Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
cf84af98f6d781b5b519c80acb8c7b24_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cf84af98f6d781b5b519c80acb8c7b24_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf84af98f6d781b5b519c80acb8c7b24_JaffaCakes118.html
-
Size
125KB
-
MD5
cf84af98f6d781b5b519c80acb8c7b24
-
SHA1
988d4c86fa1e93165e2a82d9afb3af9efa6128c9
-
SHA256
f565eac8535c5f7801ed10fa61cec1beaeb5d9c869c51558b684acfad973a103
-
SHA512
4aef430366b5bc4eb582c5fde6be04ea40b3e45eeaa5704eac4f077986dea51b91b071e5a83352511d67106c5a78fc42199790d1414cd2269152d5b939312499
-
SSDEEP
1536:SsByLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsn:SIyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000043f63878b02a9e45caf2810881068b80fed559050a4d6d49d39c0448a86922fc000000000e8000000002000020000000285e77cf894462b3d6ec1fb9e9c9878e719eee3b68a206a7cb2c26e78d621497200000003fef0c6571da7430eaf72de056a38596c93300d724b2b3e2d8504e6cabab7863400000004a5cc3dca69b3252c7d178d9c0446a03282697da0dcbdfb269efba2b46787974344b1c290e6f3d3dc82eea8f9adfc69909eeb7aca3b2640f72ce2ea6e61dc961 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905c331a5700db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{45A1A581-6C4A-11EF-BF23-EE33E2B06AA8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431787040" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2396 iexplore.exe 2396 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2176 2396 iexplore.exe 30 PID 2396 wrote to memory of 2176 2396 iexplore.exe 30 PID 2396 wrote to memory of 2176 2396 iexplore.exe 30 PID 2396 wrote to memory of 2176 2396 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf84af98f6d781b5b519c80acb8c7b24_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ecd4a3455ea635ba7828a9935b6e2af
SHA12d2647c9ba91c5e1edf404fbc2736cca423dced3
SHA256c45c17e4ab80932a34c29f7e9c0c6b11af608c661789d4ec0fa8b48dd73b464b
SHA5125f23905f8561da2ace1f991f61098624ca09479058d79aaee80f14c470090a20fd6330d909bf20b52bcf0c50a16243a7c8c17d06153ad6605c575f852cf9d247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a0bd518a14fadfe838df60c4f12b21b
SHA1e73841d6c6f209292c89cf3cc1b8117fb864b6cd
SHA25697a017d0dac6a9b162595f0ae90c51a53cdefd3ad99b737728bef7825ee369ef
SHA5126cface647506d56661af358a432d484697ea9cb9a753e927048af3160fb0624761af056e3168165013fac7d5972e70a31e83972da2e552bdb9fe7d5b0e9d2afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b75355f5da942185d3a9e544eb15cf01
SHA1abbbc341df7842056052c529c6906bf765d83a1b
SHA256c76bb4da5ef6534177352271e7562f112f14b19bb321a16e7ebc6ebd36105f10
SHA512eb9805fdc171a6d81f712b3a06435c9c19c74dca4274bb39e2b7351edd077d6590cd6f48b60eabb9ac3d6218f1b1712b903e206ee163a1068d553983129e7c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e63bb7f0b93bde101518012472b8a3
SHA1bfab383c3fdd3ea75a7fd415bf95ddb5ba2d2def
SHA2562fd7fd590d4061e6ddab34ab363286c9b67177747f1980cb9dc3209b45af7a7a
SHA5120da4c76642c91890c6a0408ab0bb11a8b50ecee463a779677b0435e1a7218579707126a1d7e369e16545b763598d1604a63f78ee19b638099eb03825c0a90ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aff7ca84180825d7f814994e175eebf6
SHA102fd726e8fe7109869aeab9a3feae9748e4a77cb
SHA25624e1ee17433a4040c27d71a1541f440513a9322324ad75cae584658418453f68
SHA512925988a007358b59443cf040600b0659fd4eca6c4029845084719d41c7a6556a2f348e3072a9176c796f37bb0dc0cf79e73da0297c39f9b2fc9772833b8e0d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cd3ffb07a03398f0b0ed0d39fbcd831
SHA1e09d2cebea3b4bd3f5520fad6d45677b95542506
SHA2567e8624cca6775f9b6c22576c37b91e2601fb2fcac6a921141513c7412a6fe475
SHA512e59fd4a3e2c2c4ac7542320ce625db2073393ef763840d1d301f5272beda332b418fcf0e3476ffe62a2704ac14bd042d3b7a8489f0e16bf0c25bca90fe24fbc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f91ced0d72ea2d348c3cd6523badc09f
SHA1ed8ada4628cd0d680a6944e57c89382a37b356c7
SHA256717b535c5d1341ca8ae08ae75b8113291c694860e9dd44c10eabdc38aa5a2d32
SHA51269d1bbcb579a4fbb235fedfcd5083bfd9fbf84445f91d7f4191fe3d57140e319c5b761c402cc941857dedb91392454b4a27c93aa74f0851de3f6c3b1dd643db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b6e16a0aa0c2f81ed2f5820e7cae00e
