Analysis
-
max time kernel
136s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
1339c5c85a17954cc573addf8223a50a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1339c5c85a17954cc573addf8223a50a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1339c5c85a17954cc573addf8223a50a_JaffaCakes118.html
-
Size
139KB
-
MD5
1339c5c85a17954cc573addf8223a50a
-
SHA1
b3031a6eb3c433d232a61a896b32f1d4a90c6093
-
SHA256
0ca8f694f0374f0c10f0cd3e0b201a5ae307175ba3a3f4f6e3083792790e479e
-
SHA512
25e5144bc2bad364bad8d39db2b0ee4f4e149e353910ec47992786459b1b92cd1d59d5b46c85ae721a8be2cd2f7adb79f435906d17567d7d335dbb0921dcb740
-
SSDEEP
1536:S8f93nx1jcleyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:S8f/dryfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008f6d13e16934f142ba36a8adb4fba2f5000000000200000000001066000000010000200000006822ed805887046f9249964a0a45e5c4fc6cebc5295e91ed43e45e26142b8a36000000000e800000000200002000000044a09647b79c5fd5acd8efb63d40ece4c97f5f50b410bfc34166c82c3ff797e7200000002a13136dc8eb095474dee25e7a9918ea4831be4c66078f040360b002ccab11b34000000094c71956cc2ad7d9e5b609021dfa0056c9e09bd3b9c4e0e6e03aef0bdf9b2cea8218151d0670cf791583ca156ee8767dc1352be6e36ad74dc6b53c122b7b17d5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10aa852e5316db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434204176" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1AF02CA1-8246-11EF-8705-5AE8573B0ABD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2776 2188 iexplore.exe 30 PID 2188 wrote to memory of 2776 2188 iexplore.exe 30 PID 2188 wrote to memory of 2776 2188 iexplore.exe 30 PID 2188 wrote to memory of 2776 2188 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1339c5c85a17954cc573addf8223a50a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576021f8a904a64edc5aeacd2ac1217f3
SHA10851f92e60b7026c46e6e2f2beebb4eb7997db38
SHA256027814a4c860905d13be8e74e0e9103a8f1b847f495e3bd71cb29754f89f0ddf
SHA512ddba8607952b6ab8dac7a1b1ac0df833b374432e0c98ee67b973bc91560d803d87ce004b07d800432064d817b6da78aac76cf482831455f28c58fe9263c3cd92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5357b4cf68d5aa6ee17b46406995d0ede
SHA1eafdc36086ef3a685c95bd63b508fbc3345c0020
SHA256d342cd2bf35f57d97d8de3bffcdc113dd69da20b587f474968d202dc5589ffb3
SHA51203676a5eb107061daffed14d8e0f37dc0b74e106bb3eca5e0563d35b40c333793a6e5363473a6b1e64715100e16adec13146146f30ce5f306c82b659cf966bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a9022502a710de00fcd52cc310a346
SHA1c06bf851a2acda3fe2011e27be08b5a9b7fb51bb
SHA256601c5056f2414220311eeec9f16ae456d08616d851489d81b0e49af218d0bcd6
SHA512fe99d7c7ea6f01a394330f401be03aeb150fece56e9e1e84f2fd1321e6be505365dab07b7d27dd0bcbec2108ecccbbf2834de142fbe1d287e07e6b256bc158b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59353c8a78d724cefdd006d3dacc8442f
SHA153940b04d67c57d71064bc1cfcbda4617d2b08a0
SHA2563849e6d0d0d4a2f03781e5ecd7b338481abcd1ef9841ef5bbf3bb5cb9f9324c7
SHA512a0746f9313ec0ec1e25ec3d9a5bc84e66ad8c497208fdbe68dfdd75e4c566487fae12636481f876536ce32b167c8e7a28eae8ee69ee619517042254895c574b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd145cdf2275ab4b1192774720a075e1
SHA147e2d04b0aeb7739e7aad2e391e9a39cee5d05f0
SHA2568cf73bd59d5bd4fbf60b32ed7a7479f4e15de2f790435573e406995a216e27ed
SHA512e0fc4a3d5f5ecce6cdb93ef5f6a4be2696814ecfe0734a1983918c8e0037ddad9357970c800d88df0a5afae47b7a137bdbdd87bb84eeb8762ce8ddc06f458bee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5992da870b4f4779d79d9ba86b2d1547d
SHA1eb93983fa566430388b0011d913d2c86364c7387
SHA2565884d237bc6d37f13b66c10238106b313d5158db1ec8a09f42dcfb2a0c48587e
SHA512a888b71117fab4767e3238a7c45e9c22dbe9bdabeba7f462352fccd763f399cc458dcc8f8133a1d741d35f66054767007ce4c7e5282357cc5bc8da93c7818134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c50a4fc63eb2c2c12ed158eaa53e85c8
SHA1c550a6285c51bf5a89b7edebabd3d72bea135cc5
SHA256f68a251ba7e2cc0dc1f5ac80b01112b3bb836529f9456566703d469dc2a6d44c
SHA512543157813953e80b91363d00625b243f4744a9e48928bcd68421c8c5271425325e7510ba9c6eca1415bf48ce74c4af5dac88141159418a20396540f38ae170a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ce8b95a9da22fc58f83c09cfc3b49aa
