Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:01
Static task
static1
Behavioral task
behavioral1
Sample
eaa1e0c16cc5989f44aa25f6ad43a9e9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa1e0c16cc5989f44aa25f6ad43a9e9_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
eaa1e0c16cc5989f44aa25f6ad43a9e9_JaffaCakes118.html
-
Size
17KB
-
MD5
eaa1e0c16cc5989f44aa25f6ad43a9e9
-
SHA1
fd9d5e6abf40040c4c7daa63d96bfa253ce4b1d5
-
SHA256
9c0abfb28be99ebf53c29862ab1a747ddf06eb268479b28751504906fedf2914
-
SHA512
9ca029b28df3a9ce2b3f641c2c0060137b75e73bd747b9935b42f42162377284c0df4fdfac5dd515a0b8fe6ca7db9fe80bbc80733c64e8e2ed82679c37133165
-
SSDEEP
384:UCSkXDWDgQDmD/D6DbDiDEDdDoDZDRDVD9DNDNDFDSDEDJDLvDXD/DjDXDjDnD8D:U16OgE+LqfiQ1sJx9VFFNyQZLbTLXTXW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90225d17510adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432883969" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42D50871-7644-11EF-ABFC-465533733A50} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000185851a2bacbd37ecb3422b2214e55c11c5941ce1c2407feeff13ca9d80ab88a000000000e8000000002000020000000ba6ee7e7dfa900262d5ef6173104f679c93403f67cd4788cd1bb3cfd7b58d96f20000000f1087f63646063dbf602ed2ccacb6187505b64551841d76cd62d131405b56a6f400000005462d531c93b55dc1837e963eef19b816b20ab7da14410c240b6e886394c1835b76690488f588943cbed857f3b7b337910d86db4004e14158d9469a60ed2662b iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2796 2176 iexplore.exe 30 PID 2176 wrote to memory of 2796 2176 iexplore.exe 30 PID 2176 wrote to memory of 2796 2176 iexplore.exe 30 PID 2176 wrote to memory of 2796 2176 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa1e0c16cc5989f44aa25f6ad43a9e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9dca0e09a597aa2568df5de23bb8c6f
SHA18dbe3ab35db22f2a55ddec77d364b9a8482f3b59
SHA25611f33d24df020145a1bc0214509c08908a85c49d0baf6593f06da3a3fe03a3ea
SHA512887e010c1e76a25f07e833c81c0fa666f81a04ecee962c7586041f33e6a189d4ff9de7384e9171a1dabbcae018a57ceec3b11ea63de8d0e3221ec02b540b4a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57605f8c0b952bfb8db7a502ba8061c9b
SHA158c93c0e78bda287d70b048bc1fe7b39fb731154
SHA25665ff373b28239c1fe826ae20dea334e791611e60e74aea6dce19244cf229826e
SHA51200086e6185ba8fe94a2f47619f352483f679d08691f5d383a6d8fbb9d4ebaa50632f3f358e4d376e547d1b3848a6909e1601e3e3117c051f9a491dc986af95ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e9a25b1c955cfd2eda276b690fcadfd
SHA1caee2ab91f78eb2ddc922b941f8ff849793763de
SHA25677ba67984b4167a168ffdf9f5f8d6069e132e3a7a54201e43e5ab7260545a766
SHA512afa95ac1ed2f7a5c2a6e1c7bfa010acf20f8df1f454395b1e6c85abf7d87a2a028ec817785a505c46e058ffe762f41f075e9da32122641878da94920c40fa4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f993f8ff8a81b5019f13d34235637f4
SHA1ef9f3e09754c8bd7069e2e6bd6d25320cc5ac20a
SHA256a8138a74f662af320ea61f90c266c2c1ef58a2a57e663e25ae2d25bbee7dcd57
SHA51241f924ac8db9a6e79a51ecc4b5eaf937abfd142334e06fab5dfb3b9ae349ee259712707b78e658c3a7db012aa67a2e448dc41d46095dc58a1ab44c2b0aa831b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5757819c544d2f14d811eb51f3fe85e2e
SHA17a8c4e46395faf078e83c39b704dc4a377dbc015
SHA25666b472e95586a02cf7d31ac37fe5d8caff83815dc005d871b2b8f5757bb09396
SHA512ed65e83570e5e8e73838d3e8989b456e6918d55ddf6dbda52bba99c6bf1b26a21329e69e31d69c6953ebeff288a9580967f3d4036224106c7169ea28bd17102d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ee8852098c4da7132c94838766ab8f7
SHA1b9ca05059f04df624370e7339a121e7cf3008659
SHA256c452ee5aa8f1b77b364a8c8bff0a7dcaeacf4aad994e7baeac8e17b25f1d7ea6
SHA512a0e42f2f199ebc373bf77753f06957b302d3cc80c6f6315c971b145d12b3fbe5a9635479c16b472a759644ba70cc7527d7a523ffbc1b654558d3b51d9e725e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5994cd4def08a1551043a68cbae344069
SHA1fcf66dbcd8b84e5308eb0c00aa7ebe8f54be691a
SHA2569d9a313cbeb3b585ac1509c141f0ce849ef2d56e1f6d86e825926ad176068e42
SHA512a0468dbd350baf202f9e9fcd2f4739ddd152da9d75cc3ada56e126dcf31e4de60023bb92a6f0181bb4f8ccd29f6c1a2be1b4a19a8535a0d63c8b72a1b82b5ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d59a167d731e227b3ecf22b28417cedb
