Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
0da5da4ca8bf0c95273f8ea62fc3889b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0da5da4ca8bf0c95273f8ea62fc3889b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0da5da4ca8bf0c95273f8ea62fc3889b_JaffaCakes118.html
-
Size
139KB
-
MD5
0da5da4ca8bf0c95273f8ea62fc3889b
-
SHA1
2d13cce29bbd0f609408885e2d0d2e42af2bd4c8
-
SHA256
fc3c85bca24a06a28594179820fddfa6d85e0fd97b3c799de104af167f47d15a
-
SHA512
17ceba0f4bc49f6901939f4d4733eea60d791369961ba134ed8398fb0d52dcd421a9dde91e1a28b57d6faaaee650ea2c6a1b9d0bc4f16904a05a7e7ffb2ac4a8
-
SSDEEP
1536:SINcO50lAtyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SI9nyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000e74eac317d31b074215c67716c9aab8cfd4b5f526f9977d962d51b69b4e80c58000000000e8000000002000020000000746b4fe9bc203c66d33bf06721f49ddcf391500f900347c22e7efe7a6d397a2e200000008eba905cc46bd7727230091e6c8faf64f175bb96985f620022f02ffb1028366440000000781fc2716a3b6353aec65555008ce239ddb02c866f78905fdf0f3fa2b1f40436d6ed2e21485a621727ccf9c80b26e6266a05da881f18d278ab1bdcac530c3e62 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434087208" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a9d2dc4215db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C52AE051-8135-11EF-869D-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 iexplore.exe 2508 iexplore.exe 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2228 2508 iexplore.exe 30 PID 2508 wrote to memory of 2228 2508 iexplore.exe 30 PID 2508 wrote to memory of 2228 2508 iexplore.exe 30 PID 2508 wrote to memory of 2228 2508 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0da5da4ca8bf0c95273f8ea62fc3889b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e585b0a079985496e068b363698e2644
SHA10525bb961f29f5689144088be3b44368a326bf04
SHA256eee275032e1d35653cf61a702d684a39e20385cfa5fa1e659fbc90982662db43
SHA512d8edf8ee037ac18e83572efdada9a11f457b52a093864de81ab853d8f78dc88073183c6aa64a784ee8eaee3da66fc1a78057a99945d0f1da2b2438eccdcee08c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ca1fc65a868558f08f20891a40578e6
SHA1d2242b3a568a82a866f5f3eb9467ed8dc7c2f30d
SHA256c749b831c56a1f45a041d8e83a039f7dee8a30a148fd5a087e7e4f4950cc961b
SHA51261b802f477552cd3f54e8570d8a14aa32d50f0b9cc0c83e11523450998d4b21d90eb97ac5dd27eeb79e48276d5ce737be013dbc0887bfdd6a5a71e8aa1c3fd7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50498b5f05829a3c7cb3bdd7a47c185c6
SHA140f9270a8ec047eba20d939326d9871c098f942b
SHA25636e7ed20d0a46667fd68fb2ad4bf678716cb925725d613b1451fc9553fd605d2
SHA5123f2df309f312118f2c727a1d241bd5f46ae7813ec70b7a763c6e37cb843e656a6b183b3f0b63012fb4a54e7b38684a0b81f56df83556f1ebfcdc1424fe800bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518b159894e9280a33c3694b387a49974
SHA17685a8c1844892679c24cd988e7621fe1ef37da1
SHA25659112217b8ebd3d47d4d044cdcc95ca8fad46d9762a177a6c371a84b4b367b84
SHA5126d4d83a3083d9f04bc9dd893fd39a6d91299d84f3d0ac06acf1ea694b7fca9f8aa4236b280b7860b0930b8b6c089086e20fc0d390a6c813cf2192bbdbc70a942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6fc484ca1225c0b5f0bc0d91455cebe
SHA1e60d46808ed434e74ba2234899212424b11c2a08
SHA256dd30396fc2b1345e72a23f23ba6163ea62069a0a477436515941715502ba595d
SHA512932d39b24d517bcd0bac72b0ed152dab3495854e91cbc9e0577679fa07f881e07f33abd4e2c2d434e04e8d345df7db94da52976cfc2b8f71f09659af1871f1cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5709f264ab644d697b7e64051efaab3dc
SHA1b40c38ac9386d59167b4852d63e28208853df01e
SHA2564b77287106649ed019a6677e793f1ee779f9848deae93145a9bd752f3990293f
SHA5129443ee2df17cb5b22c7c63f75bbd980ff0a8d52ab8d88eb6a9b9b7acf8bf1990ae07005b378c01efe15846533bbed8b78fe69dee812a419baa153beabce31705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd20379612d93db3a2bd29cc92b02f04
SHA1d3cf76bd8cc31f5e4cd2fa3ca50b04acceb6acf9
SHA25665b14847aa7ef2971e2bc5d0166670117e9f2409219c9e40c6bbe99bbefc904f
SHA512a435e8f4d9c4e10ef95eb8e7bea507bc86eef2e6e6c8a7811cd5affc6511d009ee65cb0cee2fec4f9bf452f30e453d883f9dac84811c815e99e5720927cc951f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c98d985f114703a13679bb7561e9805c
