Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 22:28
Static task
static1
Behavioral task
behavioral1
Sample
d731964b648e084c843e3721c0fbcce8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d731964b648e084c843e3721c0fbcce8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d731964b648e084c843e3721c0fbcce8_JaffaCakes118.html
-
Size
68KB
-
MD5
d731964b648e084c843e3721c0fbcce8
-
SHA1
d675b35dfd8e488cdca8281e97db11bb51e0cc7f
-
SHA256
711781aa67b91f341c8d0c61d211c740ae18c4a188b68059b3bcf65d952e9f24
-
SHA512
89aef9a0e2e99f5b81f200316ed1b06fc4bfa2cd7a75387c9e78d545e44ee52e3f422a83675b5169ce49f980d1485174216a738ae9b6f1b794e4e194f9d0448b
-
SSDEEP
768:JixEgc8nX9z+rbXT/ogD+soTyvC8koTnMdzbBnfBgN8ZYyxoogQFAG/sy/Ijky/J:JUNNzIKhTbpc0zbrga5TNnGx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1D427A1-6EFA-11EF-AAD0-E29800E22076} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90be87a60703db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000003c40b7c0e378ab7d24a80ac18a17d16c8c77dcde4b2d4edf795e1e4a863f430d000000000e8000000002000020000000c7e5a9c3aedafae1aca5cbbb4cfab189901638e79a1c80170fd2713b3669764c20000000139a94bbdcb00551eb1412bfb463d431995b0bad82f7f0b45a0ff5ab9abd60b3400000005bc417c60e9508417c8c3dec357b5a8e189d23e3475f8a582cd1d192b783c689ef9b44373237ae4a1dd281f809cf97de9d69bcbc4c7c6a4641dea624f302bae2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432082769" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000003f1b65fba4d6e3cfc1aa4f534d84ce87ce0e7e25a79483af88be4e2a4463b36b000000000e800000000200002000000049b50f573496a4f793b08c0c1d7937a3fc7abd51696bbd986809cfe9ef2de33890000000e0e813a2696f338564f9abcac62cff44aa836a3eeeda89e0af45531de411d98829392aecb3030f91804fc202d6d9746270ad40c04ab6713f6e07a4850e07faa90a31e6a156151f44dc580e4740dead3c9be2b44c3e79ec3d051b916de11d56195e302cb0a3eca9f0cebf4e50daa405117f8633d5c79b3516d6c05c80be695d23dac6feb0dc2644be4f65644d602a3940400000001bdab43fa42ae5c2123a06e27d246f7bc3ab44e7e255a096acc41301c2fb8cdb2f40cdf9d653a228b3271286a6bf4e35bf4dba3764c3a0f2cdc8eb7c0cc6886e iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2544 2688 iexplore.exe 30 PID 2688 wrote to memory of 2544 2688 iexplore.exe 30 PID 2688 wrote to memory of 2544 2688 iexplore.exe 30 PID 2688 wrote to memory of 2544 2688 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d731964b648e084c843e3721c0fbcce8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d224420433f695edefa0e5b66712b7e
SHA1121f2663ae67cb675ec4bfac334f712b1bfadc9a
SHA256a0cbb81a25c6056f31920fd6942d532f9a3a9b84c9734ea1650203a8adba2a12
SHA512d8408c3ec78849c6969e981ccdc9d134ff436344baea5ae624400d902bca91e094b1eb5eef2161ecb95e5eb341e608bfd338035e37946aa6bdc2fe227f6a8aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c092d7b0cc8c31a048e68f00688481c
SHA1e61e07b35648885ad6127a3ae3508607e1956da7
SHA2569d18886041cf1e563c3fcbc51ab54ee22431a1880fb3def477d1af7b574f834f
