Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 10:03
Static task
static1
Behavioral task
behavioral1
Sample
f5c30abc94d409ee09abf18af93d5bba_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f5c30abc94d409ee09abf18af93d5bba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5c30abc94d409ee09abf18af93d5bba_JaffaCakes118.html
-
Size
460KB
-
MD5
f5c30abc94d409ee09abf18af93d5bba
-
SHA1
6a7fd9c6e4b8ac227bae568669a7e2a3b658bbec
-
SHA256
64a6d77c06c61b51d88f554e32c5aaffd9839aa2c7a7a2c27dc3651908c17062
-
SHA512
692f88758fd93e0ae52beb9d50b265b1863c125e3e877fedbaccb03cd9f499e461822a592d11084ee8f8aa2cf8f937db04158f7d968b6bd9517ad0bf0958a6e5
-
SSDEEP
6144:SDsMYod+X3oI+YDsMYod+X3oI+YGsMYod+X3oI+YLsMYod+X3oI+YQ:Y5d+X3x5d+X3W5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000e1bcc401342636247a4cd6706e7221ca4c432c1707c1a25dc2f4a7fcef1dc19d000000000e8000000002000020000000f2a8a1b0961f670e00d45034ef7792d25745df3bfaab8de95792d526a91dc823200000003ad70acbde07293bf23e5f008d40d78936fc64ba26f28be69e0dd3dba06f2c6b40000000dcdb1924139e23650106b8e1a692e214048bab130765f5614212480d01fdea290a0c357aacb9ce721afa48a7c54fda78f0d8fe62eafdcdbea7e64821ed90ca53 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433420499" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7715A3C1-7B25-11EF-9982-6A2ECC9B5790} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000002a277ddb63a6059f0bd0834e4d83b0a0b0f3bb135e9f770ec7e8c7bd9a92e287000000000e800000000200002000000022beed454e206cb5eb157d68bcc8ed9f2d19c39b1265f49afed2baf4e00fca20900000004da4c72576b9f38a05421ce089146ca54ee227d9acc9a06da4af0378385404b37fade0215280b5c62f85938d1cce79114684dfeb6651bb75ccccf6d9374ca7ceacc3f2c006be54953a5a5fc27f6dde738375afe4ec87d90747a219eb215f0eb746c4dd02dae829118561f4b810876152aa77295c878b9c3d56627e0904d657be4faa5cecb7bb8d04650531641c1ebf3f40000000040510a6904f5a6ef988e4c0568144c8a2df4378b44d46df8484e2770d9f5c4c304e31735b226b42aa544ac0d454f45ef5b28d2b1d4b893a297e22494aa29397 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c3a24f320fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2824 2096 iexplore.exe 30 PID 2096 wrote to memory of 2824 2096 iexplore.exe 30 PID 2096 wrote to memory of 2824 2096 iexplore.exe 30 PID 2096 wrote to memory of 2824 2096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5c30abc94d409ee09abf18af93d5bba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c72084cddcf3d30ec4a1746ef6afcab3
SHA1fb2174abe579c7464bfa5cf4966fd1ab694b7b3d
SHA2567969c7cce6adb9c11c9b4e4524392ab98d68a89c8aaf79683de67d3b8d2a1e7e
SHA5126d41846a73cabb9b0c025b80387c77741213bc3da55195c40e96545e3dd74236e114fd548bed671bacb44f4bff069f6791a27b08e6882ae0b978b807c4ec37fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584e2fca276536bbf9ea809f428d2db66
SHA1740af58306fb2242d4c595596b33ab652b67a909
SHA256a4401dd763f6222d7d1600a9d937a8246008c4baa50917d9e05cb0076c77d213
