Analysis
-
max time kernel
119s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 07:56
Static task
static1
Behavioral task
behavioral1
Sample
978bf69c7b7a7bd333746f6443fc362e_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
978bf69c7b7a7bd333746f6443fc362e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
978bf69c7b7a7bd333746f6443fc362e_JaffaCakes118.html
-
Size
22KB
-
MD5
978bf69c7b7a7bd333746f6443fc362e
-
SHA1
e9ba7c77d151307206382986df39f97569a4b6a0
-
SHA256
16c1373bb96ac3dd31b5a43120e01d87b812874c10b94267be652dcc6ab6b593
-
SHA512
1a61ffa0111963f3020bd6d229d86eb30f56fc610585b7c9119bb226c065cab579fed10706ce1fd963b93994215f2fee487ab79dd244d5ecdf122eecd82a0482
-
SSDEEP
384:cGhZB7hUo89lfEVmFx7Bp7QfYQTEE/Py1ZI81UD1MtIGXJXWF3t26dKFnueRULwJ:cGhZhhUo89lfEVmFx7Bp7QfYQTEE/PyN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003124860867e7f04981e881a12986e6ff0000000002000000000010660000000100002000000079463c6a795704cdc3fd74befe683b6d1b200cf43c39f5d42f82e85c983ee74e000000000e8000000002000020000000d0f362c08ca0b75dfb64f0d139b2d82f58b5817e78b59018d50729f1667388662000000048514daa766d6d3c47a32f14a30a520197791765a5191a305d16c153b574846040000000c77683c92e4b62455b2d4273c72fd9813e7af9c780f7b84b39f24a901b9892c042ca77adc9aaa5642cb4f357b14bcc8c959d42b161dfaafa8fba064029e31766 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423736038" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703dd5f81db7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{127684A1-2311-11EF-9EA5-C6F68EB94A83} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003124860867e7f04981e881a12986e6ff0000000002000000000010660000000100002000000080ca3d71b8fa0a07819b0c7894b6b06dc7bc934f21d3d0687efcbb7b17579177000000000e8000000002000020000000da0f270426fec3f0e9ab7a16cfd00b3a3699f6c9a94c088ac444eaaa371e60ae90000000e6b513c1f957ec1230531073abe06e388c34787602298a1d80ede868357e1bc91d6ea2dd840df54a5b8ff84a8c90acd230556951bcf33ca6c89df3bae6df916845b0dbda7b1e2814c2fc233e305c901a227e308909ea0af9276d7a53b9c173faca6ed5ff41c134f5d72d0f49eae9e950efabd5c8135d192d36c2cceb258501bdfe6e5ee3e9c8b8a7bb2c105f1f8dc786400000004491a364d5e725ad6c70d3c09b26ba62703bcb251ec8529a62c829ac6885006ae8f6c5b15fe0be89e85d0f29aea755d7d9c9306f1202dfa666b83d2bef081a0d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2968 2208 iexplore.exe 28 PID 2208 wrote to memory of 2968 2208 iexplore.exe 28 PID 2208 wrote to memory of 2968 2208 iexplore.exe 28 PID 2208 wrote to memory of 2968 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\978bf69c7b7a7bd333746f6443fc362e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d2ee6dc8527d5c9816e67351a7db6701
SHA1334dc0facc36b7f81d7463464c935d1a2667fb3c
SHA2563ebe3ccc3f327685011af15d4b4871fecfe793de10854e9aff4f77b816a60ffb
SHA512db8828543be7c3c296d15847344b7adb00aa96cc5652ca41f54caa54663d55b4fb61a0cca603955cc4094e8f378b24272571dc5986b97c293d9e3614cce9ee22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bb54ae20287f5527099f8faf8d140bc3
SHA1cab6ef24004ce665f3e421be5e3635d28cad75ac
