Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
de334c22d62bb97356aa43ceddd55875_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de334c22d62bb97356aa43ceddd55875_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de334c22d62bb97356aa43ceddd55875_JaffaCakes118.html
-
Size
138KB
-
MD5
de334c22d62bb97356aa43ceddd55875
-
SHA1
b424d00ba20f27fa113e730530dd5e9740bd08bb
-
SHA256
61561a56b89299fe3edb4382f0a9f79e9ca30857f85c3c3cc0e5aec3f52902c2
-
SHA512
6689b570efa84ba64fae5295556ddb25a6bf59d4ed2d0ab4a888b3e51228786a635b365f8567fed598d9ec780c7e78611336333003106a23697667c99d928ff3
-
SSDEEP
1536:SZdtS4alxngyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SZkgyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000ae6c7ebe8b9693004abfc3b38c9fa7371c0b6d1f6833707ceb64676c79f3bf8d000000000e80000000020000200000000cddd086a45b036dc0a6048ef73a4b40d622ee5a07c01ef01c83baadad708f44200000008b9fb46dd890c54e0192e8a3c2f39d72869095803f82cddfde38488a86764c45400000009b64d7cee5f42bb9ec43a34b42979ef01d71b19b49fceb1b1a34e78ae8138cb72b1a2a7b9d90dac6f47846ecf52a9ae3c1bc3d8de6b9353ffafb751aec82bc16 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB5BDC31-71BA-11EF-8250-E62D5E492327} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432385097" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 607737d3c705db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2336 2348 iexplore.exe 30 PID 2348 wrote to memory of 2336 2348 iexplore.exe 30 PID 2348 wrote to memory of 2336 2348 iexplore.exe 30 PID 2348 wrote to memory of 2336 2348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de334c22d62bb97356aa43ceddd55875_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769957ce99db201eed69b633d6409b9d
SHA1f1bf50454ac618753bfdbd546af0432a68692c68
SHA256dd4d6a7e074444fb682c3b582cdc576565a56a7566713e44ba0153e3e0969220
SHA51299e1caf66a727364de28408e9c515a704c3dbb255acf60606ade8bb4d4d0ce764e4f2454b2c0769bd0b0a12e4000549a784719231147a7a9fd31b22873567695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c1004a685aa1741823ebb800b9b9fa
SHA1eb36137d01f60046f10a1aee5e26b8efc2f69b11
SHA256dd7d071abb45658c9dbfa08dedb2e288b9cdc732d928ee61ebb5e2627f359bb2
SHA512b36f860fc5c9414cab49dfeb4ca5ffacee345e5a694c76f691ac7fc54d17e8d5623fc0c8755aeb077b072da07fcc20a78d926818cb72ee3a2468a24a8738aa8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f610240e31aabef2b9e9f05bb7c89e0
SHA1d1d62e8cab3f994308e2ed778c304bbcf8b1911c
SHA25620b6dd395f99900e209c8781dc74869c31ea139560ee9ca2d7056759e10384c8
SHA512a0f7c79ef5b79f142e3fe4c276b29569b1ac05a00928263cd1a7a4929319a211f7c39d2f55154e14bd29723d20d84d9fc11c44bb8d6a92ee1609284619b0585a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c25c05d45a37ce03318bc885c2a1f3
SHA10dd4fc6c05a82d4c15ef42002de629108f5877ce
SHA256f7a9eb123dc67d8256a17d20031742427f66c452e575e54083eed8f0f9ddd7b0
SHA512d8d183b32299c4c2385b5b28cb82a169b7631a45d9734017e1bd3b071e25af5b872b678735d875dea06a55c4fccc61bcddf0326442a5ba0cc52180643c656302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8eae1f76747af12f80016dbb3bc295d
SHA1ef64af08510279a7faf2f1db82b67372cb9b2488
SHA2563ae6c0665232dae8bc8686d6836469cadf77631f1af7fa304c5e433b2acff30c
SHA512123ded8f6e9add36a77487db9d2bf19cdeb28b99433613a1d08333a1199e2f69cfbe7f19a12143e23ee32b9b5b276d6caf79c42845a80ba042f968255132214b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5856b43a3e1b896b076ab315096f0223e
SHA14ef0a0ad39f9708ad16828e0953fd2fe2f7d75f6
SHA256783ec1c1912a4a229945972e6048c950d4d7119bbb5beb2c4b8afd3f182a28de
SHA512d83c86854faec215ace2967264be82cccc93f8fcf9400304121423e5dab21bec1644d710c9ab662c4b95f77c02e9fdf1b6b840fa46c8d180b90e55db9e400b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b85198c7f4a029a064264900f567bb63
SHA10bcf2a37559fd225c92d1dff3b2316e84cdd401d
SHA2560caea73ddf2755701729d4c0c96c1a0e1d059014a1c5dda26780feafcefce73a
SHA51250367f0bd4a1394dd35919a4e3e38301437bac7135c5ce8cd0fa40b8068a7e693fabf1ef0de3118ab0606ef9835a1a8583f9874a1efe59e171400c3b99dff994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f32ed2360172f99d1dbf321620ed6f85