SHA164e0708376b905c7e6cef3f157d84eb4f40ad4b5
SHA256ecfb92298d033a8868b40956a3a2973069b362b056a6d2ad4e8184e10fc750c3
SHA512c5770cc841dc6db15539e8e73219698ddab940fe5954e4b730680bd7fcf00bfb2245b648d65700ccc9f93ac4a327582596c1decc8333cfa2f8a94d1b5faa0e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8d068d71083cfe0d266119026d9303e
SHA15cad743cd74541a30ebea106e4bee49fd6957451
SHA256fc87729a2989d8a4b5abb3bfc9369367a2a274db5c1a0488b9a1d48db4444509
SHA512ee4ee1f22bc15b8077230cc9f3de7143d29a9bb6976b6d6e3a85099849123fff1350ea0e01d028db3fcc96a73945c6aad0e066e85fb6fe429e7068f888ff03e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdf1a8b4b764fc12822713f52d0136d2
SHA1fe55aff26af4e421042d4b28e517baac6465ccfa
SHA2568ad873fe2cc5d891759e01c7d2ea76bb1e224e3876c1c4b2b459e403837d631e
SHA512ce4b397fa868135a9d9dbb005e76f788f51db334b2a714d1a48103f65828a1d48224fd7a30d37eca33c035dbddbe4d6b907db88eb021412e9e380b11f81da137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541d630fa20b386ff82d3f770db9e2159
SHA1ee0c7118b85855cc220964688d09ca9162cb387e
SHA256cde02cc131ef89c7e9d5b7abef795cc42d54b66fcb2ec8926134864a1cd3559b
SHA5129633a6437ed31c8f783d3942f3d173c758aa88d079cc3118cc71788556b51570e48b8a477fab97288bbaf401decce0d669718166795db81b3fe05903f29a5372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b83079539abb306ace54efa9626d38ee
SHA12ae24fd8b6409a260af8bff47071ccbf7ad9bfa7
SHA25645cbe206ea6808926766715051282aa0f3a44842ed761a70bbc1aea5ada9977e
SHA512010a614dd24d11f0c76a7dd6ddfdcbd22ba8c6fa386b23132905a9de7457455db9d5f9dd112cfb450876f012a1b7feef813accc27ab391f54c2b677d3452ba41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa85b7013ec1c674ed03b62b75a112f4
SHA15a8324a78a20f2f256c780a30e8de39ee34af306
SHA25670504243b03977b35d368dd3d578ab3c7dcfa341ea2f8229cf9e48852662844d
SHA5127d8e26de54aa62145bb6e192855546240977463708704a9a83401c0f2d3f2eb0350cd5733786feccba713a0ec361687c56472871b98d083cde9da617d9b4ac37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9079d1e3be9d2cac01914b22e748439
SHA1711f6a40039fa75da613b1e4c2d7f1d804cdfa2e
SHA256e0b7fa708bba1a38137a1a99e22efd97858c0cffadbcf24ac74d3290df984e02
SHA5129ec4e7e2d97c7cfb45451939e418f32bc19f982b289b2acadde09219f28b688eaa705990305dc149d768f7b973014a51bcda1c4aaf783e78db595425a0f5e905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a0049fb5c300a57d3950af912574305
SHA125eb40e9495deafb58d3908aef1bf4cc3ed25741
SHA256e336c5b5ea3edff1edf7e2391cb847c99a3e657a0c7fa2a5a9ef02a42b3419f1
SHA512b87c7d1183a66d7bb08311af035d72af067fb9629c797042f0b58621730447b57bf4d9607f089c4cc984c86baca96f23b1e7e43601820a3edc48c85c530bbfe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdea6d3bcacf53ed37c528c422ee60c5
SHA13b0216920c1b12585463f4920abd0a3e61426271
SHA2567975779b9fad8907e320bfbe3eaf74be5e59a0a012f58e5df2f73010a5f38e53
SHA5124cd38f4965a795c3ce5e19fc537063d29469ee87aeadcabd88271cffd5bfa1bf4fe5f3444370e425e29eb69d92cba54e2bdbb9553463f17985518ce0e28eede3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4c7376afcc479cdb4c5826c429e42fe
SHA1f1bc08bfc4632ac61b01b15325aaf444c6d0eb8c
SHA2569d6dc5ec336c05b63948dcf012a8b35f48ee81c82f87c19468979be6871a56b7
SHA512ca71cb3384a8cc2ea1e4191756ec351dffc675c45fe4f65dabba6f15b022320b460f463e9cbae5e0a81c96e8c39033068266fb81157d4fa72149fddaf11b7805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dc0585b2f583e66e70fc51efd2b32c2
SHA17a93a858feccea19f1799216f91de06b60157ba1
SHA25631bcf0a51373e148960d1df52171a9b612d8a9b3e259b684f52868295d814b1f
SHA5122e9ae9600670eeedf96aeac9239177ecc0171df5aeefbd82c8566ec6fbed77128aafcbb396f4d8ba29db0aef9e3247fcc2ae6e50ab150e16c63849759452c848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5488f38771fe3423f09da284c56163219
SHA16d2822f1e6b63d601795602313689a3d6d49461d
SHA256e7e951d8dd11c4ce54518a195054c99d6fd9fb19412f48a1cee5b730b696d162
SHA512de243379b23053f2f10042182abb5339728579ea54dd4e5dc8f3fbb1a09c10f5846e6ae92585aeb9244e3ca9df2c3a0290420392117811c785f2a693f97226be
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b