Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 06:24
Static task
static1
Behavioral task
behavioral1
Sample
90d1835c3d2d8d68562080cd1bfbf6bc_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
90d1835c3d2d8d68562080cd1bfbf6bc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
90d1835c3d2d8d68562080cd1bfbf6bc_JaffaCakes118.html
-
Size
13KB
-
MD5
90d1835c3d2d8d68562080cd1bfbf6bc
-
SHA1
fecc0ec94ff1ee77ad9b3be955ceeaf987012912
-
SHA256
b60c9c019869c0f63c81a8387b6c108ca45de3ec14c3e20edc16fb95d1314b3e
-
SHA512
6b70297ae20a897f25859397624e2f4e54cf03dd94fda596b9593f77b219f3865074ae513d238185200d90194cce316bb1b5ee88b6ebe7b0ec38ccaa9eb6d132
-
SSDEEP
384:x97h69KDfIOUPTju3qnzGENcTgi+S7ij7uCYa:x9VaHoYzGGcTjTiWCYa
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423557761" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 508eadd17eb5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000f70e47a2572f0410ac3bec7b6e3bdd33e7495d26c9e306e41524f0599ce3f5bb000000000e80000000020000200000005bc7e416c5d94814fc9d2b8dd3502c553e82a59de5ef7d7f5a5b29937a2745dd90000000720041b061d729cb0323ec981fad2af702d67c0397d3dd97557b98bf0b3b64a09bfd3234667f59e5d189bdafa4496714676ec2afce093308cfd954781ca1e9c861f8149967a05ed975b4404020d207579650c44309af663fc71117f07c309641a1b437a7671f6a6fd31031850159eb63bc4a0700ac4a6064fc1fbbbacb7acf8bf3f19e391f5e74aa31f30761cdafb8c440000000bd75af7098be2f08a46a4806b5bc4a78d5a4fa59b2b147f3fcae4e0b4b76877b2291f34cb7c465d6cd23a9adb72a2e323a8545fe81b2cdd3a31184fdc1be8031 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD1C7B51-2171-11EF-A5E3-DA219DA76A91} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000db6c79b4deedcf96a404a57d79ffc73668a7e8ad023863b5db592f867d9a8037000000000e80000000020000200000002d09381f76021f1e4ee889e74b48632fa124a9acd0144e563b485b80ddf77d2820000000eb5be450e85265e85506df041032ed794dfc2cea341c881ac7f780dfbe4d4a2a400000006668586d58334e1e8453a88aff1b618e5d11bfd2445fde52399dbca9f1f439876ed853d3d11bdf5c877ae7f0d12ce0b73a95052b6567188218e68b72908b127c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1632 iexplore.exe 1632 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 3060 1632 iexplore.exe 28 PID 1632 wrote to memory of 3060 1632 iexplore.exe 28 PID 1632 wrote to memory of 3060 1632 iexplore.exe 28 PID 1632 wrote to memory of 3060 1632 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\90d1835c3d2d8d68562080cd1bfbf6bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fca0b10320909cbee5eef94209a7a2e
SHA15b2a43ad8d8408e8f00cbd47c092718b4df3bbe1
SHA256b3131059cd96ca8aa55e78e9328bfd33ec6c15bbc1c74aaacaf83589b54d48a5
SHA5129db123cfa67e65645ce9898e0c6a01325ec52cbae9774b37671b4e9ca510280c5ed751bd46a00d72fc8045e5145be44761e761f33091f55dd8e4649e4e858b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4e7719b8e61b0ec95e6c678b5a5748e
SHA14a46d77cc217812f0af748827e48c25a9bded3b8
SHA256849cc4b3f7950d3e7891cc3f55da8cb3758d5b22bea18b4f5c4bb2b798862620
