Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
d416416827854887d8fc5af5e1698af3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d416416827854887d8fc5af5e1698af3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d416416827854887d8fc5af5e1698af3_JaffaCakes118.html
-
Size
39KB
-
MD5
d416416827854887d8fc5af5e1698af3
-
SHA1
bfd214c30df26a6b059ce79474cca12ccf30dccb
-
SHA256
be4d3ef5fbd21d3078327133f344f043053782a85b79900ac3ff3a9fc133a010
-
SHA512
e341afd92d4966caf5a0bfd1d2621dce2d8b3c9fb6e5e9530f0306841d13a43da0712349bf833b28779c7ef2beab012a9b3a2ab10470c97ae383def081d2e83b
-
SSDEEP
192:uwXgb5nJenQjxn5Q/xnQiecNnjnQOkEntnnnQTbnxnQmSixKzIhr9sMXtSiggWvf:iQ/qNx4MrcuJw/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38158561-6DC8-11EF-93A0-E2BC28E7E786} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431951086" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e09ecd0ed501db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000082390ff8ad21c8453a92711caa3932546cbb0e5b78631f203cd66d97604bf865000000000e80000000020000200000006387a946fe22a899fc487ef4de4e70bace49487de378f56f835702483736074f20000000f13616b48d13cfd27242e48dd28726b3554c314677798bf81275303d201ee34240000000ddf70c5191590c904bbce0ab252e245263a3b6f7c4bd6150e7c82e7c086ccd6abec3337bb38f2612a9963cbf052fdefebc2ffc9a03267a4443406f7aabbd9bd6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2492 2956 iexplore.exe 31 PID 2956 wrote to memory of 2492 2956 iexplore.exe 31 PID 2956 wrote to memory of 2492 2956 iexplore.exe 31 PID 2956 wrote to memory of 2492 2956 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d416416827854887d8fc5af5e1698af3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aa35876cc74b7469e5323e276a4954a
SHA19c466d1b80fb1c33c1eeb90e9f9c4fa2596fd0fc
SHA2562cb5efbfd149ea8ec252208a7fc2623ce035732b017c30697a1f3374179206d8
SHA51222956177f4353765a52e3ebe38cd9356efef7b4383262f8db8a1bed0eeb84a114a9056e00bfaf6058cb4ff5b58cd563aad25b447c608c347abaf500036f017bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527e4f92017c7268a39dfd7316e2f5ea3
SHA1943d5259c32ed821c391049d144e4ae32a3d14ba
SHA256e1bc9a93ce5178f894247aa33eb463eee680dd9df4731963750cdbc8a45a54e7
SHA512350347355a1325c0765a8e0def1f43728f5efcf78ff0b64273cba7d387c93ee1d83c0664c3ffbc0d96066d8923125e3b6b5d17b64e908be75b91c04627c0bed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e10d207471681ec639c2bfc1247a29e4
SHA11a5cfd48165d3d3a4fd5db93a9681f282c85719a
SHA256ea8a28b32f0a863a6262477d72de0aab869642a3ed2a93b9c30cb71d482c8bf6
SHA512f8f10d14b43a805ab1fba8337127a468a21af1f8f666db760765721b31e199c54423044a7948551c8283eb879f9d62f99956d7b44c73b3d5dc5f562ea096a299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aa77f2f06f9f2edda3a22007f1c4a4b
SHA1a75f484c5e6b22f953b76c28e66610a4b5154ea2
SHA256b5bf5dfdf6c04a3b478e4bcf87c6b15e7d4b3de39fa5bfcbace0dde48164d823
SHA512b91c876642f76fecf61c38211ee85319ea92510897ec363e395d35e0e300a58da58e7ff26b027b127094ee2722bc532fd1ee1ae12476d38a0d5383cccc79eb32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c0c9993501a3644d149c1b618bb433b
SHA1e0593e69bf341adcdb7e379680a100d0976889c9
SHA25635f7124a02a0a75363f29f1de02e1561685dde59356002f0b9485d22e7448ca7
SHA512160dd223bbfdafa8e6ec4fcb8dbc4797826f29d669584c7b396b265c822b7b8525b969710cd83767d4e8bb8fcac5128d326c91de58d63ce9fec9f5ef67333b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de1ea99d93eeba7e0a95554c70a67ae
SHA15e71eddd070c88bb8cef3fd3c76448a819372572
SHA2561b8028a1d62b9abef461b7279b6e5d038f8a8a6bb5266320ac5d6fbd87eabf91
SHA51286863b56973e5cfc895ad226538e642da568e582cb1c139b08334b507f7c6f7ee3cd15dd236448739b4eb1ec4fec0a9868bdd258d4998cf16a72abb859e551f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532f85971d9ecce3aceef5a0835b8ff9c
SHA1bc59f17217b737294dfec28ccd30e616405fa2e2
SHA2562d732ab4ab1f110afe18186c0a538e05c42c1d34677c64a9a7d2187a3d6bdf24
SHA51280050d7579cade0a0a78e8a353f91bda65f4171e61228bdbc8847ad3368573bb68b76ad9cc761b79084e9f20d1bcc5564e67fee0655ed8cc176aa6309373ad63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caaaff11892fbb46869c69828ef95276