SHA1889185c69dc8c1d93c5e4d294625deb4885fd8ce
SHA256599784880faeef5c2f1d06e044e52b4f1691c185ad9a0a6837063c14d5798e82
SHA512ff5904ada2e557eac8e4298ebcf83749bfa5a230d4494f98bcd74580a9f44f5b100f095b70375336f7ec0999fbf043b2e06b36b4ae2782669c32cb9fef63c2b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55efc66080530050a0f579069c30e6357
SHA1d32012556f1ff3627b5010f4d60a236245680a0d
SHA256a7bbd0db62af9292ab496f7be650e4992cf8f2344ff158f72715d615f500ed27
SHA51202e45cf1d59e56c357ba0f262bc3347b4722fd27574ed3c6b8b9ef5c4494246343bb0778d4cbeb950c1a5bd34f67cecaf3053d4647e577e03482065593a9a03a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528715dce9e721e233137aa5045d3edcf
SHA1d50c7a5a0194436078266fe6e594ac7641d6ea00
SHA2562495bffef663d14bddad1a594f07482882a7f911f35670fe54d0fbeb1b447625
SHA5129368842cacfe711f6693576611be272e00256166dce4eceeb8fae43e7f8f2632d81a2973d13092acdf9d31028ddc557fef254eb4327e911cd89b8b6116cc0831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a775419063475bcf3cde6f2ed33139cb
SHA1a41dddcc3afb96fb9de1323d4d5c676e16f3885b
SHA25695e9b6b971d939ce018dc89b9c99a7ced2aada69ca829dfe24efbbed8eeb2e82
SHA51221aea609ee93476b75d26c120d41950079d93bde7d03312e744a9f801b15050fa44edc1aed704b199be8e890634a95a76d6f88a4ffaf8108a225fe262440a2f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58af47ce63bdc8303ba6d32c00acf06d3
SHA1ad8b2a665d0fed2b96a27de396c3c958570c8449
SHA25660cf2e1340bbb468d86328bc116b1aa43b5337b14982adf1599b3f848a1973cc
SHA512c4f8eae0ef7d79249a30d3b5ce495fe6ab6cd64fd130f2eb32beb1f23dad35c2579f2e18a8ed07a8886d1b2dafb54da3044e130e540cda062ad11052b3acffe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526345ec88f4df83b10a071e82dfdfb64
SHA166a694404873dc2aa4bd24c23fa6b40ce1ee73fb
SHA25624784f9481798d621ef3d88febe8cac7d2b8a44d1876361da3fc0b614dc78ca3
SHA51246b5cad526e24219afce62cc5767e68759f9bec56340fd43214d16e02f62da5d88405a08d50489babce0726bc98a4b30f4e8ad43da149dbe843af4a54d91bf2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aa24a680e1575f4ba03a29e9da381a7
SHA1fb5bf3af136b56a4da29e04558b37750d981050c
SHA256c85ffd1da93753a54f52dfc89a007fe50986557ba32e81710a5b77964ba153a1
SHA512463786f8f7ff3192e857d111c1511fbaec4abe22b39573c8f48157518a7cb1fa6b44036a8ad5366e5f65cd24128dccca07f8ee0ddabb6789731980184af4658d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524f7ee33b22fd70d8ae5542d96c4ae38
SHA1c75ec433fc42bf983d08ce0b02b7be13c0291dab
SHA25651fdb8aed32196eb7d044346c7fd78cdcb78b550af501bca5ee75ea94318b83a
SHA512d47e372f349ffc905d41b9aca5fc05bf84133c762941c9741884004d55c9da9256a70511c525c20191aba9d12b137738d8181f88c8625ed372844c61059b8530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561b5d1c964886ad98bda6e76c30001ca
SHA1841d46b7094ec178b4c26958eb13283769a27973
SHA25642d2a559ac0d90d1139a89f9a598e6b6468ba706cc5d1f88f782e06701af5c18
SHA512de255f48336dc8c7b7fb5705fd2990270ee7ac4847b77f8d1e95ae989b192568d87479b67279ea9d3044a7e19893da208fe9a2fc4414b29c374839d0e9cf3718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd0db128bd6f2aa7250eaa66ceda69b8
SHA1d02b74e6789a90044d06e58efbf332afcd813d86
SHA25697d4163849b43afcdddefd7bd8a018bab0d9651ee52c6848ff71e64b72b614c7
SHA512498a49b9ad44cc3e493be21b82473d2a6f9de79120bfc7b46b8246405a726e2c1e05e8b505d777f2954f0564719e69001384c973a41d371102d0afbea4a6816b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bb94adf429e5b6240781aebf7888874
SHA19c6adadcccfa0a00486f2069b2f642c3790b032d
SHA256ef694543aefaf0d2243fbc7264ddff2ddfa163e3a9784d4365e4079f7f9e8d22
SHA512e16e69d02f845524703d84e43a0901c21940c9b2b2be74445e1df060de7dcd9a94cae4304781eae68a6067b7031d4ea1d55ed21eb6b9e99790eccf7ea6853feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e5d1a207d66628c620c9fdaf367556f
SHA1785ab7974a51904c6b9d31a36120c90f42238c0a
SHA2561d8382cd5fe8fdce081b7246a3f925de8deac66ea7142c98dee4c7827587ed03
SHA512523f61a7b3e2016230e55a0d9e594ff32804f1ecdca74a14bbe45289d769d742ecd793d41f94d8260f195830888fb2972da20a7cb993f04d2f80c8953c5a9fa7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b