Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:12
Static task
static1
Behavioral task
behavioral1
Sample
eaa5ffa00968ae339a0e5498eb1fe72b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa5ffa00968ae339a0e5498eb1fe72b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa5ffa00968ae339a0e5498eb1fe72b_JaffaCakes118.html
-
Size
460KB
-
MD5
eaa5ffa00968ae339a0e5498eb1fe72b
-
SHA1
aa478125342c2fb29c62cf2b2951400bf5b7dede
-
SHA256
7c6d6783318b85d4b7404e34eb01b44ed47062ed657a74931c12148454dccf2e
-
SHA512
48b0f22dd39894d32267f622f6a4f951873fe079746f5ec490f420b5a1e6f0383b21612b5337c398b442c5c403c8734e20a2b6cd59d89fc7e718528a3b9c9f23
-
SSDEEP
6144:SdsMYod+X3oI+YPGsMYod+X3oI+YjsMYod+X3oI+YLsMYod+X3oI+YQ:S5d+X3dk5d+X3N5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C934C351-7645-11EF-91A4-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000002cabeb1bde6546454962f2944ccbf660b97ce43fd8eb8d7bef60a1319a8bd877000000000e8000000002000020000000953fa06de5f6aaa5ea4733abd281ffbc1191ae8b51b1ef6786531fad5d39d7f4900000008138b01db984a83e6f20153fedf94cc443a9b9a567e4bd5a1580e14fce6e85f5452052c9c1f87c66e29c88aa7ba75684b5be4eb9a3cdb2a819a693f21d5e3efe8a8cbf2b9dbe7e088e3752dd3f7c28b39f59ab36fc131c7a102452396bba4392053f4de8bc41aad6b2ec0b83ad3027b618aa67a826c45fe1df8b7a1886e07dd3a242340f339eeb864f02d688713933c240000000dfb1515504d4339a99e51664dd7c78a85c519650bc0393aa95708cb0118ec164c5ad6888ca71e8aafad170b02298cfed2ccccb1a48876aa352d823ca0a2e2f78 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601a3ba2520adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432884626" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000003e9f3434b8a4d49ee1aeb3d8166dbcbdab587a9c03a1a25ac13d962937854b59000000000e80000000020000200000006fdd0584f7c82a9d9526bfcf1f145ed342e0293f1194fd41cbf0ee4ed73cfe0b20000000508940a4c175de425636e27a248eea3ac7d23c5860eb519825a8fcd9f2162c0240000000669e8b22ae1103d2063818a16b8856b9ddd14d471b120ba0179a5c31d5d491fcac83fbd4864d6a14914591da1f20066fc9bd91dc1ec300faa810b63739437e37 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2788 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2788 iexplore.exe 2788 iexplore.exe 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2456 2788 iexplore.exe 30 PID 2788 wrote to memory of 2456 2788 iexplore.exe 30 PID 2788 wrote to memory of 2456 2788 iexplore.exe 30 PID 2788 wrote to memory of 2456 2788 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa5ffa00968ae339a0e5498eb1fe72b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2e43d28ed73ae2d3c3c21c87e7d5587
SHA177c8e9097b19023f0063faec6d90890545df5a0e
SHA2568d8a15eb90bd3fc54badb8ff8c6d652bca9cecf7a293c5e73b4381046f7d7f98
SHA512366ff21bf5bcb71e5374d61a082879fb3c65bc8c0b37e86451336999658baa92ba19cdab9b1d86fa72b2d85e774bf11c9a4ad84df2776770c76b5dee4feb017f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf50519df087f0b6a7689439236739ec
SHA1887eaaddac969f4222e8f83f636a3f7c1fa684bd