SHA51263e31add58ab661e253011a04dbfea74377d8c38e7968ceeb51572987a436e8c3abe8bf841425813e899dd3e544bd90e3673b228d021d4c115aed59657746a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2d38647041621c238b07c266615c103
SHA1d6e2751cab3affe9dacdfb0442943bd95f3a11d3
SHA256997eaa3a6bb49512db76efb73d7daee6f1becd50014e8feee232c6877b3b4b0a
SHA512498f71002b2a9adc60254c2591d353c2a390bb7ee1a2d92d5296265b9f56939a8cb78f14f66cb02be1bd488286e9814aa719bdb91e46f9df0325e845ef71d219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e95c034f40e3dc11a60640ad49e2150b
SHA1d9697b6ff602f4f2ff8af6d70c35402229dbc5f5
SHA256ef8dd14de25a0e2cc6cc03be832adef17b360c0e69c636396450d21daeb19d6d
SHA512ef69d6667dd7a5dfe36f2dc3c998fe616faca5a7e103a922f794c4ccdabfa051e1529033d7de00dcc45e20cbe080e0c579cb02dd3d6cb36c0e9f6e7469020352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5834529299b67f8d992fd31899048fe33
SHA1170249ac3e52cd2173f097605bec3c7d54444dc7
SHA2569413e731e4ff3aea4064d39486b09671f9c99f161df4a0e97344ae0b69d9f230
SHA5129a680c728ff986fbca486c77d09c6d118a5dcb981ad40f4c8793800e5582d2bebe3bafea16f416357a2748f9e54c8fd8f03167d33cdeb7319de271019d3aa58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5391e1de18b2c471f34989d51d254474a
SHA1b3338638ca240d241e93912650637e0dbd15474f
SHA25616ff8b8068173b842530bd7398003faf376d350380b41d3b9b34fd51346937f1
SHA512bca4b51c28f61c19c133acc943a91447a0a13124ce3f57177b6fae3a7133e8589db6d962115eacc88afe64dbe0e6df381d509813e6b128e2e0c05655dfb6a841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5735494c7afcff28988e39f85b90d1121
SHA16864af7cca377796c62c210a1b321837151da715
SHA25646404baffe5e48f42a98664a655d7faede48e9ca6d58ebbe88442ea0350c51bb
SHA512c886882b7414c67747130788dff897c45e1c999a98f5b94b00197a7cb24a47384d47b758a1f80665a573eb31af7608c1446c4f19cc80f532bfaa2e66e5c9a326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7fc56f566b5588bbd3a5ac6bb5a9a4a
SHA109fef9555aa8580ce29ab06c1c0937e7520e8301
SHA25686ce0d676b826b68c7d832f4f8bb07e428e47dec20f425bf3b8f91c86afa54f3
SHA512788c28dba8102915bc8c630b19620630a3f0e2ab938c8b3df81838b4a47b2f9bc8125adfc17a2de8b5687ccf1988b41a03e260dd7d7166d5a72297c092cd2528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08f1fda4f71d0be8765773d61d65aba
SHA126f865218de238f4487371bcfea327e9c2c80478
SHA2568cacbfef7829147a8771d31b4f6e0362b6d49426e382e15fbfc267bf8dbf02e5
SHA512e72a40f949f7d7a21c55eb34d63056331675dfc2d493eea6cf7682eb4b157c8ca6445e21a29a11eda7a1e2a0007538df20ead762e7ec43674d66451e524beb55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b31d51bb52c72c9537c14b2f8e3116f
SHA1ff16bfde724c0bd32f9a6c2e1e2cbc5bc507405d
SHA25659bd095093a2e0553efef87cf4ee165de3989294d858adbb99272060ffb10039
SHA512379a6a5c0b1ac3c98c6e7375205fa1feacc09c814aa3a96ab5b5554fd9d6cd8d750e8b526af8bfc6ebf384338fe63fa84c42c13f9c918033e2ceb64f0f47c4b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052fba25521a5c799556613272d0ede3
SHA105278054ae8447f33cd956f6e7ca94922c93ae32
