Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
447b02de63103e41496787c3ba1004b8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
447b02de63103e41496787c3ba1004b8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
447b02de63103e41496787c3ba1004b8_JaffaCakes118.html
-
Size
7KB
-
MD5
447b02de63103e41496787c3ba1004b8
-
SHA1
0b1c8414d0094de3edb3b2eb89a8cffc9ac7a459
-
SHA256
2ec46ca4e03d90abb2fcafec699e86913b11e4d54693adadca8174d1801a1d3f
-
SHA512
b9e7e39515482fe89d8d0d7b59ebf9bafb08c6e99f4f427a5e67d3e62d9c1071bb0a6d122c9f4357ad4e9f3765d652f2e85d0e2d1ecde0954e9a8775d35118f5
-
SSDEEP
96:uzVs+ux7M6LLY1k9o84d12ef7CSTUHzMcEZ7ru7f:csz7M6AYS/Vb76f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427096460" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A146331-41A1-11EF-A839-E6BAD4272658} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000a86f4ddad9b767d7d29ffefced861790507b321582b1a86a1cce268b54285059000000000e8000000002000020000000ab597c7cb8e3044627303553f6101978fa6d5f647a4a201ddb65b0409cc66d3620000000257ea57da6690d9078744aba15c4f1bb49b9a2506b4ad0b04bc53ba98c41aeb640000000086a991a3e0123d9eae78273656f164bc8df6132789c5dd5243d96c973b19328095754aa9213f94003686f45e55fb5c2e49b0231a866e907d92909e196bca685 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0320effadd5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2448 2380 iexplore.exe 30 PID 2380 wrote to memory of 2448 2380 iexplore.exe 30 PID 2380 wrote to memory of 2448 2380 iexplore.exe 30 PID 2380 wrote to memory of 2448 2380 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\447b02de63103e41496787c3ba1004b8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55117495fd05d3ad7836a05ce1ecd3fd3
SHA1b0bf8b1a1b57f661af4e7f9feb709c3ce0ec4641
SHA25667a30f6a64c537bd40b61568c28c32fd2b0025da10222d4cef6def2e2f6b943f
SHA512edd0a2e55f1bad5ba370295e76b101abcc86c8a6d6165be34a7bbab8df0481a9f63fe6190039bbf78b0cee0ed9aeac016742fcdc7853c2726aff4f16f92ef86d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5872ac90310216c61dc1fb704aa1655
SHA1fab2abfa90994a5806a0de5449f0fbad6288f787
SHA25643d68d191caaee2bd17d485d2cf37631711a4195a3edb2c19c6436068a0cc721
SHA512a802f7310b9c1373923ca598a3b11331d0415e42392f9074c98a3f0ffc652e244fa202670327e138c407bcab3b1fffb6cd225562f0bece623e425641b1fcaec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b6d8755c8a4fd38c98897a39870753
SHA17ae1e63235006cc67b5da660282d87ab22b0aea1
SHA2563ffc49f26bd869164cec2c548d92321e64c7d98e37c4109c1dedc1c848aaf325
SHA51252dfbf0c285c9d2d251bb54a2a3c079f1ceb1617db3f8b749a2f8ea267944af448b5360dd1145a82a5e2d69e29c799519b8907561903e78f2f5e24272ea99f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e9ee6693d182f6870512e003314572f
SHA14edc35f789f611f2d39c9272652142c2247e4598
SHA2560b6c48d8bbc4a88bde02c87d5f5845d4861be55c356ef4c633220f2e226c2ed1