SHA512a8e01d2e3ab4d41abae20b680cba8c1c3864e0b8ce8f8e82bf1ba86172794aed87bf4278c7db70dd2b381b285d4295a261ac5e550531cd6a3d8740e0cfafd549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c164109b059adcc25f0d170de4b1601
SHA129515ec08f5b734c706c04d432d79165a70beff9
SHA256df922e5b7a585f1e0840b8b52d15b76d5ed6b253f7b45dcdfc0ac00088d58b4f
SHA512943316c3b3cf1f69de9220407b7553d2ab100cbf2f99f507d847bf3ba4958b2733c77f6db2c36a9e7d3354491dd12d6022f6612631a20cca8759d3e63329d211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a61b5d89d9d0c732fc57706208ca1b5
SHA192e0b2925426fe54e99bdca33133fac8dc1d247f
SHA256f0a28740515677cabd394c012706019c97842bcbfc6ca8f5a7055072eaa1310f
SHA51220a246b2fb8b098e346b8143ee25939aa4e227938a3b4ba7ba7b2476c077681577ee9cede85f0997c6ad2717801eb92770ce352e7bf20a9332e894980564993e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db3b35a5846c9b0cb7b99111d072f58f
SHA1b41bd7c4441de6bc1c833f0bbf52633b67b9e1fc
SHA2569f75d127b2aac5903072debc5952fd4ccde8f5686afa2fcf781ba2861139b6d1
SHA512bd50bd82bd839ecc67d432bfd092203b36e34cb493ec88a03065c390ec1401d71dd8d14738910da9545f44df9ebe61bc74000e407be2d0e634bea40ec50d3f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ce9510023e1b6c8999b98ba3260de74
SHA14a392937cce6de69ce925de2428af32285fa7d8a
SHA256898c3d65021d711adc626b3861469d63aec4983fbb351107a7f1616e7cf54d13
SHA512c679bbecad160722ac086a6f2f6677b12d9d189a156a7bb512997bb00bf37b3e3e97c3163e0bdeb763ae76ef09b1c8b73675233907a9aa987c4f7f969f0c310a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9224821fbc512cf8d3a6cd66ed54193
SHA1b1f6c3ffabee23f7c61375111291b7f2fa02ec90
SHA25637204f7909d28645bcbc8ee384f807eff7d0c788c440ce8e7b74915ad8f814f4
SHA512e244fa2ffd4719f77ef5295882ce7270785cd8aab1774227545a010ceca4769109f84909719df244b023c231cae62f548f5c0c3fe5bfed1097e8661356aefe78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51da68c4b520406caac8df308c3a8124c
SHA1a439c1873452bb7db0e7f349f264b1b46320b3c2
SHA2561b883d63513f0dbdfd9183816f96040c849e0a2a577b9df5fc5acf05ed81f732
SHA5127a5bc28e1a5e2ba34cc896dbf771261c5ff80ee7e3cca8c2b488ebc5df0e14c6007afa13348866f74fb05a334f3ac3d711f1de0cd19b6aad051c8efe42632baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bc7acfcb970539d844270b3779fd23f
SHA15b5eb06c7ee6ec1c8510c03aa937ad0dc78cc6c5
SHA2569caa463bc4ddf097c4a799843db06da203e236bf0a83920eb348f9c7474762b3
SHA51204211b83f3c64a6d618c6cd43661fde12111a3e95af006601f8721266a8ad0395ba864f6f568a484429106c280e0304812eb033152302328d7e6c0d2fb99c002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562029ac3a984841ded2fc2534ff31469
SHA17c9d759ae9b3354edb08af4d3bc41ba5c0337c3d
SHA25684573e335f1e7bc4d37569732742796545aa3936500e37993e1a2316ce6815da
SHA5121aff23aa10da4d99e3522dd637a777f99e58a11c99af092fdf41de9e94e140c8145fce205b59f9235eeb1e6a55b1321ae2fe3221fce4924fd81fc43a7aea61f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fe4bf2cc745e43503ec10c63f736bf2
SHA17e6aac698cc8da5c7f0368d436ac4953c69392e9
