Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
75bba0a91f0ee550c3063560e57242c0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
75bba0a91f0ee550c3063560e57242c0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
75bba0a91f0ee550c3063560e57242c0_JaffaCakes118.html
-
Size
11KB
-
MD5
75bba0a91f0ee550c3063560e57242c0
-
SHA1
2def5ab5f3119d15cf7ff6369c31bfe2f6a9670e
-
SHA256
f492ae0b9dafa12f3e1c75fd7a25f0828ba092e4c5292cfcfa3eea7298de6e56
-
SHA512
8fe209d4b7eaa9aac3f6a971778e545f43b6f2039f83a136638a8177e5f62eadb3f55ee84bfa1e4f55ea9e5a222d9a79cfde08007b6c570225a6254c2e2ecad3
-
SSDEEP
192:csz7xvAYS/ISXMMMnfLCuowPmIm3PHb76f:c+vAY8ISYIHS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000004e20cd0a30f86de74403c4609e68d3b9ab2077bb8ddf344358d7e338526aca9b000000000e800000000200002000000056680a76d94c19afc0e2724030a30343d1c7d35e99fe4ab5b77e9d36218c196d200000001c4e97faeec81827be5dc8c338482e84693a05db8cfa49c9e09ec423864e824940000000298ca53a1dcd6d061cbcd18dea1a8ffca28c45d703d3f1c95d44771bd151285fe34f78279667c7b7e9a3f8c3cae1ce4b51cc32df865604a9ff0d7423129e7c11 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4676E101-4BF7-11EF-96E9-6E739D7B0BBB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00d821b04e0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428232956" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000004f354695919731d1fe137582e32ffc1721484e08b4201055bad9dd7825378243000000000e8000000002000020000000af9ba974dd55a4fa844d3383e94448c0c9c0c19e165969097eabeb7fb25df03190000000fb8c056b448884a484fa1b79d95684595a051b542cebc3e6c3ca3c18e57a63ffc70324a94761d29f95d984443fa90a424755897773e8a43bdcc9ea0a42962dbe13e72690e0f9e17f88851e00a3bc39e6147acb1d6928ff6060a32a74bef4ca171b845dd021e0b1b7ad5af0af37937fb38e522371298a07fdf1ff442fa4fdf7da02fb68eda20256488cf0dcfe9d9d836440000000c8f1d1374f5b99ae307b1b77a55f5d8c5d527786b147e8eed24f8988e498ae43fd2c9f330e650a23f80da3eac5612968a6999bbb2e925ab1387de460a52c290c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2920 2664 iexplore.exe 30 PID 2664 wrote to memory of 2920 2664 iexplore.exe 30 PID 2664 wrote to memory of 2920 2664 iexplore.exe 30 PID 2664 wrote to memory of 2920 2664 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75bba0a91f0ee550c3063560e57242c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7165387ba42694ec4576621128e3e96
SHA12cb4851e0650aa6c4b21622f5872f040cbce409f
SHA2567c4aadde7343a22af5455753d97aaa4f4f495b6b454fbf0f7a15864d640e3bfb
SHA512ae29818453dd9b24949d7016b7698dd505611894f19841433c62982e2b2c14ba63ef14734270ee53d3f4ba0bd87e63bb40fa9f4d40aa46a08b779606030103ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef9ff4d9f2264509d9ec6c87ac7b3d1f
SHA16dbdf9bfd706ec7a18ca604b1b3c8eb215accf1a
SHA256c71dbcbbb0446c2b664b361c9538936e6f055641d8938cda1dc39752c6b8891d
