Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 03:51
Static task
static1
Behavioral task
behavioral1
Sample
3851024ff170fb76f27e03778256bb06_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3851024ff170fb76f27e03778256bb06_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3851024ff170fb76f27e03778256bb06_JaffaCakes118.html
-
Size
32KB
-
MD5
3851024ff170fb76f27e03778256bb06
-
SHA1
21d14268cb5b640ff1cd13ad9c34f7fe9a6f141d
-
SHA256
b5d48184a020732743a247a2ba7d08c75ee6ba9b580a9e85105ef99a352942e3
-
SHA512
20dd1a45553730204ccc50f57533942460423573c941a50ad5b983a279ac73be94794ed6b219401cfa08ec370eb8d047c3801c8fcf818ceb56a375561206876a
-
SSDEEP
192:uWLNb5niNnQjxn5Q/lnQieANnQnQOkEntX7nQTbnxnQ2MC9ANYLWPY6NJoky9t/p:pQ/77x6P9NQt3jwOV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000003b41f6a2ea658472682e061052463f3f069209d3122650d5ab1128f2335e22e4000000000e800000000200002000000087e340fa57d1c446d4592407951e753577057b4b25703fdb3c150a9a50e5306c20000000e4a3bb4e0d4cfa464bd5b9f42a98fdd5b8c4370e4f16fe968b901338933e3c5b40000000d15185e84f62888459d50215fc56a0b9de4769c3970bde050a81a74535869e21cba84e746b777d69725ed591cf094e762d468c1916df2f0f9e96f582debbb3ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434866976" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F1BE431-884D-11EF-A58E-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d247255a1cdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 iexplore.exe 2124 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2504 2124 iexplore.exe 30 PID 2124 wrote to memory of 2504 2124 iexplore.exe 30 PID 2124 wrote to memory of 2504 2124 iexplore.exe 30 PID 2124 wrote to memory of 2504 2124 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3851024ff170fb76f27e03778256bb06_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a4f901b366459fb198c72615b6afad
SHA16a43db17977e1cf4e4b2c0b316a4c8d7ce31ece0
SHA256cf096316189b7b8e12012748ee812ac0a72879bbedc510df326c0351fabec777
SHA5123894def61daec0ffffedd3daaafacf1a04d510bee945785af3d0a36f15e3bbed75406dcf1d256180dbacc58b28c23f57de72ca3c78c6ba6ea185dac0acc06d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5294679b44b90b7ffba8afd6c836b5cf9
SHA1812900208d5823c8cba59601709c5b03c286a0b7
SHA2568fdc3449f1af074c9d4b9887e2e6c5900b2b5c317e737f715b43f8380430c58e
SHA51216d946c873e1d841095985f01909644fa5521319abec8a1f36ca8a0db4fa4895da08e5bafbb6d0fb56f9935bcf9c26cf0b6e2434ec445755bd7ac0e9d8bdc7a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeb8ec68bad4557d2dd4022824467649
SHA171f68ed5b611a1c7352e46aae8c2a09b6d47a918
SHA256131951588a1235a9ada469e6556281558e0dca5a1412967248c11870fc5a0589
SHA51245dcf670fa3a93c3cd5def5bcdac4b3daa7ddd42c6cd13f58ef786fcbfaaa90c792633953fe1c021dfff2c06ba269f5771f4ee19be02b3b3bc39f6d816a13a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58871616a56528077b68f1033d60d26ba
SHA1bf3fa6262eae32b90ddb6a43d9fdde10f16c276f
SHA256d0aa2af07aa3587c396f83dad3ddac115454522e576936bb9edc2c2cad7d13e8
SHA512b96cbfa1780348fee1f2299b454c1be51f6568d36a4b343619a1e56f3450ec8df0c0f20e15b2fb4705be11645c8ac5d6ff48f69859f3827654971d1a8392c00b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e8ca319dfd88c5f9cca62a535dac86a
SHA1a727b4f4ac707107f08461adb129b767b389441f
SHA2567af2b6ffb8849b3fb3a112f60417e2ab9f08608dc70a48cfc7c0462252ca9884
SHA5127e92638a84c45d7dab2134ba7a5938eab23d69804f18ecae5ef23c64c6857ca59287314d8f901126260a907fbb1093012ea45a8f384c65b8bc7b41568d6ce50b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527bbd375af3051a367d9cbe3e332166c
SHA111bf0d4ad6f3068c6c8e40e920ebfd3c575590fa
SHA2564e3f23ca021e74074c41ab04976dd833b892b5f296e82d9d0960f35cc3f3497f
SHA512e1b0a7748f8857bbc83e91156135295d3d4d22da48f980b100802cf6a29551f564be1ecb728db6bfaca179945c0e30d2cbd857f258e182bd4945e1341a454bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555fbab8c9d0f8d03f5e7b6b783515cad
SHA195ceb09bc2bb3fdba60fe687b137825e89bc13b9
SHA256ba1aae974373d4f69bac6461a2a515cc411be75a85142a62f16c082a61a52a53
SHA512c2c7d85b64bb02cce5b44a29711e44f6982ccfa1f0714b0e13024bdf8cecea31b455b87022795eaf58f66052dda4632ff3173ddc8b627b505dedbbfa40e0d002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58911e03e5d35937f7be2abd2f2208ea6
