Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
747e1425d5fd849ccd7fc377e70688f7_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
747e1425d5fd849ccd7fc377e70688f7_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
747e1425d5fd849ccd7fc377e70688f7_JaffaCakes118.html
-
Size
8KB
-
MD5
747e1425d5fd849ccd7fc377e70688f7
-
SHA1
aa8a74b14961fb47ad5daf5e71b9b1cfdcebbe32
-
SHA256
2e3a7cd2bf37757aa69474726a17b602936ae95c71c144338776292a879b53df
-
SHA512
62d9de9766cfd45e4d88d7e32ac64f2cbd953fa2ff6484b62bee753a1530a39cf0e8d4da14349fe4b0b902766653ccaeb850518f68441db6ebe940f7d0378a06
-
SSDEEP
96:uzVs+ux7QxLLY1k9o84d12ef7CSTUazfSxG6MURT2/13pX4m6WHXCmCGq8k/lBcD:csz7QxAYS/oRTg5o3b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000d62f3eee251f7c657f978db1f27ac78ee2074ed780a04ba2152cbcc24de74411000000000e8000000002000020000000685c66985510a6f47ca518beb7e2de3a06841f99028bc8f37bc133481835748f90000000d8e5d508ae33288eb7702c0aaf0b3b3a488f9c3a4f97ec9979beef2ddd573a95a345b5649495a36416d4ec18be58e92bd6088eb00857b94b1d4233b693ce60ff808b0d52c8d948611fc70b0def9a4237e505dd03d65aa24c5cad98c7f2bfc7b4fd10f0c7830a8b83ed2c8db424be512536c49d573aa5c5be3c2d5dc6b53b5f5b4f7f4769976024a6142f1414c9d8fae0400000001b772ed52b529fe1c340c0d9fc295ee29f9b9aed3e4730900b933a3d10f62d8730aa0e39669ca7d0bef98b89c84e8e382c6b7f1907362c83223a35ffa8c9a601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428173991" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC966581-4B6D-11EF-8B52-DA486F9A72E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502f67d37adfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000bb9ebf0fde9b956b715d02bcb2b93044456a40a681bb0c44fafbc4ab0b23c7b0000000000e800000000200002000000005d905b0a876a9d78b2b8c3d6821e1a130d50ebc4bcf8c385dd0d514f0e34a01200000001d0a974d6d9914753a3e31e1ae641c510794c8b8cac2c01d2c3a6371bcd57f8c40000000dcc4b11cd9261c729acbdbc48ee3d0a62ac59d79e0b0147acb5a8556d5ce0cd2137853903a037e16275e292ef6ade4972e98da9c29f86fc264184474fa542d19 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1148 iexplore.exe 1148 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1148 wrote to memory of 2448 1148 iexplore.exe 29 PID 1148 wrote to memory of 2448 1148 iexplore.exe 29 PID 1148 wrote to memory of 2448 1148 iexplore.exe 29 PID 1148 wrote to memory of 2448 1148 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\747e1425d5fd849ccd7fc377e70688f7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b507faf511033f2e6ae67be8fc8959
SHA1f999bffb76ece77de25ead1b3e239dc9afd0e7ca
SHA2568e38fdf07bce8c6a43a12287958b1da39279fc1a54c10564fedc43f84144610b
SHA5129543c306790e0aab94b26488e68b6fa922fc97bcc65a0d6db6c945296ec5b4b80de1c07414601301dd9ba4f4128130b6fba615b5fd14c14a6ddbdbf8822cea9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c007b1ba5ae8d9003d5bed670368745
SHA153f4bbf664ebdb094b8995fb6cb66d635d3f6b6f
SHA2565750fdedbfd4757b85559b200dd123e4b136209b7b786e39322d75a1506c194c