SHA11e5b871135734ed8f180cc5c45005f04c20176a0
SHA256c3cbdff50fd0f333d4579ff982f9236a59b999a323d66997ae17883c61abae57
SHA5121c921730a9ff15997cfdfa429d173bfe03f08a808d32698ac30c94837d091cb4e7b6d4e62f923f4e7fb69dbec4b90549852bb570f13a932ec09f3007dc9be04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5271d388ef8be0e715581781130a27aab
SHA105825ddfd09251e8da417e02b393cee222764de0
SHA256dc3ec3354ce7411409434b6c16e18abba7b2c2f76525bd6278cc92f885d8598d
SHA5125500df9bd698895e14149a20e270ef2fdd9ecc98b9c0a3d1e353a4f9321659aa446355cc315d96b1ce516e11b41c13a3fdbe717471770d421fc388ce36c06d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8de7cf8904455865233ab107a8989c5
SHA15269666a4842f0daddadb6d73e5455f6ab72649d
SHA2566d01c6cb0121bf8879875e5638e2f387cf6ac4a1c19729d5233a7d509dda9c9c
SHA512b82d14f094cdcf15a4a908d2fd4afb50705ceb8f14ca7849a00c175adc0ef069b3498a0043bdce9390cf893b1af5e0b60b4c02f4b5f14c6eeba57a412e0edd78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0c0ee4fa42d8775d8cfe7259390855b
SHA1956c47c19f2f7e197aedf7d03721f67d097523ac
SHA256176b54dee3404871255cffa004bd42f1a67167e68598d6723c0829dea3b35db7
SHA512e7edb0ce316706869196131c69ab92e2cd79964490363d0f8f4d6314abd4ddf97bb993512fbb30c64787fb43ac9ba22c566f24091147bb6ebb187842c4d0b57e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaa02841b897e5344f9d2acb33494404
SHA1035b65850daf9f026e5f431ac768d56a9994d031
SHA25640553f408ef72eb0afea742983f1fdbb15f92742952c2d7c72f53c91d9bd7bfa
SHA51281c714525a0e70d570e62a57e9ec1676303c7f4669a00abbcd3c100bef91ab9f1f0e3893e8cada719186e98429b8f6e7fbf76492b9d039cd491c1092e1141a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f75ebe2f288a146e5b6b906b63b5de26
SHA107327f7dbacecac00438b8e37ab6feeb1c7899cd
SHA25670be22a3f2f584c852a9d77768dc4fb1bcfe7db5889c2b4f22518fb117ec4312
SHA5122323bb510ed4b62bf1ad0fdc0a7dab95ab88ba3dbe31f612f0310befcfed156854dedaab0a0b010c4b1abe741e62ed32ac3f3aefeba54865caba0ddb39567c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ca9d9613cde22e7d1b66fedc8571b0
SHA1140b311f11105c308ebc463a0d684317dfe02cb3
SHA2569d2b0beb28671fadf8f136df9faaeb2cbce8666ea34193b2fcf8d385dba63efe
SHA512dad99f0da5f29cfde1eff7c84daae04312693afa6c00e042c3c33781a68e7ca753a0c727ead1b0c17b33be132d84c78c855290828811a521fb3d0330e42e3fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cb1c6d3a8d4ff1c2b04e7922b9363af
SHA12df60be5af2a10ab47a908714307ff2e78e25324
SHA256ecacc52a09b73e1696ba533a207daaaac247c2ef91359b7cd14c38fe6ba5007f
SHA512445172139258e40161c0ad9dd95c8ec0da77b14330b4ceb54ba8af5004f5c873232bbd290c5e1623d7d3acf435407a611c8c33c9d1926705c499719be5e3dc7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5564dd0da6d76feb267305788fc41484d
SHA19d6bafda162a5e4b3df661d8cdaa373738ceba88
SHA2566561d114a75b535cc3d207279fe5c98c10e42c15b9ef7650dda21615f64efaf0
SHA512c4451f35d87f08298bbe960e27e45b83c48c66f4ca74d142d8c7b404f0ab9cde78e4074b90505ece62ed347d207546d4c2be45ef6b9bfbdd97a98d310e8921b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583e7e0607654587b6e13be54ecf0dc05
SHA1bb4158a344e7eced80b59b35eef7d2ab3311ab45
SHA2560767d7da355957f1378285026afc7e9e26aa6d21f3720d2a830eda3b5ad5b9c3
SHA51287b73f770da2933f028d7dbda66ebb0107888531d9cdfb509fcf8ce3a21975076a13dc56212147ea2a5a2644f3bd4b26190dd110caa6216d4be8eef6c42b6a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f12f2fbbb641fe80f123c68d5dce7609
SHA1765f41480735e44e2f522e549da4fcb5b2cc42ab
SHA256b965af808102848af9ad419141b9f62e073fccf5dc90ae3a79e1b8081ea65367
SHA5128e94980f104c4d7b3a1f94d78affc7dea61d1aea5bf4619dcd08cd410220a1f0834626035859ba03dd8c606574f5ea8e9df58b5a3c0076bcd9282ba37f0d9793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5273d3c9f0742cf81edc7ad28d33fe2ab
SHA113dc95ee1d8c553645b606aff3d147a9aaa37c7c
SHA25659fcc096e0d60f8de693c3af379aecc56253e306bd30106a50b3c6a5cd3f0f76
SHA51231f556d01463f4ceae121f1533298c8d116ca5e0bc93d8ef986c879c506a85ccb5c47295af8548bea8a8623a631edcd12b945cd89c8354a21d934712a220cdc6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b