SHA2569e306fdf60f33fd50eeae1ca7da097437fe8f8ba75ed3e4227fd9e5c5e193abf
SHA5123d1ed62973c43e22ace3f54dad013028c0c92e573e33f4e0c23934633b48796f49cbf610c011787ab517d59ba221ad825340edd60039db72e8948a6477eb9a42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a47ea45b37bab5df3338b96e2b56b71
SHA1afcde546eb30e24bd7eeaac271ab0aa91fe0a21a
SHA256a7204574e43b72d4d3e7d2c7207096417b97b480d9ca465ac92a0c6b9c4bdcd7
SHA512c58ea8962a7436913e0577ba7b63a30fe0f8bce449c1575358b6f0c628ae4e734151568b68dd8ca7742f3ca4e034dcd1daf45bc43aabf5015195ae7b3b3ed2a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d6a1d5a64b7124738d2cabcb29a8f4f
SHA108ca50d9ba02e79ecc8f8e2afa5abb1a5cb2235c
SHA256866c96f651557eaa931eda35edc2400713c8f9a31b87039c9e2c46b350f81901
SHA512da89226871ca543e3e98fe482dd91414ba9c34306dd609b9de2f5d29332ef981dfaa16b21458af13293e9f8a6d1489b54303d33e2aa1f51dbf69b634b4379fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ff761f728dd74b24c58df6d4046d415
SHA112573780363768eb3859bca365cfdb647fbf18e8
SHA256a599a95b31652aa53fddccd8dece38d73b8a59a44d2ce3dc51eea9ea6ca17f0f
SHA512be9464f55a6d6835c70df2c5e08ed41ac99294e18f7cdef049ea309626d7abd15870dce72e795064621eb751ac1187c2176633d710d6d4b6d01bb174013a7fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ac4708dc69321868329d064152a7899
SHA1d1120f5792192b37447c31ff82fcfb17e8827e4a
SHA2566c460d8f36956d7e379ed9ad483f7f6d96e4e2bb1b0a76dc9c8873677c702cb0
SHA5125066dc4538d03158d3434135e80d4dd599d1f2179c55d9c4b9ab2fd51357d672033babf0356ce42a0b1fe457ade074c320140d55258e352de1b4f1fd6654065a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e27b7e75b6fd621d06c71f8b9f8f1819
SHA1b51a870c5f3aa5868f4cfc5740d93c1f93eb6c55
SHA256355ff6ff71852e1c2685b154197c6f18f7643dc32c0f01e5351c241c3830b15c
SHA512afbe3a85cc041b87c79844c3c916d5e84cc91a94e1aa91573f77c7c5a079895205af6236922cdec7e04ddd2ed4b865f3b2a5b243148686ba6e7e639fd45b75a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5836d89de69728dfef9af4f5e2b4fa595
SHA181ee9111c35140645fd21c55854c9a0c5ab570dd
SHA256289ba690b70a18f7ac716b2740811de11a5f9646c5b4509ff700ffb692ba49c0
SHA5122a553526e0bb4099a1116ba85afca47f6506e5b29cf3d7c8ca64fe7e3d27e9ef3f56e11705e1963d5d3e8280eb5278d248b665128c93579d609eb86bdb516e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5678aaf3758ac08752e8ae2af9162fd2d
SHA1cfb538eca2581f345bdc581aaec745cdc250b73c
SHA256040640f6f9a0d169170e8599619749b00aace1d92a684c6bd4f6658d44a404e2
SHA5124638f3f0daf2e1159f5e4e755d4cbb033aee69f95b0fd1efb186c95586a88ff975570e9ce16bfd440097096d2c3595722b7843ee52b59200620931ad64f72e54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f53cb6a1c1fe4079f82c21d453d1fbb6
SHA1ab474d0f21ad7e980cffe5935dc2e9d5a37710c3
SHA2562afe81092224c591db63e5531f66c64ce7af19e4101ebd63b67ad206886a4987
SHA512dbf3a4da93fd8e40697afdbae7c25e4652b14217ddda0c1534485e408eae906210d654a82e4da84e0075c5781c66a027b3065aa59aa3aef9fb72ebc690963aff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b