Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 04:56
Static task
static1
Behavioral task
behavioral1
Sample
8317554152546746d6070d591a686376_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8317554152546746d6070d591a686376_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8317554152546746d6070d591a686376_JaffaCakes118.html
-
Size
4KB
-
MD5
8317554152546746d6070d591a686376
-
SHA1
a89d93d802b41e419c7cd1890d05badbd7f0c914
-
SHA256
5e767d39211e3a575c66447f5508ea59ee957610f4060bf4b00388a97172d1d0
-
SHA512
3bed30c0e134b58d8f71817d7409ef697b40b68493750c82d75a7227586f641a8e76c63279342db8f9cc465c90a042df59d83c582ff33540ea62cb4afd4d6824
-
SSDEEP
48:Im0z0EA7MAcuA8bABrkwxOGx8riw4r4p4rj4rHSMBZ39N5LmqWmGVNI/Wr0fKJSh:GDu/R+w4kp4/4h/9Dt0ngW7rznK3uK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F082AA11-1E40-11EF-8F92-565622222C98} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10c826c54db2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001c97d53cf03f884fb339f2d03af98ead00000000020000000000106600000001000020000000dfaa106f6d6ed0c9cd149f6c065a9d87ad0bbc529bf66b20d36fe8e3eabe171a000000000e8000000002000020000000a1ac7ac2f83620f1c85161c08f0dbace3af41979496a1fdbb99a900a019b457e9000000060ba39a035b80190ba3c6e8e6fc4d9eb59bb97f57d530411e65fe5502a3bec27795dc9f03ef91777acc91dfd29d56207d3b07db6d671132e9d1d6dad5ae42869318bfe833a5286fc9f7035c5d9211653812d2b10ab5f0f05e3ac3457bb09964c20b7a949917ad75e248663d8fbf7626fae6f53dae5892bc52b126d6f1cdc972a22858d601f3c573dbc47a226e1625b9340000000129676c959ee9a17316fcefac30efd3ff376cbe7233e78f99f279c9e64bbd828d248af1f070a32f8b1c5bca5dfc144575ad67235ce8efe8dfd474c1c21ff6d3f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423206841" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001c97d53cf03f884fb339f2d03af98ead000000000200000000001066000000010000200000007ed7b78f25226abebcae51b34100947c8631f35c51535c024c9075b39674a542000000000e80000000020000200000005cc93c3354d926cbae38b1d8f05fc9c55a3d61a91637a93c1185ca3493aa8a422000000076b6037ddd6b5d9eb2cf1eecfc63f69a7fd729a751463e934e7f505b8f4ba281400000005bcbca4a1bf3345e46ea65a6b9f961de1317f635a3b23c2d605d809a2847226918f67091ca63a4fad8573a7cfa0a3d83fc95a93087a1343cb65ad95abdbfa99a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2956 2872 iexplore.exe 28 PID 2872 wrote to memory of 2956 2872 iexplore.exe 28 PID 2872 wrote to memory of 2956 2872 iexplore.exe 28 PID 2872 wrote to memory of 2956 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8317554152546746d6070d591a686376_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc18b0d1f14509d12c03d4461f6eec84
SHA1400886b63e97b5f6c790bb15826a754137a61c85
SHA256b929adda4c452d57d2a26294c5e329a25965ef46d8dc1930380e82134dd11eac
SHA512aefe2ae06ddf7e7cba236e85fe3a3329e1498a51bdedfa00b13dfa39ce1bb61810041425d3c5e6c18a19f3699e175549141bbd8cb2bdde7b9caa67ab992de5e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e782d12bd47007003e3decb9dda324d
SHA1d38319ec4b49f7c8633204778542802a697ee90c
