Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
835451841e834a72b84a75595bdfb62a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
835451841e834a72b84a75595bdfb62a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
835451841e834a72b84a75595bdfb62a_JaffaCakes118.html
-
Size
463KB
-
MD5
835451841e834a72b84a75595bdfb62a
-
SHA1
031111c1c2b4f975b19280c52006e0485cff443d
-
SHA256
a310508fb4afc76304932853cd27df7db920a55d3c48a3a4e6b518e151063978
-
SHA512
3d1baeb747bf4f8c8cb926623e7faa23409c601f112b0de31069f6dc7d01341328f2fc2cf4ae324bc10758607d63a282b566f639a2b28c2193dac95bb42622dc
-
SSDEEP
6144:SJsMYod+X3oI+YrsMYod+X3oI+Y2sMYod+X3oI+YLsMYod+X3oI+YQ:u5d+X3N5d+X3e5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7FDCDAA1-1E50-11EF-8FD2-F6A6C85E5F4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80549a595db2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423213524" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000365895346888c540b3fb1f489f95ed8c00000000020000000000106600000001000020000000f2480797ee1eb4beb7d7ad082eccf8b9337c7364bc4760c451db774b1f0b664c000000000e8000000002000020000000c43b136313b9bafd776caf29a784566341b7fb35987bddd14897c7c1b3c66c29900000003d674a8b908b05e1a16a1ffee742698bfd5f1bd3b7ec634490c37b03c96d94e22c907b70abc83139b9dad9dff61a2866d8da53be114917332d6deb4d9ec3073c7a982fed29d3908d817574c3e923c39de776a34c2487e6a6f320d14b7fb8f0652d3772eab2ea08aad7dac5ce8b532c05c937d9df5b27685c4a9d9ac23b4b0ceffa78dba46e54dc4f73e96a6d6be1f5a140000000d51a2e149d8456e8f65ae33431f94b0879cf28dc9066169fe2efcb31c546de45d875c6de7201170c12787611a1a54e98d7af307febc93602677d72f7d0123415 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000365895346888c540b3fb1f489f95ed8c000000000200000000001066000000010000200000004169add71b57d34f946378d8f13a49ae761ffd8508f10861df8a52a11e8b1dd0000000000e800000000200002000000006f6426e5f84f3fae50a4771e810a4c147d4490cac32577f79dec16356ee23a6200000001ae41e352dee0370eeef7bfc29424a4c12619325d7248c611bfee60dde0df1154000000043e2614070ccac0ebb4d9bc94ce660f5562195d1015bbdaeb9224eb8d6e816b45afec5b7d433f5f8de26e691c3e972a1f4f19c12366a9af3c1eddf70bfeebc76 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2860 2924 iexplore.exe 28 PID 2924 wrote to memory of 2860 2924 iexplore.exe 28 PID 2924 wrote to memory of 2860 2924 iexplore.exe 28 PID 2924 wrote to memory of 2860 2924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\835451841e834a72b84a75595bdfb62a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5794e0427bfb3cf6d85cfe999a50c0ccd
SHA1ec8e3dda5d9797e29b335da158467d1b081c173a
SHA2568b4f606fded78af2e5fa27910946f2586166f4b68cb58cd7735b107316525b41
SHA5125bf2a1a005292b9fe40da148e2c1f8764fc6a269357e3dc6b1016f4fc9b6eea696553cc23e1225ab5b27e1393d802c9d9c0da19eb5edade5b5c72ccbc73f28e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efcfb328cf1a559b1b5682abc709265d
SHA1b601e2187be926ca278ae78245943a2ad2703285
SHA25611dccaef5d38ff710969ed29b50f98dacea63769b9f758621ffec5ccf0b0f89c
