Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
b6b1aa491ba649a3160c4e961a71030b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b6b1aa491ba649a3160c4e961a71030b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b6b1aa491ba649a3160c4e961a71030b_JaffaCakes118.html
-
Size
679B
-
MD5
b6b1aa491ba649a3160c4e961a71030b
-
SHA1
6613d5179423c654c0466420691fd9ba1e256808
-
SHA256
8bb3b954dcc284efef88bd806218a7c38e86544e4c6d85b828914cbba7879af0
-
SHA512
dd5cee94a1aa6acdf6210e400ce7939b37b876a0755a2ae7eb260463a2c35e41a7d2bd6ddc4860278ec249c99e53f112daec10ffb1d196402555872b64bc29da
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40c2f3205ef4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430470643" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000edfddbf73ce20d2a67cdec351d41a5c928d6186208dd12c6cb9c834e54794276000000000e8000000002000020000000b2375f6107933ed23219214b635fbb5c7e4322c5a7cbceb2757b9af83cc03d6420000000bcb2ff57b6ac45377c9de9d160cf739e71671ee598ed9816bc6370e4b7ac683340000000c437c4fa5507cc09f2e1905c6592867229cd8d3829ea23c6eb7e6728e3b41d669725d7799b90861424163f8ed4eac509b1d2b2a8067ba0a67291d6f8d443b4c6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C776021-6051-11EF-82B5-E297BF49BD91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2660 iexplore.exe 2660 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2800 2660 iexplore.exe 31 PID 2660 wrote to memory of 2800 2660 iexplore.exe 31 PID 2660 wrote to memory of 2800 2660 iexplore.exe 31 PID 2660 wrote to memory of 2800 2660 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b6b1aa491ba649a3160c4e961a71030b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59052f18d0d872a55daea80ca1effe526
SHA1634dd87387db06575b8e3ceb2d63e7aa9b0a78ec
SHA2569bd24a955306193e8751cee14b1487147665162a44e017e2d313c0de0c632bfa
SHA5129f176f235fad0c47a8f2db41122afa7d7c1db8b677e3fe5772b1062306a273df3da0be482fa6b1a7b1983f60d3e8e8cdd9070108cef85178a6e2bfbabbf2dca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e54fc108c323e6c61b4508bcd424a3c5
SHA141463d9d337e4671a7fb4772294c819928cd447d
SHA25603b4597f3fa6cc7db1bc6e0197950f8d9e556c9443de1789da58396395d7685e
SHA5120c07ab6b7ad5422eec46c910721f0027c6599737e359f55e487de82f3a469a1751c910023c8a0f51ab4f2dc21de646af9fd683e2689b119a9db1b0ca06232f95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5865b3c47b548c98d60e7f65f5120a8ba
SHA18231b47cb85e205b6904e8cd5b6a9e33a4446a47
SHA2561e7317ab797a434fc1fc354209106ef4018c236f5210cb5c56bcca7122c5d3c1
SHA512958cfad5784c82143c1db7a8adfe27a765b21407ab8c55ff17d8cc8cc5e25ba0156143beee7a872d3c1c4a886443bce71fe9930c88b56bbb47db4eedd8dc6fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5444a1516dfa5b84350ceb60b21aee85d
SHA1cc42e8063fdd9c695a1a283fcf19b236dae5e6a5
SHA256d30cb5180746e747c945baf7e65729f7984efbbfe22d48808af4193767d5a16c
