Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 09:32
Static task
static1
Behavioral task
behavioral1
Sample
d40c0c51f28d0a2c02519a7540c4b64c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d40c0c51f28d0a2c02519a7540c4b64c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d40c0c51f28d0a2c02519a7540c4b64c_JaffaCakes118.html
-
Size
189KB
-
MD5
d40c0c51f28d0a2c02519a7540c4b64c
-
SHA1
86b3365d57b9f4c493df618f60a4fcf565c6fdd6
-
SHA256
e275ef6a8491c7e20e71886658c4ee40c7544ccf4b678d3418101348ec908456
-
SHA512
91917065d0edb317da1dfcfaf4efd2833942ef91c85023ac586fe91f8f1d82a188317c3b2b38a81c65c4c2e8ef60edd5358500de5a00e75a9e887289077b4d89
-
SSDEEP
3072:S+ByfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:SjsMYod+X3oI+Yn86/U9jFiM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{427A02E1-6DC5-11EF-BF61-EAF933E40231} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431949815" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000002cef4b3ccd59a292785d125d60a5f72627e387927a1b8fd6a23fba4837e89dc4000000000e8000000002000020000000b5dfaed2ef62a5a8d8d3633dd29637f90ea959bb4d43c77350bd8d1b26cb7292200000003565b0945c14505b2ec9bc26d7180129a2f3d381cea45427d3525c676a9e8cf440000000ce7204c1c915bbf89ef23c4e600e742ccb5acc67b529e38a1ba516964e03825514ea527bae6a8e675f9b60c99a53783b007c9d90ffbc55f2cc711381fb2f8b36 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20390f32d201db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000094b9d67d1d76149722ce6465b731add6a9788f47d55b513ab3bbd0e9de2c521d000000000e80000000020000200000007ee13f92178b8e16045c459108f998c8ac0fb47edbb2e0a2876853eae72c76c790000000fa109704cb23f83261db9cb601fc8f1a1ace2e9367031a9fc5a6596ae5c296944f381d16feeee5dd84af292aa84440fda9a6f065be05102931c4d441f9b235b6472a684a5c08d9c64de22e8878a48fa32370ccdbf7923c2df32970f6ee97060a97eb6eb572550dde20977f082901de0ffd3890a14a3d95609b279d7ce94441020463b47766cf707ae70763008001800c40000000ec1eb83b60b5f36a79467b5db3a2529314f97f6ef3e1ecfb277e8f4113aa9c3cd19d331e518169c45f512a71f0c79ea8efbd78311d67180bbfa224f5233c5558 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2304 2236 iexplore.exe 31 PID 2236 wrote to memory of 2304 2236 iexplore.exe 31 PID 2236 wrote to memory of 2304 2236 iexplore.exe 31 PID 2236 wrote to memory of 2304 2236 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d40c0c51f28d0a2c02519a7540c4b64c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a37cdc8d2c87d119f11e477d4f779e
SHA1ec70e639b9d8017d943d5704c89204a1f1ea0e33
SHA2564453008cac1ea4fbabfd1695471cc7ad0c25127a1f7aff8c4aea5684e0bebdf8
SHA5128db99033ff69a674cc85f1fb42d25636db496b8d5f6e367f50cf3089609e4baa6f8f072a378292fe4f80dc479544c578927545282660f5cc217070c495f71c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdcc8e480f4cf9f6bd8bf5e632b10602
SHA154111a3226d7f11d35059d237be2d1ba92decd26
SHA2563dd205679254f9d19cf899894a3c23aa59878f0c6ba23d3f7fd4234644bb45b9