SHA256560bc1fe1bb21684e76193029d15a98bfb7a29e6e13c0fa2e1a711898109b6ea
SHA512f9f7be85e3c6df8717b2c9622bffd98778158b3d4cd246d0d2afb41f85d5b3e0a63223c660cf42d49de3808764ffc55434949189d8683d0a505c1261381953af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ecfeba91b2844c80e21e61f0914d345
SHA1fdc0b2c515e189821a926271a92267de3fab1922
SHA25604bcbef0d7d8da4dfc3bf07a2f315946036985cd0b391dc09f70b45dda34a5ac
SHA51239596910382fee167ac4794dc151d25912d8579d266a5bd1774ac37e0273109e8350d9ca8fa5b82e383d6aa30130d1b68863e4e8c44692c986e8d15456da472d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522cdeaab62bea041ca3a6050baaa0451
SHA158402b604a43499bad29692e6c78653cae910c70
SHA2568fa45bc6e7cf46a4e1824a90df92d066a619d486491e4b1cec04a0e4deb93584
SHA51287272f489fd7beacfae633231b8317c4177778bc9a4e379042045c26932985759764810521bacb4063363414408057e41a37cfd26c5abc393025941c6f1af830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf3880fa774fe7d93f5303aa3dfce0c3
SHA12831dc77b3c515487fd4e496ecfbbceac6de482f
SHA2562e27d17e29bb6b3c8b8f9415196b73f81d492fab034ea368660805715ad5724e
SHA512fa8a56210d19fee5608a95b1c63ea2cd1b3b18ef23f8afafbd9595e9652bfec5126a0be97baa124aeec8a4b3e9263a71375ef75deb17573e340fe50e5e7cf9e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502f002bf0a67ee61e46de2ad7c83a865
SHA1040157ebb9aa7ec8143c247a21b2c6bf0ae1e70e
SHA25626d4fe7d7079dc7cb571a2e27b92f946fc576adf3de5d04a7deea6d8c184de3a
SHA5129f1c95e1ebe458bd734be233c42bcf610e85252a8346c40e9e2f13497e36579df17f4b4da6d9bf66b0db6c0a3168fc95cf9e6663ecbcd3cf93b9ccd886505671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519ff569fa59c29ca1b8c5ff2c55a3827
SHA1c89bc111dc5fdd9ea183c8cc3b22036d6eb7ac2f
SHA256e7888031845c4d430c3c05635c788f52fc10981bf1722ca0227d7a219ac7dc11
SHA512b8c45f8c51200d1e3d128e9022350582c9a3b91bfe843c280044dc9c1293e59e6a05a1356787b6aa0879f0523e831fe4e16a039ef3f6a1b07ee9d6f2ef23204a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d4625971b6ee5d6e8c41385f13d428a
SHA1859f0a324ad801e541a703680f4bc5119c3347ba
SHA2561ef7d37bcff7942d25a0099530608e819d06c653b5e0841dcd5e4864a4cdf5c0
SHA5120f03f9c336080931355192d7050e5888922b589391737dbf3920ab6f7438257ab1a941b8388d4b7a28db56d613cc26a4a4f6b2a9fc087e8437a6a6dd1a0826d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a51879d292813bd862a3287277e68ff
SHA11398b5f5587bd5c9325f15b11f1dd6721371ef45
SHA2561e50b1b4f0373c3fa5559cca83ac73d6431d311a84e0f02b9ddfe0b426137607
SHA512130d14a59fc9cce212ba97d70a076ac0d006917ffa5f474ae66d421bb5b89a1e663c4bb9be3cdcf8ea9de4d61406f25dd647787e80dcf505d9f08d14a2a6892f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5447361dd762172b7e4083b7eb9cda1d6
SHA1bc6c7e945c4540e4d19767c328458d530560ee2a
SHA256c2c3bb8c751ec12a91f1c828fda851bcdb413f6330dfacf66edddb97d83533c0
SHA5122c124dc3e75dcf3de18e1c7b13149844857116c153607b34c4b1c926bdbecb602cb16c2d13f6dc675de5f007a95b0e935f701b67517cf4600313a4b3a1d60221
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b