Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
c160e6d970b1588c16900cdd23214bf7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c160e6d970b1588c16900cdd23214bf7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c160e6d970b1588c16900cdd23214bf7_JaffaCakes118.html
-
Size
22KB
-
MD5
c160e6d970b1588c16900cdd23214bf7
-
SHA1
00375acfd552453fd9af26b876b6e1490c1193dd
-
SHA256
5b7cf2a19af922f5049d1973b3976724288c6c5675e334d94c7d3e622bbc7379
-
SHA512
219b2ed1d53664de68b00211d983588aaec418a638721777b4f7809f320b764ce81260aa86a57d12354e88295e777396eb6a39ac41700c1231cb0f46d5ae13d9
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIKeoeEeYese94teqeKeieae0eFekePe2zUnjB:SIMd0I5nvH9sv7mxDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55D0ED11-6314-11EF-80D8-CEBD2182E735} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8095a03121f7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000aa31ca9b6ad294b30ed1d611e77267798682e3453ffb0aea20c3f3738aac4922000000000e8000000002000020000000d6e97b648b1e20329fac99a31d19b3421f9f802abad48bd0b9744d87f115cbc4200000004d87c1d57c55900b45b71da3085cfced32c87b193816b8bd51f61118c42196fa400000008310333dcc893c1a0273ca067c085ed0f78c2d2cbd2f6bc8097e00169e0d298d3d14ecaaf4ddfc76c13a39b8e26986dec9d738ba651c8c7df4b1756bb0c88dc6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430774315" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2480 2296 iexplore.exe 30 PID 2296 wrote to memory of 2480 2296 iexplore.exe 30 PID 2296 wrote to memory of 2480 2296 iexplore.exe 30 PID 2296 wrote to memory of 2480 2296 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c160e6d970b1588c16900cdd23214bf7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54b32d1738c82a5ecc8216081587c638a
SHA1dc885f485a4d6cca920efc08657cbee48a25910c
SHA2567fffa09e5b59cf30b23091959331ced15e05419d02b2e94bc772f29436643887
SHA512d973bc8e01c08921c4248cc905d6ea3ab6d89bcc749b69c4bc8c4ca792ca547ac48574bbed7883d73ea1827d293829d454d21f912c78b261934c9634423e19e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd076a96ac1a97ed14dafcd6e8bef064
SHA1ab97b94c1880960abec89d3e91ebfaefb96a8915
SHA256e7f62420932f06f5ef565cef7b3958f620a7c98890880a409f2bcb49991651f7
SHA5128cb6b0cc416139b3c3a51262ffb66fcd7e51536830dca76380f46c52d9ab59071bdf758b5c7e45da75c889da7dd8d8f761786d96086f10991b308d84732ab8f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5826b79e855a08bbd5c48deccf529d051
SHA1b3ac99d72911bc39d4102eb429bfbc4d4c065211
SHA2567250d7f44e0cff927e800febc0295f6391360c6f4a0b0189c04932810f322704
SHA512b501e17f4c78c366127bf055c120b0b16fd5670b1611291ef1e22ba96b19d713f19220b9c5f0e7ba8cc2542d049418cc878446e6e313dbbfd4af0ee43051c4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51707ac42a34c1418f4eb76826ca955d1
SHA1f7eadb8d926b0ee2fd63407ea1386070b2395246
SHA25698db83a773b513b7e206ff3d727494236d8393ad074dd2f00ade2f69f2582489
SHA512e70e717391deeb3121c0ef2ee7a051611be12a8721f8a3201f2bdf31e05dfca8597024e2376f66b49fa8c9046aca6638413002f65878849170663534852b4991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1190b94e0d625a29833d4fa2fd418df
SHA1b340bf94933babc19c0ca5af2e0533e4bbd99dbd
SHA25600742997aa474640f2ce608f2b34a2117e90d537b6e7b219f4633ca4bf511b7e
SHA51234001fdfd5d8507b0e68b77b0e7efcc1298ada871cf359c8fb7f4f6b043fdc1bc5c9c4ba255955ee2498888f8633a83db96e2d8db3e1c09ed994f539d139f17f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfc8ed97c843d9ca7f2da5a85f3625c5
SHA192c69e7605ddf7a9f37ff53b2828ef4ceaa9f477
SHA2565348eb11a453e3fe303ad16136a59ec17a7378a448b7440894da54bb0bbea575
SHA5121715b99988c27194c0038dedd9dcac26439111115b37a8399ba0e16c08ddfa28de98ad7c75769993d986d19f2c14875dbc3bc6a00a4b3fa34e8807673a517360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55def4f90f26ab6d546dd5e4d73fa8276
SHA1160a5dcf389a1064e13e31d14f74e0e0ebc38451
SHA256051c6840673c738502197087fd760d0ed832508493f1a8ade68afe2a4dbcb5a8
SHA51200378c043ad2897dec71206b4d0f8755ce43e86d5c701493e9741aa960eefc281d59cd538a204c35468d2f8907547ab09b740e38354c83895d8b55e0a0fb2315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57458fb679f592264b56df86121621c6a
