Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 04:59
Static task
static1
Behavioral task
behavioral1
Sample
0e08dc870ccea1afdf218932750c1835_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0e08dc870ccea1afdf218932750c1835_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0e08dc870ccea1afdf218932750c1835_JaffaCakes118.html
-
Size
10KB
-
MD5
0e08dc870ccea1afdf218932750c1835
-
SHA1
efa1ca581b04ee559088c079c81e92257d9687d5
-
SHA256
b3d493502daffc489a0ffeb899b540a483eca73cb9844d7d0ee32784e0e2d8a3
-
SHA512
340ecd3c011d44dd7dec3d5e073d07e67b5d5614244c2fd65136155eda19129cbb40647b6485b1e7b9000e9deea4313b157fee15628a6a4ab72c17b04ae745b1
-
SSDEEP
96:uzVs+ux7X+LLY1k9o84d12ef7CSTUOGT/kV+pH+5P1ywUlVHcEZ7ru7f:csz7X+AYS/naH+YPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54398631-8144-11EF-9FF1-E28DDE128E91} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00d73e295115db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000a78ed7e123fd07c17170275a40555e2c917b3d2ba3cd4186bdd07fe0191ae1cb000000000e8000000002000020000000776e2050cbdfe81daf1b47f8cd96ed9faa361a2e80c8223791340cd5402c12ca20000000b02cfaf7bbb6703a6445f48c8d9932b4a215a7700e24a5e0a46322dd4c11c827400000005bdec3e89d1b2f75a60901fd69e1cb5b41c90e2d73939b52b04178dec546ba35635ffe5f958fdeb3d48395289b12a427bac31289a755f30c43d5fa500bf47f38 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434093461" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000b5640cacf0ef8948b0b74db6f5f706672bf850e60e3c14b5403a0f764ace3d5e000000000e80000000020000200000009d2685babf4f28f92025ce57724c3b1147f909c73bf01d38185903e76e9baa1e90000000726f95218ce69ecbacc5ef51a01bb62a57f191a770a49e1529597dcfc15fa2872f2f257661dfe36e069aa41e7d310c469c03778e0c5b0fcee4a058f8ba88e0be2b1a7464419969607150505e2109cc30c204f7bfa4df7e73885039adb9895a3f2ddbabdb263cf0699866dc721aea5213ed5cddd59327775cb863e8dbe29c98a47411755a8808fde98a4f315b477446784000000091d3d1fc210edfe78a2c4b740cb26c2924c0313b9c5940858968cbee42bf3d46d33d90577a2abb7e1f816a5c588d3b2a2be5d422d5b0a552fb3575ae6690e67d iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1504 iexplore.exe 1504 iexplore.exe 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2260 1504 iexplore.exe 30 PID 1504 wrote to memory of 2260 1504 iexplore.exe 30 PID 1504 wrote to memory of 2260 1504 iexplore.exe 30 PID 1504 wrote to memory of 2260 1504 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e08dc870ccea1afdf218932750c1835_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1780091c4063d6c59082481ff2e7944
SHA10e4db2d8565a271b8a2d980bdd88d39f6f3b7cd7
SHA25658434c253cb381c035c6acc17cd4179e99a2933f04baf11345f42ccf150bbc98
SHA512ffcd62ff3bbe01040478f88d647a96996fb177a23b06b9f18c07ae7449083a39663e677311887b211e4ed28233cedb500423909f3959ce261e7907dcd9fcda7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4a0ab36af9b5f9507399cc4ea004a3c
SHA1fd42a0468826954419d1160dd7edd2b39ef3ecff
SHA256bbd8108ecc03614d8f7f01bece99afb523903a2e2af8f4e24de53d5756b275e4
