Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
4248ba76dfcc0859d8fe27bc7d5f7138_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4248ba76dfcc0859d8fe27bc7d5f7138_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4248ba76dfcc0859d8fe27bc7d5f7138_JaffaCakes118.html
-
Size
9KB
-
MD5
4248ba76dfcc0859d8fe27bc7d5f7138
-
SHA1
ff00e0cfe15aa39c6fbdd91305c38751247fd0fa
-
SHA256
a816fe230892b363c76d86cc2921a2d4f65567d018f9d21286edf9d21e3b860a
-
SHA512
f96e010b205c03b2b7527274b0d5e7a8329028a4c5c8344e90e81fa19e5c84d7e1f74039b0c5d38be9173134a9dc7f82b211dc3d641ecd2d91efcf11d36135ca
-
SSDEEP
96:uzVs+ux7Oi0LLY1k9o84d12ef7CSTUnGT/kPs8bpUlVHcEZ7ru7f:csz7Oi0AYS/6hUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80545ebdba1ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435018416" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004943d5e66b5fc54385931f84f1d7d40e00000000020000000000106600000001000020000000b89f02a2aadc476ebe7efca1595c6709f2adda16ff62ad45d4776e1faa67d4a9000000000e800000000200002000000002417946e1f849eb71aad0bd04ee046849cf052715eb74ecd05c53210451abab90000000b32c6b01bdb7a014c6be1e765c4c268d663b7c3fd151c7d22f47565746716a748a10a7dd4accd8dd558e9ba87e0fc90ae906e837d0119b1021f090669293d79f0f004fcb0ba109c4ca4437083315283489a5e8af90be6d9457ed9e1d99e143428f7b8ae23c2d7d04ef3c9c52139bcb46acb74f27e645b70a69f3f91f37517e2403bb207030db149e44dd6fbbc36d0cdb400000008174f6d91aa85b52e9d119a59c1a542f364835376fcbf8981d0b5448982fb380a09161c53530f15783644ecbb7592c031a1cb6f900347374003bb1f95376d5a5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004943d5e66b5fc54385931f84f1d7d40e000000000200000000001066000000010000200000001011cf60c16d19cdae4d6f261e44548df4a38cddb7ddb549da3846b1a44cec49000000000e800000000200002000000019e193ef6811c1d483c5765a11f145237804c518792a2dabce9bae75f72a8939200000003a2d281e35c67f037897169ecc6863f1b75773432d41caeab0ef549c91bb2ea040000000b17a875782936cd10feacf5de383a2e38bc993a6baf8423ff7fff212fe7cd2b882ed1d45038d61ee7b2c96cbb0526abc3b955f1233b3b6fb2adc7ce76b29dfec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E8680F41-89AD-11EF-988C-4E66A3E0FBF8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2704 2916 iexplore.exe 30 PID 2916 wrote to memory of 2704 2916 iexplore.exe 30 PID 2916 wrote to memory of 2704 2916 iexplore.exe 30 PID 2916 wrote to memory of 2704 2916 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4248ba76dfcc0859d8fe27bc7d5f7138_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e071802afb9dda18d3f3d9cd733d99c2
SHA1d8571491c5d8f5318732da4540121639afa55981
SHA2562fbcb72bb84255047bb4cf51fb80efe47a09cf124ed4e762916a20b9fe860424
SHA5125de2537ee78e223e2aa1d2c6f36b3986688ada70101ceb0893d1c688d8bd5654bceb2f52bd426dff5d22cbf68c8c59d88563ec56bb78f9350533be04960e9b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5857cd499f1f50f7395eff0d85d0b46a0
SHA10e8b54e4cc41f51bfe7caee210d4aa2349f83e02
SHA256d6ac66471d3448ac902276cf150507027b6546a193790c0530978c7cacc528ca
