Analysis
-
max time kernel
138s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:19
Static task
static1
Behavioral task
behavioral1
Sample
0838fae07bd5c6df2b656a6f0b631c09_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0838fae07bd5c6df2b656a6f0b631c09_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0838fae07bd5c6df2b656a6f0b631c09_JaffaCakes118.html
-
Size
139KB
-
MD5
0838fae07bd5c6df2b656a6f0b631c09
-
SHA1
6aa7e6ee60945979c969ecfb38ec306c8efb6757
-
SHA256
4b87e2dc62e6d6de3ecdbb6f58da2a4191f0ed502d2ae91f4116f63d95bd5499
-
SHA512
ffdbc10730e4ff76cd9b1a9b91f1fcc68fad7e8f76d11eaa9fdce142db32d303152bcf68cae12bcb646f4a84ee5cad4eb5baa26e86982b41b23d53db3a5ff2d1
-
SSDEEP
1536:S4J9/xNMYMrtIOleyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:S4JTyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{634EB5C1-805C-11EF-BB31-7694D31B45CA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c95c786914db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433993843" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000000ac381d525ab411bdb475df11de4f151a95ce687c2d36de41a4296e2ae5100f7000000000e800000000200002000000041de2b6897a5c5967b79c1b756c4bea3bff8250e4bab780b76533e4dcd9216c520000000deecabf50dbdcaf7d650a275b654d55bea1b519b559ce5907e2ff9bda23c833d400000002df7e2f92534f9c1ba0079b3830b5c89b158e441699553d6855521b938cdb1f6b918f0167d3824846556d8d579cfda5fb17cb434408da15f4dbeae7488989197 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2616 2488 iexplore.exe 31 PID 2488 wrote to memory of 2616 2488 iexplore.exe 31 PID 2488 wrote to memory of 2616 2488 iexplore.exe 31 PID 2488 wrote to memory of 2616 2488 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0838fae07bd5c6df2b656a6f0b631c09_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aa7b2f1abaa2fe8b25c46c6a9ddf00e
SHA1a1d75038cf7860a32b2b2efe130b75346ba88d55
SHA25627261914df94f177e6d367807b146f7cc4cb1fa228e687c72be76137033b0a02
SHA51279632e1ddddb37b61d96a7462ebe881f390f75d0d3215a40a98fc552db44cd7770c05cdd74cf79bb4b4ed8942c260fb152bc90df025a6e2803f63a488355e7d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529f96395dcad9f36a50a4904b61edfb0
SHA1b6b255c98a7be2fbcc6f1ef2027a027b7fe7f3b3
SHA2568d66f510db5b4e7065668365474d5bd43ffe1dce56eebb708ea8383c4fed0d39
SHA512f8931180db0d8283db8b740623c4733ccb9635c4d7ae3d4bceb300038ab3e413e728862438e754bf31c62a14d71ee9e2a3414c8a7f397341724e0bacfa678224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6c0de2c67d10c4622883349bf7ac91
SHA19957fbda98bcdd2938f5e6a7c4ffa2f6d29e687b
SHA256cd0bc548f76052baf1b38ef148970b40c8cde2b54906db3d4e988292d64ebb51
SHA51294ca3b997a6b852b60869485e8e98e276289a63cc8d28fe9a990ed421a36dde53eb219173f5ffb3abe7029a4498a1ef0d64ec3d301732fca533948d1ca094cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d83c91af7a446595a651af2e61d979d8
SHA1fa5031593f1c18bb5914b5268d0e2affa486a0c7
SHA25611baf6799c6c278a69d6aecc548b08c108fc81679e1bc2249b7f2821b7fb2d72
SHA5128d1b2f82d31121fabe47cd4f413a675ef8e75ea90ae5ca1c60727a30fecfedfa522ee9f576afbf76a382786c1b286e066e13a39e560c9265a58fdb734e9e47db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd1b97d88a71417631fd4e4133de76a
SHA1a42894386b8d17a995fef60ef6b8e49abc34d1a4
SHA256b28ad9be0533fdecbca8bc42a2911dbdf03f144f7b37cb4f875a6ee75adec893
SHA512dd1c0c691218a7f03b097c14d0e0c7929f927a5c5b511ef69e10b21eaf773039882fa38458c01581823dbe2d5eab47baa58d1fce6ddd701708695f4ac14945f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b191be229a5b7bc13c1cd3f0c254f7
SHA1fa227490eec729f806b50322b29995ed39009d7a
SHA2562345fbb342fe11659ed64a54c762a894ab66140f331f598a28e723ab35e39e5c
SHA51247309e286e269bd50190d0980301de42f7a762c65639cde023d3ca1afc606f9fd8922af17b3dab7f9fcb2e2765b08623b4f1300980e35a28179aea64c0d6520f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1f1c45ba153e1f0c86aa0034cafffe7
SHA197c9af4adfc0593ee853f8d7a849543a924bac04
SHA256e11764906bf24d00e89658880d732979249964950314580a4cac6bb589383124
SHA51244e04316ce3ca37103f3658fd78781c28592aa8f25d4aac698ef7f5b3ca9f694fd157994f73c7f4f2a57b7c2cc6e2114b1767d8729bdd27cd116203fc4c41b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e67c1df110decd9eff0a486600a5af6