SHA512b57ef0f9ac0ffe533d71444d2bca15a758040b5629f991a3be3500027e385b4a957d0539e210a70d3eb632c5beb2a8e2b235a68fa04f3c71afa56008be992fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5febe4203c25711db1e68f9e65d5104c6
SHA124d621ca9b5934034ae9f4ddfedc7527909fc9dd
SHA256616ed5defe40d5d8e52c6be9ba553dad8e2e6de5433f5fca782acf16816eb3db
SHA5124f223f80c6f4ccf44bff0d8f5245ad3243eed2f493f9210173bc979783c8c7a73ff94cca19dca66a88fa50b93d816fd075df724b641de829786ceb04b0996c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fdb3f74bf89497cbb7570b0eba8889f
SHA1e455cc103b5e05914d454a8312236a18438485ba
SHA256b45d1e025a6f7ddd2a86c81e598a01ae57e90873b9c3076eecc5790f6c92b741
SHA5128e79fb9069ec9a428aef8ef3c0bf1872134a7d51abc8162e2f48ee21b0265a5cb163bf929869f7214882030491db07ebd0c31369bb588f60e57088c425903e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5346eb57c737541a0b716da1e76866281
SHA1fc1409d5e04481b03327bc67595273c85da37dae
SHA2567d51c669fc7f1fdf3e0c4b368333e42c659ad76910d4c818fa3e8f906585f216
SHA512cdea3b508d437277d3c3fe7a4408ccec889c6028e4a8ef6821dcc687402e5696e2e47b8b9034c9088145e90e4f80c2d7e8897c3a057d5f473fcfc74a21549e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7fbb58a7e5649b92dcc42fd9f0c31fe
SHA1ee7feb5295c58b865409d7e19c7a08495d226c22
SHA256d64328d9c4b6cfd73cda420c10d2fe4309b37c720c837aec119922d2e3b3736e
SHA512a0c999658be8ddffd09c91d86d3bd360f9e2a2a50263be8c78d6b2d9a107cb5b03404e30ebc850cb153d38fe25484ed9ed20f04d999c87e15386620615db08bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dff537bf537320694dec5d55bea74a3
SHA119d4c4b6b297eee8def989e35fe044c77615ad00
SHA25618c7cd2f6a6c7b3f4dc9327ebc7411e8d9ecf400cbba2b91f83f6217b9dd8523
SHA51293151f0fdaf932a325da955de5be67a3cc78056fd7ebe788a1ee8d80ca6c4aef0c7e6c49cc85e8dd955d0eec10ee6f805ad79c27f6cb5efc18d5e02c1ce882fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585cde75949cd40232cf972d40e1ef31e
SHA1cda79910a1ea61cb0a2a238795ad465674882e4e
SHA256e28f038002636a3e8ebdbb9eac3adf6169859c1d6fd78b45e3c2f42f03ad6ce9
SHA51216863da14d3ba1fc31650f230022c998655267bf2867cd78a22bf3bdcf3338a4005d29c7592d56c0e48b16249bfb6ecd261898e67d9d4651f1017e0d245daa29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5596b2f686a575a0432e46670321de6cb
SHA18ecbb3eda3e07cc17f413ad6eb5b8b48052720d4
SHA256a9f4361967b3be2b25f4bae41bc4735ff490dd50d344c9576800e8e785a4496e
SHA5129ef8ccb9963291fded3ab767d8a11af2bc0e5f3d2d7383071e8f62313b3f1ee135cd601d31db9af60b0ad9e1e2775131e28d17b8b312046f8b992943771e9416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b1720f1a43d100328aeb249643c6b5
SHA17a2ecb8c4bc41486cde7f256c470ad961ef99ac1
SHA2565716ebeb7166bdc31d09982ef0ecde738fccc05b4c39c9cfc4c28f9cd72376fc
SHA512e328f0b3967a0fb96bcc84d82253b7664aedd66e24426a191b2184c673361e04f5eda1bb7ccc499bf666707bb693deae0d48896479f39551184f8dd7f0cf12e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b07a687ef951c3cc561f48aafdc0b1b2
SHA10259e504797a5b0f9acac2259bb7f6868d8bbdc5
SHA256a3b96ff2e2ff1010975b27d20f5b1607ab3bd06df99e9fcec1c143a566412579