SHA51256b122b53a89be9a985f5648e5891b8b4a0910b3ef15e2a4a34cb6394c5596007309787aa6b8a77547936c5894ef28a0ad31d509d8a849d7d049240fd6e2b6de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546ea97dbaba7db6ba2ae3a877d14e9b8
SHA118ae380173d82d448dd586a9cd3a933c4718fb49
SHA25619eac8f4154596fc62b090d0ae81eea2e9438c3a6dfb4198a08d7ab25cf56e57
SHA5123b782b4b1af2347a01deb8eaae4d877be8006fdb4b7c2ac90abece574ea519d9b1881f9b2e24cc21b6d8108260594d7e7ad667e7e912e04fa641232a81c2467b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585ff2a1f05833aa0ad94f575b8faa936
SHA136411f13b4c36501833bf3e9c90e86b3131da6d0
SHA256af662b041778a27128892daaabdf5a1cb33242e35b119499d3a4d05d3b43be5d
SHA5125eba228a3f0f48e2ad9c4c0a84fe8f7607d12cac7fd896ef0a8815d7b4bdc0cee1d5289df7a3fb3e4b59f3d8d4447c0d2f149aa4faefd84266c0a23374c0f01e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a02de739d0c6675bd93c30a30459b771
SHA1aabf578b56ad1a0d512aabd05d87c5db5226212b
SHA256c88780bcebd1d525d8796dc9f64f2ff9bd394c94e89e7dfbab90fb9588aab235
SHA512070e9a6ef7ac8b39d9faae6c81c129958ea64eba208a65fb48ebe7862079bbd12aa7d23e992626246aa45de00605a2ef1e59625a1f05d7425ffc994c48bf61da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e891157cb210d161e01efb9f5a1d73d3
SHA1f539d1cc3d18a89411e675981a421f59399de990
SHA25685cf2b359933163b63c5adcffe95cbab708edbccd49544ff5725baabd5700fd8
SHA5129d578a8216e0a386d51de19d447d39bd4d0b222446f277751777dda63e12ce577f9e3ba79421f5811e626964434bc504707d987e40a24b5bd25a9ff7a9803ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a434cc1884b8f52ad15d0223a685247d
SHA1dc1c9a1c6e0ddc1c74e89059919eaefd2851bd42
SHA256356cc6607331f2971282345127df74919d89126da83f2d67ffadea9f58c05593
SHA51262d3f471c80200e7aa14ffaa632c302ccb63dd055d5f849b6c3d58b2fad9ad37de668438fe127da2947c64bde02c1c7ab89a0140330a5a3749b9b7bdb2b51cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d3d588a8286a55a51a2d28d77204aab
SHA17575a16fc3056f2304b7d718b49d6945ad67b70c
SHA256fda2d68de7ff69fd34bb42aaf6861491a5bb5d3fd437e41c7ca91fd50a1dd2a2
SHA512af2aabffa2d4907ad5f290c350ed8db19694e121abdae132b758aa71101ac80f58bdd4051d065d45ddd019761498e2598e1a306cccfef466678eeb1f701b60e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51974281bdf2c8a41dd9555be2fb0f252
SHA166aca32c602a7a4483ec9f9ab5615495a3687cac
SHA256df0812faf92226144382276d8b40d4fa93b88722bfc4a6695bd8e12840ea37e2
SHA5121c97c53c7fb456c715c3d3ee31b44578bbc8daa758f0cc9672697156032cd739d9787ea25de9b496b1ef275716c540cf0377fc214c2ecbaba7d86674a7af6bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522548a28f302ec1ffa94e4b287b4e379
SHA1ae6f4efc5ea9ba426e8ada5323b6336082d8afb3
SHA2567c2fe06d014dcf40337cba9e78c20456aecb9532d6bf9a42f7b5dfddd2b5ab5e
SHA512f35c3a30fc4e9ae96662716da6a3fe186ddc563d5122ef1e6196193f5c95b47a99981e583713a5186d49398d13db6e5234b9a84203a6b90dfffaf987a0b28464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55666baa33ccdf26d3243e9c251916b05
SHA11fab20071076d057d9e7206c9ea601f44124f581
SHA256550b0b8a53b54ba0c51763f3c9a4d2de6834a7b9dd155be9e5e8ff694272705c