SHA1c5412201129be3dbb8e6448e3338f98b3b21af2a
SHA2566de1bc17249ba9551255f1acd26c8540f47ad30234f2538694927999b38d1e6f
SHA5120ccc43d263918940e7a4226fe953c13633f47d850d02a9a47d89d0c85c7330a96e70491caa844c684bcd276ff9c08703ad7236000591eb4da457ab0b16e9d487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f73f59699abcc4c6bd308b1aef90693
SHA13c903d1c1b949d8f55dbaad47e51c48f7f208967
SHA256705ab06c5bce1a167d1f6970bd41ffd3d6c16665d8b4c370f62b5d8b7694601d
SHA5129e6e77b33d8e3054af140addc746166da6bcef62f29a4cde053192f6e94553338d1c748b4476baff4f7bf9ff88a003e3f97c136193f0bbabfce96c2d21162b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5811230758fb8a9cc419a8fc7bce0eb71
SHA130c069d05d52c75c67fc812b976fb47adf76f8d3
SHA256ce27016adc0ebb74559af2fa33a39dec680782a7f16101195fe729763a904f31
SHA512ca9447c9f1d8b22c8f9051d634e201d50eaa2d2f4dbf20680b83cd634be0561f8faae3d456235d54a975391665ab53df60f20fd1a1d3d35ed8f8b9b80ab8496e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0977c102b81e1eeed701e1cff90f028
SHA1dc643addcd18bd99f1c261e6f165a619ba98ea1d
SHA256f0da03a8e2b1f16f6a558b036e2cc124d3e44bef7f198f7dd74465f36cdcfada
SHA512aa20a892083f9afeb1d1b4f05af8a218e38491efe9e19a5dabe9c9b6108e91ea32ffaffcd9936f28bc871a90084b31096d9b23a765c4e30568384e7c2964ea7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f2d0e44c00cca7a8a18a75c007559a8
SHA17053355b2e8c33c233ebd097699d0615155c6dc4
SHA2562498cee751f4e19dc8efcb24a8368a18be76b94eaa18ce191d46d93c62711bf4
SHA512ae78cc74c8d8c81a98de664745605e59e9a7ee47187a6ace1547a32812d4987cc12cb08f653f5d912545bae4adc5c086088d16b9152addb0caa973baaa91cd3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c1bcec8c936dc9fe848dd1c4f0cb15e
SHA1f74527b8e14a5b9d61f5b5495d4d86607602cbcf
SHA256a0fe9ad0ef8ac3690acbe16fca9c4a19dbbc0695b0c8b3614abf0438dd246f0a
SHA512e3a0403cdf45edfd0897d33b8e3219f0dd7ba8d7fb784f49548ddbfdd6a41b5827360dfb7b5e05f55ccc51def0051efba1108af5ed68cac4449f01baa134127d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52163e994be479c0ea9b8cb5b16e80ee5
SHA1a8f8dd7d6c229a04147bd5f83fbe67b7c94dca70
SHA2564aaefb33894bba6ee7955c108d1055e0433e57a435c452aad946a880f7de52a6
SHA512891bf4839359fc2ec031bbb4c7ba269f4995f1e2d685cadb9f80b0379f57a958bc44e37b9a99e893c083f71139f3feeac0c1755889230d58914c4178900d620f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae6e1c1e8b1c556aa70f995148f0042e
SHA1350167480d36d9e35783bd3bfd19465e22359b28
SHA25609c757ac43642f50029844ace7fe4bddd38687a63dff49a837a4358c64c525ea
SHA512a36f20b0c4b9506853eacc1a741b1905be8ef4492a6a4cfa2a0b094819be914a1d636d5262f6752c55ca754f74430f1e77f6001acb5b874a90eee9136666455d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be9e1941d9e0116910b9e72774474205
SHA171e686189d6dec3368c219ed28c059b731ec6693
SHA256fdc52e3794ba5c5a12e8bc623ec15d66cf680df6bb3f2b4852a593e2f6ec1aba
SHA51230ea09f8dde8f970638d68a36de36807fb53fbf27148dcd1d1aa6306a88780335e345dc450b77cd817c5ea57e5b3ea68d627e52c24bf340ee629c748d86a8156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c30585dbe2a11b3b25c2ae4aaa0a56ed
SHA11b30d8ad3845e65d49c41472ec3b6f61c9bd5f1c
SHA25622059c5971b8f69c0b8580deb9e0c79ed6bac72c90fa9b633f0b21b51f84c166
SHA5122135a3221284f0ac9bca1c026a02dfbbe958c81894393f0dc13000573afd783a4af98bb3f2d6f3f457791d17035439f9f7245464f2b78a451e0185755f7cbd19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ccdb169c203bdfc0bdc233b39631192
SHA1a9019bf78b4139f9bf5949403ac7f345230b6737
SHA2565c4bf989c8519686a0d7d6cb7f6b1de8d9f8b840fb23e3e6e94752bbb065eb2b
SHA5121cdd27134657a0b27ecd46d4cfa561e0c6d62847a2de1b8002c373dad896304f0f6b97ecae720b5399ca05b876418e7e3d7859b962cb1771a5defbebaedc38c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b9745999e549fe86bc05c0ecbdb46a
SHA1d10223e6bcba9737e92acb8a08a5ec884df3801d
SHA25651748d85231b40066b4f9b5f1f2aee2bbd31d7f2a86274ef7b833281918c46cd
SHA512f017b4cb75b03d4c8926f9d0f7a699427b6f392f31e594000e16ab346f7fbd66092de4eb99fa75aa84ae87418a2de0b16bbe041ed1645712ac7c004d3c94126d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b