SHA512f2ffda662c00da1c85807aff80a0f011b17605819c392d989258297b809c6213c375b6f06f1efef74db714220a3fb734e24f692c37451869a8b4e61c65da5edc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f26a22e1063fa0449ee4f6359a7dc3
SHA170b295dbeae947822f921927d89d28165c118677
SHA256a71cd6b74c811ea0f306e4f88c08e257b3358c9a391dd01a77ade73fa88d151d
SHA512a5cebcbf1e5e8a3e76f6552789e3d325ad9639c03e8ec0aa7dfe6f43dd6f51314c45b75df2ddd0444b669749506d8e5596ed2556223a81b1da4e189608623625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f10a0e16c2990c72c32fc73cd9080d0b
SHA16f100be07592e915e4806ebffb94b783be4e4297
SHA256565b5ad08fa03bc70baafae883036163f7cb154619d7e275c38d25defcdc31f2
SHA5122409a787da15190613aa4845b71c2d0e83152b012df73af6e204b2f38fdabab2f9e838002e3c5ca9b60fe51771b2ba7c3ccf752581f9f5ff6b00be2ce903aa0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d146f2580962e80378ad959166d2538
SHA1d6fe505bfa350b1ea7a869aa2a59d57839c770c8
SHA2561302f4e399a03d738b6ef71abd0303e2d1c0e68377ef1546e0834de78abe1e7f
SHA512f53b052cacf8f010f52174f5456048f544496ab903dbd5e1773fa8b5c40ea40269d802ac980899e594083cff0b35dcf8090a2df7735409e0cee98987846041c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ea761ff55ee84599940b8654fc69643
SHA1c84ab9d3191f3a4e33dc752d5e22afc8f030ae73
SHA256fe9ebc93c7bf3f3e68a05cc880019b638c70dedaf7f52248763e5cc29e7b6507
SHA512126ebd3a87269cb749ad64867695dd7f27ca5c4b67ff31dbb7f1ccc6117ceb639033711e419056adfddcbbd4d3568cf71e386fc11b581cf40a1494d9d4401412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bf410b4c5239b9154fd1ebab0b8b7c5
SHA1e896dff235b08b3ef4c5afd2e8b478a581450251
SHA2565c7325bbc148d7ab3708a37336f4aa65e8b09a4978ad1e8abec5376397086a6b
SHA512394d3990226bf6a693696990479dff0bf30d3ae0a5c04ef31c6233e927437d5c4bfe637b40abef3c6b68c1edbfcc741397bc752e89a50e5d92a2149b4902d695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591fe4a1d8e38e0c5bc7f2f8eb5a8275e
SHA1b9944b66724e5e7ce9cc5ab4aad3272a6bc9e64b
SHA256ff77294e89d934fbc03e9997ecaedbd7d03d1f69149bbfb1b67bebb7fbcfcdfa
SHA512fe13886917517ed6ac3cd905c87641c8a7157dd6d6c8f68d6ae2e0350cf86ca0744b74855989e1766f4af959b6c867affa6adb9506dc8ae26f6a6a97481246f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c5d8857cfc2a012836927002c239365
SHA12a988168f4772db85c97ab3388de173990829411
SHA2560d1020d4dcad44043967d3051fb2a09f1f1f455694a1be0514376b6a93d1e483
SHA512c2e4ab935c173c958cc20f62fee6ac98a671e6188023be5d955aa95c53e6d83af06628e8eafede1bfd07364e7be6e20339c77a54f4b6d2cd815ad2f76eb128ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7946e9e5b6316afff36ab87e9cbd86f
SHA1d80c231ace51f4104ca6770c9d5272b904c5f023
SHA256df5347b98172693f3bb511a9bdc9b9c55fb533e5920ccf11f9b0631b5b531850
SHA51266b5e17bf9cf8b211aa731bb0d6ef2fae8bcdc1571ad4c4540b69039e67f169f9e466c5f7c5bf9a683a07396e8910d81f6736249c4f5e7c60c5770bd5d578090
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b