Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
6f9d59a1132068cd2b6d7e149743521f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6f9d59a1132068cd2b6d7e149743521f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6f9d59a1132068cd2b6d7e149743521f_JaffaCakes118.html
-
Size
115KB
-
MD5
6f9d59a1132068cd2b6d7e149743521f
-
SHA1
f92e2a36f1ffb5c6ff266d252c608dee538dcdf9
-
SHA256
047478ad63d10b90ba6b99748897c9d848925bba7000685ba167a562d4b35fe0
-
SHA512
6469608b599fd0d4490ee90c100227e474dc25a173286354f0fdd9c8f1af438b55f48ee69c3ef9437e29bc30ddbb3dd623ee9a8350a961a569f2fee0d6a5f8cc
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcUAoHAB4ALQw+BcZza24mp:sbYtLiy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000679e9462dbebd92a34fe7fc1dcd2c65050f1301913a3d112d9913ba02b56a8b5000000000e80000000020000200000003ca5f4bd399781f0313cbfa77c3f2be29edde0a9aaf37cf4c9c1502b0dcb7ec29000000000f5290e17ee381878b8a58605cfc1a32a68a98e90612e82e55ce362df1e21bd3325fe0e62a5e9dad5c08a69ceff6ecb4b71e5ff6214f2d15d6c6193ef6809f57f0e0178ec0b8f567f4fc16b559de821e3cdb40068297d9ebb067d7d89c8361f893dee31d6a45832b85a140cba8c4e668c17af2a0e72754f083b611ca35e8f3900cb039cae6e27269499f74c84bfa77f40000000ab181f9c1162582ab0610e80d96062a2c89b703101eb0283ac74ee8a48ee54da356b7896d9771d986d20146861235b06ecbe19cc02ab237f55edab7eeddf172f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26C08891-4A83-11EF-B585-FA51B03C324C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000009362ff9017d6b2c1dd9204440f9cbb8b9fcccabdeafa7c744c3220b6c3e6c0a0000000000e80000000020000200000006d859d7825ee70e6d67a453965555cc7e73b906826b8bb5365ce961fccd1b9a020000000ff2929d526211204cfe3cadacfb80d0544746ba0e566720233bf722db9f36d9440000000f9bb79f914cfcbf431184d08ccc4ea3d042a1b29a9dd7dd29418af9a32540c44dd5a7388991ae86989bae89f1e4838adcb345c7c7e089cdad89ef1500c74035b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08ac41590deda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428073130" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2336 2136 iexplore.exe 30 PID 2136 wrote to memory of 2336 2136 iexplore.exe 30 PID 2136 wrote to memory of 2336 2136 iexplore.exe 30 PID 2136 wrote to memory of 2336 2136 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f9d59a1132068cd2b6d7e149743521f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5333b4d139a059ebae24c40f970a6d447
SHA1d69adb554054314ee93bcedf589ed03b5bc73371
SHA256379d35cc505f10523dfd5bfc214851e07ee46166dd3a957be98355229771a6f5
SHA512917f30e05d47ec207ea77f252bfc47e44153eed45f356ec72efefa7e41b7757be82e61c2fa8967d14933baef333cf334eb7c1797c438c53135b95e39bceed159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e523877e1f6de164cb5f0fa190e1c52
SHA14e82fc007a6426ecc94471d7d88003b1cc3f03a7
SHA2565ccbd01c16463dfee6228d3ed1fa21dc303e2376ea0dd137e6c010f6e85ad069
