Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 14:25
Static task
static1
Behavioral task
behavioral1
Sample
dc6a7d58772aa2d24f61345d83f01ede_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc6a7d58772aa2d24f61345d83f01ede_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc6a7d58772aa2d24f61345d83f01ede_JaffaCakes118.html
-
Size
27KB
-
MD5
dc6a7d58772aa2d24f61345d83f01ede
-
SHA1
f03ad510aca051694cc9130b7817eb8b8dade602
-
SHA256
6a6e9b5a6e42b031c348510295b48a21b370d8ef33bd3e5511b3fa9201f00259
-
SHA512
798d682532091d792059712816e2e2805d51d6beb00e9875bf4bfc06c7fab067131651dca942b584123af6a9188f4299557074d158fd9ed1503017615f787f20
-
SSDEEP
192:uwFclcpcYcUrcDzcDUcDkcDcb5nmc0cxcdchcpcwc1VcYc6clcQckcYnQjxn5Q/S:GQ/jED4D8SPA5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405c45b81f05db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432313009" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000004be54a88e3673704020274362486e68ace6f393d9e3a5eb5d5ce41523fc47ab7000000000e800000000200002000000040af4ef3f14b9346e323c5a4088b6105098fb652077e8db69f3848b253ab5b7d200000001eee78eb579a717a3f3998ae2952899c1301ba3ae375138713fb7c6792283616400000006bc9b494993bf9618cd911e43ac083357a25ba5c5e2198dd8e61bd3e638c5b1d3710869db7e0aec9096e5d17b738993a7a285a2dc739b5251e2fda567b843de9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E38F3511-7112-11EF-ADF1-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2640 2112 iexplore.exe 31 PID 2112 wrote to memory of 2640 2112 iexplore.exe 31 PID 2112 wrote to memory of 2640 2112 iexplore.exe 31 PID 2112 wrote to memory of 2640 2112 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc6a7d58772aa2d24f61345d83f01ede_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54824500753c36156a58fbd372d05dd84
SHA1da66c536c5c120c4f201a083a55a5d1b1d2b4ced
SHA2564e14aac5dfec942ae4a575669338ce38c178af42fe33ff85c4c6b16e8284b389
SHA51281ef6814eefc1631936c7ba5ee132009c0922bda831e21371b6e33bf16a1bb8c901570548770f80bf64abb7f5b00dafe0e75e5e9372ce9b9f0930a13ea1b6def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529859a97cc173a50d1cba7447eb5ef38
SHA18e692aaca4e80c8ca65b6540ec6b4b4d1dc9cbdc
SHA2568826a44ab21e5073abc91c9766c4062347fd8c5c01e35ea46f74a712454f88bb
SHA51240ca1af9f687e1fec504387657685ff90a85cdf85b3f71ded3e1a0585aa7f3f7d860af110d34275935316cb3ecde52f1afb7ee8637bdf076aa908e2631fb6f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576596485768d4bcf5c65523c75b94b8a
SHA1ef27ed89845731410f746f3d47ec39f125bb3d9f
SHA256244e191526451a02c13176490cd0f2d58533220e0891a60d209e44cf3712111f
SHA512b0e1b75de7a60eb78d691e3a1922a0ced156b5f3e04dabee2157042c41d78cb7534fef387b39e9de5cee20225bb83391b1bea0857e755c04be4c71f7ab3777ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eb1c934bab02140adc7ea59ab813058
SHA18e393ae3fc72d63214b35fc95ce8bb534aee144b
SHA256db2332ec3d5ef364734a89852951f70f9674189b0129a267559e57cba382c250
SHA512e53790fb66044bf9a5b01be93744dd3aed60c908bb5c5650b737f3f93a4658791f2aae064fc72d5cf6941948c4e2cd0557c6aa3013b7548dd4aff6b04cc3427b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f4fddd10da3c2b408f84221b99d190
SHA18681997d0238e89e5f480668c43e258c2dcdefaf
SHA256757d97ed73f1137312a4a98ddb68fda0b0bc9b8211060c6ad206dcb8f75f6cb8
SHA512540dd72259efa99f2cac96ebf50a24ce9f6d00ce29b6777f08a7884288a676e23b1a33bd5337f411c05e6c8c2968b17c7cccad29c728abf241231d46f20f5121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ba60fc1eafd33b3cdc711967cd9801d
SHA1568799eff4f7b53dd283479842f1bc34abe06b42
SHA25667d7c4b2b4a4a5cbaf3e198be600ebcaafeb32c3c1c403557213dbb47a6deb13
SHA512666533357b4ed342ab275d2c1cef519fcf087c6f6c225490ec4a4008cb01b91e1f90df61e8cfd45ac9f0c59cbbddb6ed9f0b4721a4ac4290d996c4e585086525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528be9fb0edb4dc6aad3755d78194a237
SHA1819dc255da44fd7fa741401364ef7b30880456a6
SHA256c633131db4bf591d682101b2adf012accc9a6a8bc10e69dd06b22637c52f3285
SHA5126e2c35f2945479c4e8ea1aa6de9eff309da960ad8636381a3e5ea45cb85861d20381b894c79d80c756235423a286b5d9cc0ba8535cbbcb050406f637ef2ddc9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eb963a70b3325e5b9d65ed09a8c69a5