SHA512ccf5294ca327a523ac0fdd226f15794120af776cdcefc59bfe49496b10fa5992747930498dc06ee1cb60b7c197e055bfe0325ec223e70e550eb363d357eb3926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e97697ab27d25df56e1fb372caacf4a2
SHA11d3228fe319a34822bc878e1957ff83a80a5b68f
SHA2568a3e34620e7cbec5c089e0d437ea204c822406a67432c5e0a8e36dfd2fe9bddc
SHA5120e6abc7b92476681b17745a38e7e822fe05e442e44a1801660c77f5b4292047591038d7e12fa95a656d634bca7f6aa78c77a7487f26455b56ade9f8c57fe30bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518c058ac3f60b318fd14530bc71f11e5
SHA106ab946ce3dabc226774e5d85b1831ae9ddfd797
SHA2568dade08c7815b5d021b345649d92d1c71f2858bebe6045c5cd2eb4c46e386894
SHA5125b38f1f49920d7b36f3bb7b2dc909c07220e6b49a61f26eac9eda33358403bd8509205427d18d77070d7028c8ae08d177b30a0fd6ad86b4eabcedd4e9e169250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea85e652d9f19763b0691987e626272
SHA177fada6704afea6b06bf3d12b7ca6581cf3a566b
SHA2563c99c385b8837a16dbc0ca1c6b2125769e7c8667ab341e1d5f9cd01bb87ed8bf
SHA5129d08c45fb37d08699a9722b9bb8652612515966927f6b3fdc94e2cceeb2395a921539d316c8c8e5b794871b38b9c5760a40864d835b4e266176afe83ea64a04a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579b8c6a924d3b04fe72c0374e1104308
SHA1bd027e13d1b12475461c54e783163f8c6b16d862
SHA25642f1548c3b6f886e90ff47b03ac610814413aede7d3fef9ac5142470e59e2c13
SHA51240cde14e64c83796bf87587daf3508b836eacb394f213d29ebc2fd44beb940965c3559f9ea28a31ba5731d18f2c951596ee0a7d62f7a267a6fc8bda97a45cfaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e12f4ad1cd31880b09cba4ae15bfe068
SHA17267a09409296449768e6a7e14d6e13705e91991
SHA256361666e902b6c1cf4642502d605a0906e34c4c5eb67473c3416896a856d69b1a
SHA512567bee8107f5950a31ecd5517271e2660c815efc637947de9dc93f11812778542ad0a63e6e67e39ceaa16004218c5f7659b16e7c0a21c3e3163d7d9bffc143e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc6aeb76f303c776ed8eca39d3266cdc
SHA1f30caab49bad8d58dd9561387bfb86c6105d8c06
SHA25658e343d42d9133acb5eca5542559f597107d6224b86413ab1b8cc82e5b78e4bc
SHA512dc405172b1885e756a2623f142f10dbacc38a36ef67b064eed0fc2e0b6df62046219c1bcce214c80dae1a4fbe0c2a65ebd366287a2d0fafa48b3c66c8e56eae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5773f3894eac29883520dcea78a106d45
SHA16c5486f0efb1cd9e78c5934293a5eadf2a445c3f
SHA256556913f904dffce018e9329c91be09442f5e038e9112250459f0482a2145b597
SHA51271f885af4ebc61436d9c45f9398fa5919ae136f61b886a763e7c1ce7e1f16b1db2e6b20ea3a18e8c0ed277d64dad48b97c5a6a878a72b35308a4cb31fbcd5d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fbe74ca73a9b1a4e5bb497ec5c795b0
SHA1fb5522b5894beba11ddb37aee8c237a64eec4493
SHA256abca570880f9c797f60496ebc860e7683eb74727916c41c58e8ecf6dd30af5df
SHA512bc78334abb72ffc32fc3fc3e5b803de752074747baa045ccb63cc530fe4b78bbb76564ca77f7dd2ab84980d8f933721f0c7edc22e9a7263f000ae0552a47131e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5526133e143df3e85509285884ee3f6a9
SHA144878bac3eb370fea0897032a01a77555882090c