SHA256cc28fc5dfb4ecf25e222bf3be78f6bb1dc4c871c8183dcbad302065691121a66
SHA512f38f8e589291858e7f2a875432a5a3ff4d0c25d5318a28b843db37f3c6895eedc933b593cc6ff5ea3767272e9adcbb34b0f63799b33768e8a6e500c9bcd76baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59f7196e2a302e2a7ca8c062d43687847
SHA106bbeee155fb6c02cefd438bab17ec364d4a020d
SHA256ef80e7525da5186d5b1be15bc0a8cd721573367e1eef5d9f76bfc0a33734c5d4
SHA512935626aa051c21b42b2337ff48169d9bc782f973c39b9269613320d6a8b01870ede39f1ab2dd11faa5bfadc84bece093db652ba60b81b19c3d0db5d9ac411f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a1e14389062099f3fe98e2f47d888757
SHA1ed96c2f61b04946f671ec178f3fdfe4cdd3965b8
SHA256e70c259567c71444ec66ec010cf58305b78846617adf5b0fabda4fd8ba45485a
SHA51245befe49153467c7876752b9c3922080297cc0783395ee6d642704b50b85849cf46668b201d62abf83a102fd32a6fd9e39551d50e25e4bd0e0a5ca0ac7b638b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cb94cbc5e05c4c107a3385847a148744
SHA133dccb65e0098f217536c9917b5a9a7dac43a37f
SHA25695eb6c36bed479b2567f992e80aecc87839351d640083d2f024880a9168d8a22
SHA512cfee295643909bb45a297906e1175f80ac752761ba25003a1d23f9dc90e4a36c83bf67f8c416951c1305561e58206c6507511c162a14d3a6ee51def3265019a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b87da6bd267e2eb5de0b6ab2c2a151c8
SHA1cecea15973fcbeb843e325b67c6f5285b7c9786e
SHA256c74d3c74a2f53e69967e181b6d5e0c32d036b617a7e32caa2f88668551e7e3d6
SHA5124e037e25ede01063caf81791203896004aa695c8df3deff57d8c4f25666057a076c322979b92e82782dfd898be169852138b0a191e9b83170e9ebb52ccc6835a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f5424459c2a799ff034bb0def983a333
SHA1bf6663904b74a06ff06c15fdb6c5c3f45cfb73f9
SHA256d63056731bf8f4c1f360e0bd64827373fe0644d90b212095e310829f9e9a817d
SHA5124bc3db353a68cc7df2642f9c361153546448cc00d71ed3c6fe3dc3a99ce6bbaf4f932f3e5c9b6de97882430354cf48c75d551af81421bde5b27debae9c4b8391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53a9e4c8e9e3981e694cc9d3d012a4d53
SHA107d856e2cdeb095ba337bc856e6438cc291c1c33
SHA2561c91c879172cfd6c24788fbadc52182ddf5d49390bd82969592d4718e1da4aa2
SHA51289eaa98adb823633c1fc04d4d4902dd46252711c090e9ce77e5d90c4c280c384462d37d6e742ce682e95df9970c4f0d9084fc3ea9af630a7cce6d823628e1a01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fd7804c05978003029d8de7d5fb1dc68
SHA16c907717bdb3423187c93fbfdbca87a5dcec536a
SHA2565999c738b40a2e9ee681905046d79ba24413384e5303e5aab114d2a212c4563c
SHA512399cd47d63e6536778df3fb381fb8d484b9bcbd649b3eac73623681c2e6bb7f3da98be35d74860967c877ea2dfc97bb7f53132de523c497db598fd1556fd2b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ff7548bac5fb0561dd7d808383276a99
SHA12674b1ff9a224d9203e57b8ede31c41ad24dc620
SHA2565a541095cbf4bd867ff75f25c7ffc3727c2f97fe70494e5695a221c29afb5039
SHA512ffb3b9952fe991c9dd1394c55a41905a75a30c620809288b001801a7c64a9ca23b9ba6f9813e3bd5ca3efd5d6d4aa0bf7ae4091b04679736480ac8d51798d582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b78dc19ed83526d96a5abc24211978a5