SHA256d48777b4e48d9ca875b26f1f398a4a938db9dcd1858b8f998d02de8b16d06360
SHA5128ef66c9f2752874085937c69de40f40ee9b81023b50789a7bb7c85046bafc3710a75b476273310e8938463185303bcd7b695c0e05389a4b08a7abeb1049c9dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56969715cde39bf246ae5608a1f67320b
SHA187f32647c7413d15c7b10427a197831495f5a2a2
SHA256530e19c77da1cc2ec9998598ddb7831127762c0f7fd253c316dbdbcc68ac6352
SHA512da50fe2fe08dfbf70c206ad8cdc1d93f30a74555519abb8f3ee68145b4ab10c105e2f7c86bec16fc720b18931de5a21f725f12d9315121dc407bfd19a3f99153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537a62f4ad1033b091db54f5a7b50e302
SHA1fe16019dfb498c8e1b01c34cff616c0678ed5989
SHA25649dbfc7ceaa3824a85367f50888dc55160c82fbff0c98d52bb47c4f72143c428
SHA51200626b4a461cf81bd1a75d50664b3fa359e88568c8f044ac6f419ca4714660f58f14c01fa0efa70bf8ac86b8468397c66e75cfdce637d6a70047ab62d91981de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0596fb350c7a92d1ca749fe6fd1ec7c
SHA18ad2fd625dea078523bcbd40b6bc4a4410c4e6f2
SHA2568061c7525530d8b031ee0e50182840d57fba6a85eecc1a12e23322fc46d0c5e2
SHA512dcadce4150484bd7e03bd6870f1cf035db0d6d2895b40b3d0e01f73ffa4ec169db8fb4580bb7f233100b9f96e3deba41e45b7db49aaa73c30178fc15325af145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5045a467d6b92c93b78bfbd000223a219
SHA160cfbf678f145f801e602db8c5f5c2c6335efe25
SHA2566e8f13bd029f63cf8433221495d570e45a49af20a004f14521685f5defc80da0
SHA512c1b5234db080dcdf475eba2dd19d97e1f61b26efb241981931645da12b20020bab3786b35736a43c146646b5747c3184ff923b46e8578d7fd971c3a0693ef84c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee22cb7ecff941e7f0f5fadfed09702a
SHA17f0e58f44aa694890fd3c4a74ef3a747df233da6
SHA256c35683dfe784c2ec9c429865ae46434bb1ed2528507ebc67c49125bed5992fd0
SHA512a28a86010381d201732e72b1e9a9d5d717a1717c7edaa78da1bdcfecbbe2f85c77cae4c3c4c2ddb42cc0021141508b52ed5583331448e85ff27665f569b6096b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471b1a8c30ccb3f2b1ac31bd3ed8a5d3
SHA1f4fe5bc6820f6ddb13431668476c3cc53a9b541e
SHA25636972b46c76b6db49b45ad6d92c5fa8ed67eb9e61e417bf51d3cd20b43179962
SHA512612f825fae79a9104b2b1c2e5406872c91e1d98150a655848d4cf6c734a4bc43c3d37885b60dde35ba8b0e04db3ff5d0c255ad8b4595df4c0ab0b98ea832f710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585156ede4a07a43545ea0a6ff72fe9f9
SHA17021c18f69a1ca2b393e30f923b62659b60cd112
SHA256423597d194900baa0c31881cd3bdf1e5cf7d49c8329dcf59df891dadf73ab1a4
SHA512a093301c276a3e6106e7a94d795de545c4acc1be42435f0200fbe5194900b212e59a72b2a1b6f64db7057d0fce4f6137708c1f2cc4b4add30d79a7fd09fbc6fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b9e029d8d66a6e4b911824909d39f2b
SHA11275be320827a80283f72d2518ceef0763136450
SHA2561a4608fe41878afb10cc98cf846c076eda4eafd6a317b8d6d35f855d0c7dee9c
SHA512a521e879fc622bc2df2059f27caa867cacc1d6103af7c3bccb1b31ca663f09cd91674ab867ae923f9c4def9cef0fdbc4efd1e9150e6e2d4c52b3495df3d5f41d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9cda19fad949ba32476f2e4a59a0e4e