SHA1da7cb2f0016809d6c0e19f567ce2984a25cdda26
SHA256e730951ecc74cb10be56c639d70c01970ab1b0b8e7343cbae648d51fa7ed2d93
SHA5126f0f78ae22ab0110939ed0504fb9e2852cb36c8609b09e58240965fb4141708acef178fd43f0ce7591bce362baff558db3f53b03f8183f5c0186a9d717d31c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c8733448c6662c8af3691398525ba84
SHA1e24c9bb1058afadb0ea2fe8c5f79d17c3e168578
SHA256c45443b6a39d301b0cc8e2c5058b3d88e87f17cdcf297914575f3a66a134691b
SHA512f42917344c328f8792d1d32627cb9030e281a17f2f3cf05e520787a51f94e9e7920edbc416b4f9e264dd732b25390efa4eff56d90c77d542df0ef4e3701a7bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545c085bcc85720fd207f071cfa1f2d61
SHA166eb9036401e6d09b03bc70baccd15dab4ee967c
SHA25635c98e19984cdeeb91bdd6844dbd044708e3aef42502ecb9171703abc48d4a97
SHA512cd466f59f565d9652f7efb832398af3dd55f261e2cd8c8dd8bb0702737c39123c1e6cdf346d266d77af2dc4846926678c08671d5d27c004433cafbc0668a2a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01675c1ca25fd9123b586ea624b36a1
SHA16cb65c4078fd7af05d9a66c285927cace99bdd19
SHA256da41c874e0af6033e2127b3f393d2e290b265aff1496ebe2fa471fca8e01216c
SHA512e73fdcad17e0959fb0134e20d1d64b1f179649f77e9a7ba95f84fa83d4692f0289a057a1535977d276961a995728718fc5fd68333abb00e0e34cf8eb54e786e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af92c742f3f69c725378ab0ab45156c7
SHA17bda9aee48c78efc67a04229d62aa2e642883d0e
SHA256d68ab2f4fa0d2e64c5df5c1622e203ac170bba910901047b958d1fedf6b394f9
SHA512ae77b52b6882cf54c9f1575ae8f676391a5aba9b6777cb7aed57e66b68fca28dccbe45b30330210fab73631001bdb4d824b42467cf54286438d1b7d5e9211620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58948f5e9b6903e2b854e25dcb85a9f25
SHA1e3296503d71233ce17995ed1866c8a71afb80429
SHA25692b6af6eb679574703af0425dbf4376ecc0d8e79a5fd2c489ad8480237a4fe5a
SHA512b1a7040ca141b700066d6f885e8d44d5eefb504844790b060d7a4934cbdc09eddb4a6cdd1b7c0347a84e5acbf78d5ce0111c63ca48636ac14e6bf310d4b4b99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5864fa35b3377ce08cfd4833f21b0049e
SHA1945193d77ab99ff6b77bdad78f164b4eb2d1bfea
SHA2566f4c83d164e8be37489b7e01bd8774508ee36fe8e2f732f8f14832ffe5e99791
SHA5127d18d84e667eab5a42cf493b93f36b018b09a2e1d43c0c43082ad82a9d4e7a7025988d87e05de63a65a313d8519d6156416133cd0ffd40cd9ef5bb203c107778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534f918ac9b0bae8d69770e0811fa740b
SHA1ee065e48b28dba0b3d904f3fffc7e5d43e39aa45
SHA25635283552d7bc6e4475da013795c0e4eb26a5cab6eb01500b932ece8092bf5141
SHA51269210665e13b816dbc05beac6d0e35f059b3d3db2a15c52e499d00f9961b12b6f07d7460da2fa7b2d12b497e95d81b824517ed9856fcab9b657bf27e70d4d5b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53db45fe7abb4f14db1724e0c1de65361
SHA1b109e5048160716d5acad60638483b5224262145
SHA25653d00a59fcef1ff319f1f18446b7d0d96963c73c01719f087c20bf71d1177949
SHA51280ef1c82da976ea281522aab07d3c8086d1422d64602316008ab95851c24a95bfe9b91393f6a5e835df42fa070f8f9f21b79f2956788797111acb568d64403a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59903ffed2d8b871b26fd0b283a7a3c69
SHA1a9b00dad33e7e0619c470d972fb5907c9a2d07be
SHA256534364d840434533c4f84284a6c180e3e12d985154c34f6a7c287254cd44e345
SHA5125bf44c80d2e0d161f620cb356ce74e92599810f5e0948633fec1f3d4913e13e13ab799106a3e5bdc1825076d754371ba5cac36a29714c34001b40bf1910bed61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5747be28b942ecdf439f578eec5403387
SHA1263f3cd6a177178ef0593f2b377febc81a3f9eb9
SHA2563b946d6a9c65eca39f2d0d6f45ad0f7e34059447e0e768d3aee5caa513abef86
SHA512297f882a72967acec7656bf1307a365bf14e558b9e1a0c9931528769944fe5e06bb8add6bacbe55f0a6b04e19e42e91cc504690757a53e306b741d6f49c1078e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ee45d635c8242a537f31348865e4f00
SHA1cb91f67dfbf4aba53174484f086ef1bd10827a44
SHA256970e7552376cbc534160a5b2c45ce35b4ab1451fbf6a9486816c9aef37b02b74
SHA512e00d1b9dd3d4e8c8a75bab0c02e314636ad7b5b8c1bb9e958dfd473e6581615f279049c71bc418452c1b97441a1235a74bbb7251b1bb88626ed05d8dcc86340a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b