SHA512a01135aaf47f56a1164ee57fd1c7b820f6b6cfb5d89b01ad085759e8f182a83fc14adadfe4834bc51158cdd3aa81c58dc254916c5fb15ce6b5f33eb3a33bda7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c71a640dd54375635c29959db1b327c8
SHA11dd7fadd218f33dbb9257c8736e9b0a2707a2049
SHA25621051f5f2051496ea1bcaa7ce591f35f0c70ac6683e7962e3fa72720b17cb634
SHA5123158642861d0f32f6bff63e3642bbce2458e53932bacb4c3b14be3675c1a05753c24cf4231dd0c3a9dd29657c559554ff95c0cb47445adedee35bd3dc0692a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c9ab97f6a799dbdb90fb08865751841
SHA1096b875511cbe7e72582cebedccd6a5ddd11fa87
SHA256238093f307edf9c3fd43e8e549c987bbe08eeb8b96eacc9edb3ba596c9ca638f
SHA5126a3b5faa43de97ef4a4e9485436ac6e8cdefe50a601b7b345f9d9f3a7f64096efa9ea72573c15bdacca69671fd667f2aa6b50c2e9a4face50145902b6c254539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532b7230ffd73cbc1a87b10c3d73e701a
SHA138fe937108bcc435fa5f755c71a092778b33644b
SHA25605e13e68c5f455373fe7b54101f08191805fd7ce0583ed0fb42ec8977a0c8a2a
SHA5128203d08631f8d9f461ae73fcead6a5430cf2828d68d28f577d48c1d4faed75d3c94347b41c40ea87fb39718896e84299cf5c8c2053b7c68378a305f9d496ea9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59af36ac2f00802a5104c2e172f628e37
SHA13a8cbe3013dd4cb80327656919e5599c1314733d
SHA256619e71246e59b2caa790764d9b86ec52b25718cef6e4efce726eeb5b1af35213
SHA5121634f5b1546420cc67461085f621e4806b713188c496c61c84614a41835cc807826912c0a3d57c293faee1f39a5898dec5578e6ca44a068ec63a3034b880372f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b08fa3c745f60e2204197d9a94088f3
SHA1eba75a4a33814b0193a7f972e6a1b20f98b4ad90
SHA2569a28c9baf2a5ba4506485ea3994686ceda2ea9ba6562e3d2bf25786e7fde34e6
SHA512abc2c56de56425a42d923c007d660f8ce9f8060aae35318c175ab6fdc8f5870407eba25f04499fa94848f873e8cbee55abbb7d1c70a01855a804aebdac6017bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a286ae469e5091a01f8b3102d9a690
SHA167c6c1e061c045269d18a96883c0fc7f5258b1e0
SHA25619c7a69e2f922d60c8f7bfc74fa243e9385f38d331d906560d8f84b08edcac5a
SHA51280f1bcf0bf40c0e96127d236bb7206d1e37088f9d2605d9b9fe26bade184524e92c5d4edf1034c6e4d6c22f4810016140802c836c76e2ba7a6192fe40e1af427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a8eab86a05ffbd4290f70c7e8cec581
SHA1469d10a311082aa01966c6ff00f788c1e0beb932
SHA2566262e7dfb3920ef86ef862d278e97e5cc57bebab30db84de6415bc9e4d34b9e1
SHA5126534bf10d4c3b808c7285b54245e61083db6ca8188e3a4486146cd67fc0f5f20e75ad4ed147bf81f4fbcdca974d2a58fc2e880f07f5743f5bfcca2bf4ad34ac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc7d05f7937d753ed5c65538e840fe96
SHA18e1830255086787d935f00380ae08d936094fd2a
SHA256bafb3b6e895a7386eb4b697f9b0c01617baa3faab03fc57d39a8c9d1b250502e
SHA512feb33f7647809e6fef11d4dcc86873b14bd8f32f170e5ac4055835147c878cc64df22d7ecd994589141cde0d80c21754e33b965b94ce91713eed1203b41202f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554f8f6d240a900c8eae27393c1d44755
SHA1c511d612e24d952f39d2b5e07feb6a83fe8f62b2
SHA256633b710b880c0db80d45b13f87eab925c3d570f02ef0709debd8cfa261150e9a