SHA256f7b0a2aae55a204b797aa5f325759329559ac256057f0f797fb0991be81f4609
SHA5123ff38c7988240620255d7dcd30b292071fe1325e03ca347183832bfde915b5af3b248848a2d566bc03ebcbb5d7a092b2c82ec2533fa0f26db01f42d114c8af71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514eaf36285b7af3533d92aaf78dcc23c
SHA14aa10bc5694d9e78761633f8d7ed911550e14543
SHA256ebd08466404f5531780b8b62315bc168187211d1e4c1bb5abf9f69d6b30b1d50
SHA512aa3da844dd44a059d9dd7994959054b4343653e0fbedfea99ed556516d14407419dc64b1379ca0dc9cf84378089c467dde2e6b61e67fa5bc66d1c50cbddb1871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e145ee1fb7e0bb6269bf045edda15ed
SHA102c694454119f8321e56b814d50d9c06c89bad4f
SHA256c2afa3768ece7543e8e4504f1cb52b164b92b0023fce875a2c0f0250c0b12891
SHA5126485feebb7368d49580759c1489ba9a58290934b4132c1f7bba79bfb2b4f5bc1b2f83b05a011b08a7a413c047efe6ed075f1d9d7ca152bbca999d69e3880c98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c066ea4b9ef1a1b8098815b984ec1d1a
SHA1b0f8c7e4ceba94d20cd9bf48a0b4536bfe6116fa
SHA256964981c561a85f94937f72922babfe10c81bf424ec9303708f7281965c6741be
SHA5120c6d8eaae93e80e809ef070677f0217e4081fbdc214f9ca41fac40016f8a1aae70fffa5b39ff6a246fbb335de5aeb0339ed02a3abb65d6f278d12a4d16c856e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee2f2020dd65742ca94d76a4cb899076
SHA1546d9d6e0480a8756886a453ae4d776821ab5109
SHA256ae7f1b8e89a49d0a34170f8e472a8f221c116b2318767a277a1b6a3f17c09fab
SHA5122a83dbfc60920786376831de6fab540038222fe0164e3307c9b97d7546194835a0423d70dbf42edb14ceae6b2c95fb102576087deb64db86b3b4ab8a9d3ad4ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563c0408595ab0343458b2b58f8eb9c37
SHA1e864d76d40f066164ac89b96e1a06f3b1eb568dc
SHA256d652b47ad6b4b52169174b9449d7fb35c29700a89e978cd47380b17d6b4b4b70
SHA512f29aca4b5e06fb469cb3dc8948ad67d242e0843a0bf93be041797f35fbfd7fc33b0b07e97e5fdd79c3fad5aca9a82c50692c8c7e450b262a6b83eec21399e9de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad32af04c2625bcb451da8f1ce0694e
SHA1f214caaeade58bd0d6c1486b94f61b757e0e4454
SHA256d7a027919da7fa499f83a8e12f9993deca59b5162ff2ac688758f7122ea4b662
SHA512073745e2c9a7943557c71321ea3b3dce02c8a1bcf0faee5024e78fd58b017cd8257a8d7fab8cce998e2357112616e6739a06bc88104f38f9bf7793054fbb709b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dde0de13baa15aa63da2faebe04afaf0
SHA15d51e5bc571fb0ff6e71124b29ab30cd4d1cec60
SHA2565086132382a75622e4d9c827aef37eee7d4620711073b1c84d6cf0996186c1b5
SHA512da226bc576f1ae76b9abaeb5ed0467067809a2f7daa4502e9845d896ca8d1d8c276d6e390befd07892ebdd0855ca9348e306f8c5eeec2e2804aad6636a2082f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50010c704e7ea6a01da2deaa943f37b4e
SHA13dc114b6e29accf8688d67564ea2005f0304ab6b
SHA25665e30762a86c2f3b22c983e4525d05775409121264bb52dd7479051685682e17
SHA5126451ebaeefaea52a55f3e2f96ffa6bcda92b5ff0f3d6da3d5f15702d19e8a5dc7be8e07758d04b6fcff7e7f5890f07fc1a268828eb0ed33413dfd1883750b309
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b