Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
d126338c3ccf4044786cd1fe3cfd322a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d126338c3ccf4044786cd1fe3cfd322a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d126338c3ccf4044786cd1fe3cfd322a_JaffaCakes118.html
-
Size
35KB
-
MD5
d126338c3ccf4044786cd1fe3cfd322a
-
SHA1
d1056a118f71e3c783813d6df0d45bfe254243f1
-
SHA256
4f87ee20b0c995a2af8a937890ea54091fb2db05d847f8ecff8b937dbf295136
-
SHA512
16ff4958e3db1e8b15073da4897832bef46ea0bcccec5429f01ae4e57b944a0a3dd861a56f5cda0ea75921cac47f7ff2e369542854d72d96ff4cb9b0945fbcbd
-
SSDEEP
192:uwPrb5nVynQjxn5Q/InQieLNnynQOkEntkanQTbn1nQOgecwqYTcwqYXcwqYQHNJ:TQ/749r5HN58dZG+0hRz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{872637E1-6CD7-11EF-BCF9-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6099de5be400db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431847709" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000059c85195e615f3e66f5d44674ac66f3c2bd0d069e07a055c0865d528179681b0000000000e800000000200002000000020a44c6ef2a090a523624a5e5b59d3d5a7dc3522d6ba1fed4d147b23038917b62000000067a032f3cbd9e3903c44c20a25d21fcd2b29e0ec19590ce070403d835e1d1145400000008f28ebaa97f8245fa386afcd4c52743a6751acb6b2df4e0fd21a68e75d463392bb8fdde05bed3b34ff32156829730d7856f3364757a49106d2ef7192f11e01b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2680 2668 iexplore.exe 31 PID 2668 wrote to memory of 2680 2668 iexplore.exe 31 PID 2668 wrote to memory of 2680 2668 iexplore.exe 31 PID 2668 wrote to memory of 2680 2668 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d126338c3ccf4044786cd1fe3cfd322a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0e2ae8885a35079dfb699a12551081a
SHA1ed3889f8e39d776a9d562108d949b3a185a5a84a
SHA256724804e4abc2e00e9788d8ad936aba762f9cd204f8e5d5f264689d356f875651
SHA512f3234994abb7723e3f3f3b93e955ea46da1b5e730df26ae2cc18c31616683717f06386ae41f40991b3614368a52dff26b2ff0ce7f447e282d977ad5fcc33402a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5188989b904243c49f6ccd80eca0f12a1
SHA1459e20baef44e05830abbcf5ba82ce3dad617f2b
SHA25660b77adb6735756f65e5dfbcd47f88c80bbfca6517d5c99b74bd871d0e29aab4
SHA512d4755be3f879c59b7d0ee9d70db8af2df245d4ab25382de03b263d4e9fe684409b38c90cfca524a04a63135ca40b3da6eb34698a2c0b44563cab0439e57a4f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5333e27bf998b80b9f59def849f000d2e
SHA10bcbcb63446f0fb7c4668f38f5f64bab1ad29082
SHA2567c65d4a61d1800a44191fd65a396c35094a5d9b09d3f98fd57c844819e42d10c
SHA51228e66dfeb539b1bdee7e936380971c79bbfef16071622b1f4dbd5743cbe83d7a89028e725dbb0c4466c99649b0d48d43d9aa1c62b2c21860d47665e9b2f8b2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597446b796c2ea9999468df1110007c63
SHA19085d4f8c4f4e8c1c6d5443ce7fa12895387599a
SHA256e8409c4bbe3175bb1df0f2c4c1a1a1b5e11b020aa5100f4ef32b12967b88d036
SHA512ece9b8db7af08c8d80f00e07d0d3779856dee4081288c763fbff0bfdd6a72ef7174396f3afb92660db9da94d2f8690525abf9c09992a68baf95f137e0ac1c5ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d75025800e845741864b8286a961703d
SHA1a2aaec2f1444d4d2d2e1de0d3dccb52424ab2e7a
SHA256b431f16e0134511d5db52925e12273f007e64b03dab1e20d962ce8a5eb7dfe58
SHA512fceea588e0b3a2b39d8df8170b96f72a33a845740010f82d22ab0d8220229834f3d6aacdb0808bdcfd5ad140489f869f3b9cb799e2aab635acdad722424f719b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a8efc742f0a31524132498e5df6f16b
SHA1a49eb70d00c7b7d9a75bdb6283eaa5b4e13756c3
SHA2564bccd3cf9cbee42d863ca61654b022b921fc29c021ac8bd86b7511ac78d78847
SHA5122c773abc1765b41a682a5dbc53af77dba945964c2773e99b157309ba7f5e8667afa0d238dea0a8596dbfb8c3394686b5b50e3759cf682faf98ad8c069860f3a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dfdce04a31f418da13f81c932f82bfd
SHA19564b9e72cfc3f71a217700bf4cdc93c916b3b2a
SHA256449aa7914053345cf4730e77f3bc7e283aff62a4abcf65d5771d51e48e44d342
SHA512145eec6465105d1c423a5d04946fcf3ef3b1eec90af1116699572b22724b6b32f22596218291819b0c3d3c31701dd8e71d1640aa7133d260306a188ded3141be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e07d49fb3dcaea2df7b40102c48bb0bd