SHA512a0c7a95566ffe62e995c4ef4df1771a0df55243771fd07c6be7bab81ba885045869b0b52d7f0cb52ffec099dc9d2dce6b6dc67c77152246943963cc38de32191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531c7d38acabf364d97e11a8cf959f20d
SHA106b3b767babe3036e41795ff023f425b30c3aa2c
SHA25677ffaf5e94e31af549164f621b5946d6b492149cd5b910d8bd75871e426f7f39
SHA512bfd79c8ea867d5b05aef4daf40b29887579aa3b1de640932cf4ac2f68ed5475ef65ac95aa0101c4591ee2b0ae69ba8c6730f2f93df68f13dcbf37dcc8e12eb68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511979513f3a1e3885d83049343bf72ea
SHA1da44eb6c26683eb6fe2c4897fbd7d0a8be3731af
SHA25641d18b7e6a24b4b818aaa998ce510010f60c64b8cda7f549bd390e2787e765b1
SHA512ee11f37f1417b16b14534a0be0ea97f12487b1921685c943728973f65928be77f0a448e2ae656d2aaf2d64b7d27fab011a38db11fdbe608f00f8eeacfc0da738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564f00ca475cbc40e8161efda8b667aa0
SHA1ca05a7a221b1a2a0e9026d97bc440f4c7e188e13
SHA256057b4c92abd2807935672b1d27ccc221244682dbeeb3c06bfd463868bf1cb57f
SHA5126061d050a9170f67e29c71207093da26ad62e8e8b6d90280a0c18f40d71542be5a22b649b28152e62d01d0ac85328e116a7bbb77dc0270bee8cbfc6ca7f68e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd78e575b381d1f53968b32db98e8a74
SHA1e3bef36800ce17499d7f740ea487e04a4f856d93
SHA256ae19b5e7e2a0eed9446c8fbc798877d37d01f709eebde40cecb3ce68b2f5d3e4
SHA5123ecae3c041d6f0f74aa2fa456ebb8667f8d702531c24ef4038bd2d1706b1698a818a83a531be94792649a0583c795620eab6ef5baaaf0092d880f6c2ee461f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e63f2da8e6df89f8ccd83f8ecb366dd
SHA1d32805db288d3fdf8392d83cab814d7dca71e427
SHA256d572ba5509cf0d48f1510b8e7ca107503b6bc465f59e4f38bf03106fa6438a3b
SHA5124e2dcd60e845b5af7050b2f4b0207d30e5caa679cd9ff5179d564b01db621992e4b857ecfd19f42e576858fe8343956e31df16ab98f882413b886dd7e10f46b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5340ac1b2a9ad8a0b77197a67654b0369
SHA121117dcce5522e55acf1a449d06e520f243b948b
SHA256591acb063eefccb28b548aab06fd54e1bd9ba66d8b84e0b7b448eee6c337ea58
SHA5128091edfdfc14878ca684e9c13aabdaebb852b8d65f1510b2b1f12a3533b592ee1a3309d46748bb6a675df578ac9a1ff3190cac7f3ebf587e17b775c1c2094649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc77880b38c5568998e24b58d8a5e4bb
SHA1ab64398ced2f2494f55e763a68b2fd3177bf6ddc
SHA25682f00e8064f2af634f2344245582a08a76ec8b360d97c326b659f824e3509574
SHA5126a1f7d76d4ef74c6fa6f28488be432f61433fb9275cdfa235811b2a1297af658ef9fda0c6bc641570ca47d7a42f935639199f906f8ab34a7ff419976454102ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e37b48ecffb0ca042af11f00c256f78
SHA171e0741467513309628e494ac51a1261fc36f68d
SHA256e8ab5e6c9f47d515d3c48ab350cc8f0ffd042ab7381bc7010a7ac983f263528d
SHA5125b2a16d2aa8026d6471a6de6d29d1dfceb8f01d90094c88d665dc1ac5fda81581cb4c313be613a09bd7da40fb4b75c2a650b5f3303ebdd3e3305d0b4ae83476f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587e6bb52682a380cb3ebd44711ab6090
SHA1e65dd17d7351a2f76d944c567e9306c82b2ca1da