SHA256b2e603852a94e5500420367429256b0579e6788853d874cae781725988d02062
SHA5128a760c5b21b955848f679a701f4c06b89a5e87d673e43f9df318b09d52c18d1a50c1f30e918c22131243b267a91c38e26b408971af029b7a803eefde22331f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549dfbc6e653dc1a20b8b8dd9551bbc87
SHA1b1baffb643282895e73c1aca8ea1eb1413f241ce
SHA25698bbb786354ea6d93e4bef6183ed1b7bfec3ddeebe98e37feaca1224a31a316a
SHA512cd7ea0eeff263432407a80155585ed876133538024de9edbba7c9e799bb744664c7ed29b810126a5edbd9713d752687282f16bd111f924221dd74d5ec7cc6452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b6de1044a1996d47fa398c0f1147506
SHA1b1f7c6c99330c80ccbd02c983951d856b01c655b
SHA25622a96a25307a26181ccae06a90d21aa6ba64d8f0ee1ee9f6868d74a4658e715f
SHA5125e9847fbde94e8e15e11e942b9a901d40ef465c4f46b20c76920dab1489b73f76ab6c9a60bb378cfce8a14befae1a3cbbf7216805cd9d401910072795d5c3261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56661dc0729889194bd82afe97ae5ae5e
SHA16b9d67db6ed4933c8e37133b456fc9e4943cc96f
SHA256032e3e1e366c67ac2739103072f9f0b6e1787979b6cf926c4bb2e7df5105108d
SHA5129ab8225f11e885a97b0db87918d28b981b3f545fdc09ebf1a7aad6787103f9a0ba82681a37e2e12142b0441d0c304e839be5ae47a58e900d641dd1e08451784b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5627721282b564481964f3455346a261b
SHA111ed7a1f63f0a308197144f8efa53e237d2425e1
SHA2563ef477a3d953b853feff9f46b1f33b02d09f80f79d9676485fd79861a3bde043
SHA51221f2fdc995d8173be1ae2103f42b1a6badf7050dac1bd585864db8cc0f0935838bbff935cf897cefb7e7ab6f06decf4262c87e6b018f385951d1e4ce63a8c05d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af5124d32b4afe4e0cbe3c17990b0fd4
SHA16ce9d21451c4997bade86dc3254cb10db8abcc43
SHA256eb37c0629d24375245845ee26f9e4ba99aa493a089ea34741c3233b3f63f03a5
SHA512133f70d1572e7b714d384649889e8c0a0612531e558f3964f5bb26d715daa38ce25ed2a071ce0915b99bac0ee71ac928b7341546a516cfc990cd86ab85e79c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57108dbaeeb5bc327c78fed91ed08320b
SHA1f9d5d64ea629ce882bb11429e82c07a6d3277fa0
SHA2565880d60b23d6468e2ea6fbde24e4422ccb2b63947106d6b9adcd23f4aec77d03
SHA51269f2908bb0515d9d1f420cdc8d72b27c1f749870fde2d16600a5f2e4b29ebf1afff57c533fd61330cf8825a80b9f67f54dcd1200f914df5c5709e3f1eaa42b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5591b6938fe7b8fdc4dab828bca5fb4a6
SHA1bec6fd2ef3320c380ee425b479ef565cddd4b4eb
SHA256e260725fd353aef6b8c627501bd69d63f84b7e25c344a07856550d6f5ebe6ab7
SHA51278b55077c95928202ea7de00b5c3d24681c3a496c85477946d3a4f6925394c6200222edf54ade3d136c1f0066e72027e5f37bf603bc9814b2e2af5d63767b129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b09b85306ea569d04c2825f54f1b3de
SHA18cc92d79375d5926eacb897e3f43ded025d796b0
SHA2563594e2569a54ad3894445962b249a6f532f146fcf3bd4996f7074d8acf79feb0
SHA512cd415be4d82ead432a04308cb299306ff251eacbca66d13e14f15a42aae7ab789663d62a8dda0d9dafb5116b67e94e0dcb6f10191c0a70dd18381562d89dc021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536d3a3e70dbe1aa0ef3fb314dfd32273
