b300c9c4acd821d4bc7e40dc12d1413624a3ed63f3d762fef8846f8058b8787303ce107ec0b3189b84883f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e89342e3815dd0a90268e5fd28ff1c15
SHA14ad01c99fabf3f9843cc0a79da85e0510b2eabb5
SHA2565930689e4fae39a8c4c2d6fda88bbc2e84d43f54a0373ef111d870d696941a29
SHA512b51841ac8a862232df00e797df6cd46a1b12866a1ef97b65439368a21b34577edd45950d1f6613e31b0d09f1397f51d171b7468ba23fed67e4c0d14ac949746c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa7250316416ac526f86c19da13da890
SHA13332c1e29fc604433faaa9087622c86c7ce4c6fd
SHA2568723f5060b9070a50c77337084a51ce4ac83997afbf3a86f1b446d67b3c2ee42
SHA512b3ce420e0a32ad8fadd671316e5e7947217bef89607f1253978cc6077d1521eaef9e0a0fe6e466a88ea15fa551786a33a94a10bc168f177acea169dedc20f629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521e38c4b413e2a3806203df9f38a5a73
SHA17417c7f4ca6038fb4b6f802ddccb86246cd5b8ed
SHA256da7ca193ba61df99e6c5d7e1ab16c3a067b717614259b818e17aef9d418df53e
SHA51263b68f092c427ea7349c234db34d801fbb2a2f9ef1fa82f11680fae8e1c5cd5272a54baf36214bf91a66f01042524ebad3fcaf1c6e1a99f75694d76ed15754da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad272f65a3d4da0cc8e5665cf0eed5f1
SHA17a12865fdc35de1ef7e5dd0c8e9de795a4a4c391
SHA2569bdfe9a7a3f3359a5c3794f50a98785a5b39bfce7374697376f7af3a3f87e7be
SHA512e0c9d2ecb2637bc99c854216c404a4862e2bf042625e771ff5c36aa28c5a426a37a71213f88513642656d7508b622be4874645d8eed29d3f3bb0807eb99c2e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5087e7a6b3a2f1cabe5cc3879a4ef45eb
SHA1700c6fd12d4749a436ccfb3a05d45ee70607cfa7
SHA2560d4e824b63181a0d21bea739873f1dfa339ed97190474e3dcfa87c213ea2a433
SHA5127b062f264d46bd8d6a57d904576b3e0829dc28f1f6cefc28f8a850e8b1cf51f3d8ec3831202479c9787959a9661d2c734ab09b6838ab2ec8fcbfff1500104e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53949b6ab583b98ccfc7145b150f6398c
SHA147dc69aa02e209983c091898edbf92daabb1eceb
SHA25621c697813a5bb687f21f0be82fad70a63d981f35bec3f9b08f5f1914b4c2e27b
SHA512cb28770d4b9ab387e8a9238111bd7166d1a901085ad43727f4ef86437e4a38d0da6b78c5137ed76d712aa6b5fd30fdb2b20bf02c4242206d6e2aac01b6ee8095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54404d928782005ee7e792fa3e6142bd8
SHA1ceecb2212eae28eb2027de65db76db350f662795
SHA256f0cb4cc3a6e774bf9b8210a8d3498f76d5625d174a4e254b5a921c2758d3c655
SHA512ee1a1d98db8fb174987d973b4f9224d0dc49e15e6ff97061a864ab938094fe480a62e89f47468d6dc2dc4066e19300c6ffe20d5ef7eb632cf9274650361e961d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe71d8d1d4ee97f755eb4ef462eace43
SHA190bcad2d82138d94856d10fdc454e19d15afc7c5
SHA256b8e9ce487ee070c9295d63e1f5d485e56d248677dd35e8a8236609dcf6b9cf38
SHA512086b440aed8317744800ec5cdff206cc1cb583948226d6d79bc3c834c1a95c89309dcd316c9d902778abacdbf0bd06b8f5db55d4ad768f9f543d3dae10adf377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58611508a1ee433917606b50112fad6de
SHA13c9f14cc8dde3078020174b62b3d8cb74c3808df
SHA256e076869f0b7725ebce89d75a52ff008eef1ac750caf833ff58fe24a0609abf81
SHA51282d60fe8c4c1a6e3afa9f098326f84e1de6ce87385c71c0aec9cc03a8c2ec9c9bc35a10d55a52f0eea7441d6a92a4acd4bcfe8e9e4c46dbe4c733c9012678539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5526484eba42616c58131c5a93323bc3d
SHA1a6a35fb6eb3b1ee6ef9228d5210f481790c1b2b7
SHA256e06eb730a9b427530f6feedc2076f6a80990eb32e076e9dd36899620fff0e154
SHA5124ceb2e50da8323397f03a9bb827e7467404f770a4640242cf361f59e48c9c82c73e093b63324f0da9a8b9634fe8d7e1d813b4d92ecf1669a81598ede989bef6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5c1ffac20cff70e50ce5ef33652fca5
SHA14ee1dbd03c8794cbb9f25645dae8771fa2c21f34
SHA256ddbd903f1d9354f2a5b49eefd650eef27e721e353bd0f121a586943e9b3190db
SHA51256619d64f2bca413f6e6a6f9c30de60d457fcd29886e7a166f04c4be931bfbb4f634f86df779067b8225c493ec9aeabcc491025294f6b61a71042fb3317cb6c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879d3c05d6a770fb5bc8567c9bc76865
SHA16416d6e98b2532a71da58262c09e14fc6537bbb0
SHA2569414b178f811bfd88ceffe288f046e83d3382849f60751111fc9c568dbad592d
SHA512b33ffb869c1a57d9e5efb8fe9d2ba36aaa77f9bb55e43c74744ce8ce5c0e4bdeba5aee662bfb46f7d1c21f207b1da1671064c5c55cd418b3657a4a79d6f90756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571d9646af4c115275eb4b332995892c3
SHA19ea3e8f9e42bcefdcc0b2c85b9116dd6c5922515
SHA2565b16ccc14e750c76761b9764f23609599ca68dcc5fe2ae1b3ade50a2198f1899
SHA5123f229c338bb8c73f6521ec111fe85f544aa76b70654e04176fc676253a9c107e84a7902c6b9589ef7012af1f874a0b024012e3b4a154ec5bfdd06e33bede6d0e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b