SHA1999743f2196567038d46c94306d6cbb4d3c466f3
SHA256b86c85c7b1d558ea7e2d78c3d3016409b1ea8617c6a0d0ba0a0b3c61a96e93a2
SHA5120664ca5858036126360d2fadfea28d34db792e38ad44ecefb0d8a7de7673fc475f3010f8d36208752199949936369576ac30f39f7aeb63364080203e317946f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a71fb1335e6b82ac1f7e639b9c6cf00c
SHA1b5b29fa4e8fc24bf85cb1d59214f573c4d6f46ba
SHA256df14ecc82b477b1fe638aa7cfa0c707bc3c835b0297db9352019a6573b21fb39
SHA51249d12d365a223ab9344de47b7ee58ff6419a169dd625efffbcd42a5fbc8ec8f6ae7a2c72d6c1740fc1eb5e452a178e2b40f5968180fcfa96285eeba0755b783c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59987f172b364f9a959883f99ad9681e5
SHA1cf450d2ed262c5a9ef8c28f2ae4a1d59a03942ef
SHA25636eda54ad12699c4d3b9df74654595cbc76dc7e23ce6054c6bb20413e1fcd9c9
SHA5123b20e92d07fe0e87e592280006003042cfe7a2778e32b8ed79396f36478f80eccc5a76190016c67d3e179d3840e4744ab7117f17e9586b729ee9f49228c94f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f348c650769e84ce4071c750491dda1
SHA1beeed58d5f22d34680dabd04d1014062655892da
SHA2560a08179ee5cbb02d5a0db9a8f6ca5947910e7610163638e5d7601ba5bdfb9667
SHA5124313ab0d04a2c531592fa42692ceec662c6e76cfec2f896f9a1bbba92214a237e3c12e35c2a604b3e1b20d7ee5e7c15b1f677f8ae5c4738848dd23ddd6c19489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e27bff41d4a7e7da58fb3b4425fc55c
SHA1412d3dfc27e902b21a0954db660598306726455a
SHA2565ec8e93b6fe94ee0b5d886dccfc9493f00fd66dc2e5ae5dc72a96bc492704e3e
SHA512b772d607bf948aea4e5831513c22e34bd99a180e6a484587492fc086f9abb3be6133e4c4090fc99b4b63c3e770d1d233efb470798c285a3b97939e317c38793d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5017b8c35077b5cb833d80e9e97892792
SHA1acfbe070d9eb29435b37a2f7a84728170b6a1be1
SHA256fa56185ddb5742d8350a79093b1836125cb15750d6ddd3649525718ee980fd2f
SHA51207cd7117dfc4a26505b85fe61449ae780c1a5c25a0174371514e913d637ccd97af33a2bc8b398537701d2cc473a3dae79321762b6f0e11852fb4b19d8f47ba38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf0afdc0e3a56784bbf73464d1487e08
SHA108a062a764bff5746b6e2c6e939b8b3052c2e23d
SHA256115bf68ac6d32de7036a956541d71df6576e8933474ffe95c9e5d04dba7caf4c
SHA512737c561849f9514c6796879e7026506d27dea362221582831805a0b4eb4ba4452b6773ee58614b1e2ab38ac80c2043cc973ac17037019dcbd69838b9b38d0fa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59afe5b2e53c645f6e9b2fd5d8e4d3591
SHA1e3fe66b9250dcaec025a80e2df8e916179bd2c70
SHA25645c6e7df9f1ac97bada1f7c18ca87f9287efb60b16b199d8e3644eda30414038
SHA5122043ff33f75cfc17acb324c39c46569a7c68c06e0eb50195d86b8fb72ea5f15fd3e1932ee0a7e9d75baae10df907d03c6b205d2b552e27859a550c4c58dbdbe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cf42805e787303e68bc6d17fbb93eea
SHA1ea81652acda1877866ae596822a5b24fb0b9dc94
SHA256f32ced7030464aaf7e0d968e47e7a48d7f2497d94c12bd4289801041e7557ac5
SHA512fa6675eb61907ac18d93da3913ae21da223a6d1950f0beb99a9ff7273a3107079a6b032e48dfbeaa950efe02278cae674fdd9cb8d6ff29a05c976c2e38031dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e4708fb9b75756b31d960d95f2afeae
SHA1046b8faf067df58ad241a56585e7f936b6f35b1a
SHA256b2a907ce1e6acb1bb0d3c735ab44fc6f6d3c589ef0ea55c62e8ecaa7263021a9
SHA512ddf1c038feec09a064c34b48edcccd402ace7d0b82e9f7bb89b8df7b57b2d9d1e510879f082a4df552f6d3ed87b2e1a89cfe4eab4b0e294e503891b508f78600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c001865d9c384fa45f449b0e282da211
SHA15ebf6b9db15d3dc2716033afc97c4d4c5652be81
SHA256d8730098b8ea480df9ca413af651199bed72271307c58a707f78e3eb3fcce38c
SHA512d0a973738cb7279e386a20b1ec5e7ff084d42af6e93950f58e2fdb25aa9b8df03ebc44ba3a09dedba819fadbc3f7211dd236d299e43d7d62b0bbdb0aebbd8872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff6d31d341b6e980f1d0cabb91af7b7c
SHA1bf0228155647031494276891199c3fa40d3a981b
SHA2569f8c8c4594812c89a4de028d850baec330affa79ca80b84bed98f85100cad236
SHA512a37ed54eeeaceea484ec10e23b83505750b71c66071627b931daa38cfe71c27651734fae6a8948f151878b26c11e873ce797e595d96db2ef559d2878e64298ca
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b