SHA1fe85e3c1de14c568d207bd4fc8e99a451e81a05b
SHA2562dc5e2f4040c6484f4654b124046d45802976ae7acf106124bee130786006ff7
SHA51249dbb4359d3fd684295f36a429574e9b042533f9cc30d1592c6ab82190e8a6131a680d2d86495c01b6ab70ec9526a510bb6c47f6b1b6098040d7c926bb8c2f7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de655d5ba743dda817301ada64914430
SHA170bedf9ffccb6c67e0b3d1b79c909bb0c9b1fca3
SHA2567cf0e673789091bf99a7e0f56144edc48f3583a6d273e2f607235a7b42e4f3aa
SHA5120ce01ee59742dc84cdacf713b20521d6e623ee841eedbbd618cfeae489d0616f1bb619da47f5290c9a34bf67c15a3a588afa182121a44086c48cd763c0fff429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cab957497469202c51a20fb0840b119
SHA154bb1726eb4ac197072e102ce154b2adefecbbcf
SHA256beb3695082e043ca57035472571e4dc2ec50088316f056aff90e2b2d3df7a17f
SHA5123d00fdb601ab3a8966bfbac6642192358aaf26a6175cba461a510b4391a7389855fd2188cc49ca101f60982d4c183a5203ecdb60e0f5c7660e6f8b1d8089df8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd4ef7a2000a73c6a9ada42779998704
SHA19496b7854445c81d9345170dc79f490d43de6c1b
SHA2561ac4fb890dabeacbf7f6d72cfab1002e23c7a1c49fd11e33dcf238ba9b485de6
SHA512e7b039352938314a2815cfb3df28dd026ddf960fbb1ffaee4d5a9f9eff79fae97869578b8a8101ee26296f9797ee5a76cbc5184bbd191141b10566fb92b59a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f206e532c5a54a6ea82cc46962b3c51e
SHA11154e6db47053a5eb4fbcd1e3f09f4b6a8befc05
SHA256036d55bedd7ce82bde2e157bf8e5a90049ddd8f24ac370578f5951b59593e779
SHA512af057d1dd1fd177bb1ba7919fb37ce1c2436ea5a3ea567d3314c8afc3082da3c6c39247e3e39e1ef8779396202c90507bee241b4fe5129231fd989d46c7fe39f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e28ac58c65e3694a247344f5d1170be
SHA1c570babba57dbdec1cacde38ff240484642098ff
SHA2562c658771f894c6334892a104c8598b7b6c441c2b1bc17cac5143a553d32c7a78
SHA512baa2cb945f4bb74da9a3be55fdbc7f58b55df8f7c7fd5df320af763d583eec2b3a7ea2ae8df455bd1759cedb7eec234294b1b2bc256dde43d9522ed5d0f45853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582607aad9b2b28ef0cf55a05b521b9be
SHA199cac2f93810652a8afd811a94983441983c237d
SHA25608bcda782a02a222dcdd208f2bb9261af131e41b2b717de663eae772f3f81cb1
SHA51287b19ed2f7233680e11ccc569ef33c99682034a9f394989c7a9258f1bc5b8727bc801301c6a012e4e80401e9636d70ae251b7f10cd3fe8707b3d5f896cfb8150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bbdafd9e5e07d66406db5100087902c
SHA17c93b117f6a690e9e676f45e7c9cc5028935d8cb
SHA2561225b575219ebe6ff17d9b9545a3ed324d0b01de763e3559b859c11d3ed66e56
SHA512ec7ec3c378b7b4fffea1b05fd8d0239a3fa598f1c1b7f0d2ef6a61dd40b4df84a8e2ee0b40aff3e4f9b0361158b844090c1dda5def2c2ba74bf6f135b2f5719a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519b6d95e3b57730b7faea3a7e1baa509
SHA12bad667483d3524d252e8155d5ddd6ab211b7322
SHA2567e593a70a66a55e22a8724970b403af3e63223d80e7f074b19d5020270ac3270
SHA512f6ca1736a00bcd42c6ebc8d8c29f4b08c03901116954cba5dfd58b13772dd91364ba83894ade20699d48bfbe1f508d91513d8093effe32a91d6da35eb055215a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5357ceb0f5564a95b07cfa39abeff2c15
SHA1953c11ceec7bf74997c09135770ee0e8b1bd18b4
SHA256e83dfed982514c8d9571578643d82587cf7703c165193cc3a978302e38e34005
SHA512c722a89b6c562dda732fb7a57fef265cb58fabb575a9aab3e03b4b753340ad85d64b41455f3be5be881e4e4300db0237d1b76efbfd9ad96ce087f280acba9222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52440801d4bf9979275453409de57bf63
SHA1582c5b0b488596a0b8a22af164c15be5254a03e0
SHA256072a5ca160d94c54997c32dfe1dcce00d004a16352a59faca8a19bebf3e2c0df
SHA512e17d572c7d7b9d816a67d5bb681beca8004c3737719f135f70a3e1eb6fc409d85e232a1188ede78552f7c6a3fd2e9d3c54371a409fa2dceffd0b2e420a5a31c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d48ad4f7d3be453352c3435655def349
SHA170d69ceff470dcaf1519449ab5b07aa3b58c1783
SHA2566a6b76c08a593b282a080a56360e765005e053f09a887548bea77e57df9c5ea4
SHA512775881f51b3def11cbb7ef4999f46d8dccc2e4fdeb710ef92a979e40a01970919be5b41fafd6475aefb1a3117201813862abb5b41e1aa297b4a9e02de3aedaf7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b