SHA5128b399c85fa6aa781759bcd82b8ffdf116766d37d93999006d480284db51ee145d2d9746c5e5aadad67deb696ea3d811c3842e977bca970fc512e0997274f6fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5317e55a11bb9bfee249ce97ab1a145fa
SHA1533a6e0b5f5fd62eeda6631c6d25a2ca967af23c
SHA2566cfa7e00a06f028555ab684b3bbc3cae00bf01bce39e3cac356913cffd551848
SHA5123b6b0869f259d88d8c5f3706b247e4aaf45d330437d20208745f46765ae57a843a4075bdfd501664eecf038d5519b29235eb08ffea07cf43c54c77b9837344a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5438b571361c721b22f9fcb916a812518
SHA12384c711b172ac9a83f6b1bd1f2f37d7d94ebbab
SHA256a01bed1fbe5f67aa36363088a6a46190b5ead7a927e4d094508d8011be56b7e7
SHA5120b0dd1c0c4016029060347b53782d1a0897585bfe53e9fb9ee22be9457296f743f12bd8ff668862c688c534be8cddf3a5532a15bc19440ee43db52e28ced350e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565f2ceda5d9f560302f94c6d5d7129dd
SHA18adedd25b79430e84825265e5c21292bcc12dab2
SHA2562d6badae674273f228282a1342b46782f43245622c6487845b7182de76cda15d
SHA5122c8f3b2f89265930198808d609a18527c1bf065c25574a864b78840f8c96f0ec285a45fb0051067f38bc47307600282ef50c5650c861106428d5020ee595136b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0aa9dd84dc33945df50fed2cc81d3b7
SHA1c1155a45dc25e7a7f529f66d5b347b3c67b30c0a
SHA2568521f6d7ea5a22779f354837759e6a0672086b5fd63a1626f18309a0f10813be
SHA5122db84cc927050ae46f464e70862f9aca07878bdc2493c9c32536cc7a828f21b20b877b92e75d70e4e3da3a537d779a97baac8c4cd993103cf25749d674400326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1c5ec32caeb447c6a05ea37bf1167f8
SHA1809f5c4ae003da839b435a47689f89265c7ad574
SHA2560c579f677e3fe0ac0057350d2e69332dd7e9f384fe3f89ec6ae4777d1e9f93cf
SHA512fc7ef6eab06e757912737e98cd47c8e4566c2bdb7a48a6311da2e4db64db7ba9dd99244c3180bf3fabef9aae83073dbea10d3d862b729b4425872e1e49b3b298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553445527e0262a61ede8ed889e8a29e5
SHA1e57cab188e298ab55545ef3306752ffe8640baad
SHA25689105d970fbf6b9564661eb21f4f56cb963739609d334958699e9d16fad35156
SHA5120a27169c6f013bef10603de169c8656e25b040877da047fade24a5a1bde283675ba49f81a84d2dfb47dc1be1dc7a130af9ae67ab167eee297b7a3d8d5d1d10a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e2a5e011a05f6e7b12c9001719603e6
SHA18fb5e1cfe4234d920831fec9c50ffd31e049712b
SHA256acf3b8730c74e2dd4298d94a6b2c5ed600d5d70ca4d7f2294ae8e4a644fd1e9b
SHA512e99cb122e4061d233e3e2df88e85fea269a1b9aac75b72c401b0cc15242d4d44c278cbf0e44c6246f1ef4f404f29647f2ee6564bbdd9d5ea44dfb35c03c63563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f72373708807e7587d77d2bf126d8f1
SHA1305f5e803450bdad87adeb154570ef589418c68a
SHA256bf00cbac9529f1cb97f6598bfdfb4f0df442b05c1ed81383f87f4cf67e5060d5
SHA512ee5cce16f5e5e01c423f574cb448da513dc2d1613495d7ea4bc9aa850305dab179e29053bdaef950e580b80e8d120769e90bbb59f8b14c11687c2879375d0372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634876103542a28aeb6dcb26f734e683
SHA1045e73a7d4b9bd8c4fbbe2d863d54b7d5f6abc34