SHA1bc0ead87498236e8965f4dd0915f9d29a1fbc0b2
SHA25695d08dd4e068bc15819f06edfadc3a8ef6ad421428f4791cb839147e482c525c
SHA512f6f34e49de0cdb6e145dd360f269b43703ff59a79f0ffc1cec506998e741307bf77fbb3e53d6c7ba342a19eb3a25a261719e66331c396c86912a47005dc64442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c9d87f877a7c6b6782c64dad3d9377
SHA18e6be66d7cd314ef5a6969d106b1d1e232dd4f57
SHA2563ec90211099d3943193f8e24122b9accce51e51f05e4aa2006ee4b9035202682
SHA512410cfec4775499c16194c80fdd5e32cf516aa9e71146ac4aa06f2c37406fd78d18286698f5afe4aae7c5b4945658c1f633d3a667f84375adb8d5a3fd69335f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fafdf8a8ce6a1a18ac4917766af6a9de
SHA1af9e1a4ec3f956b5fd1057f0b29f59eca02b6a89
SHA256555278757a2afd60774106b84dbf376421c899ea370b7962702a256dbe95823c
SHA512bb0ab204eba689207cb140805231e808238e124997036f81ff0fe8592f8aad0bbc4ca0156bbf74afc19ad4b1f26d3b2d6bc9bf3aa3934a99feaf0ae1f5ea74bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a13f39d40fb65fdf5043f5ea558f4683
SHA162349a9230e00da3db64697ebefdeb3948adddf2
SHA2562f2ff09568ad8415e8648247c21f963feed15ee5b822a9790e4c5b2bd08a02b9
SHA512636e4da78e0e2f83679e9f6905091cbed6523a25ddca9897cc663fa6685a902d793b54e41491f15f17126fd61efd0826c749f28dc29d172be425b32de5c53614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdcfb53e4571cb29c0b002c323e6a4ab
SHA1ceaed12fa62e45ec7f7ccc57c9bfc0d1f4ded363
SHA2565373b5d1b4f5eab1249d38285612faf46c2bd8a561f33ff946f146209e782a79
SHA512f4522be682b772525ee83496a2f866320ec06ba2086b4908b4392a842d37520bfbb8d8cd10029126824ce22521bd22bc6901b4d6d6b94f1b6c93257c00c3fece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b5e3b5c3e989fc23d266ff34150d535
SHA18f87e97fa7c18cdbd8d26b2da257e4f1d3e12ceb
SHA256f0de92d70ce3f4a151211021e6105600aaa04428003231b43c1b4150eed39b2d
SHA512b4c4a7cfece390f778ba957511162275ec6033dfdcc00ad875660b06af1b75c61ccc93fd11acf96a31a59c71d5e3a98fe0de4a8cb07505f9871701eb01c7ae39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8caf06ec99080165ca809c2983a2053
SHA1d8b0b2407247902502bf87834723492173cdf816
SHA256e7de995079cdf352d72c2b03b75d96bbd16f027334bd9334e1a790f29256b85c
SHA5129ff4740bdc9eb335daabeec5112489c2c83e596e5d3671e65d08fdb64d13dd779ce6e63aad2645c8cae87e31eb9b62d77dc3e43d3f1fe10863980fee5d269f17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50260e7a89a4910d4a5066a4661e320fc
SHA1fe450d6bb9c1ece39da7c47985f284dfcecfd8cc
SHA256365ff13452c7bc9acb6747ba3546a028dc597f878d29b5e878d8a21f245e1327
SHA5124cbbf777b5ee2674a10bfb4c05da881a18c232ea37845ad530c9b8a4b54ecd2850e807ab335de4b7c6574cca4d2771c943c5e8fe4dc8d2b4ba2041d5bf3cf232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f076406fcd3c2a6368cf83ad95c414d
SHA1dd5a7558b12c1067737d6193dd6f8d6b80e759e2
SHA256265f53c78285ce6090652f6de113fe999601b3a6d1dbf57b48cb46f13e7636d5
SHA5124995737496599aa7ce954859a2950acb2755adb161ebaf73f0600701049ed8485147ab95678dfbc745b6fceddfd926900fe63aa6cd7e09049a1a290db3ba7119
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b