SHA512ffbbe99c6a207a53f1b380c2b1c1b83d473475288842174a75d8be02a53d5aa02b2279215398a1ef1d89119d4d37f0806ac988c4d1f32e1235d31812f857e116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58964dd5c302379fc0cc4eff7dbd9bd6c
SHA1733422db2545d44e082e012502d10281b4275047
SHA256885f8939b99d90f40caaeac6226b1c5c15c40eefb8056c7cc37a3727b54256eb
SHA5121bc8dd54ce64657f120141154e007ce385e6a71d9b82de9b9f70bd892b3814cf79c44101452badb0b24cfb14bd294662b81c30309b16e5127634162779af24fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cec348467cb66f39e504dae263b4b01
SHA144dbda25805dd44691f53935ba485d5c58b08048
SHA256ae5eb4cce1d48c300d6e3c5a18ad74ac155073d8f371836f13ea2d6701daa86a
SHA512841dbc9e58f630f5a4908d9df79a422100b2a4032d8733096cab477cf4f327659230aeee63144f75d88ffe02854b9654ecbce7c0acbe466b2b7170a96028290b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56178c6c8c979e140a3c753b54aceefd7
SHA1c4f6513347a5b1b4754fa62b5b1b40f1c43c937d
SHA2568cb6963742014fa0a35cda67010d7864c4356dfe9231f453c769d014eb410bec
SHA512db49093fa7adf15bada704a94fd539973537e05a9764882f9c0cb12b78808ffa927e72ebd4bd1e31008fefd37c1cd08b2b1dee86dca5bd5cb52f412df4e42a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5326bed2f06418032358d325fcf8ff455
SHA16c676343b2ebfb5d3b77f2aff130b63fe9a4ed24
SHA2562d0f8751b4f1c7d8fce0168250335844ffbc4e0c4070b78cb120b10bc9852e08
SHA512338c70810eddbcf24533d8670fb0df934263eb936658cb36c92d9d22c67d6a12d2820d1a7c17aeecff1853672340aa4bf0bb6b43034d1e87ae9f510763c5425a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5150c79356443e8c11e6d77dc3ab0402d
SHA1d45ec642ca7b59fff7bea92be4d2c509a30e7dc2
SHA2568264c4b4bdf115347a2f727c3b8466aa4796de1e2003448692b1b01ba48a3366
SHA51272d06f483807a67433300b969e0ca5957e5292b1eecb6792400e660de5a284e13e560c8b8f5971122bb9b441a2aac3e3448b0057425abfb1a20e96a874d948ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e74586606cb0d52783332f01f9bac0a8
SHA19bbb2f762a583d7dc956e8c7af8c48280e6b4a6e
SHA256e7d0c369ae61ca898debc6c481fb04b39ea8561c4e0d128ca501bd318667e19c
SHA512c60a6129561e4b0febb7a124144831956657459f8daa7e7b4aef42a5b30cc9ce868730694ff9c8e5811237b5fce0d7257643123739ba8447092d4ad1120b1731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55debeace24e9a576d9cc31015afb42d9
SHA1a70e434e121f317bfb13aeec2f4293dbe6360318
SHA2565ac2d00f5d36d31897449fd2a8dd9e8549053ed6e25f508f0dae099fdc568f29
SHA512604a7f14f6f3b38070ee4d44cd7a91301d673529618168acd7253c37f83748f3ecd3e15ee6e610ee83ec64be46f0b547f96f1478e8c95a8b50f203a2d6c70e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc06bd7b969c32e7ab0abafc15693167
SHA1edd4f1941cd6aaf5a2af22ce8e968a512e7db07e
SHA256e11c25d8e96529cb3ed8c82fb76e11556a7ac5ebabab713ecf3d1c027b167808
SHA51280c02285dbf488dcce4bddd5200955c067829b0755f405b49f3cc2ff3b18f16ab44978a91ac0fe5a8b90138e58d351dfc7b18c945b4b4f88b356546f4deefc95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7b9036967a5055542cb3c0ccea5d28
SHA14adf01912884a00419d230ea7a87534ac2c6cb40
