Analysis
-
max time kernel
136s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 10:53
Static task
static1
Behavioral task
behavioral1
Sample
d430c6e2371068723af274aeb674c530_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d430c6e2371068723af274aeb674c530_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d430c6e2371068723af274aeb674c530_JaffaCakes118.html
-
Size
157KB
-
MD5
d430c6e2371068723af274aeb674c530
-
SHA1
3546c27c32ffe7d5012154288579ef48ff2acf95
-
SHA256
9081c37099b282dc7035135183204bac874b32aeb3b063bab766f65c75869d6e
-
SHA512
d7067bd2adafe370b489209cf83e7c267b2f87301f585f5c2183ca305ce067648325f5d0f94b2ccdb7ecf3ff835c084182c89e0b55c65b83e5c05743da8daaa3
-
SSDEEP
1536:SQ3T40PejamlIhaHS3oyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:SQDgaXhoyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00ad29ddd01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A50D0C1-6DD0-11EF-9A25-6E295C7D81A3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000006cad04b1379246c37f0d9b68c7df0e216c36c67908fdf77a02fd3d7fe1d4b129000000000e80000000020000200000001e7eca1f4711dc1abe88ba7aaf8585df14ea2e6d41871095991d758b2c1c04f420000000272b91a0c74a44e6a23c818d603612ea8c65fbdb4894588054d5e0fc7aeb058b40000000e8b8bd09174576cfe7ae2c2ab00dae7cdfb0b8963cc418dd59da99564a6a86cff17297517ca86d271e816ca8497cbb9476d1bae37b45b84b2dc48577975b2f2e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431954664" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2996 iexplore.exe 2996 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2776 2996 iexplore.exe 30 PID 2996 wrote to memory of 2776 2996 iexplore.exe 30 PID 2996 wrote to memory of 2776 2996 iexplore.exe 30 PID 2996 wrote to memory of 2776 2996 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d430c6e2371068723af274aeb674c530_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2996 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50631d9d111e7547f2ba3cac36a52bb0c
SHA18a6761217ce7c44f8770e3eacbbe357e34391fa9
SHA25631cf211cc51aecf5859e732006a3c4b55049732d7445b29181a2bd38361fc326
SHA512355f33ec8135db263453f104452ce8dcf4a7e94756dc6a6d1de45840df2df8c42480514c0fcdfe1559d8246f0d52bbab7fb1dedc75a3b3a6200e1ef8dabb9c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5876e2cb2bedd68f1ca873c7c908c2d4a
SHA19ab4ecc02a62a2f86bc19d818ea08730139bfa5a
SHA256911ecb6d6cccc895d6949f30baa54f147c98d16edd4aa8ed154f2eae89136cc9
SHA5129ec3750c2b17a067566f4e7a5719cfc58ac1b82170b02498783acbd1b7a7e6ea74715095962dc37a40620d6d768bfe3934472a91032b82f1ad6d4c85393ed310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54855393f25a0d8c85e8b30920da23f81
SHA10c871dd27f3139d0ad3e8480cba8aa0aa82105b3
SHA25642f0a8293b05230d70d5d380e4ed91909e23a0fa91c70fb5559ec6985721f7fd
SHA512a63c3bb0393ee975f37b57538f146fcd2e3b9ab8c93cbfb697c66304839e046de412b4349a3d3d74037a4c7bfb85d58a72dab650ae00dde0cd2691c38b9026c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d0923fb5ec17b7e2819973cff8fb98f
SHA15e1b1aed7819df96f9e6717623f3fe3df8931058
SHA25607bc701420a2ac4d323033ab3164da390483b1f2ab1acff18bd8e4bddb833445
SHA51270f9eeb66e032251ed18ec83ff230f205b1576df5938bdcd16e435b9c51db3a7dd94b57bdf6af62560ac86e218771bd4921dc9dd8387ebb84f719680a191cd86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5672cdf3283b48d1739145ec3695f9e27
SHA1c919357ea9bbc4f9158809deda24f7de9a593ce7
SHA256f5b5a0054c24cb735b852e34ff1d290241fc15ae49665d9fa044f7898b47b3b4
SHA512d960f992664fdacbb893c1f410b9539a42b35469703ca10224e4142ff97047782a80b44575104be65af68e2f51f686cc46485d6b49ca9599d87205413c462b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f87f6901330353f0217ddaad4d36b83d
SHA12e98fb0febe9bac2068430a3824456cce377c7d6
SHA256a81aef19a59028a5082350234efe844403208775a82571aa95c8a90447879de2
SHA51269374593ca876629099e548a84e1a813ab758d66dfbeb0e12595b2a950836db60454d73f90fe0711b480189fad312f12eb6490c0df955c54e71a1dcfaf52bed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c20b64c2ae9e4355652c0356217e547
SHA1d6bac0cbccc5f5cfd576f8f60c580784bf5e29c8
SHA2562027a0ae9decaa485aee856b1120fe11df8cbc80da35d662f63232fb685c010e