SHA51223030794f5fead529c2bb14740bb43b016cffc2a01d519227c35adc4889b67799a90fd2668242809378c125763ae28adb2cee44f1b5c45d8641f552fde84e501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb9c4d2e68399196c372fb3ea3b5de7
SHA1bc97baa32ec7bebdddc7c1aad1250a70b0028ddd
SHA256952a0290f31dad83e30372f425a972d790592b4149dccf8cd58547ef69c3c288
SHA512626d291ef9cd80bd8f0bc6532216df94be67558d322c1862a515deb912c65d48fde20c5d9acc640bead122934a7dc3c67b8bcc88e1f2096f3dd4fbaf2edcf6c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e15dccea62d5fa762f691db4a717c32
SHA169806162b9ffe3980f1a1a320396de13195d6aac
SHA25639a3355ffe0eeef3a192a1377b8d8bdb9a0d877380a52a6ece6d4fe1f9c1d6bb
SHA5124fd3733fa6857a43533c104a56c38625cecf5077f8716e5e5dbb83fc923ca84596bc3fa57b24ed7d80fa232ecd4e7833b7d25636612d89fe3a7d72c28c1dd9aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5919516a2fbffb60f6e69ee655ab3d7d8
SHA1d5eb012f493776cf6b212098b4a1b5159779fae9
SHA25662f2413038f4f36dc2ce87dc8deaa06f3e9a722e4e9b0115b7127a0ac48f0cd4
SHA512b9797fafdee1bb9e9ab978d00e492f65d243788bbd5210c3c471ee592708d4086f8035c4dec4386dad72c22adb0e6f344167a9cdf96d52de201b1a72c30723b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a0471deaa44e276f8a1708453d51bdc
SHA1f1744eb7bb2ff54a680e475fa491c9a7636772ea
SHA256cb5e03d5a0995d296a4d2bbd97feb3a965dd237113a7edf5e1502e8c8d57d5a5
SHA5121289df2b0394d1791067979d08db966af1fa23d875b349b98a05e9e34a3b5675994a6f6d1e7baa0dea908ba460c595e92c7cef3b820ceb2d574cfca7629d8a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55908aa43e91041555f9352950ae24337
SHA1ec520fcdcfd2dff91c54837c5bc4cddd7d0c98bc
SHA2568202a38566c6c02c79aaecd16361eced93543b858c23a065bea62762da86279a
SHA512c34263a4351d1896eb23b62b21c99e6f81ffc155af59f0a6238c7cb0e7bf94ac1533bb02ee9faed735255ab5ba15388dc534aaebaa0cdcefe66cb310b106e72c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf30a2cee4bbdb4c1085db8cc64b0692
SHA1094722f97f853bb0c7746fb67299e0e47754a825
SHA25672fffb0662624553d2346f655c7579fce9a59a7b7d85a0fbc982f5c3cb03f213
SHA51245c1cdfd43e4a9e48f9722f8ac557991674867ab4f23ea1fd76b1f8be0b932adb0e853b71f632fa3956ccc6065437fc80af044fe1c95712198b0ac7c82839cbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f93874aad67360ebf119077165cbbeab
SHA101fffa5806cf3d29a98f03a5c45769b9f23bef81
SHA2565950e2427759da0310ea6a375e7d5ed4f9a4c3e0973e4189b304d98e644c7cf5
SHA5125d75a640bdfbffd770ddbccdf405b423cc266bf1a7e8d0074baa22ae5d30e8575050352b6f7ee9f24c67f2572ad0f38a97da8256edd4631dedb481e0129af4b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565f9f166e068f0d3ca6b59a0d816f8fe
SHA1e7a3d99deba28e32d6e20792a4b529f2946bd5da
SHA25635d41d0f1a69a845b490395aefefc082db2541cc25c893d80765f62fe12a42c9
SHA512ab083c3516fd724bde7a4f527c129c35f3dbafc7a12785f7395d27d302a7532ea34f00898d6c8f2211f21957b5f558b8f7805f56f8b184afe9c8d6a9facdff63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e23b132af5c3cfef19feb8ac3ba07dd9
SHA16f28a47bd003e5d639bf233ace838f9fdff31706
SHA256a85794ac2083fff919623a6374e28e66521c0252959d0736d8755d1d603e811b