SHA25672817006235c70aab5fe58c8d7f36503a80c7ca03d159f48ce062e1771a4509b
SHA512f127c975c6cfd7d34516e5f174cc365a9eedd14e6d5b9b7147ffdad6ca0eb1f684c55cf3aee16e686ca3af662ea57a0278443d8271ea4dea51e9b4604e16b4c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc04fa31cd9cf48d3b6cf2cbcfa9baf
SHA13cdbbddb80ebfc478045bb81e64fc63e4d7523e5
SHA2568dda30be01c431f8c84773e48851112155b76ec85eb08e668c9b12947b4664a4
SHA5124b144c7add2d9487d2b9d4febd9551ce85cda3e85abd351bf943690a6ab0d60d5cae7f18df7c73c28abf3bba671a7fe3651c1a2842a52bf63361daf461dbf3c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ea8dfb026e3cc23da8904d321a176e0
SHA17094fd9627ea3919edfcabba389a0d6d442af9d3
SHA256cc28c25f28298dac512f2e0cbf6750137dc71bb7b147a987d04efa4fe5234cf8
SHA512ec26f002697ba33a3bd7cac6472023b47b3202e38569e9d71e2eb0dd3a01b387ee285278e000e6c85585b4024b25529a9e809365bef25dbd073e99c16d0535fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa8413074983fa4e2c153c8a120c0393
SHA1bcc222d7f5ac74b1d09e0a510dde513be3b44c4a
SHA25645bb05c0c94050b68c8ec5904ad8783ed1dd7757fa41e5c119234c33e5d76896
SHA512627384ccdb78be80941b5f06e3e619bd29d1a4803383b84e49ca27434a0c37947ea89c0213ff229843106a54dbd7be30d03571ac24f2d302c270cfd23d9a64d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d6e44533d4e8a92995550c972e6a1ef
SHA13231d6692697d39c22a519c6dca5d4be22aadb6e
SHA2562ad8ecc62d64221f5090d0d62951c0ddb47b1b795ccce394e5692b409446b783
SHA5129ac92dbef3e9e4386e2456b73d6e1bdd088c81d49e66f90d1c9bb36d8c165959874358e906fc2ce5b8debaadad0d5d7bb1effb2a1933b3e631664a33fac58889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c27a1e96f2e9372a5f26d4513a3c9f4c
SHA13c298c90fca25755a718a026e9d43285f4f28d08
SHA256afcb366d3113ba5598c248a001196bcf633e91574c7068e3f51df703125508c4
SHA5124e994ea6808ec4c942f2006de42a89bf674e4a384daf2146aaea139a47009ff6b3199b412bacf414b761c46fbc89104a9db0ad5f62bdfdcac1b8d6a901ff8b15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512bb752d0273b3dc1859fa2a865e1f43
SHA1f0ab55325e93bb6b33e876dbd7692dc77482d7a0
SHA256d8711a311c2335615e2adee0f9032420f154e6131f5ba66a5a224310bcf9bb0b
SHA512d4a611aa989e4f1813214c24e371c96274afa0b3d87f5abe1cd24bfd153057a32480edc918f7e203e50c50ef3cea92bad760a33dbca9572f99ed228dc56f0fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fb03d67c1ab06291007e25dccca99ea
SHA1005cb003aaa6da48a4a4f59bf74b31171ad04a7a
SHA2560d86d30bdfa97a6933cf287e6a9b158dc1146635dd8ecfb7b00bd5fac8a2a07a
SHA51220556166bef136d6f7b54e2adea47704f09989d6310776791412826b0146435e9c1cc439bc3532cad87c346f4f2d32ce2fa9ea5649f39587f3a918590a72bcf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5715096ce26cf695d247a9cd9fd135d55
SHA10b25d1dee8004ca367dd72dfb94affdef5503edf
SHA2561e1042816a7f9b5a038fef88a3897ba63d06b907780b519ce1601b8edf39e6e8
SHA512ba3c1ba08dd90c5b2784e96b78d9b3f59f417aa5a01ff0afcd21d9c8eca7eb3358983f1aea1a4da1a06cb8aa6f9569c567f64ad9b2beea3fba3056d1d32c3bed
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b