SHA512f9869c0087d480e17dd638da28dd5ddcfdfff484993bae605eaffa593991d0e7f6fb909565985fa68b5812504fe43ec3c5d40d5e79977415ee31de681b82834d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548a720c3214021931d1d175d94bbc2a1
SHA17ff0d96cfdec6370cb179daf7cb7fff7416d347c
SHA2566a606b196f3e7fc1da22ac76711e950ffc9b7ccebe470c443b5e2ab8a271fdda
SHA5120df48163e6f30c4a97bbe9b16527d212e535094c1646b4ded268fe9257184372ad75160c04a7f4df22a103cd792dfa84acc1faa22dae331db0270584f4513717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bfa9a7f25ddad54e17474785fa0d6c1
SHA120b86ae968002cfca1e9a89b5e8552973f896729
SHA256ee05da605cfa40a031204fc53ccc12025b0c0f5ad8ee44062fb357cedddafb3d
SHA512ea16043644e55558449608f9255a6792f5a8a9dfed79c05658d622919a1ff843696942ad51bfb64d92ed54abe6043f76a21c4e2c85b7c64392705af74231f8f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d165fd44b5acdfc7bccb25e90ff95877
SHA11059133f681337ac81102cb81722aaca7920e16b
SHA256d353f5dad6ff3182a60882bb874854925f74c1f17148701f4c0173a7283458e7
SHA51207e09baaf7238e4624c5d7184ee41c6073d02b8f7ec586a53daa86f6319f8064cde12a3e61711eca0d0d40a825ee2bf894f04829bb5d68067f6c87b18dfb80d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b15bbb94dbcd49076b17b414493240c
SHA1e6559edac0d8b529dfe4797349577e10ebaaa7c2
SHA256037379c89f7fa7e73bb820754d19ebd3df339f33d2018a1fe1d5ba3ae5bf5e7c
SHA512d680d908d49c9df4d57081c6879733ae58520449364f5ab914994c23e7eed12b082376b53be1883e280138510c38f530d3597901c6f9a37b9c1aa8aee9a53c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553e64caf06036d6d8a97dff3f8c71922
SHA1ad66df9e5106aaf8b1a3e9970ca3c9e4a7d46190
SHA256e081ed77bdfaf631b51f75bb238bdec822bb4f10081959a8fbf159032e7b6bb8
SHA512fa0b2f58c8bf226db74425aecbf68b0429b6563502b43347dee5ff9aef335e006b6f83c01b5f1cdfa4b141e1bb7e39d44bececaf23d0cd55cb0088fb14e50fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b085d13b8126a90572e2a2bf558f30
SHA10145dc53379ea32e09b1f8a3bad809bd3ef9b8d1
SHA256992f54392def49de1c1a59320153788a0b70813672690161abe20493c6250213
SHA5121c0319f5a8401d18ca61d2d02e61f97f55927500131e12ca5a92a1e6d3e57123a5bfb0b1d0c6c269aebc501bf089cb8e710579167385fd8074d31633971cd11c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ab72e2cad28aaa3daed836dcf6e73f
SHA1a8b123c8a2cf38b523efd47d97c9a363f86ec6cd
SHA256baa8fc9cef3579ead6c6c0fb6a5a0395b53838ab5a23c98ea3a39ac5e3401321
SHA5128a132c9d4eb95fefb54f82ca265d583673274cccc6d77fea8be9468705379f7cd509aeb1132dffac09b3754cbed47007e13b118994822d1bde8e8a2c9a160e81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599bfbde064346b7eeee5a829d051425f
SHA15d167934f04f2e9488f29e49e314ee9423a44631
SHA2561123f241b7879bcbf413ba41bdb32062ae9cc139fb8d955ef131d025ea191417
SHA5129f4b3c636280f2569bcad337c18e87fc29c2681d147f39ea51ec78f0b8eb573d1d50f3923d328f30fe20de43fefa93f25577d377a96882608b45a6ff44c086cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e695aab524e4864bd5f07463fadd2f
SHA19a5809f1cec39689819ee4f2cf093f6e16c9f3d5