SHA512923c38ada69f818cf57429ce4bdb4bbda790a2fbafdfd758360552ce61b809fe8d94471ac84a2c32ffa16ade43029d8d47e81e5fe15bd83a541643248b099bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55db357b6bd6c36fc56ea37bb28ffc92d
SHA136b7c0d1920ad069edafbb1bf24fbd93b295c69f
SHA256de52670443b781203d7381cdf27826b13045df9859bfac25dc3f688310939215
SHA5129590539b4c84793d609ce3fdc63df75d9fd09bf8ee9b9477ab70b429fc1ce1d200c5de26e341badd363edd6f6b2eb7357ada19cab5f0dfb4e2081e05a73354b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a59e07392b85eb687eb76c5d8eb4c3b
SHA1fa48ecd1ce9383e7e7f8f236f5b030cc45267812
SHA256e24fddc0fe4ceed944a25f2f0a0439d99058c1c5d9864cba9e297f3defc4940d
SHA512404581b775bf32b05cc58b09b57b70633137e1dd7ab093f481c2e6ad4515031a499cfb0d21940e1b212f976d448a4c1663b9da093969b3dcdff576262aaac117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f865c619d0535309a3fe23d352fb0a
SHA1e8e2e02a373314f2d2435652c835dcee5455e523
SHA256986c6a88f248c511a0acb8c3418adbb4ecc945efba9c6789db0c4da410a9f1d1
SHA51241cf23ee17efab77601c1996580ee86c6e727c80c9af93f72343c6e47cc2e6a79f3eae200d8f049335a6406cf3214ab0d70d0bb94300055a53758c91c2901055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542321dfda283f0956d933e64d9eee2ad
SHA1b3e155932084f3685d6690f6a10cf2c4e1569f8c
SHA2563886a493e7c72c846db80b1c873469fb43e2de07dc3ba1cdd96733966de9c89e
SHA512c8c39b116378f4640bce253a21df136d101aef8800cd489fc0d9ccfe5e6b9010bdd09fe8e3ad82b1e646f810bef4df7feb85c7acb7c17556314bdba0288d6afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bf28e4a56f82ec622132e400dd24e78
SHA157c8772cc066b52045137003b320b2abc16a102e
SHA256a006229b97b72306331a116e6ea6679c8e668afdfe4f53b4e8e8012404f80e2e
SHA512174a9c9128722e2cbeb10bdd61e8b49b9a2fdb27a2c1752ff667c5b21afb0f40b720da8304462f6f359568bb3bc2e9b0ab51379ecbaca5b17212c67a34de3f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a512e7d7b47c26602e5848477902ad5
SHA106499020860d0774c3f7ad3bd4bcfde392b22f6c
SHA25655814b888e4fc4ef6e7bdb0de9b28f8ec067386958a273e856ac632b2e77da49
SHA5127a7257c753de8e520f2e1897e0079faf332750780f307473f5cba57eb24586be2dfb2d28bc773a9c2584c98b927ccdc566e6efa09ed423d7cd909a5452036c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a84231d6be7c1b3c271080e03693d8b9
SHA1f7b4f414c609a0b5561113582d1a60887b128010
SHA256ec98284a62ff476b79c2656c8bb04f480e3f640e85cd5fb9b5b4de537d1ae6c4
SHA51233dd4153195a4c7b828573ab1b60f4427b7b42ef4c2c00716d6564c7e93781cba6e4bb97074e0e6fafdcfc5d01b6251f6ec31dee9a2ecabe0084465b5794d619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5058c2b1964071a4e31a1152f92251954
SHA19d64326933ebb7e49281016316b906257e75360b
SHA256a80cea0f3a807170d666088af5d8e982489ba5fc0ced5f18bdcefff77aa6468d
SHA5127446192bafc68ffa3def6b60ad5f9b8ae31e1fadc9d23a5e34b813ae79fc73449bc616b99d7c8642c4857e867241afd97e78f0eb190f0b04e0c9493a21bc6ae4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b