Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 06:31
Static task
static1
Behavioral task
behavioral1
Sample
a85751000e5f055306e00c773499052c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a85751000e5f055306e00c773499052c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a85751000e5f055306e00c773499052c_JaffaCakes118.html
-
Size
122KB
-
MD5
a85751000e5f055306e00c773499052c
-
SHA1
b7b0a744612b11a1edbd2ddbfd430dcb5330dbc9
-
SHA256
c48ef88f25830783edf9ee65ed7b7a85c054d25556f141ab42851da64be2edf9
-
SHA512
f91d3a5a136d2a8e341e8636a4eb174684572860ea5d55622259106df00885574fe1756a0252aed41f094d7e6684c980e070418ce25d826a73308b5365a5f166
-
SSDEEP
1536:SP3dNyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:SPNNyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424508547" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5BB5C01-2A17-11EF-825B-FA5112F1BCBF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00d3658a24beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001c8a94a448a3554e93961ad0cf8c9a5a00000000020000000000106600000001000020000000d4881dd5381ff3d2deecc7f692e0fdf9f10a0bd4403f8d6f87ad6304b5ace933000000000e8000000002000020000000b507f3b8680578179e853e064e61423853ec652c9e81aa2069cda911a09568f820000000cc75d8b3e19b83c4ead7d49cb7fd61b791732fdacae29f9861f71fadf3fbe92540000000ac3b79ec310a796f13d0685262a14ef6269105134597d469c7ef6696fe08c0cf35f2e685654c60e46cd21d49dea392796de65463daa090ed4d75438f6214f14c iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2984 2204 iexplore.exe 28 PID 2204 wrote to memory of 2984 2204 iexplore.exe 28 PID 2204 wrote to memory of 2984 2204 iexplore.exe 28 PID 2204 wrote to memory of 2984 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a85751000e5f055306e00c773499052c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b8481c4e010c8a8f2798c3fba39721d
SHA1c107eb5de00ca920272dba034b67b19623fab1c2
SHA256dbafe89e0c5003f7c8bcc985ae31b1f104f0b73c833173b0092bcd960523c965
SHA512500fa63567fb720c19fbabefb04563315ed8127792f43d3fd24c9ec35d721c14883fea7cb5a21200071f55283171895564f6daec21a3708c07b1ad697d00b49f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5207061d8d925164c51a36144cee4f4d1
SHA130463674ac93bc8f79f52943775be3e5ca762466
SHA2561618042e8606e39632d0c5d8dd3458c7023081e31f97944b351dd1b32ad2389a
SHA5128f747106fbd25b788971a8447ccb6e89eece68a9e3c1d40ceee682749261d83e8f73008c39e8014ddf3faefa4874b0ee7e64a14953c97ea9e880d45521776e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc0906a8da40291dc04c37993d283fb4
SHA1ee24f6b1d5e2186d0f6d9c4245be94c87f1a39eb
SHA2562042408f2d22ee256f4819e4f18fab1865e1930db04b794330cda86fad724f27
SHA512ba06be2c90df8c7341ffeeccefd35ae4d8b22567bc48cae4db008d69d0f70546bb3e48e849f8796a7cb94e7a2ba087503444821f75b0250cd19e71da6b737f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554e992b983ee89b316c6f44d9a1da37d
SHA1ce9a57a80e0d55e013d986c0e1972a08ba644b42
SHA256a9b741342dc66f9508237ce0cf3a248e32885636fb15ed8d3ec027f01dcb535e
SHA5128f0447607b50b64c4e055bb28d70a888c8893c9f01efed6b5ef85be72e8a271f4fbfe192d0af35d30c16c815c0d89328eb1762ba99f790115db837cbda2016b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533fa14d701312cca648363d4aba842ab
SHA14e6cd6ef961eb8f02585542def3152fdee77ab97
SHA256d935bfdfb28f1fd1b74b3aecfa0fe8d524c4fc9c900121fc7796626c58843c56
SHA512b22f602a17e7e1c1fa084a4aec23843e6fff90aabc8aecf2ec899e64e28076dd90dff07b05301b64e61898316dea12c449167432cf8446c5076bba8e1abe39c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e29b406b8bdcb4d72a756f4e3beb3cf9
SHA14378954a389f64e84d9199154e092a7643684170
SHA256a05bc3a262d0d8e4cf1761095a096326669fe5d34864a95c2ec02df6dc78648a
SHA512190c8cd6aada3ea83374c13458cac74637110fa5ad24ce3651c0871196267168085ed17e13380d41dd519b8c39bef92eddbaaf94a59b1fa64965e33308fffbd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b78213d258405c7c322432b27b7c9330
SHA18fee2f06cbe6e05620412bd1f6c59568e523e717
SHA256505523863cb7ed642a033f92520a889f2f538eb184ccb64f8096578a341df682
SHA5123ff66f1165b1fb1d916740141e2a6e1583c35c0d4e08c3d5e05b5b107eafede60d2e106cdcbd03a89aeaaae16a0ad618972755d0a69635d402a42b4585ab8127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5887b0b5618657bf8f2c113398cd236a7
