Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 05:28
Static task
static1
Behavioral task
behavioral1
Sample
3e0dd7f9cb04c992b139675781d2dbf6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e0dd7f9cb04c992b139675781d2dbf6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3e0dd7f9cb04c992b139675781d2dbf6_JaffaCakes118.html
-
Size
53KB
-
MD5
3e0dd7f9cb04c992b139675781d2dbf6
-
SHA1
daf730cbed07729ee2536d922229c498c4fcff4f
-
SHA256
68902379d3f912ad17d90cda0235730a63c7f376e124bfabafaf38ed6c30c033
-
SHA512
f7981a0bdf8633d42a56092e8a2b120ffff7ecf61eff6e0bd281b5c4cdab90c119fa33edc924d98758c9df5a4289e7eff7b6c08d4d9ee362c1c62ca8dbe84d57
-
SSDEEP
1536:CkgUiIakTqGivi+PyUmrunlYBo63Nj+q5VyvR0w2AzTICbb0o68/t9M/dNwIUEDg:CkgUiIakTqGivi+PyUmrunlYC63Nj+qq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fda4c2301ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EBBB9AC1-8923-11EF-BB31-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434959152" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000d05fb76aed0fc032b9918280ec9827cd6de15223166bc506462820a9bb9e8656000000000e8000000002000020000000f6bd4780a59c8a63b4e01fca5d86dd230e4d19a7365a3bf102e1f64c60d97809900000008b660657665a22885b9acfe119be48ef941320bd877cd0a2630532f3b4344cd39f69230f7bcf5657f201d1361ddeaf5c2c73ad32c52752f0350897e227d260d6ee4eca5b7faf6a9477ba08e62c9e4ba6d0d2078444016765206a381623b5ff6ada048c8ddb0e629f801dc1c4e6901cffb3a8cb1249aafa7780aa04b2d24889be1873c58b3b46f540008359069a441c244000000051434156950e41b8ec513a21d41e0688151f791a26a6dee75cbde1e6a9ba8fecd35652d2c48488ed51a6c2a483ba0496969fd87aee59a37b0d949bafb7161ca0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000063ccbdf90325cdbc7ae5004df296b20acae28dc24a3a186ff0e973835e349c50000000000e8000000002000020000000b9dc0ffbc094d0c694549fb88c1c8549a8aa0aee315f76b55a916ea6e399368620000000b535f19f0321ca9a68991d5563e241908fd2d59819d04e3f9901092679bbe68740000000a85e889fb73c9cb2e1aeb47742d938c41e65772464c73c0c151ba62a0d6e1d05ec3855fcf7a1addf22c9b4adcc7fe3a724b845f3cb8799dc30727a305ce74947 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1544 2512 iexplore.exe 31 PID 2512 wrote to memory of 1544 2512 iexplore.exe 31 PID 2512 wrote to memory of 1544 2512 iexplore.exe 31 PID 2512 wrote to memory of 1544 2512 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e0dd7f9cb04c992b139675781d2dbf6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a80cd7629349bb1e38a41996cfa78cf
SHA1bf1d8995268f75255a0b208ec54b615ea2c0c057
SHA256248aa0ad611d7f4b31bca4a3f5157801149f4c1be16a4daa6e4f0dfb250f7524
SHA5125be54997a5d2e6acddc3c20751b094f01395312de73dbf813850e1f1e291dfa3cf744bc63112eb89a0cc78a4d4883bb70175b3ff9d7ecfdd362069831a45363d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e23f9291d27a96e2417d500bce661e
SHA19c014e34c7175e4fdf1de6b459c2f5d7b3626822
SHA256b96f22660653830fd5801f2ddbb953aefa1db9f7435239eb8edd079fc19372bb
SHA512a2a29f7eb364a8cf1309fd5ac88b41d539174ad7e9e53684f790d6e751e8286994e36d9f6a802a826c6d3df1007a5a72dcd817391879052639976c9a3b35570b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b1d3e31741ae32b32d600d8cb9a4db0
SHA14d66172b65d37ae46dfcf7dd34ab7f8beea95e5f
SHA2565d6471d166f27e26134c6ba09fa41ca9438fea198c485b56ed1d47af02490d19
SHA512b116f4fc6bf429ed124574aff2d2413ff0a52bf00d00465b610a93373145af1846eebc25a04b195c27b9703619ec76af07209f86d3a14dd5a82b3709b22f2cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506ed766f175c811b83bbfe0c1d78420d
SHA1775248ac2ef21f6327027e67ef207aef7c963eb3
SHA256254d38feee298d2f606db6a33d75248d39c9cac8d88e5a31ad77417852eeec23
SHA512afd9abb843b36ce331aac434c437174ae6995467918932c48c34066bf91868387a8fbfda69d6e40169a313daa48f4adde7216c88fc1358a54ba07d4235369c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5602ce070193335db2f6239b52df46f4f
SHA18380dd1ffb00d72ef91dc7018347b81e7c5b412e
SHA256ad09d7a74981b3c4aca63459c0410b6037ef5e96914a4e2be65ccd2155ddbf3e
SHA512999b27d28bf0f631878f2d5f43600da254df67037f74030c1e26c37c9f99ce986100a52e120e955ef88e94beb5fcdb11b37f66a35fcbe267c0714250fdaf5d55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a187c8c22fa9d8dc85344856a9347f8
SHA1bf2e08a6dfcf7d967f194400a64d4179fb940f3a
SHA256859155a78f1b78ee750a7634e75b4673be7e5fc6bb8ebb147fc3694a4debc1f2
