Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
f07324b6f47c0bb09ef6e8944625f577_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f07324b6f47c0bb09ef6e8944625f577_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f07324b6f47c0bb09ef6e8944625f577_JaffaCakes118.html
-
Size
27KB
-
MD5
f07324b6f47c0bb09ef6e8944625f577
-
SHA1
1cf08248e09f4276dc83bd1492b5919d13f788af
-
SHA256
0713da270a6f93bb03e99eff8b193c9ce0fc8d681fbcd564dab976774c22df61
-
SHA512
a4ac898e92a8416d9d1f46bc40a4e0b35d38535e404bc8053a1a1d600d5534b750d03c926b65fe496bf1cadc6d914c47684a83afdf8a3cab59f0f55b43beb8ea
-
SSDEEP
192:tQl7vFZ7v/xlZ9TsVi7NaNeReVfDrjWfJQhyTWfsbbHpxWfYgE7P/WfSJ/hxWfzc:tefV9l1e1rJyl7pt1/h43bn3FM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50142297580cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000008dd86c32360c98ebfd9ab58f76519656f8ff8771e1a4fddf4b60dee16c9bbc2e000000000e800000000200002000000038ada3b62a7a35fb1de0053b315e0d6818866d0fb1677ff53e1ddf9dd497ecd2900000004f7f98fa33876bac00297be31cffd80b5089488bf4c6b9e6bfbaae0adf0b31900845737b7eb7797fcf6b9f9d745a6776e7e87cf0dbb329be9d433587c0647d95016bff30a7956359e162a67d60a93ffcf16fa720be229ddc3dbe232ef56aea32e32a8203cf3558cecbb4a2466f155c4ce5f006563dab91088211d612f58b4ec9a6a6ff9a53f53f45af66d68a32bb443e400000009cea412f0c78458b9d5f901bc7faad80ef7c0f18ac31e0f8a7940193990fe3894f0b27720ecf5505ba4ba54652b66e0891cee84e10e9d1d6502f51ecd71206c3 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000063a6fe4b292d68c05057b5c1f9949a625200a75c523a73451e50b3a418e09df8000000000e80000000020000200000000468254bc7099e047ef6b9c8642fdbccadc8af18f617eca1e0127315310ac8ab2000000017ed33f2ae125e674c0dd5b9e6000162ca2d93366d54d8178da2896358ab6f72400000007f1cea6fd6bc7bc9548c2f0417f8ca99ad33401668ba23ef7624ea7a4e55390dfd24b4c2184ff3b74a76e693f70b11ca695b908713a5aa0dec61c89418fd180c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433107093" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C28E0B81-784B-11EF-9BF6-6AE4CEDF004B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1676 iexplore.exe 1676 iexplore.exe 1056 IEXPLORE.EXE 1056 IEXPLORE.EXE 1056 IEXPLORE.EXE 1056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1676 wrote to memory of 1056 1676 iexplore.exe 30 PID 1676 wrote to memory of 1056 1676 iexplore.exe 30 PID 1676 wrote to memory of 1056 1676 iexplore.exe 30 PID 1676 wrote to memory of 1056 1676 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f07324b6f47c0bb09ef6e8944625f577_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1676 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b87890f8e425032e1ddefd726e809eda
SHA1816bd9177edaa633f610e083919bf6e3a4e0e088
SHA256e51f3013ba5d20c39310bd425bd580afb8ad9b979236d68d152ccde6011b9840
SHA512724dcc20d320522f9a75a305de82c346b7b60f27399ce289700e9a66297596ffe9bc820d910fe8324cc0427cfa396065a5b7344c62780436bfe34c52137f309c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faaa12d421dc751403cbffb3704c3a79
SHA1d60371f95934bac199d9d14b746e2c014d7a8ab3