SHA110d24095012e3bfd0675064b3dba5a6655686118
SHA25600111b0285ed3c10cd94fc178720916fddf0d99746446da3b64a9574e43d054f
SHA5128b937c5532db00bebbb7e9e9df222b9a3ec06066047caefba1985adf0b695debd68dfaaeb77e2937e400b25073b1145fccab5a63f91bb61a47d199682d500269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056672af3a8b1a846e31d55f5d4a8179
SHA1c8dddfe7da516ab8ad81703e902b2bff820bffc8
SHA2560cbbd23da315ef8c94d4503cf2d8efcabeaeaf90215edadb2dc6ea2b74d1a38d
SHA512557246fb5989eb171464781f225cf58db837fb7d536cf9839755aee5bd984c9da7886c759d3af4ddb7d7129915d8593aaa68a5723d91d38ad7445ef397916398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2a0f324815b0f791cb61dd5c9ef765f
SHA1b5090ba8273ca308a02548c17a1dc3a0d37bf5a9
SHA2563302bcdb2784173226a32a316a7115c72e4f801fe4ac18d44dea84b41a5715b7
SHA51217eb64cbd5426885d66a39555613dd40153f66ebb0818d236af6ab122ed4e3996db4e272b00495e364da9bd0694e5edd64998a25051039e1f59cc08cadbf8c98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5747ede5072654abd369b9cddf55ba40f
SHA1a00d588a74424592366397c88e93fe796804cd05
SHA25616846fadee13f15a04453394f579f44a82ab8ef8ee199d12d270a828411850f7
SHA51233a00c8c6c0ca8f8b9fd099719d503f9e79ce50037d590cf7de0930a33f4b0425a8a7246ede9a1fe6fb9de7a6d08b79f7be1043ceca1d90c33c0ff149bf77790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bef7d555b91bd107ddde4dce0f8a132
SHA138fcfdac3eeeda306a59b24444532d4d6268e417
SHA2564ec8853d81f1a02b92259a0d60cff7b7afa93af5d51abd64130dcbef8490f1d6
SHA5120d24edfcc324e1759e882eb702d0430a8299f98c8fdddb216fc24a39c16ceb6d0406e2ed56b10cdb81ff9ad84eec5d0f72e8e22fbd5ab713f9d1322b2984e5a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59866944e2637e8e58e425503055acb95
SHA176f1e8d7cf38fb3858dab9b55e28f9bd5c5f0350
SHA256f82773b1b94c6f6e97fb7ca94920241407078b94275726d5ff88d20a6c2e7bb6
SHA5124031d71ce7949d129e8507bc14e3db1476674a6acec73bebe183e6869ef3ac5ae31b2d52546d9ec5008f1bba2886ac16af598e4ffe5ce2b7eb57810c93303a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5739e6e163e26d4eb2ad3dbf1a33337c4
SHA1c57944cc99aee85dfec3c6e574d7822d45bd4bea
SHA2564ac907ea376c07039500d98a7dc7bc9102e08ace2be7601dcb8f68ebd3a5449d
SHA512de67b54675c6e8109ddf9ea237dbfd897b295ba812c506882ed7f49ed92e4b6e1679eafb34ff8ee9bb6cd38a948e3ffedc66350d0a4c6b6354d8cb23a559fcc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfbb336c14650fc026f474870fa10a4a
SHA193576a92d5a81700c0188a7fe564ae2cd16d0413
SHA256a21cb183ccf5b579f09ae33fd28d01d60fa7d949cec8791d0c53c91d6603f641
SHA5120a24ee83eb97c88c49d6692654e80d1524116b62eea7eb3dcf5b12299b7e2702cfc0a7f4320812b7a760f5e71403e9874f9c88171cf264b3915ea269cc9ffe44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568cc8888850613ec6ba83fed01d2ce33
SHA1c4d7661dcbcb89f5873ce57a48b6aebd80f49f4c
SHA256a6c792b6b8fd6cd19313c56377991460bee23537a49a177850192b649f5a92ea
SHA512657ccda72a642b8420dd26b4cdf847e8db76a43ce23d3c1b291410f504b4303c56e6c896a6b798ac6ddccaa2a8b3fdf27fdd782737961107ba8b8cc89214c2da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56920416ae9c4d24580943554395f0431
SHA1f7b3ab035a8379828419fb7e4f814d7d9bafa6bb
SHA256ec296d5f79347d5e59623cfb7dd3cf9688e2e866b8cae3e0e7d3b4def295e08c
SHA5125f4028a1d6aaaa4adf70745ba42dc3e82dd10a5d961a21acdf8f1f03772c34dc433127425f94b15273083dd7ecfe6f249799260345d5218b2520931f8b4d0ffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5616bffda2381d0895b409fd302ae9f1b
SHA101e92b361b8a98d18264ada7a46593dc22fd9f92
SHA25661d38f556bf919a8ab20bdf3db9c81d32b517f7f9dd07064b0b48eeef1209304
SHA5123567fb31d3a107116954e0edf82e559f48b7399fa2d348fc61ce8c6424bd291188ae2b35197cc3835e74925f98ae04ecb1ed447acb750c6e19d51b5a465f7526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fdce0fec512061b92d2c2ee9bc4137e
SHA156b4ddfd67ac1b642cefcf4a574f9c3d21250d18
SHA25637ac7adf9aa00a1fcb37a9dc4c0d319140ced265280016df9a89dcec434c0e96
SHA5126660c12afdbf6dda867a19b9a56382fae240cfff5da498c6b827db0cabeb506e7883d829fb98a07e8f00fdf31452cd84b9ca01a946b1fe8abf5cc79a6cb2bb01
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b