Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
70s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 16:01
Static task
static1
Behavioral task
behavioral1
Sample
d4bc1da5882fd8447eef4228baf2ce4a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4bc1da5882fd8447eef4228baf2ce4a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4bc1da5882fd8447eef4228baf2ce4a_JaffaCakes118.html
-
Size
23KB
-
MD5
d4bc1da5882fd8447eef4228baf2ce4a
-
SHA1
b0d9554b14d57b8a4e98b62c12cb34d0dcd763a7
-
SHA256
110fee735e6a4cc27541aec5ca6db4dc019c4a9980512dcee2b6d6bf06bf91c1
-
SHA512
8dfc545ba98942985958729a1c8faf8d38f77eac8bde2381f038a876dd72bcc71d98275f7bef677cd05cd3485b6116e03d0e2bc3cda5349cfc3d6da4bb788b92
-
SSDEEP
192:uwTcb5nAenQjxn5Q/znQieaNn2ufnQOkEntZFnQTbnpnQtBXQvMB6qnYnQ7tniYx:lQ/wunnsnE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9E544361-6DFB-11EF-9E99-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000047a1e7f2f537eb4254d59e348775d65235352b81b46dd33114d6c2cffc7e5687000000000e80000000020000200000000a129b78bc6957276d81c7bac98612bcc5f4ff9805c9e233e7f3729c3f34d5f420000000a75f9f8aac1b974d247e2bfa4f9212b58891f5e82615c6f62fbec075b394bf60400000000897c2f388d2bb36996d5db43aff2be723c0eb33ab1383b94eb44ff4b7594ef5b1d46849f1e8dc7287faac4096823a91aa454ae3bd3c493d2e4affb568ec7699 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3036bc730802db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431973164" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1464 2000 iexplore.exe 29 PID 2000 wrote to memory of 1464 2000 iexplore.exe 29 PID 2000 wrote to memory of 1464 2000 iexplore.exe 29 PID 2000 wrote to memory of 1464 2000 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d4bc1da5882fd8447eef4228baf2ce4a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531d4bb6e5e2092dcd7e4cff82cb03e6b
SHA11344da76eb1180ee887177f830972c03fba26c12
SHA256795ce500f7a826f545e7d96c27e09d14840ffeb74258b68296cfc3a70dad6993
SHA5121f50850b687bcd759c6cfff69de7a70233b491c0e1f87a39d094c6a5f903c79b9566d04eefa5fddb715a8f89e696797b2a3b5c5ceb018951b19c249c6b5312b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5591bb73bf0247467aff9c04136d684aa
SHA1063e8922e9b92a0610c5e548a00310558e995b26
SHA256f30229af4720849df7763cddf13beb66ec455f6864e7122982d859f31e913519
SHA512a262d1ea2d6c16f114e5a3c1593ba6372b883534372f7f46055b36edafe5da05448b45d70a842fba206b12f6f0a584152aeff8692250bbc2b120a66926b07ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51542e13fcb432fa29b3655f8f2372f58
SHA18d1b152c059604460e4ddb277dc2fef17a25ca74
SHA256cedfa96cb758d4d9c838a7959ce7b5e1caa8ff19c6140d37d2d797ad7ea558e1
SHA512a5ea16093dc57e8dc1196339dca6536280661341dcac99696c2312319f0b9d25ffe8d4b4a75d18ccbca57de667f2b4f9a76a5e3cec7ce21fe0eece8be90b773e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53712f4cb1f23df97c8633ff8cd24306f
SHA1b98c31913b0e97ddf766c148872c8f434a6d0eaf
SHA25609de006b7c7a5006bc8b74305937920032bbf41334033673dfcb993ce8cac8ba
SHA51299bfd088da4b889260aa2f3ea74aff13fa530ee79279a2c7a8fff6486970144862088ce73be0354036fefcb4796966f44cabb80d089b8279b60e173b5aa756cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626503b79249b2ea8dbdb8b04580ca75
SHA118773a8199616be0c0e7fa29da36025d2ed039e6
SHA256d74c87f409c144587765d221987dd3531488a4bfdee937d698e4217ee65d9c06
SHA512f51e7c2a8a0f4471401495b60e72a362ec6e04d65d2198d2c9d46fac0843bc13241c1d603aa1f3e562f60a497d978e56ee94c94348e46dcc6ce8385a19656832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5943a330ec22446e129477166478901f7
SHA1155ae0d56628fdcf355d962f657b4ad65f59d8c0
SHA256d2c086877b44e0b901ee3b98f0abac5e021115524a14a3a1cb73df2725e292bb
SHA512c060c3cae81660f3115ef39d6562f73f0cd2250fd978e083656997a2b835cba0c5ebd15a43e90a6c7e84d1c1f59c53c71aabe6325951f0254f8964d1bc042f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5a8a097b09dd902da9fb0cbe493c316
SHA194c42d1490bd5bd8faf61e4f9ebd67215eb58277
SHA25619b1400c0925eacde2e8416e0efe5847c31438714926832cfaddbed25ef65288
SHA512d3007c8ef17a00e7fdc1be2a8745c0f781dc7b3c76699474bdbf64d8ba262fe2f89d337b56bd9cd9648ee4b63b374180d28997da93e3748cc15406a4f241b149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dadb279f89b8a9b80a4a99334241f717