SHA12452eddd52e276d11899f1c10f321ef1abe5d6ed
SHA2560824940892c92b43641152c5ee9da65a77ec9ca5676ab8f5fec7bd2734024027
SHA5129b5f9f598b61aeac768beb36a32b80da1ed87317d6a5544c34accf05d63c3e16f054145126f07d2f7a9b1363e217b67c6f1076fea3a29c22416e934981627fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e61f68555c0297e2475231af50357a3
SHA1fbeee1e95806e0357f47bb1b37c1dda1b619dcb3
SHA256834bee55d979db37901010440b9c58ac287abcb2dc8843a3de6b344e016a6e0a
SHA512997dbef2d80001664d6b68537bf7558bc2464e7f002ba5c93beb0c9d68fe2f4dc41d3a1d87b1612557b9183e8aa9dbff428267bf1c2e4aebc8ad3580faa72399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4c53632088b1949f062d419137ed951
SHA198a6c0a6c3805cb310f656c3b3d6efb5570596a7
SHA2567e18430e7b192cba0b00acac325e45b4cea25824c9a63c7536136f54b2b0a66d
SHA512e251f73b4cc69d5106a97411c51353ed2b8bf5a2c7ecddfe6cca36d88a3debf5175a6defe43195842dbe81c9678435e44386febe1c980562978a1f9232137aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e23c7cbbdb79ff97d295bc9b5210210f
SHA194566191e9953e866fc13b0c33bf36cdedbf3c51
SHA2564f513905c72f6a0276d06548b912eac5f55cdaefcdac59c0677c8e004ba7276b
SHA5121cd206a7622caf412b7211dd289e4d402a50c46b842c72f602a8d6670ef8bcf90fcc08c4542c11b0d3d709e934fac5d25d9fb5f3da3b1290b7018337aeabd518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579debbc40058711595baf6904d3e9047
SHA155029765a49e2a57e3b358108d7fcc13c3b9ef34
SHA256b9f707cc4a039f5da18265a40b491233cad7c2387f92f1f5d5b50d47029c4669
SHA51253f0a122d75cdf04d210dc01d1f24db9c5bd48bcb8d0d9ac2acdc675cd56d90586eacae1a59786ff093a6059aab6eb94247df4aa2329274305d3c634cbd55b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577906c5f5f0700803b0de074f4a657fb
SHA176f4ef3869da81d274117b23ee6432942a2eb30e
SHA256b737488ade35bef46360af9a7ba098cbb90289a3d4c069bf4a45ca514a60230f
SHA51279992e69c7be5f5fadf0d862be4ec32accd180a36c6c649b403bc655eeeebada1354ed734e0289e8cdc203030c03f91e9b4b5cd47bef2663df2fc6426bf1d4f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51881b1a7edb046d9f9a6339e54ce67d3
SHA181f9a803f1ef358bc8120810572f1214a0308a4b
SHA2565cb45682f72efafafa77d90589381429632dd7691c1186799c5a8540b66f42ee
SHA51231bbb28d18ac05484b0d0eba8eaf37f6c3f169f4654aac6f8e7995e98c6ed14d88703d68f4dafd1356ce3e1d7cc4298a8a2c51290c664b685eddd64bbd263412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fc2a2b83dc3abe79a5c9681a54c2e6f
SHA1ac6f2d4b904edd4fc6514baef4bb6b3f3fe48214
SHA25603054b17cc62e8b97b76037a0a8e0f3be203679ea4a5c82c84c56b565fc72467
SHA51200ad448f2464783bbd63c8a3b94f4a6ed9a701885c495a1262619093d81874d7fc6bd35a020b6c76ef980effca09535a195079d1395e0475486fa3793e399fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a60f22f6ee2e5137b803ada137a6d72
SHA1e93037c4c6ab6a425b83f1fd1b0cc716f295f77e
SHA256f8cecee4939204360afe6143b71fe2b547fa478ac5b139050290d93c4c2435f1
SHA5125cb0126ceed9f7dfc55cbdb2c723dd65b0a20c9cb7afcee5cbc14f008899f0fee6b4c32f9e892a0f91c2a01eea06af3511aa00533a9936776c0e06a03bd006f2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b