SHA13ba5a9a26864e839db22854f2ed29e36d86af1f9
SHA2564cc0bb911914a1ce902f81f839649eb1f9872753319eff6d33efe9d805e03446
SHA51217e35ebd8b89e8e9d36d4ad3d3461bdb06de0932a610deedc4a1ff3a68b4bb1d283474dfc1739a44ce8f63c187521e532de5f125ad0ce0b9b307275ebb644e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5affbb584cfd59dfbc54343df564d6b6c
SHA157afd5191f06a8b9c0097490fdf8c41f004a8e48
SHA2562d8856f50063d23b2108a38a13e1b1b53ecfd71c0434a543130ba0f8eef2dfee
SHA51280092d6278a1476a7babc3cf6138e425039348303a6efb8544c69d6e0c71a4a63e3dc67d411765f730ea4359dc23fdbe73bdce188a42b7a4ee21491b8583a285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57037468a6bc0323080b37712b596942f
SHA159de78983e1a3ed01e883194da606662ac207821
SHA25639d1e9ddec7087c6a407ca45e0edc7291a8786f3520e72b6bef2f1b48b669ec0
SHA51289a64e6a192c9d8fd681b9ee5a0d64ea376bcdfdec3a7ea7f7c680bff47687a3125d312c99aff151e62cf902d85ea1fd2fc57c4d307436dbf705ab36d3a12729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584f1484441fb0cddc8e5c85cb99fd876
SHA1e4c30b13f87eb9171aa77c6e4a3274045a04aca7
SHA256ab91320b7a19d7c1d65f29f52a0f7ea39528ef0947eb9d210a9819ccca6aef4f
SHA512b7fc62a9e64d66bf373be0f4581c1f99a78e6e257288ab5b7f4ef240323e457a32a5565d945653406fe380092cacad05a5a8ee491edd337fbac42e890bd00847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb68a494870ad9f83351bd5a9277f180
SHA1f87a485d630be99b0855e672c5c3e94bc98fb419
SHA25609d690789ef899ac019a4fd5afa080f45464ca12e2f69950612e11224f6e69cb
SHA5121dfcd5a2a9f51ad58b94a958163b385370eac02dcb3e6c2a46e7fe61afa9a220bde31a4ce776009fdbe591984f90121d3029a5ad2ed40e73144114799245a498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d1a2848d985e8cce0e55151c0c2a94c
SHA1c8387d48388021f2ba538e4130dc025aa5352189
SHA256748f29374adb236a91dd8b048307a7d3894424dbfd54505bd59735d964681e75
SHA512dab9650faf636ce1fa615d95a9256f13afb1a17a05d51cb013cfbbadd1e5b4ae3101bd6556ff8736276470ad973d258dabfc6fb621b9783b5486906e85272708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538f74cfe8ed8b8d22b52e222948650e1
SHA1f8807b67824dc69fa63e1d1f42550fca8ff35497
SHA2565c9ebf0ad3730272dc129dc075d5085d1a7bb936b77aea8a2478f7a20d6db7c9
SHA512600043ba1546acfec9818eaf9e3e97ef1119340bdcc2111670f36c1eb739e2232288eab88181f0acdc19c0ee94dc673498cd23d308c1a361a8d0234042c20d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565cbd988abe010b5244f1c641ee80c91
SHA108f4e8e8c794b01598ab466e347a4b9ee08ab109
SHA25642c0c938cdd2ba52607288cd2d8fe8d40eec1446a3927b427cc352f432d1420e
SHA5124836d20d103ccb4a3756aae3b755f8a68a8e8bf804743e6c30ed67e7f7d1d5f2b57d4e416aac730c9e9d130a2ebcccc47a60500e8d0a60ddddfc0be31d052249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e2497799f8b411183e105d8d8845bb2
SHA16b76d8b3c07c9badeb4a32f41df93770f9409174
SHA2564e3169645f51cea2017df98b331b1ad883c55fce7b4b51f34fe429d7835d081c
SHA512151a2a23b92714863acf9ec7a71acd44f37c039f402629f635af4571eba717079673019e61cad2f5dffebba71ae005e41f70c23ecbd05f1627fba406623cb30e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573fe51b29b2a7a434db21903095feeed
SHA14aa566245cc49d525278ddf2bd4cc52a2970bb09
SHA256949b3c2e2c21cf1294a243223c60df3a3720f33f3d04fd75ebe0f800b58840fe
SHA512200656558d7ed3454b4e12ccef0dfded28b448127ea0342c2a40ded2c19bb5e32355231b36fadda77abbeafe49dd1f462e0d193cfb4c55acfe6cb72104399f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eb50bf3fa25c34a0401e41ce7512924
SHA1a6acfe335af300549c0ed42fb9ce661376267f41
SHA256522a0bdb118e0c381f07a32f3c0c352577188b750fa718e5eec6102f24d4e205
SHA512fb3a2fe986f08c0bb142cb8b46a2e4c68193b134c2c00f18e550362c5e63614e461a4aa598d155732bed7e07a255e3200ab28fb76b8fbc19b2c4836787e70a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55150ed6d055503200db98e77d94ef329
SHA155981424926f03092aae06aaff99ee2234e1aeef
SHA25689032a9ed739af1149cadb5246fe10e0f1dc6868084f364906ef84bb3f98f627
SHA51205995a935a417375ebaf7a3f685fb060fe4cd2d8aff0f9fd21dac2e8b08dc7bd7dfbf08dd2a661f34e33c7548d88dc3ff83e9b08b51c8efa608da8b8fe992cee
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b