SHA1b9c3b7f26b436ab144d36a5418a65a563f730273
SHA2569c2830099672f3d2f8afb870f3146f254aed240f407dcfc929cd63ad51019076
SHA5128355187b9c568153a29ceecc6ead7600f29063257019e9e5add13349f733c78a1dcb43e0006b1d339337526bba0e8160a94a2dd7e80126bbeb6f35b82963ac53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f34747dd63353588246ae371556faee
SHA18dc0eab72f2fdfaf53e3079acfe11765f97b5a6b
SHA25671c0b0713be27980536f3a5288ec4be645762ccf6338b25dc3fa5b56f3563184
SHA51217197bbc19c82ed78b974dde3431de36ae62fc5058ecb010baf9a14e3823cc8f6a498e5596ad8d81aca5aa1063771d8a90017695e3728c0355802f36388605fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533e5ac183a0f156e1cbc9164fa65bc47
SHA1e5ec64eec8ab13de712f8efca429dcbcee9fb3f3
SHA2563a2e0f6f222687c2edc713e37f875fe0a030cba20409b9c16fe3ce5a5b302c26
SHA512009d345c38f32af8f44d2b0064dacb08221152b40787afcf942063f0ca0c8be177807d656a48609362f98637b393fd9d0fdd90a9ee8e9436306b805e7e7d784b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e7ac83803307bf6f5f0b51e4902743c
SHA164f5b5ec732c6a30d67f07722c8a82fbdc43eb77
SHA256e6659bc8d7e8b2422bb497a3a13cc9f05a7f5b89fbd7dbc5d617d32d96ef84a6
SHA5122b54ade2e15d972e878249c171ead1bff6b7e790b80f71c2fcbba72845d201753de7f0c777ae89b17ae391dc9ccb60aeb50165f1643e5d854002ad1e463297c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e674da0020fa5af05940b1347959a01
SHA1fdf22e6188598adae1fb248023452f5f76f8fc4f
SHA25639fbc58cefb516ce8d0e24744fd9c1d6d26f95d231d66a5fc5446f5b437f94fe
SHA51223b708aa8e4dd61b5b08df29dc56ee1cba5ca7bceb515e5a90780d30f6be5eb91f89708af157fcf196fe5656bd0c7e8a61112672dd2cc15877b75df6453bd9a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de281710d70d1302b8d7048131d21d17
SHA1a1707301815b4290254825da8b68d5adeeace2cb
SHA256e37c11a51a5b0c2c22f61d6a8a85d792db5ededbe0f1c9a9a3d65976c23130f6
SHA512b79ddc5628ba457da719c2d3fdd2cc8d714c4b43dceb0902774a91c01297f7a1ae22bfe8bf4d7bf9573e8ee9248b87c1fa34870cd64e77b27e961e02f0e974e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e97a0314f6cfa2831d69a5c16d844929
SHA104e122c4f183c2e1a02b5a71b7e4894860635b50
SHA256f8d3a3f73235ba13e5001c7ee0e35b07d4f3ba60c8cc8158e29d3829a3bd6c4b
SHA512e212fb6b430e07e97ce6e2827f47b752db55fa7c57bbe03b1c9d259ffbef68aa6b5efa6dd82d570b4f63e849bf00df238ed3ca48e1669c5d003f547443681503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a54ef61cd6ea7d005ea9d2a89d2c3a6
SHA16ff31709c636e34c184581feb5db23ae1e0268b8
SHA256c43ec8e770da9d39713ecd7176adccdd361c8c6eedba9f84cc4b5f3a1d71b8de
SHA512b6831a1e4e8d291884c440245707c952c6385e1490fbc3186cde86e9ddddab7fa98b56290035e1dc2b46fd245c75b75fdbd78997a3cc14799a4c153466d47268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2568ebcf63fbecb25de1bed41ba3eaf
SHA1c4949e640c9eac81c530518fbd2e8c5620deb7ad
SHA256e79fc77e0c9972e63b1ad7c35d242a7762bc813c14186b2871ab933f65071c34
SHA5128c46a124de0634d1e3f4fa2494bc34ebbdf553078415cdf7838f3cab3abdac94e1b5683208936b9e62e2e9a87cbd79a3a6f39c87b5fc92cf76137d1518840446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8901e41361b3da242b435705cfaf3e8
SHA1f8d238c3d211110dda7b086b78b88fafd527ec1d
SHA256455a7a4dd319d1eed1e581d4261ee6f4bf560d426e2c0f36a988c0b6f5c56f97
SHA5122894f80f0284c0904da9cab6572fc6afe256fccff921d976e68076db19ebb1a7cb55bfae0d8b3f5420eb862ce483f6a5e037ce1bc6750477e1e36a48e5b637e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5e2f6990581ca212db366844333d47a
SHA16a26b4ed222bce02c6e796a1a3797cf5a0f78cc8
SHA256e92a29d9e4dce833ea5bc3ee82a3fa2b4b29bf28e725e1a86d63052ccc943b85
SHA5124c394402a329c6ab0d3ba0c899054ae3a748e59e64320c6c3d89c1b8b50f7eed849f532d110a5da4339d5e73d6ef520be61328894690303444116e9e1660e319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519bf8eef978255a7449c594926bc0513
SHA1a9731d1962fb85fa6b83800587fbcba604e91cca
SHA256505304171940c773068903acc721fea479d8aa27eeb207c670af8edc2da1c501
SHA51259317fd3629bb07a19517e5d584d7d3d797c5d3371316986b9a6244385f6ce2fcb9353dff04c96d819bdc461f62db56afa2263dc9c50d9369d1212db5b250215
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b