SHA5129646ab272f9fa2281b9907ba9d8e0f0cd6386beb891382ca97367402d7e2279322355140c4955ad3adddebf02ee21144f09802f3d4c74e50a5923ec5fb070da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3ebff0e297a5a6a82043aba5b632d0e
SHA1f94df00e133dffa6454cb478f2f7ffe3668f8ef3
SHA256b2128b680d2e98e34cf5ee48752d8e7a684f42de97b397c88ea82ad617052e40
SHA512a112400ddaa263416da3cbdbfcdb1a029b707e378783f42835519e379501aa41386678c9e4ca13b51f36d3529e30a46eb0b1a1e587ed4fbd537995cc4164e8b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53442d5846ee02a4b8a5e8c95df131ab0
SHA14b17bea1dbb93413109ff0b9652610c8d8cdb86a
SHA256c69d755bfcd87110099c6bb753f88ca1172e5ea8c5ca827c3031dabfd1d7648f
SHA51207ecd06e23116c23b0d6512b20f2921ccf9695345f122e85270e3b14fedd250f96fe4cab1f1933454d0d39755bc50e8f7b69284db385e73007529351e47864e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c4efa79948943c881c040e4f778222b
SHA199cd9bc4c6994c331ae05dbaa5ba8149668d6e74
SHA256fe83684146e1057fc435076d225b9eadd879dcaaf3e56963450353cc5675412a
SHA512f36f65b1b20d10a6f7a1a6f5b4ed722f45f28c67218723dc74f5d0c00dbdbfe851138cd884953c96d2855b11d803095b0782b1fbd4b93b932da2d64025ae4439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f699cddfd009433883614a9cc6a0ea15
SHA18346a112445ace194483a12e09532514a4d28672
SHA25674ac81be20a6d745d7a6d27a35d76bce98576fe46051f608f4c2e6fce75d69f7
SHA5127bc6cd6fc79dc4fa4fcf0a0c9fed5f4a69d636e6ddcb3d1b551a7992da7b3fe6886f670f293f650214f461fbf27068d22e05857d2938e4d8f68414801f28ed94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b21037cbf959739b0db5e3e76dfd545
SHA1ed49bb31b418f2a2b6d8a0f44c8adf4ad2438a29
SHA256c59f124e0b808453631d05a81d168121ed890bf4d1f1516f8b1b746a911be0f5
SHA5129cea15e09a97472a85e758c8665a7c4d0d9dff0b5347c70a0fadbc64c4a26b5d24f39d72635cd0d4e586c03f4e5995452abbf68ebeb9e33b86df8d9874575629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5164e7d7072de2abc20ca7f70df9a77a3
SHA17a958c99fe7b8cb0ffd56f6ec0c98afd70c8ea7c
SHA256724680382a94f5807f4402036eed7d9acfded2582f776e4abbaf3c1a9fa17246
SHA5124d2bdbd4b5be57fa9fe2dd61c81f36ebd4e618b05b6f319b24f376ae88d6f3c8120ec6f09e0c3cf74d34780fc8add9310402e11aec886dfeaf03f254355a6b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c0f9c1825b1b1c5140a77905ab7ce98
SHA17a2fac08538a8bb5348089e5846eb04844317585
SHA256bc481af8f1ac5029b684442fbe2a50f1b2399b33d91b2eb46bba14af856ff827
SHA512cf767af5bc628cd7e43507f3108f6b9d30ec07986a9dd15936c24d4fee66c7dc046f2c300e8c70d9fa70f88a18766bbc36ce18b3c92a731232bbcde2eb20d852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efd7f163625e1b10fb325b3f06a69a53
SHA1a527ef50d61e4ee08c0fbc6a01875bc20f890d57
SHA256960dd5f549366d4050eaa46b68d4d8d12e1e62ca4aff0358c668d766b490f957
SHA5125d3c6463a421c2bac81b4405ea42cb042d4baff11eebc778b7b709be98f21ab3a7c35b14e9f3985a7891e70677a387f7f4d3670ead7555d18837cda560ceecd9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b