SHA16e33b5bc46dbff3402cd72c42aa228b457fd8d86
SHA256573a5b10d9ab1d78ed27d66d33b51936b2935cd90a33edb4a69de122bd472c4a
SHA5122a0c277212b34c621ab4ebc36c1486bae8289c82b758ff697f874b24730a447116bbee2989ca8e22d45c52f87e790670204925ff28f64a2ae74a26baf1ebc9d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540c225e49d6be8e7f93169fadf761694
SHA1d5255cae83b90da31aded489f1f408999024d42b
SHA256a22f7fe3a073b6e34c5331ce7c1155cdb9574612a37707d5a519df8adcdb2957
SHA5122f11582a633ba7c06416a5317e4adaeb05a3b329f8d2ee0b89b44e08b23f30f57706c332d7b16b4f09f0edf7bde8a3b62249e8480e8273edaffd2a4e2a8d30bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbf047314403661ee5cb3399477d0b83
SHA17d0bb5f7b189b445e4611a5c5b3224d3f90133e1
SHA2567d4e389b728d5b21c5a2d9daf3689b86f5bb8ccc13a1263c00adc19e3216a607
SHA5126037ea7326dab2913bf1972a875344d3de760711399327ac2202dae42c76ccc5241d8868f0354c8ed93edf78dd7ec04590805a176117d7a8deed1d131cb98f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6290023675062802009b6bf1cd1e198
SHA16d17f90f70b4c01b00f8a8825d38d8949272b705
SHA2569850367c3ee004dbc542be4b6a764f5cbf9e439381fe3b324d8c1411a6e393cb
SHA51207901eaf74545491e2dcde4125275f84eb4c823e24871a9f0f1d9d28305d40187b7da9d08392700092c795e6a1cfe7db0a0a54caab119644be3e972e041685a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526c5654efa6951d4d3b6402e38c9b9ab
SHA1c213e510f2a06652bed7920a2be00424725b2b63
SHA2566c4a02a85467dbef0467b9fb513473039f0260dcc4d38c5f0b4bfc585b1f11e5
SHA5124904eb64541d9958b546e0aaa0aded9db18b813dba3d4c601f97c41c2eced44041ac6b231322561836b30034635a4ed50f7dd0ad4ee1a784ef203e7d3082c7cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bb1036ecd64a32a72beb1ba46b7bcfd
SHA1de5ae1887aad062d56551ede36596929a1fb5389
SHA25629720ce9771c83ba119ddb6480b3e31d78f3b706aadc2428af9bf5050a152f3c
SHA51237e91d8e6626af14f717d11d2a3ff61bb6ab54319340579ad019bbe159b63e9b0abade6ef4b5c241fedf4314876dc7df36ff865cea7915f1e0672179d5c12740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51326e50ac99dae381887969f5f9aaa4b
SHA15869725b7fbde60382c173d91f408cd2613df994
SHA256afd3b8f8e8446c3bd4c989458c0e6d273788957c9c7985a8a5151ea413a82175
SHA51234a15f7aaed46f80e4c3456d706179b7eb84444863023b8a593ca0c56bc58649ccc96cefba0d718b9fb8f070cc1992b187308a30c2215e841366f5d22b2dadb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58344ef8ab5c6f4cd1169f2405f08ff40
SHA1f2aed598be59b6959efec02216946cfd0ff09667
SHA25619fa09805cfe0979b7f98811ebed2b3417e6fb8d02db7d94bb1160b54f95f3ad
SHA512b8f765ac822548240dfc17478eb3307c56d68c61a8f10aca20e892b9cec4ff6e360883c316b5e37e0287e52628c57f49fea4a3e9b32fd646bbac644e4cb49c4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51155f3d686c8d76ef55a00b349036290
SHA19a53f1918cb3dcc5dc07ae9d7438f03191c32817
SHA25621cdf01e1191e8436f8049ad58ceae49ded5050d365f0a5f544ed08839adda77
SHA512a079aa016b13ba13455678e1a70076fb8ec4be4b637ddd8f21b0d9f1b7a6e6d89b3e8a3eddf7cfa639e7907b47fc2f32509ddbef0733663be7f853986ba7b879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526b6e5b982d891f0a73148b361698182
SHA1ac1448853e06fa2e4bef45ccb1199ca02482f75b
SHA256c2d3c384c31137edcfad53f0bdae457ec2f4e3c73c130ac3585e5505f5e7e4c4
SHA5125c227d1b62e6a109bbb7b04f29064eb6337f2ea820e449440f6d5dcfaad95f717d271b5154b83afaab081f2471b5f772dba075fceece667d71ce1d7f1b5fa623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57841ba73f837fd7a50888f62ed7f4c17
SHA1442018ecea24e530b1da34bf5e0a412d53f4503e
SHA256a6c8a9a2ae92ca926bfd9ad9e8ab6280a128bb0d406e0b1ac6366097b1072985
SHA5123c0fd3d3735a9512208b239512dc76230aec7b14d9314578d560f62115aa7a861567d7f6e11ba5d052bc545b7d8271d35db145242812ffab8495311714fdf5d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4921c96267913c6d76d54478e997bbc
SHA127b6e3aee45439621a1b0c81067d81359f98aea2
SHA2564a2167dff3242bcda7d35bc42ef04e64c2304238818bb027dc8edc18b2b0a3cd
SHA512286c6e0f9cfeb14ba934b5feb667a682992ed5f0623867dc534bb186af06ac59c9bdd551c2d174fc445337e1b42089e88baad244c8772b77689b02dbe93c5287
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b