SHA25682162b27aaa791e01de6d7dc8c6147f52b2e3a49fdb9b9a9351f737074a19aae
SHA512b4409e87fcb0af5032be300d6614d5a0c5e305cebf52ac6e2537b79e3e0074f05792e2de37abb0cd9812e4fe90d20142280a4ad00849e1404ffecee89c77fd32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57012a275ba77e98dfbfea184089dee65
SHA11c661275c5bd9ec51455c6126f956881d794d62f
SHA256c8ce44d87a696c87bb60b17d37a5d93ac5aebca5174b91aeb6a540ce42b066ed
SHA51299f7f6f9c4eb60566b47510b48d5efd3a0adfb42f0cf8b16bf0c7da1a69998f2b4cc8231d2e0c5a42d06f773ecc6800f6d3eb6b395239bcb57eda0fc07823e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519d6ffbe834b3f880f3e279a13d749c5
SHA1cdb96bfa4249565b65bb5484288b9a2402d6b7e8
SHA2567d5d2a7af43810031b8c12fa36f312308a04689a7378a05dad99a6672748650c
SHA512fd00a9e63ed1e2cbde349d4dedab662ca8742e8c334281058c25f47143400d517876effec6846ee1b7bff9690d58ecc6b6653d7adc0e321ce6bf1c0af078b31d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5398d6b4681ac30e29cbc53161f1caf63
SHA1665fcab72cce099417fb3f0a5f194afceff1560d
SHA2567892bd0b15b6318455eb5a3a7f3293241496df58baed6b216a40b08e67b6cbcd
SHA51277038e2527541412db2fce2c762ade42965b68bbba37ba136f8425100fcea43590e2761d1f04e04788f82ea50a5a87a4b239169eee66e39714b88d104906e4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b59acbc6d501eda88185a61562548c3b
SHA18d6d56ab8228ca4baf856e2e5154572213020b90
SHA2562e0490efb9c63e37d586f3b574d4be1eda5beac99961b54da7ccc731085a94c3
SHA512653e827a21fd922e00ec306cef19a113cd221d534cdcdd0ebfecaa0e84cea68b0dc0e0e493c4291b437fcfaa6406007f9083dd51deb766ebd3b6877e84243329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58240c4b10d5b7c806f1d2491fa36bdfe
SHA1a407628e98fca4f2092c2af302f5629aa4579e87
SHA2566a2918e3d8179179761afabdf2b47369cde7fa6f1498874a03f7d9122279f340
SHA5121f7524fb5b10a0bfed689d45a9fd8e98ea0787e060f7a24c198a75a8ca3bd7ffdee47f29ed578ebef4e29b68f28f3d5dc785a79429ddf8aa0dd818b61b01e62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa5288b13fb886f312733671b50ce81
SHA1fbd337d9a8c9bfd61015ebd3d39e35283610c213
SHA2566ae4b132106279b99209ed8cbbfcbea84ac0d010e1da924c057b515112d6f07f
SHA5128c0756b83724d5dc0ce6be67ec0db6de49f247cf5f36f2fa123f023626136f42f736cebea4992cb5c332636a3a5fa0a6ce2caac40f74beb77585e9567fa84429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ae0ea41e9f4efb2084b9eb78414d2fa
SHA1528afd1bfbe07e5bb8fbd4a0262bd12dc1e0d255
SHA256a4453212341de31a7337d22d66334cf5a0866f35640c6287346ab88e63886420
SHA5120ba06cfefb05f393039ba171705defe82bdc65883928da66f35c6af32406201db5aaf80090959633dffd8679f9c87875a739c2c0afa4546c074bad2bf6c2a788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa0265d73a78bd3bec1f365bf4512c66
SHA1ebb3feefd5b5c0cf1c393a60bed2c1485b7fd774
SHA256351b9daca25945c305f5bb16e3c44aa895c5b73ce8c5ec12d362f906c275a8ff
SHA512714cba15b9fec38040ed7d23abd6540271023afc946233c6abd82bd7c9578572fe2c03da21d5db84aa95d31c1ab8028a481eacf9646033a9c857fa342a138b7e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b