SHA256f2bf0693a43f1cca44a02bd9d375ead8b7c7da3c1db0bb56823b960fe10af112
SHA512655a33a698ef82e9244d451ad82e3e3b6255829d0b4f33bf625d7e3efbf9ff8a61c711b65c39225472bb844096937509b86f5e77958d2b914484889400ca4029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d6130bec69205acae34aaa906e7e42c
SHA16c6bfc9acb431d962763c9cdb23d9a204f0374e6
SHA256282f1aca986f30ae40971f1a0cdfcec7e40e9d00da7c32bc45e8dde766bb7c15
SHA512025fdac961293b29c4cccf4fe98a969f6aeace6061a04eb24c4e2427b5fbe99561b56237ff4b38c34fe0c0b36b0a958e5b4c10af0e33322ca1c47b8b2c82c735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575289cd86ff7593377737b2b3320fe02
SHA1eaee6924cd9b1c4cb650e34d20dd5a25733a059f
SHA25644db2cc8126e5fa9efc8b890d0f08d8f304751e5333385683748486635f84f24
SHA512ee5b31a7a72f5a3ac92a04e7b570be364d327f877a6d34d8b17b82cdb73b566918e72f6598ef39fa7645931f8f60487724ec205b2877899326223c275e20ea8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d53d68fd91b48f66e07fa426312f098f
SHA178868d035d7b0b108cb305b738c543cc946386cd
SHA256997cf20ef005ecb7fe5596a17c6231dd68aa6879cf0b0c0050a617bdf82e7526
SHA512eb88d0a5736859519d539a442fbe521700228d5dc279dd2fe19456c91b2f522ec73fd8a706e324f4d2750d919b20022c1279af5a7497e03831fa633c0ea132a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b74680f4fdffba27ed81dac465c8039b
SHA1a6ba9f0bc29408fdcf3a790d9676196445a5f2ee
SHA25672d3483607e7e686cef11d1fe341ab862b3a3d01979175e82b751153ff67cc0c
SHA51269592c87e1df44b622c33e618283a8bee5d4c0fc4e1687724d22a7521ee1b40a9e8226a23d42adb728e1f489915c5a0f3ef36db6b66df779521937ec1ecd42f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5534d060dbe6b5b4da137807f41efcf2f
SHA129985caaac52c09bc65fe3b57002fffc5380fe09
SHA256ef1b7c8df96712010f77511437947e22b61b802ccef99f20c75af65f11886a86
SHA5123e1cd29a5f430609a54c37ba9ea70b537159bec861e061687ff92e8b4d8c3d6246d599ff151a6a47a9754cf57c7ce3f1e7676437f93a5078017fb72b14a1c7ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55db48e8a755ed47e5f9b9cb433e7bc9e
SHA188b846593056bac164ba91f8d0094823490b9467
SHA25660219999cce4dfa4392c92c4549b737f1510e07c6d2c08d016c6453f65903086
SHA512add5b28b97ec642c5daeec3ea41e2069bebda1fb2b63fb22f466ff7b6f715046216df6b81402a6221de804b33fd73ee7de919d31e8271be208fe6b4a308b0f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59273ab67a637813a41b826f2c95d2d9e
SHA17107a9154a700d0806564b80d09c93740a584ff1
SHA2563ce1dfc8743c4493b71e4b123f2b5a321cb3413d04a1936c08ad46043c8cebe3
SHA512009cdf9bd9e7a16d69360604ff5faf4c44bcb080f5c261118103566eb1e1f6f9695c6549c3283d9a2065f85b0f4cfac9199497654cbfce5ba908158e68cf9072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532a378e16799c60224015c3e8d131321
SHA148dd4be16ea7c0d13e5ef4a16dcf9cf1ef6044c8
SHA256a27dad1271db2d32e92394e830f9dc89ef4bff9a1349b2c45ffb5ce9f09aa94d
SHA512ad3de68c6634e715b76a96ae0c438d9303d4eb3830e24e26025f449c60e856120b549a17644ad3e9489516852f8c7ba191f8fff06fdf917359bc8c7557ea2f6c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b