SHA512316c894157842b4853d6ce623f776d2707589d9930b9cc6f74bddee1d5cb65b820973f8e65b63ffeba6b8ac4a33fb5ba94018761d774f961f67253cfe98a955b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52640fe04ac2ef242d6cbd27ab25ebd58
SHA115c7192e7c4a711a679588f8b67993d42a212bfb
SHA256b4b339e1a7dfff07abc475a972e20df30ebdc5fe4f13a4c505f8d8ec5306c30c
SHA5129879f6a272de5e35ba446afc8544984198a624e1861db6b3e0936ea18f6ed53c56efce4b2523e986f81408307d6338966d64fd7f35440fb6d44d786678cbd046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a127bc53bfdbbb3667372087d068064
SHA1c18ea3411fd7c2c24ddab4eb9ed639fe26df7a8b
SHA25629733d1339abf2395981a689a18cceec7aa5a85486f01f721cf0b26d498fb9de
SHA512c16430f0b7c8fb717f5cbcffbe3d4b421a87720be5c6f346846908f2113d1a2a3cbe34e85f328761c0d96592790099f82829dd8d4d71e3a691fadc0787d90b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5500401ec67bac8ad7773bb26cc0b9cf5
SHA1b308a234f47a07f7b3654eea2a726b92455e3f1d
SHA256e2879e41c8a07783d3f2ca9559390fd143b4adbefdbe9f9016f180d63e3a5093
SHA51209b1fa6473e860c420bc7c9ab7526dc86578c8949c704387e00fe7bd55234b30c4de453fa2c4accb28f80a5c52f9106b165ecaf84c9a1a9566bdce28b7ef3d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d438a21019e45720af211fad4712644
SHA169c82eba56491afc09c8469a0a1b8cd0b02cdfb0
SHA2563f62bb62d9aec59528d85ebd65ccecd13fcfbc4f0dc458918d0dee1e445ff8f8
SHA512d789a6b16e2461f2098d7eeb073e8b3e3c585194fffdb97e604d0e3de4ee67efe92259ca83e130ec03f1c2eae4fcfe8e3074ff66e8fbdc798ea7d7d0aadae3ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0f3d07f5450bc05680f4148fb39adec
SHA1ddd7cb428b3986aafaee5aa67a5684de55bd5ecf
SHA256847b11e0e4aa6614362cb45ce0b682e2f96811fecdfb54fdaf80b4fc0bb6bf84
SHA512f224646590fbdbeb478e558b811abc25924738c02f6a87e6cdbc8917831a52c2bb08342e4ccb323de3be9f59f3595fbab532a753737f6693c2a6521d6c13444e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6803961ac9945b4d8eae391c522ce73
SHA1fedc4cdfeafb215afbf4023be29160262268d996
SHA256b005022171f3366fc73481820b71b57fd888d526312b349696d4992038101938
SHA5121ccd060d902bd4103d7c75994d8d4c5c7ea89c29384d54681178831eeaee33b3b4f6dd6c2ccdf2aaf8926f54dcf61c6aeed83c56ee8f558f62694db76d0d881e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525c31c496ce18233cd7c43a748539fc7
SHA1036fdc7923cc32d12428dacb0f885c2c4e9c07d7
SHA25682a9688ac707f70423ea64a8b0e03deb035f3bd7b290716ef9a2d1e0aab1710b
SHA512e22745d6100c0270193453be3e166febadd807b0be7381e2036fa8e5c5a1330f7815ad7e8da9c12b7b7566f1b61e4a4054b595c3eb93d778ba0f22ea032a0f43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5433c9408e9ec5db65875f155270e3794
SHA16ac678d05047d37c3dd275629d015ef7540c39ca
SHA256742d33cafcdb92a6826a986ee8854c0cff7494bef3ca61733219e50240fdb1f3
SHA512ad577e1d084c672e115e87f6555f9f5a688e20988ee1dcd48f6ce4967fcaa947ec9bbf7359ce10087d9be10341cc7e6c8254706ae10c8dd128a3db9c09b9ee5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc6448d845993b03b67d7a7802b27403
SHA16fe947abc7ef33be9f3b9853fdd3a58063736ffc
SHA256ba9da1fe6a4a29e7ecb6b14b96125d9a2893cb7dc6a075badd9bb04ef768c468
SHA512edf0e16fecc096d9ac283a84f454b51a1b59b12eda9fc5c662344e397dd54f4ee167f4383ea4bef087ac2376dc9343b9955752d08076c7356aeadc452687251a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0510e8e5cfbb3f9b9e0fd580229f230
SHA1f9388e40b72fb1d84cebf232160936abe0762564
SHA256b79cc637a55ab156b3abddc8c925f86fcad24770f5308ae2434d9a83b0d0be1e
SHA51283aeb2161891414c3bcfa65c0ad0701e3bbb086dbe3c8b5171391da9a1d7bf6b561fdd70e99d5099c100fda8e54699977b4299901f5bc386542da953d2171f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b67bc464c626ac7524c1660767cb83f
SHA17521eb893391aef53aca22d82b7b882c2ea4ea3c
SHA256c784197bdf44202856a50b8a110d5bc510f1a015487dde981e9b5db02d87cd24
SHA512e0eda49cd1633e55c4b1c051f803bf55faf31966dd2cbc32a431a43f48b4e3231a2f60c8503fc52f41d11a93d3e245ebf4f541e03db88d508b011e115b5a3a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547dcce3c06bbef9fe17a8f14364a82a8
SHA1807273d9cabfb54acb1e61bce3fb1b996fe120b4
SHA256efd9baffebdf01f24fd56955e35818ee9f2b0e9ee89ab328de8d433c843a96a7
SHA512bac7a21b5363a60015976715262fdda5d70719e92d075b38263e5bded22e5ef509e6be7050e435e3ecf2cd0b7c7e6102d0d719d07ad90e36ea476179a520407b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b