SHA256b3e674f87faaa0d426cec1917677929ffd2836a2bcd3d45e4ba2120a51a5ee58
SHA5129b98d7ab7f62d3d15b2a650c3dae91e740ee396ff3c802d3a6ce89606bbf78732ce839101fbe0fd2f4513c2a7c18adc40cd1ad661a2a4be19777e8bff855a3c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52805bbedb0c24f7b20f484420be19e46
SHA13193f707b67352a255556dd9d545321c79dae7f6
SHA256399ce4ef4643e8fb506938a118b68592ba72dca3201f109b25151067ef414b1c
SHA512dd5de04ce03d616102e9609fbf6fb2ba7b2c8682810ce6d6619c107a076ea3d3dae332ecbd37f47585045f6b739d3d7bd60192d0ae0b05281880967a7107e0f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aab67cbf3e853359cfbd0f439ca2bf3a
SHA1497575d7bd59c49ce8d505ef6b077a33050ca0c6
SHA256d429ed687f13f128f869f9b27461235faf298128b1074b8cb8be560562211059
SHA512c004992c810e4d2fa50603e74ead4a232ecc818846c056236c9f04d052b25085dc82f6c251bbc16161be1740a0a8f787272a24ad727234cc5d92cdd1bae0a108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fec081f50a7b780141767c59b57c659
SHA1c2b2aaea29465b40268f27e1fc4d2d0598fce669
SHA256d90b9086d68753d278b9b7fa9583831b8b26efad542f897fbc64672db0ae6d8d
SHA512feeecef2d96ee9330e0cf8503e6f75a9ede602226ad5d619873b287d88aa727e3a58e17bd4d896e0501cb176e2ec99da5666c34feebd2fc532be6af8c3af356b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea9295487622410dbb85ceef0c4b4fd
SHA1c1637037efdde8c6cc6759ea9db1ed18e14b787d
SHA256ecb0ebe06cbcf25cfb9c4e1aaaff9e06bafbd397a4bf39570232077e5b414d8e
SHA51256665662cb5c5733419691844940032ed6997cb1f1116103ed4176df1a230e0a7aa20167280c2489e638f37179f76897bfca60d4ba84b5158ab1c521ac075a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56866b7d8c2dd166e8fef4b75cba2405b
SHA13ed37a309907531f080b6b7f00a9205b3e8fbb10
SHA256977cb6dbc87849d995aeb7342e9212bd1d6f99b764371edc7ba72c941a6434ed
SHA51258a1e3a4e9d15c0910f779865d4a46b2756c50847b5d3e6724c2de7005880b583d9b1891bf029e157c49c18acf19f1c774a145b0eeb60916abb0acf6a2a85144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee29042a86b18076477801728350aca
SHA1fbaef5310335635e0301cccbd9b2cd4a3e0ef670
SHA25673e4b4795ed463c7c51b8806b8d077de7684599456d6de05632df2cad7db7122
SHA512a54b44ff9fc63d738e11ff828b77e6781efac2edb73dab49674c006837203da6759d1b7dd3243808677af1ae737ac135ade1495e89ac8f18680ad28d11300934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ff73a2e354d794cdbcfa487c1ca9991
SHA10816df0300402022c1b0bebc741d6a1f1c5e2d84
SHA2569673dcd1461843a6d43cdfc12617feed77af2b8b5c8026fd1f2232514766041a
SHA51291809a2a55277b7ca4a238026968a40d73c422fddd17a559896891b1ba653a085db048c6b4ce0394497feeb15b1edce908a5270d5c12b1ee6a0f1faa4b67499a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5539f0502e79443954e206f8b30e6230a
SHA12f7c3b1b88658f6fe37ee3e776ffad7e46f9d573
SHA2564a65d51dbf38798d27fdab2bb141efb9763a3209dc4a84d809a1dcbbc02fb83f
SHA512c56bb957714b3a2925d5401b7ccff5ac7528dd59816dc67e43a4e66734820e4d6b8e034973ed9bdeaeb0b0be6989065fa49a2e075d14aa06af152ab9465f224c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db70a0698764f94e440b0aeb19baea64