SHA51237f65b248dcfd8b2a815ecab4e0ab45fa59bf3280312fe6024801952bea002b0578729127cff21cc6430c58ec22dbb8063e766c8c937ddf623d1fae7256dc1f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541f2760ed13e52fde8302f9ae08f6a0e
SHA1f109f42afc6c83d68383ec3fc94e2e1fa270d197
SHA25691483c1f7af97a518f6e5c09a74ec75b5f54f2d5b7aab36bde96f1b666b3799e
SHA512ab9472fb2347c085be36846335ae85a6c73e5d6eb4abb12b97f89e16375396986b8ed71145bcf9b39cf9e3e683aefb3f4266b0b92b9341a67418f36e85a072f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cbc8e8eb5769fd203e82c8d127a6507
SHA104f84f9f3f8982382000abd2f86876ddc7f5dac0
SHA25613df25814c600df8d03e19a2590de541567b1ef45b36b12c96b3931ca7ac8d4c
SHA51225145683f2013382c0fcc90c77d9664d6b1e573cf9ff7e0a9439b7f5b69b03bfd1fa7cdc3becb5edd70eb2f2ea416c14b8ef1cf4d5d35619afa3a31a46d77f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eee7f614600111ae9451fd32cec19bf
SHA19e1ac8b0ea9cd8a9c17520d3a003e4ae5c2e6721
SHA2568f8f60294b7f3a2ac5c239b80284fca80046b845a4a08bb3b498248648411117
SHA512b5178499336403e4d8421a6ebb55f18783f65150fdeb1dc070bea111a7251c49a27e64e16d17d9b03ccd9101b48bbf5c96b7bfd91ec8f214c3fe1ae7395be190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575cae13fe2e5585f2a28495f07c46da3
SHA115a0050a55431252e3a183cb34661a0ac934d87f
SHA25637812c91b8f18e6217afa49d1f72eee5ae2fe368e392ed98d74eba671fc50c45
SHA5125f8dd62a7573dff315bf26819127730178cb22f8e4fde85c673674b7d0975bf7eb66114ce273d7cc669ec1f0bd099872ab3089217393f487fc9302e2cd0bf32f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f6dd85390679c83af1dd6c263000319
SHA179f31abdfa58dc82dd9cf4c7af8211e5ccaaf589
SHA2566b276401ed37f03c977670d009cc6a79de9cb09c549bc9534d9fc92c8e9fb095
SHA51233f11ad58e2e1fa78b5f330d7a8c72a3a2a1b03985e7f435b57383e265a610e5c8d163879606c2237262884d15f87df3ac947f847853a250f803d373c31bf27c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd53104f4241a841ca010e8fec933c72
SHA1ee804bdadf4476f5eb46791044f9afbdd7d04bb8
SHA256a1884731425f28d776b461491b177262e08a6a29af674eed3642db783438c436
SHA512e9acb6de1f2ffa1f8a8a6e59c1f04b303cbd4ebcb0bcf55bb7f46e02b50bd5c90a50b8eada1a46207fa88cf8cac9fc4794938b72f5f2774a75331264a62cc52e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fafef4215d1a02ce2695363088d158f5
SHA1f4cb5ec2236fdb7f8a76921cbea27f2372e66bd1
SHA256222819a53cb0403ddb8f6deeca12af5c4803056bd73d6b660b46af309abbfa13
SHA5127fb5e9fee44226e83902a200fa9598fc9f34cb7993e304d46ad2f671bdd50c8ea49bfbd54952e5bf882f867a44c4bcee8b46b9d57af3e13ff754fd32f40f1a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c8bd3c8c0c8d49fa3f7ae151c4c3eb3
SHA1b4538af99714cac346cda813ce0480dc3e0e7560
SHA25626fb0f74360c45dfed0c6c8f93eda8e460b1829019c3fed4fb579a5cfd275372
SHA512cc15ed7c9316b0687f2be8ae46cca2456d1dda1fda9a371b46ad3bee2d060d908b7438b0d5e669fc23aa63c68134672e103c5ff92845c35eadcb068d8caa3145
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b