SHA19cbb3fdba47b1714572c78dcccb7d17f38c827f7
SHA25629631af16868ced799fe32489dae04ab66fb6bbf436d1f0e1c5818761c0b425d
SHA512db69030925e7fe3a95c7dbb0cbc4793a4a8ab097449fa7565f99e5700214b4ef189ab6e99aa3f30c3e53dabb3e889db702635985c7dfae9158b82720cbb9dc97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b0138d1c0c2d669f09eb9b5e8eb72485
SHA11c8a3e1933121ec1650b20bff6183a6a5d411e70
SHA25650286221fe141aaa1721fea4b3ff6661e09934128da058d35924788552f0c7e5
SHA5123e9a0cad5ccd63ef71283315dd86181a40bad518e10ff8c072e436727355376682e6fd94a192deb58422e88ae0649d203299f6899de455a8c73733036cbb73a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50ac1695e64a5738a07a58f41cbd856fd
SHA19ee94f0490d18b4b4b28118d416663711d19ef1e
SHA2561cb22ceadaf116fe4e2ca5ae53fb29183cc52902a95b88210229fb7f9825a600
SHA5125896dbc4aca8f784087cf96bddc3ae231d7a561f83e36bc382fa043fce7a05b6bdb8c7a2239e416f073bb2b76c1bde049849963df3636d1dc5e662aff9b8a729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55200e8323b80caf5981ac89cea5134c7
SHA1a44a87709a0b5778515a3adc06a9a2681ca1c150
SHA25601e6084ccb419ff47c1a918ff2657925f908e1f69c3c568574164381982279ca
SHA5120612438a3378f5a4a760ce0bd07fe8319cbb4aebab6205ce8afb65b9ea81d44868e4974e03cba3635188a91c8be239dc9a82a34c4eb98aa89a714d454440e55a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fda5f9da43f6a0f3a622d9244d66507a
SHA1702e8dcf7e35022d8ef07a2c38620d5069021721
SHA256020a4c4c6ab61a622ad8a4426ad0ae09c7085f9c79bc095d0cd72e927083d376
SHA512846f9b9e54baf0729d652eb11a7b8630686fc10ab1857f14899c7c81d68a1948d49651c27391be6d93a2fc8c5045926449e19a384646e5223bda8b0cc6ba2d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD500622189bcb546d07d2c5d9ac9be1287
SHA14f29233b9f50ac86d251f5f4ce816afd82b864cf
SHA256d7f1946a6358107841629423b19ab1ade1b6cc1c676346a73c2e3b322285f688
SHA512d9b85fd25d0ba0a3e529c2a7e1b1da274540fa00cd4ef8be850f9a5ddcc4d60d0a5e4f2c2c84460bffd9e8728534d38e3dd4105a32d3d048d0a161e01ceb385f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fe77baf755e40344dbf5cb043c6438fb
SHA19ce695ca6c80bcaa86a55d9def3797ef82a37f40
SHA256d5f6051aa2b127a0a818722a4d2795253b4a5a9269498e47b53a08046a973350
SHA5123ab4d1c129feeeae5977eacabee035189ff8feca386e332e51e66660b2896c2df88e65dbc953a282e3348247d43a6dec08cee5cd5245630f9da8357d7276c436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52d0aafea9a496dc72d288d443b74ab37
SHA1e14c8b31a875e2c0428697a7083e8eea74e36114
SHA256a52872490298a0519a7268de58bed8d08ddbf331ee02c858dd3c9aac1a3a330a
SHA5127e6171ddbfdb9276ad03c5b85439a370ff1f3aa25ee4e880c98304f48bc0883a4675ab4de7479485451a708dd642ce9209dafa3acfd57f1c7a36b4648646a11f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52af9814af186c108af0046a6c77bb8b4
SHA199c5c1024012cde4afd15656ebf389e89a3aba96
SHA2567d5e9cd9ad264f2eb64fecfe24e9e5e60a53a44288befe420b03be26860bc205
SHA5128d6eba9ab17c4f0b2444b2f8f6220f50a4da450c3b8005db8f09da874ae3f28ee8a1604463b8398462e65fb9dd1baac1f113309f5c9149077f04e6bff90ec8c7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b