Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:07
Static task
static1
Behavioral task
behavioral1
Sample
b4eb1bfbe2e00ec2c2a62f416f0c8068_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4eb1bfbe2e00ec2c2a62f416f0c8068_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4eb1bfbe2e00ec2c2a62f416f0c8068_JaffaCakes118.html
-
Size
138KB
-
MD5
b4eb1bfbe2e00ec2c2a62f416f0c8068
-
SHA1
8f494a6d295081479a8843b1b5fc0a60e486099c
-
SHA256
ce38fee047fb3b4147a9c6ff31092e1efc4271e832ff471d9aa4d025d88cf241
-
SHA512
7263ed1c80d546d4c711d9347c6ac639f5a6d06e975fbcfa3912326662048a6bbda22fb1dd6c7ebebde097416537f4bc9e5a1eb66b0a30ceb989e2410974dd6c
-
SSDEEP
1536:SUFzJcClLDwa7yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:SU7wmyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11470CE1-AED9-11EF-BA23-C60424AAF5E1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000465aeee044fec183454effe49e3cb1062fc4e5401bb84d30d81cab2c6270751f000000000e8000000002000020000000cdc23e56cce23bb57ea03cdc549cfd7d6deb89c5d3c477b7fdd86fe83f4a50512000000069666eb34b2dfc09a945a259169e456f1f84c6b307a6911f12d39a04f008b60c40000000402b00307d4dfe66961617ddf850ca38e838df50bc005ac23a814e39e02e3c6939674c0242b348346126d26731f3620c9780a823acb0dba7e753cfacfb936ce0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b1ef28e642db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439105147" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1968 iexplore.exe 1968 iexplore.exe 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1592 1968 iexplore.exe 30 PID 1968 wrote to memory of 1592 1968 iexplore.exe 30 PID 1968 wrote to memory of 1592 1968 iexplore.exe 30 PID 1968 wrote to memory of 1592 1968 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4eb1bfbe2e00ec2c2a62f416f0c8068_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df0fe3f97fc0242e755c2004d23b6671
SHA117fe9d0d72da29bb2122f3d91f9eaa105da437d8
SHA256bfb852ab7df6ce8f71c6c1af0cbe7ff5a53b0d41631a2f7ba5d4fba1245e3fea
SHA5124e18ddcab6247bca4eaeace1de4be0297fd72ca3383135c8c7a1fc526e624635c7cb1aa3bbe998b40dabac19cc1750fd491feb57bdcc096a966c9ecd22f486b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5579c4bf9fe4bfb5d7bf521d5bc55e21a
SHA1b8011ef8358fffaef03383174230ab7b90799166
SHA25636270126f03b0e62b9fa87db5707157083682fa94ed5d51312e75cea7e150f43
SHA5125361afed03bec2b153f4cfd310278b26c6627e6157f39e371b4db15ea11d4418f8af4683a0b4cc0a80f7be346f65348822ce16688998fe411662305d0a32b75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a31991a17f2604484a969fbd6bf55c17
SHA1f9dbaaeaf66d2bd1b09666ff386a85e21fd40e1b
SHA2565ef804f58d71b313c592ba9e2cc3294e149715adc4ead98dfd40d578ce438c38
SHA512064dcd81de8d9b89b21fdc1ddb90f8386559e2a0bca9821c9b0317505c1f6f573a8661ed7ec2a4c2de4dd2cecfa45371f49366f32a98162464af54250c78a2e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533f8f5161365656d63c8b03086e593e6
SHA108dd36fb80c96ef813cfc894b66c183e97742136
SHA25600a5ad47b775cb758a2b2dd16e6b04fe0357dad51bbd1aec79c4d4144af8facd
SHA512fef0ee098a4834be5d0f19b5c4addfecc662ed3dd1bf75350701a58ee3ed9c744baecc5631a17ea78b1dec798725f6ceda2cf405b8443309a13c284e9dc8d5b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4a7cd468d619a3d5c1c81de53c42c75
SHA19663c44ee1b012b92e52b852a4149f2ce30c1ae3
SHA256bf2902afba603dd359ba4fadd01949faf8dbf6a4bc09d3a5b9b5c11b1ac3f063
SHA5127aa8443d9d5e3f771f1fd39b75d03f360c240596d08af0d80d31308ba9437de39975a7d123da763a8677190b5e362983fec23030168c9c867d535a89390e4bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5569d7c4b613771fa3290370fadf0e25f
SHA1c9848b134a2af644908980e668369703075e6603
SHA256643e35faf792533383008df4b942bdebce47fd2daecbdabd60b188f8848445ab
SHA51245094de15a5f24d2e9bb3e047ac6820603df61a4c9ae0b3cc7a295d9c7821d7521a5df256cae88fcc18b85ebd9da66f858b241115ee2ebb49777a4e66e797984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e009009706251e79a2f451bfa292a4
SHA1f6a517e2cdebf7a9a0670b54d158965436bd04db
SHA256629865648cf557732a8f2208fe90feb2ac94607e9679a8e94703c55dd5fa325c