SHA512bca185a34b8d2ba37e766db1db4639bcbda1ba856e66f6006afd145e06b520cbd5755817d96e13d2a248e53c175315eb818a3fba42fc271c17910ee3b53e6160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e39234961f803d20c3e948db175a81f8
SHA112c897ab855a5928eabf82233cef8b1197e15457
SHA25666a957cb35f6aac197b4af3ee31e0087056bb83781090ac4971b4c8a4055042d
SHA5123a8447e95c449aa33aaa8853b734ad257f8dc891fe20d535948b5c441ef0b5b67e83aba092e3b84931071b49013a6e82bdb7a8999ae8dce1a3049b91e47a0cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9960b08c03ae3fba37f123aa3a097b6
SHA14aed2613fbbe03c7c382d42eaa042c234832808f
SHA25626a43ccd309a51fc3b5cac46381b325735ec9e44cbebf0a31bf902fe17bf912d
SHA5128effdb96f1df7e5412c37efe8f33376a8d47e72a63c3c19f8afd37b9f63717d4816446f3fa30d723e886b2c170bf270ad4c8a45a572d51cefb5176a3de0bd664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb07a44862b18b3b1199f4f19dc09cf9
SHA10b03f2c323448205f1d0382845accb15195d085f
SHA2568c9d0c6b45f201b3aff2538d48b9f22f2658ae6a14644c45fa915c21b0d1ade4
SHA51269149e6c1e814c5cb67fb064e184e0afb37f9181858027bd2c5e0b55f19cf4e2013850cbbf3893b828a76937f3037035ee0bf067a118820f89fb4543e92c119f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea893119f3dba300bc53dd5d4ae4189
SHA1cf6bad08c5ecf55e00cb58d88f5f340a88124a38
SHA256a3c46155d1d27b5b27107b1f3a21738b6e860223b1a06722ed2ec85f4ac8dbd3
SHA512a33db7f3d58285b914a73ea4a98eeeb2fde083a27f96442518696b021181785e933e17663fed8eb163ca3fc0b24e0776c9401a3164a6b7fb8d84e060ed43dcb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4a3c200867da31f345b7e10504fade7
SHA16695c13eed931bcf12456f30c2a47b505790210e
SHA25605d4168bb7c3a0b33969c96b77797f98d44f6fc882f18d11be1cca17faa50db4
SHA51223bbebc5cdcd47aff13ef781db18dfa608c0cbbddb1f4cc51643343ec02d3eee67efb388c8532640e48afd58ef20946a51f15436fb94ce582a4642fe34d13f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b8f3495eca696fa595dd936aa4cb857
SHA1010b48d727dab95d3c10697e01e6d85f4978d0e0
SHA256f0b42eb2849c6d8840f32a6d8ea41e06bc9eb4e0b6889e7a7028a73aac8bea8c
SHA512eed98223ddc6826c34dd3a342deb87090f68a193f29db2cccc21528e3097cae1a3da37a994679d0a5bdf2bf6f18010c1c1a3bd5265d54a53a5175209890e27e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a401218dc54a187c17f92021b401bca
SHA1bf5c279c78d0c61524f300fd35c41c5ed36e0637
SHA256fd6e9448aa706114c00bc5b63a3ef8f1f97b43fe3d69d1e65da7f9be1a519ad8
SHA512f95d5fb3de278106b1ecc5d5c4bdd2bd68915a4bb340efa179da8285ad91e0e7f2906842d7663d61ac75f32ea0380f1a8c1c83858bab35350d68d3a9c32fec11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd929eaa0af94a35bc17ce5c09418a66
SHA103cfaefa083ef750532e124118d5e5a986f7b426
SHA256b4910c6f0593263a5261247a62cc007db4ff59e28d2af7dcc29b83744db99586
SHA5122415d664783cba38f8ca2b7d992e97dc39dc0ce71e786a654b2cfe7e91c6bc24d4ed90368d89ee1ff1a530971ac5deab03c4b91b419758ee6e6aa9ea6a038e28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e699b62b3564e1c32cd53f723188558
SHA13b5f4aa793ea650ccf29d881eb16ee4321484cca