SHA512b3989c4da801ab527f3988eda04cc5bcd1664013e78bf384ddb174cb283b59357f7b5256f62612eb9d24863b87acbafade9a987d991ed452f5e919a2b37f6dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541559056a585df0a2fc3ef6529726520
SHA106db48ac37a2cd0fa2f504dce938b9d27735775e
SHA256a1d1e7469af9ef38232967db92e4e8031f6fdfa47c84117698f066ecc5d4f27d
SHA5129a2d3db10dc9863f4681560973e82bb73c1e9c5e590727838f5c410e4a4d3a0c9bb85745926b5ba09e3aba69815a52bfec4bf4e36b967cb4502945897a548558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5458394015dcd7b6d3c3cdbdf816894ae
SHA18e55930a1e76155664af6eca463b51d88be38db0
SHA256070caf43d1f592727fc9f662b84a606190eb173a8d822c649171095e1f227308
SHA51248d3656b3084a40c6b9f180746c957a6b7b86f5b2bc777be086b69391e5f101a8b1d71dbdce4669a6acb78b6cdc0853b621e7336cf8707372cb56da9465e3b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5456909db35cd72aa85143ef81e75e1c3
SHA1eae80bf5aabe9f7e3ae1b80f83336cb912da0b25
SHA256014d23e17b1a9b7c03026627c4a169a35a75cce9ab470161be11990cd917761f
SHA5120c522810453109b5ba5a971748d93730abaf9c5bacd5cd3d560e8eac44efff6a51b1095c1746296c00989358b949c7c019d2be3726209b06ab2645d2eb4b9157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b46e2992ecd378d4ae63806b9a207889
SHA183e3eefc2c7f8f337158548c1578f3bd899d9133
SHA2566b9ec57db93709df31d7cb08fe133589494aa54706350e38e7e43574c60d74a1
SHA51220040c1132886e2a9f6dfd4bf25aa1e9ec787df7e511711f1becfaf2d9490497d32178d2cfd071f0c7d0d248960aaee9360d5a3477870aedb4a2bb87fc9b108b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541d301cb3474f1e2fa230face7430281
SHA16557d8c4e3e8ba7f47b43e2c73c25700b719670b
SHA256d4d6038ea5a1c9c33ba4a86ae99f1ca5bddca66195b4a2f4a754a6e6ad1ef72c
SHA512b7c5c5bd00b17aca54e5e44f08276dacb638e56f37b8ab4e97fc48461059e8cd9ef944a5af5627cb55fb16f512a407b0203cb181c764cf575a2248c8b00b8abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57be42d319cd6caa22e9392923e705239
SHA1dc8945795ee5a4194636dc4969be17ea3f8d0612
SHA2560f72248ab6ae25b400d5e4748e6f9234e94dcf126e16ac610435e64bdb121f87
SHA512aa05517f314cb53a8129cc7fe99c7c1a80933ce1aa20d4cff535bb9eb9e9e6fe11d30f67210d1323a1572a6948cc3ac58544ce50f590b8e6435052491db1ee33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5231a233b3388edf2319d3f6cff6d7f92
SHA1c9874d7e500dc1722e71c7cbebd08b1a1aa0cda2
SHA256fc7c59bb6dd3d78411c415cd27e7ed25d8637d2a99a2a49fd666840bd0592b54
SHA51267ae345569340cf3d0481dd23d84423e508ad7df03817b023e8c14ac0ce7a98fc863c89743545dc35a621cbcbbc8f00434c9368d1bb8385a3087a4bfee837732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa39ccb2588e95b9c9b85a69d91eb954
SHA12121108d69bebd941aa1e23b2c7b92fbe8a52029
SHA256406c9b82466cb49dc0439d077db4dd1abab0c12ea8eeee0a2ff4db833f51bb68
SHA51276bb0343152a4c44c0cea28cdefc7b392b47a815e9d890852ac14793a0555313c7fe9ba48ef1c1e11e26c20fbe539234876e2489f0e52d4c30f105184afb16ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b05160d3387b6bac55896d011901557
SHA13e9b9112d07fc88b4d020243d15fd06820aefad9
SHA256e751d517d789a90d3eed421ae5a2d4ccdcc5c3bf6a3fff85c9d1891e2693a403
SHA512b4dba3f9293b0182c6c4f9b0d675b0555b31ae0f9388de7ac38cf887277785bfdc8fd5cbbbc431cc591a1b3b8c5380ba85de9296cd9dd2c6990b0f5b8f314834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d76942d7e05db5fbd980aa5792a90bed
SHA12a0a99c6f9f9eb192dcbc4dba39931c8ade12727
SHA256dc2dba8c2866d1a507c04fc90b47e9fbe82e0966ae12377d489b14c8e4f7b34c
SHA5120d4f87f4a84076612ae0016556b2974e85b669f2d7c426e1a88441ebd2adfbbb518275f8a98d050cd9f3cce0099480bddd4b5580d0ca490af60291b566abc3c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab0cc1a4612102215a4550cbc61a1541
SHA164a160aa063518ae6990535d73018f605848db5c
SHA256a10fc4a5cead4d435bef44864b7aa5919f023b95c0fd567fe956f53a5a458d79
SHA512562042b21e390977c5a6460795db02140a2f7ccf20b46ae14380236d864553cd47f097e8b560118d34c138dd3c9f3c40fa54535995c1c695b53a842cbecc9452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4bcabc5a1092ee5a52964414483e46a
SHA13c0bba431dc91a66b18cb0e1840753e41f4aeb42
SHA25651a82dc374c1d386b23db770bd5d6443270bc67b4cd97d358f8c5ff1923dfc82
SHA5129b88f99eb9abf7ceee9b93a37c89ed114ed4d812d14356f13aa47a29ae6207f5333c3ee4db8d263eb57ed3f63e94bd4feed06d7fa556e8824f3558f3606aafee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b