SHA512e11747d6f324ce8964615142aaaf59750a51ab415584a84e66616d526ea3f110b5dba8d5925a7a9b35b19a8bef12b728b4253662dadea7b3378c4617aa52ef1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5830cc35de122cd44de9e887e7c9d82
SHA16a6f989b20b73f96c0750edcb73a4cfb81568164
SHA256a94a59436f740d5347a00392b0856f7f0feed85381d3187d16db728096b79028
SHA51203ffd2c8b0947cf7e2ad79a8f514443f161ec26e42816558cc4014bbf4875235daac9f917fa739cab4ecdb70cb8405e5cdb67b42767593f92d462c85aacbd516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd8419cfd9761090af3047a387771cd0
SHA1c309afa0a9284425c2a19b2b2293049ce6793e09
SHA2565ea6ca520976eb58684546b8033d0017aab33f9a06cba8d55840e50b6faf5235
SHA512cad97f7b0f186cc92a3ca60bb36ddebca1a1fac1c0241425a02dd5ce7c108ff3db53782fca4a94e7f3ac238d4b637dc80676219044dc0bba1babdd10c4608b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b68e1e43de319308978aae904eee15ae
SHA1d70e15c35579788785afdb1a716a5a9f054ae21c
SHA256820941a3201629486c23d7d9093b2f14b12953211130e33d53a748de0629fbae
SHA512847a71a61e9f7e808613d0c8fe22cdc811bfdcb3f606566a34b672e25b4d6fdbb5244b7bd68433c87cba037444ff6344b92d66b57fc0a3b1905670406d48daed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1590fbe0f22237ecf8428fa8f0b03aa
SHA1c052c0fa3d6a07f584e134346ffa0482b8dbc02d
SHA2562a7b94d9726d210a16de3b8810c34fbe3866533011f3134e1f80113d8407e093
SHA512602d7ad4ea826ba1cba0f08ba87fdad75e71d56e3035fa17067ef1982adf75c00664ac9867befa3278b045e92258630b3ac1c9ebf808be948aed63cbbc105561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a0b26d54271586d62f5fd986ca4fe38
SHA1ef8718c0f58eb26335f1dcc59ecc5e7daedcaab3
SHA2563a7c6d1b661478110b1a637beb2e3a599d2b8ac462e31652e0baba80042af80d
SHA512e2b65077413403056140d64f3323a56a9650fd429d15ce981c710a93b679d8303364619458cbc126f07868ba7a499ff24d0b667514692a51c77ca76b33274ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb9085d276bda5be8f96f3755d3cf63c
SHA1f20d8c21394863839e51c9374294ce81821bf7dc
SHA256ede8112ef98df205930f80dec84e482ae118463eb7dcd5d0cb9eee8b35c8a326
SHA512ebee9e4c7d9da0644c7d24dba659f8bc3808b1024012b1b7bac8aa1babf5fd72ebc006980f3c3ef25fcf94b8fc265802400928190288e752384d33950c841847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce98b92eecf6e8283bae4ba91cb3c95f
SHA1ed78763580acc7d93e9c520cf68ff1a34448fc03
SHA2568fd2b0c48ddb91083c9007343e31eb6e89bb6767d760724fc5fef67044e34083
SHA51279fb90054a4f77271c00d59516dbad0484500fc6c6071a818b5ee3f4dab663db6e7e7de8a9744d6d207944d19b490724c9e6df12c8f0932107aaa3eebe8bc9b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5af6e651528f8cdf39a16c6c46b5798
SHA172b3e9b5e1b41e5ab6a45fab219f69544542eb73
SHA256a0cfa9f92f4c673a0deed5446437cd4436c1badd14a4208d4d6b7a4a306d3a74
SHA5126da6c81dc2d6783c0467b2556434336a0961bea9764f820587dc43e223894eece3a216416d1f9a35ab00f55ae0fc70440a38dd3dc668714400a74a91b1be14fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e90d63e8822aec78a5049e37adb4bca
SHA19abbfd2c9edf1590c3af19c21e83b2057161ea20
SHA2565b8e1f050bd4c11c951cc188aa0a64d2f126d3aca7e584099b7e5c6ed035365b
SHA5121da0e15e5afe5d82b9f031d7b219fd46e10fecbfa42f020e0af21c633adf72ec9bb6431ef21ea20e0eced55ef0f7340c0aad157d66c9f870bba7584f854b726e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebca4b07395b24d4a2dacbbbf871d1d2
SHA19c784fa062024d79cec55a6ad08fdcc764cafb1f
SHA2565eef1751afdd3f8fb4b6e4c79b8f9200c53591c5641ac756cf8904fbbe8d8ab5
SHA512ff5ceb61d4a6ef7ba18b247667df90cd0a2e6b8e4d0c34adbd773f9cb2c4dc961b8cf10fed25e7370abad40de2d588491342753cdad8d1f126dee7585b0bbd3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0bb77a596b1d85e6e36b1636ffedf2a
SHA1ed6de83b8ccdc48756fa91b13bc3551067a99488
SHA256feac1090ce2816f6a438b6c35d9e731f99b7de26e5cd4b722918d80219f547ce
SHA512026efa51304781f1e19e3e4a9e6cc81bbfbb5117c19ad08d7bfd894eb94891cc8db11d3106d25d75b4b5d376e60fc09a107c9db61eb4ad19e9a6636413a77a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f683bb6a25a16785075557da5317bcd7
SHA18c18cf7cb3db132e19cd9615b4d6e778895eb335
SHA2564df9d0a144ca9e1004dd8bb64d509f2a1aace938f087e628a23d0298fac10b8f
SHA5129c55136d4631fa1b040cac903141d1b8733ff6d210558b1b89316326c26ce467722bea307777f17c56b3a532ff1e8684ea42b864e9a9623891f5b7a42b4965ba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b