SHA1b9495086be934b0bf294cb40c8e7c12bc66e6fcb
SHA25617f3d7bade82e1f8330bb2eab1274914e88bb053c31071d555e7edf7c46a31e2
SHA5128e6926eceee31ab9d70c6484ce2cdb4776419111f6a90a46384ec8497d34de7859f3d432175a8a9bd5a4ea52acf19097cd617ee967d093f99697d1ebf34ef100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5682f8d07d6ea68e13fbdf628ad2ecf37
SHA170178cfc9cacb89ad44878139aa83b274392337e
SHA256df9a286f2dad9f445902e7e9737dc25af56b8240e705853a091fdf52f724af0c
SHA51273e2c9d03000af49a471b8931dcf613891fcea704837855d2b59ac1a5a6e1a974bbd83762f6914855c6209eb990949fe6a6872e9524daf9025c089adfd7dc53e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ca47911309c485e2f726ae51c9d75fc
SHA1cef3df0293bafeb8c8bb2c500c4913e853352c30
SHA256ca46098783248f0bc8e1fdd62a4b02916d12c415e68ee438b7a9f4997ace8b5f
SHA5124871a489640cad1dec148d68e16527f045c0e90a99c1434365ef475081af963fcf741bc10bad14aa24398a48ed0ac58d1d942952a98e448acff5f9673dabcd96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a25a4523b8e25f9fa0336499446593a
SHA13ff4717f74ebf5629f331e9f67b1466cd7890aa1
SHA2562252dc7bbd5be672d056c106ab3a563251e0932b47161de4b710fdcbfe3c76f0
SHA512fa1e242ead9025d501bd2ceb89e6f7e313c14cb050a5cfbc1296c7b3c4ae7366fd5c3534e251df1375548981f62b091e914f9c5473d3a2aff3978ad5fc7c1c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518f4bdbe92232de9038c215bb22df157
SHA1dfe8080d26215ae5bac15f3ffb6c9c23c4a5da39
SHA256a846069e0097e1a74224664f0d301d0a2e1c00bbeca376200ae6398e5aa1c2f8
SHA512f0d7d59058d77b135a50907a251b78787fad2ba9dfcf86750f17c282637d8b5fe5c52887705e08fe909771c8bf82303734ca6dcebcb5da910918c8c5c1e5581f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596009b1fe6212af1ca7e97e3d8a8bff4
SHA1a05818e1bab95afc12d2f6ddc1f7ec8c2b8d8526
SHA256a6fc8975d5339afa554cf2e426747f04d2fcd27f260d7d194d3eae4a877ea141
SHA512d4ceefdf22123554fbd84b2cb5838fa1e78f766731809c4c0704744d1daf0061cb9ffd57e89aaacc8e155f18e5689237850481e231d7897387481442cd2759ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ac3468ac9b34ee7b5c57b6d1113c49a
SHA156269a4efa132a8381911e4f79ceca3d5bfba891
SHA256130c5fdcf5b1e4cb21725ed5efde2cafa682b04b796e7007c07cfaf056b1cea8
SHA512c230c82d11bfc48b3d73b81d1f14e20da2bc19393e2733c61cef9ee5b3f42bf95a1f257cdb289cd1d57a07ac70b19a6017bfcca06546bc4616b4378eb86cd491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504b98543cabcb39553178f91adaaa482
SHA13f2902be8078fa161101d69b4bcf558367a835cf
SHA2563253f7cf73062c63eaa91b5e96db331302974696d6eb8e800c2714b4335339b0
SHA51281e7d045e448bf6fd77946424c5385f7bde7d34185e019da936bc92e1a1ed60579f06c08f4ff2e0ea38ef77bb0b3ab6bef00e4cfe3bf7a296b1135de9ba982ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cfdf095c88665d5fb60fcc282b04510
SHA11cc2131ed55eef0e6f0f37329def027ee676ead4
SHA25689d61addbc8d6ba9c020366e65c84cd2a5d31dd1cdae37d12c537ba4031d4a88
SHA512a5196b09bb825194f6bfd8b19092ecaf3cef437c4bf4af2e924039d95b33736dc57633378f0ab408e097a9bbce4c24094273f49a13b05d2a605931a1dbba49b6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b