SHA256dcd0c4dad3245cf5e3c9f75804e8c724719dbbab0e23a00651da506b47f8b20c
SHA512dc1614b915160c31bbb835be7ec5efe5d47dbece142ebafc208d9c32176f1690e6cb49d929df368f5fc9708fc34a2f76ec638e02979af031752a355af5a54d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf56262cafd2b7d1f8e281c640fea026
SHA10ef41505bfc60e7467aa4ca7cf382582e292b427
SHA2560a7ac717797148608393480cdc0395b1fddd3243b02202ebe3a3085a00ec993d
SHA5129ebc20c53e2f723815d8ad4386979c1acf304ec835619834d2aa3f53b4cbcd3a725c93869596ad7f0f4158c3b0a7906b61d7a3e39494527b0e3245ae7b4d1167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4021c544655954156df00eff10124f9
SHA139a417b39ac3a0ec708d42783866f4bd1dc9f758
SHA2560d7d95a0a2ee48dc37499dc492a38fd83e4f61845c7fdd3e15bf460df6386b09
SHA512c10bb486e13671fc08e54e22d539493bdf564ace1b687eebc3c8e559456bd00b8711a288bcb63a52cbafd6eeae18ab467a1732c27c126b2e4c5ba9f1561f21ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535fa0194c477436e51767849738e5a9d
SHA1b007aff868fb590636368613f9828ad7d943694a
SHA256cf069c13f93253bba3bca016c68a0d51be2fd32d2812c2b511faa447d812bc43
SHA51280d514a07d4658f727e2b29d94e3b8cbd173919a7c147aa4035af44157d0052a3027777a3048c3dd691f4dfb44382f65cf2294d6ea787fd0d9a69b93452c55b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5007e522211ba9bb5fcce0b1fee6525d4
SHA175049699b898e34cda1a906ee92571966f861145
SHA2561e73f2de9be12dedc00b52c43c99a962469873131e15ae53c593644fdc411dca
SHA512acef8571ffeee394b0b3516cc0cc154c56ff4d62093367acd4b613349fdd1868ead332705b1ad6b32ad9d3975651f3bef630fa5cb8e0251fd81b75ba4fc5ff45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e9f7fdd6d99c0e70001f8c7dc6f8cf8
SHA124b9e6598a405aa2eebc141becf9c3ec90ac11c5
SHA2569980e83f3fd90732765bafcd4b49683ad2acb3457819530562775367d3f58270
SHA512e4854bc345ecb9c1a26a0f17e54385d9e3fe4da50f60968eaadf1cee89dd72391a359320a003cd577eab1a345139990403f14da672b84bc2644a7c7ea05920a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594ff226755ab235c521b26ceba5b8eba
SHA1feb222d0853c323cde819ab4cca0f30d7ee1c5b3
SHA256508b8ecc4a7d9cd0eb995f8d5f7926d8e28dc6ade6a433220a527d1c3905c1a6
SHA512cc22547e6a45a6ac34a523bafb429d8c462fd0d826962a4867f1c93675d996b0e75528f03d1a01fb6eaa51535d3cc37f1824888b41bf2d6f3282acf1fa1ff55a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59facfb2d5ec47725f2b5eff26bb8123e
SHA1fde8e4e046f556cdd4a2b4221259914e63f8bae4
SHA256271dbe2c7c48e717a6a0d54d5f8b86cfc97f3f55bf47dbadf34fe94f6f205800
SHA5121dc7fb3fc15aa92d8e6ec7456deca634a6e350edb53c8a8f60f1b1b7d1514fe85fe89abeb144ef25a71acc2b505755f952de85732f4c14b13b8ab29bc8884a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5074aa33efd4c97edc5e2486fd6e55061
SHA10e2eaf0f9645036f4025461bf4a08eacaedd821e
SHA256b731603b74c802b0a787d7c37dd782e43656bb9a783ad0ed41f5d2d73d36ec1b
SHA512bdb48f06e5162ef9ff5a2f1aa52101ec900a54b7dbcfdaf3f44d764b88a46349a61a6437d051e5aac9c9ba3f2db70627f54768ff6b8733a03f2cf6add883b47a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b