SHA141e3613f65cafdea3d79ccfad98bf64bc5115f31
SHA256fd8d88170887354c03d94d29597f934c24f42caa7a816fc5f2bfe5a2f088dc89
SHA512f3f7e3c71f4c981eecda5454b7e2c982ef852b471515a2edb435b0c2c34294617e9ff78a7191e192f9f7f6789ce0758cba47112a4d54c4f1154b0323a157b681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e23aedda5cfa43adbe6af4e1a305e38
SHA1ef0b5e911dae8fac707ef41c9a230ecdcba4fc79
SHA256a2c206914dcdaf08c7a33d3bf9b4337cb7593da544fc5d4a981b6361ae036670
SHA512bbb3251671625b9dd92029c0b74c8f4baf307994d96eace77ab66724c3c62f31000d743f619e82884e4b4213abee59d161c5f44404730b7f518acd609dbd7240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d95a5ffe2f50f4a1a4d2f9be1ed0daa
SHA19b0d99ab802571ed63eac1350d2ee6fdc42d7a5c
SHA256ea9c533a5cd852fe373d350543b48f7be3ae1d8ad3a1887779fe7f20624f6d21
SHA512398d570f44eccd70de16d010608bcc2c42c5fd3891875134edf1e6fa0a78275e447cb85cb5a984a4a922b499a3e905125dc833c529493982ac32eea787354796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522395a6daf1c9918141a30c8d0747ebd
SHA1c77daf6b87da85c06edd826623efdb1504e8d948
SHA256b0fb2b969e00d4ec197c669e84ced0e6485f05e24aa529ff07ae47a1071078dc
SHA512d59d41ff7b64de4a6c91e263c8d673c35ee08c7bec6511d91fe2fc3b5c7b9d94aff5c66f9abca67299ea6f0cfb25b2cdfbd9f850b4d492ef052696a594b0e943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae839086f0276a9a6968f183b5105b8a
SHA1a27b6df116bd8d2621761f71a762a5fa0a2a2831
SHA256d1cf03b2b6ffe998c9dd0978100c8284ca98c57b760d9ce6dac3999e99727f98
SHA512185d56086708d06b11f3df7abadc9b224d598a95f99955a23c23e2e360e99ff37d71901586aec458c37bcc5ebb3f92cff37ed0503d606a51acb1265069beaa06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584906cb5585aeed3e28a11579b979579
SHA1979da876bf574a8f36f81f4478e0dc96041c0eb7
SHA256fdd652277f1fa46670029846137005cae4968331837511c877e91fb70983264d
SHA51213c5525ff7633b94c005ce0d7de8153dbf3da3b36779c64b3714feea84810c196d3c4678fe3c136c8c44a849594e158d5847ed103e4a60fdc7a444295523a097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566ce49923a9ba0a186244de904c0ee98
SHA170782c8ae3e879cc07c238a62ffcb7b3d92212c4
SHA256cbe7ff931447fae6a5a82db406a0099be40b3232890bfe28cc3f261609699bc6
SHA512bbd6b5b0e1e117a6b2e2fe922a09a1d9a96cfa285fbe1cd99457801ef338477dd6cb64a3ce60dbcbf0dda148094ddadcc7eb673f4aacbd68c4c475ef8ebbf358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbe75d8863e9b532831b06029fb9bdf0
SHA1365efb28086cc27d8d6ca08bf3e5e3d473cf521f
SHA256c4584d59c648389db8cd2ca105b5d8948b234f816195c5e91a7572dd2284a35b
SHA512d6046a583ee09155a0a2610cea23f1d580d9aab2cf95eff68b5d38db5ee8e33aace6cadde1ee18d5f4dca90532e78de39f118d679a083aab5d738c50ce5d5d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb35e2cd1f4e5607a362d25eb8b19e4f
SHA1bf97f002cd935c495a87d5a03930470a12c69c30
SHA256c16ea3445f31c26c86312feb46fef27c955acafee668343636c50bd2f4f6f9da
SHA512a62e9716355aa5209c3f4a29c41ba533e43204dc7cef054f5ecf2d31e38dc68332d7bfc8bc0c4b9ea9dc4c95f6e20a64eeb4cd777610860b835e93e940b234fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d17bc59792069bac4a9ad19de3d47fcf
SHA1e856309bb6d21f786fda4417d4754669d8cd65b6
SHA256bf52f2fa9c8ad1df4247b0ff8fc9f979f4504f4d440cf16ff133a916a2098a01
SHA5121b06773c65e9bc0d2007ac79bd71a8986af95011ac96042b56ff3c0c353f54871e85e492decec89159e7b5b073e7eb042243eaf00a21c006a6a1ae62e3e8c9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f5a029ea8664a7e1c36593636e85d48
SHA1b4a8e90797389b9453fd25fd0fbd5a8e6e32c528
SHA256f4965790b9d8d22f7b47bf7ef0f7d423e79644344106514d30731a6e6385e169
SHA5126492abb380035ae0744b57c03885ee61257aa50cd77ffefb4f8aa6841b718e9072fea97fb145cb96db13e1923354d7f415ad97d2d51a5704a0753b0cb733ee99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b7ff07fcbd8b628e057d2bba406701e
SHA14cfaba6e49813608cba67f8f52f306f2a5158b2d
SHA2563957aaa4660c0f64519e723712c7e95a8fae98359323d8e3f6169a4ce9bebc51
SHA5129b88c10fbc8f3282ab00e79d58f20a8011a9a3ca4add9c3176fb144d938463649c3b42877163a7507805c6dd5b0e7be5f35944a2cfa93a842698e4bd9fea9392
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b