Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
eafbcc30419ee770fe711830c71741e1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eafbcc30419ee770fe711830c71741e1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eafbcc30419ee770fe711830c71741e1_JaffaCakes118.html
-
Size
77KB
-
MD5
eafbcc30419ee770fe711830c71741e1
-
SHA1
af675fd2d4241d857be6c50bdce3f02270a05798
-
SHA256
1727c147bb18e1b20cc636f8d5fc3ed8084779f731dc2b286471d317708c282b
-
SHA512
bcde308eb8edb4ef465cb9637ac19228e8f0515c4289d3a47bb43d4d291e05d314896f2fb15fcb8340aae383b81e4daee5b7f57fbceb5f10713ea68b4db5bf75
-
SSDEEP
768:Zcd9QZBC7mOdMAPpC5I9nC4K2LJycm4tPd:gQZBCCOdH0IxC+a4tPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3702E61-7664-11EF-91A4-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000002cc18fc75cbfc50c93114e14abc3e871350f9338f17b37a871e2ac30e66f44bc000000000e80000000020000200000003ab4c813374d28f05060065ab4981ee88b0246085172b18a8499949a23c7016f200000005957f109c55bcb93a60a7d165314dde41ac40b2eabea067355403fed746e75f840000000582f9286f2e4d0edab639884acab0be673c4130d2c31bd5fd7f42520180a1d76c89d6da4da725a9979038169c7113d806745c41e8b755594986c80d9ededf625 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1057bc79710adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432897877" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2692 2792 iexplore.exe 30 PID 2792 wrote to memory of 2692 2792 iexplore.exe 30 PID 2792 wrote to memory of 2692 2792 iexplore.exe 30 PID 2792 wrote to memory of 2692 2792 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eafbcc30419ee770fe711830c71741e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548ee014bdf14dae8367ad4e5ab7ac60d
SHA17f798df9bd3599c1a7bb994c8ee6485f216bf17b
SHA25627c84989f733a8c589bef9b1ec500cc530c33c9459dcd2d4727961bd48fc930b
SHA512716316329685cc7d27c12d2836426cef4c947f523bd8d0f0e066a8138f7376a5bc45e815f957e7012902875b13cb23e1565b8175e8dd15969e53cb8c2edb95e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553223e1ed5b63df27de5661ad0479b33
SHA1758661d848674e5b27e9e7e5192884704e01d3c4
SHA2566f36429096f5c84921d5e2fec0c637dc3fef3324409e375133dfbc09dc8f0972
SHA512756f128f952675b47fbf22de3685a21e9f8d5374c7b813bb2250144a3bcb2a357f80796bd273b8cc2f240dcbe29f16b28537a1de0538bb8933d5cef7e2c5863e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530d95a0b5bb9c74536edb735e9840292
SHA16c4d7c61d6c53fdedce31db908f90214f9011b67
SHA2565d16ea4c3e44e29e18e7f000cc91075976f952728ac703e29ab654dffaf37ab6
SHA5121995646caf2c54d5008058a9967deea8485b5c50cfafff4d7c9b64978f408501a057b3510a52729ced4d91c93ce924330feb3d0c562b67d15e307d346aa3dc6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59695b1b18ef1f7ed55af4f76a38e69d6
SHA176f30ca448cf71bcb51a1a2bc73bc72fdb7b7783
SHA256a3bcd4525a629ed3bb2c93d7e100254da0a29ea06bbdf29a65a9e1d433d1e00c
SHA512ee14bd309d3f9122ead4007f55e6b0489a5df950410415fd2ab7273413324e1e3550eeb429f06138027f89c54411b04221bb3d7a10c39591562af2bd735194a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c10534a373c8f3b8eb775962dc154dae
SHA1157b22de664b476af9f9ca2c8e66d9a5a3859cdd
SHA2563d2076b8c2bc6bf7fcde50fa03df1e1ac3be2956f3c296708bc725737f306ef7
SHA512ee776bc389dc3061054f54583c3413cbf97ec17fe46558212be863b35e76a841899257911b801818855236b9c6f3b3155fa82527da3da9608648042cd7c0092f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58871c385117e93d6e536faeb3cd8bb28
SHA130b6ffd8970ea2ceea1c457843059524aa49f00a
SHA25657649d396edb15ed45a0be9f1b40ee34414024ad24fd13c39b602ae53819e33d
SHA5123f3559f39f0f43264ef084f73a569675210228fdf2d7413b73cb15c631802d218b35501b4230bc0ae12b3dff399c2e29290f055ec18c75e83e0bd94d55834e60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d3bc4f305360e3c9de96d01b44f342
SHA1e512d5a499e4c1488bc14eb112acfccc5df4d2a9
SHA2566096da18ab8a72e6ee380701b6838bd8c546c277380948186f98f08be08968e1
SHA51202a54dbd1ba07d8b0394eb965f572365d97de966f94c1bab5ffa5214bf2c61810283636159f09ac67fdf507a6c1657843fed926016b261e676fab6ca3a9a3599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e20cd39dd363e3caf97d38c7d972634
SHA1e0c478824b5d9909df235b6418da37e3d7e69989
SHA2568988584055985d63178becb3f488b3c74571f7baaf50b79ff43ecca244cc0813
SHA512107d41a376198896162f01da4df9a2ed16ff15abcfbf9c5eceb6a2103b1d2074b5eea533df53c93310c81d78c449f5bf53caa0537d441070ae111f3ed65f72d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502cab7b833b6c7f29890db28d1f971ab