SHA13c29666791abf22e74d8efa81ddafba5e1a73d21
SHA2563dc187fac5954f2d5482ab420c5209011bcf9a6d9a7af4bde52342acd9028ac9
SHA512043b589f61ccdca15731c79f681bd79df4b71d5bf99d922c8b13dd0ae3e9c17d6a215dad21650a9903bed22511bc8717460066f4926e91120f824fd7c1f2940a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa1699750cb0698587d48cdb4d29f73d
SHA14e53e7b03989fc23090ccdda4be3de1117262f64
SHA2566e9e7304d47a970106c0cf67f6ce306b59a8bedcee369276a83d8e64f3212dee
SHA512ce69ab0bdb853a4c2e125bc9e7480c376e363a8ee84b15e3382bc349747378ef79ac5f908fe46a29ec3d35f2c78c69afb226cffdc82282e8775f23dad61ef6af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ca027bdaf78f33168aa83f47a40b03c
SHA1176565cf49b39481a63951065d3d738af72babcd
SHA2562626d472d26d5a5a7dc5e3e3726be13f1283d88b4009aa5c2b3d591ed4503ebd
SHA512999c9851639fe0f57004ed21cc10a8541cf3313b246324a0a09358730545a0a84441ef21f50d2614ff878a9cdc1cb0e73bfd17ff108fc3fd90649f489e5c0c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a48b62b9908f58092f32eeb34287118
SHA163ca33a7706dd052ba6e185a7749b2f9418898ae
SHA2562bdb5f4bdcfa9784e557258f096085eb4a9bbb7e204310a450db8f8bad9e36bd
SHA5127bea2694f538d082c034d1d7055f74e1a3ee2e89c5c0ccf1d74ffc47d82730af8ccdfdc843041accbaf089b867c493b8e1099fa7920355297aff9445a69dcc1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df787e9566e33eb1ba5449463feeecf
SHA1aa642689977924a7bd6163d6624c9e7b942f3bc7
SHA2566bcb4f6fcea9563bd292d9d127be850d81c088ab7f878d2bbca3cffcdd870d4f
SHA512923494c61d5b9065296032fa357708a775b5f7d7b7c74cce87d5b5ef40e3054babed7d0bcbdb0be53e81f2d7beab99cc9dc40fc1677dc2942bf9706a18769985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc28a116809552b39e8fec0ef4ae17ee
SHA10c0fa7b6783b83e30bbb14aa56e76cf9837a948f
SHA256d0f47cdc7a4a06fbfd160661153718795e852b657ee007fea83519adf60bd85f
SHA512ca93b99b95e1126827a7f1f410ed850531156340a76d3ca2f06b475fef29ec9369d89d66fdf89775459b6f6840045ef5c9c9331ba5156c57a7e953b134e3a737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4547aab49b8d804116440f0a7556b54
SHA1bb8c92edca00cb3e606c727a5f4f21a4d8903480
SHA2563739e5c93f2197ffb60e07c542a56a8102ad9ca6da1a36b731bce1197bd6ec46
SHA5127130e974efd45ce0b35edfb3116e6d7efb6269d35c3b06d4ff7203e3fcdfb3ec39bb5f7546e55c59e68a04c4f1d4fb899e841e5125c144e1c79fa9356f2d5c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c7e53c3ac27728374dcec4dc16da034
SHA14a2ff6dee940e81239ea439bdeb5349234ac3eda
SHA2565aeaa541ac5b8e31925f6efb2fb35ebdcdbba93afbc5cf93322ef142bb6c6a36
SHA512c78d597149d82bbac728cb7bc8d6f3d66ee8d6bdf94c98abf82d0ebe48415bd084570f10033ec0f63d96d8a9a5262ee624f51683fee5ebab82c91e32f578aa47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a283bdee373aa9386ee8f0c153624649
SHA13d14129c41996fc5ff1003662db98a93508c00df
SHA256247364110c551310047b0c373551cbb79cdb5b418634a58c64d7fc06b3709942
SHA512b7af7cd2c57dd2d2a8ef27dcf8edf679e6e940c35250bc2d90c4f1ddcd99b920bbdee6221875b0f45eeaf31a2d836733c2c175bbe546c44182565f740b2013f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573ac6b598b151ba8cb59c96a4e1ab0d8
SHA14b0f9e446b1c1b6415046ecff43b3a60e7d1129f
SHA2569523ea5f3c5ab54061a07e993ec646afa580710b7221b3a3b3f0883dbac043d5
SHA512233fb7b4fed9283f7fe101d392bfb0265b035738f1fabd609144188b044bf414474e561b3a0aa1de5f0eebb83348d936ac07fd947b430fb1761f287ce10114aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e4dcab49346457ca8fc972f23042a61
SHA14389219c0db4a1c7fc6aa1831615e76b91c709dd
SHA256f61dfc1aac7a031009599c1fb182ad06a8eae1d62ec50c2d13dd185f8f3f8c48
SHA512e1f7b369a69186eb711772f560c534abb32d4f220698c66c8e546544d01916b8733b8a697d6229c7443a8fa1b4d55716fe253d1312704b649e59e58662d8a244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5257e8b2b943c831f7faa93097ec36eb0
SHA15afeda3e66a5f8388e26c1a272c4f51508d9f4e5
SHA25697555a4c01adf97f25e8e432f11b65dfdfff2e560a7f8a019d915239ae7b94a4
SHA512c8468c2b7f2e32d1bb84588ae4fd96f194a7d153e1e05f8ac67a9a3dae34bcf3193a1de2d2178167960d98785e17e2907eaafde198580ed761f136e6c4977f5c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b