SHA2563b8734d8429b10423d91db9ca5f5c20339e30babc437af544b0d3fbf0ba3f6d5
SHA512eff39e1867642a7a8bd009dae80f6e71d8f90c66fe717390a7e4b5e27b675321074050c2e01f842f462eb106c2cd4ff1e49c9997f39c242602ff51c6a54931e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a33aec971815dff8b2ff951b22bfa2
SHA1f6bda0e52de8f50f80cfa25411f313869a53abb3
SHA256050640bb0a784d523d5ddbd9c4edd59ba738487ebe58bc4073a1720398a37455
SHA51265e41aa5ad72105fd03185f1f371f6c1c9f3c079f64f615b66e006c56c19fb9eee39ccc69a7ab69b98484caf5bc861ac37f93d65046156c877e954fe25180417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2e3f684abb5d64be32c04e41f23266f
SHA158fda41ec583105dc699ac004e6d602eac930bcf
SHA256fcde7591a3e8e2e9bb11072cd54d6c8d08f9cbd4a219a8fdd9d729385645ed67
SHA512f1a5499759fe436fc04c11f996ab4be14bfadc46a0ddb999c96f5acf22f71467da99af51c6f9b08a159791d4a2c25f39ea0f74b0346c85aa52b6ca1f9ea8621a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cac2ec9c88dd29791b98b2b0519824ac
SHA19fc3a53bafe18109c68974bb48cad752d871ae95
SHA256ccaaeb7b0d2edfdb766179aa602839d78b2bb98af76996d2e38f432e3794c087
SHA51206ee0a6ccc1accddca9ffefe73cb32b59b708752152d949fddcada654e0537d80150331256c9d94e592499e28a2b43c4f59ffe58c2cdedcbd7272a59f615bc35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a18e2615b297a10e022a5563b8d0bbfe
SHA1ed6bcb9bdfb6aebd3325611e8e254bf9a7d39b4f
SHA2565194b450f4ffc71892f823638d18fdbd24b9c39d74ade9fc967132df68d600f5
SHA512c298d1d9e3f4c238253f6df9ab44893e36a4506b118c7821e1c6cc46904126bdfe901810829d54ad6e404426dc72144bd3ca05d0266b8fd7a1630a6d2402db0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5454ec3bb95177f46d4a375c3a8db36bf
SHA141ea3d131026d982b6fcb5e1ffa6f820b8e2ff00
SHA25645b67d548a7b03dcf7c6e143ab3b50fd79e1e46d34eeea3a2f57e15cef3c070f
SHA5128ea01bc59e7eb74ea14a86176677e1be35312648b89b5b99d4f64c0a0364d74ee5cb95a974bcc4982afca7e47ae7a4bd392628f58a7d3ab0f33ea8d748a48373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d974affc89717c4cbe045679f646cfb7
SHA159f7c92a44328391017ee8f3d7bc425f88fff648
SHA2562794da528a12cfb6c9fa0c29a84634116b55359d293669530c80591e382f3ce6
SHA51236769a256d9122e8068c288c06429a69fec7be0e633a4f7be32614b90f35d09cf0ed61de738d28668f9d24ccd3d713046fe756261c763f45f69eb3d117c0b26c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5b739bde0b74fb624018198bb3442c4
SHA18206e8a9acb33bc7362a6a002ec5c2a6c8ba4b73
SHA2567b01b3c40424a2aee0e4ba0f50c7420a0b2d00e260bd800398e4fd14612598aa
SHA512fe3cadba44998bb32ead9f0030444306dc598bacb5c4449c4ed3e2144d9c4a4c92180549e9966bbdd080872cc0db008d9914025e28777fa22b974557629ad039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f6e341a778aac45fbd1ed689e7315d
SHA1951b40406461088a0426e6be4b06f6ff837f07e6
SHA2564b374a49a03927385442dabdea6a5d6fec4da31c12760712ef9d98672ad6c84c
SHA51220706b585e3bb159e79c9c12e81ebf3bdc19801d9893df7551c3ad42b2f82599aec9c6c5989adb9106d31c596a9da2b31171b16de6979e28bd9d47d07672e12e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b