SHA10f3ea7b74307902e7532bfc99d2e90dd76b7b6e0
SHA256119f9b617b6714bccd6356e0bd533942a6a95af0d1115472fd811a0accda3eaa
SHA512c4b81eef526f644ce96b28483dbcb679c5e2fc3228b8b882ca760a7923d00d9873b97750e04ef1c30d279672526254eb8e8992d6d2315a24b1cbc5e272689a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea951b3d72368fabde97a5189f34d095
SHA1f22cccc447d2fac8c69a8e117ae09973d3b9eeab
SHA2566cf824306226867a2def13439d20fbda95eb198cacba95ee13233851130685ab
SHA512dfd5395725f3878584ea465e594912e3dcf4760142f02821e0e0d170d5f5f6364195f98e14f840c1d029ba6b54e30dade8756bfbc9bc3aae2c10528d688242ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db5aad23cf7b25a9e6893a67144d21ab
SHA15e5dc1b765c18ba37a464439e795a88fea4cc23e
SHA25643e9c57d8401cfb965204841f86276281934ed1c95fc1e6b262139648ec9c4fd
SHA5120c8a3287a91b2d02f7c80ea6bf6a796460454745b6354cc8797efe0e53b6750149429159e465364ec5b9e185753ca5dde755c80d138cbe1146599ec7e9ab7df4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c643fa2f4ab8739fb27690f988999996
SHA1fbc0a4f4c5a9ad1bb2fc14f26e3b52cc1ea9eea9
SHA25629cd9c27d40c41bb905bb84d99792301b5610513a4ba86ff591c20b6a7a47467
SHA512de44672f5bc262edb8b5f4977351d08ad5c9bf0e9f38628218244671932c8f37e91b8f1ff2f8249618c64209355a0c5253db995f0aab0c5c79c044b6c7cfc0ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53660d9fbe6081511e6c40a14b8c6d6a0
SHA1587fc9fc355170c434b89f36ef2af225758b7671
SHA2560da412a6ebad9363edb19849118efb923a527f8b25c3e719ad11903dfc9128b9
SHA512343a55b1e0e42c233a064969e19787493b4443646ff8f038e892b11c2972462e88504c52e99661d229c933e7e1a7a495cf0185475445fce207360dc382fdfef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d175ccfb09723b754feab46946ab3eaa
SHA1915c4c8157663cfffdf4ec03ce50aefbb1797ca0
SHA25628c20f83f617cc5c4745c388c02cf8884f10257cc86f8e03470a133184e5de53
SHA5121ded43ff5e7b89772f5cd5281e73879cc65a01aa20146e9ac8133cce0b9b5bb009918c4882f168434e0b0afd4ae889d0488155014f9d1de44bdd3e85d456bf74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56269534ba1e8f87105d8529a86db9c6a
SHA194ac945f041c514a3671cb10b027bd8f0c7f5211
SHA256f1336c5ae5b560bbff6ac1c005762bc0acda2eb2469af76529c3669679a30cb2
SHA5121c4f27a7be12a68fdcef9c0b0fd2751ab7ddca4743620a020c72b315aafedf8cb43e269fe03d1d146febb71816446faba0a497fa54bc1fa4798948ecc553c911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b306429da94db3199f7ae14b307d850
SHA1ecc4f8f4d8daed1e37402400cb1390f118ea1823
SHA2565ed1d0e5f92d6742017b6561d2b0e64b0df15f8b8a8d7d42a3eade10b26f2bab
SHA5122b5bf01cb79a067b618441efd5b70a2bbcf63619319efa37713440d3b833573a521abb99084b67760d8f89a15043e1ab4045b91932a25800d5de573cdfc18a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5e96c70fca119d01bfa50b9c585166
SHA1576ef8e5036e365004fe418d74291655eb269739
SHA256879ff9c0d589d662aa5f9f4efc0583d3e8d522b0879073559cafa84c15e0960f
SHA512160457ad36a412615eacbf6afe7ab159b8842c62d0d48189bdbdf151dfb8cb0db58873de8378478acaa6a03796dbde4cb6a1e53aa802094773c659dcaeb1f48b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c9a2fa7b01932ae142577c3780f6e8e
SHA1ce74b8fc6ab662f15605301713b8e6cc6c88b148
SHA256289bd053411b06a52e8f4875e1de3f4495e1b3aacfb7de4e75e578f962e8a87d
SHA512ce26832c45904c6c6c468744c2b92536441f9ad2490c3d0e5825bafc62700455a8bbd2dd51ba2f344fe1dc0cf38fa350ff934a9328fd307155cc28d16d5b892e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5565bab4a55abd8374277be4f2ab244ef
SHA118be44bda6f6908d57363725c36eac90b42e4cf9
SHA2568a3c51d4bf27f7f1d243cd8f8206326ace9597c50901551afc8d854537adcde1
SHA5126f51c884121b898955f8130f019c7761abb234a09068e89be6393645f86421bd13e6683fd5666a2d693d72fbe82afbddc4474a1829bbb33f146558adde7e7889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4020d46e8040a90dab8c421b22424e5
SHA199143fe64fbc0f30f5f400ca370b8f04f3dc88f6
SHA256cb761a07f8c1a4733f15e931c65d7d7d830dea3ff5b8845188dfa05fd2ce3e29
SHA512379a1731253368e01786f8035ac81e2922c9e4ab6e5568b03a9eb9bc95610b2cf0c268574a83ad0bdb150d179149eda7a1ec46c21deac6f1971f5715c5783362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7a222d0e6815c658fa36e7521ca852a
SHA11ecbde964a2ba9f1aeb350a58746bd891ba85557
SHA256ccd4e1cc68c4b1705cb34adf2bd127d5d3aa2703f19561b99662bca8bfa15253
SHA512674d5265a481ac61f4ec73847550d1d0df2c724cdb5017cbbd4e8d6ab36850c3bbf4f71bfa379fdd5735b3e856f5c8854beca25dfbe4a50237f2db8da3a7e276
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b