Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
ce924da42bdbb1eba4782984f7607e52_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce924da42bdbb1eba4782984f7607e52_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce924da42bdbb1eba4782984f7607e52_JaffaCakes118.html
-
Size
1.8MB
-
MD5
ce924da42bdbb1eba4782984f7607e52
-
SHA1
737b488f5ad2be6ffb0a1383e299449fe2cf1a69
-
SHA256
fb9aed416233f59d7c7d8c766f90ae7466dd446990a3888691bbc94a71aca81a
-
SHA512
f25b94e20a5b5031bdf7f9fdaecc9d602b92b38fdd62c673923def1dde5e18a7f81bae59a65b1416767aaaabd48fed97f9a8da9746c343f7f6588f651e0e66b1
-
SSDEEP
12288:N5d+X3poCPuzmrugwG2qj5d+X3poCPuzmrugwG2qoU5d+X3poCPuzmrugwG2qiYK:x+aDHsp+aDHsi2+aDHskS+aDHs1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A3F02A1-6C02-11EF-AD26-C60424AAF5E1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000006f80c24599849dc127606a131f436a419f2fda6cef60be39620224d7c5e58784000000000e8000000002000020000000e913292bb89751c69ffe2826c2e608c3fc071f2da6640b739ed5f319b8df24a2200000001bded37c2b7b13ccbc3b1187b812b9f625b0dee7b5aec4d72baac97f96b5e2f240000000d9bef1403517b09d7ef428b98c3d1900924239bf64043a787bde609f3f9cebfbeae5027de9a4ab43d5332f9e073499cf9ae27d4702b977d951430beae1c2f5c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 508f09350f00db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431756152" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 396 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 396 iexplore.exe 396 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 396 wrote to memory of 2732 396 iexplore.exe 29 PID 396 wrote to memory of 2732 396 iexplore.exe 29 PID 396 wrote to memory of 2732 396 iexplore.exe 29 PID 396 wrote to memory of 2732 396 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce924da42bdbb1eba4782984f7607e52_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:396 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af5329ecbd78a15f032a5d9842c08e12
SHA1fbdf1de3171b3fe97086f083c285eb0cdf19a0b0
SHA256de21b0906a375f7bf166e696f43e767ca05706abc37393d3e4434fb1705f2043
SHA5127a23e278c40081def59c9d81b1a2a1e04dabb30c02119890189471975d0e818bd651f1e72d56843525303d0dee263aa0bf50621bd2f86ac9ad37a32bcb4691ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50473156881e943972ac4b2307c1a9c58
SHA1c9252c0cb35b181f519d93cd05fd11c91cfd6057
SHA256aed768e79b423721e278ce5fac1ff1138e49dd7956e5f3dfb16ca2c9f48d3f95
SHA51218664f66ad1e10fe97f8e32f99db4b606673c38b7103640f6dae652ac8de699a053bb8c1e9379f7bfedd962f7c60f35132649aec7ab9d3d9ad0950502005a2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d70ad1e923c2d732ce0667dda29a947
SHA1dc8a49303ef3b42af586d0f8e129e6f0b663626c
SHA256117a08bbef382c34cfd7e8ad6665b94b3bbc651e9223f607730a2e4fd086c35e
SHA512ceaa226ae4d83e5d342af65a995d9448c0ccffc216eadb9988f1736d9b150b1cd08476954fad854740bb4696a292a19558eeb17a0da258322efeb35ee8deeebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b530ce93fb112f61ffb98ff6a70604
SHA118de1727f8fe046bb560a17c17e6a9bc5924261a
SHA256bd4c3d5ee6978aef07436f505a3d98130080c250ac3e9f9cb204485c19c1b4ed
SHA512f7813b288ebe59e4e26ac5622f207bd9f00b9f6baa614893c6cf498ec5f0edd97c28b4422df8844d1e8a6f05286a8f45a34ed8c3cad0413dff7b038017a9ffd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af66aaf661d914989aa8fdb9d2cd7b9a
SHA12b23c2c5f115f9c52e372104dd111165203b1d56
SHA256fe654817c9c59ebad5adf48c484218c8e3a0d2c9fe1299d377bcdd340f6ffd75
SHA5120a9b0fc7fe6845abfe62be8fd194132229b8e07ea6030c498dec30ee4b508d0b19cba3f3e5d7b1fc4bae9753071d290c6508c62fd94b8f284bc576ce289818e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55991d20d06e0e4a6ddad46e58a9604c2
SHA1f074bf208f153ee18e0f54211c00e3fff68c731d
SHA25609fe7911a9b7edf1a8ec90b47a5dd51ef88fe36be15338517dabbbae6bb93a21
SHA512296c1f48b0bba8020fc8ccfe7518e0ee9009bc58af5986c6078c1f35f2f7aa6efe3fc3443b27026bf9e108c6f746fb617d9e5479180e66a7a290eb215a519498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5579eef1054718d579c77dfe2a92db68f
SHA1881ff735505c975128b0410849618437d653dfcb
SHA2561bb9dd28f021b691d088448f64313a97d0839e35865bc7ab379d7f0343b16898
SHA5129cf4ee79cf0b03adef8d894a4b854259d0e68409f84aab89ad684f9e9f4c16089455dfc5e0c2f2c1939e5fbc4b1fd0c95d4cb9d0490dde536237167221e5fe3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503204d9200bb16b498b05a54e540b10b
SHA1c332237996fd02d2d2bd64f288e386fd406a8b6a
SHA256ecf4260d0fa37d6711f7af784655dbaa38ed1fb00463b3ad7bda28a9db79d41a
SHA5125d28134f929747b3aa74507f476e09531ff0b6eaefd5b9580b72a23a5e6e6e15becccdf539e695ba1d6097986a095b86a89064802e53151dd36d21594bffc727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58852d11d39ff1407223b02f083fc5487
SHA1e87b8fa5ed92bc22300136253d1fae881e3a376a
SHA256ef436d96be70e16c12b814e915f44c6c4588136fe0487dc4bf54ba529167c2b3
SHA512c6eb00bb5a6dcf36493758d2e1a7ce155a10a5285b6fd67ec7ae591b49215501e7d4e4725a6ab955c8d5568d642bd255f4fa7d108cd25d85ea45c356ef22e801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524acf90514e47bc91d6c9d062167ba6b
SHA12e89bc7eab07be4160c33cc9517cbd9809fa6753
SHA256f7d41391634dcc2670d8729721ae50b3508279b69ed994ed466dc445d4c91682
SHA5123254a4dc3dff29afbf285b61335ee99aacec37518b3f46f19991e021458e95e757c9fdcf1c6c11d851a68f23410da2cabd9f276f1a40fa1552303deb6ff70950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500fc2c9d6279b1474c4d04635f297d05
SHA16b3eb4901178c0ce1bd9ad7f6a302b3da862d705
SHA256e90daf8a58888d5d184026726f64e302137c4bb86bbd1a4f8c83fb6c94cf4269
SHA512d97aceb313c9a0675c65c67cc91cc7a64012b0d45a3be647372092d4ea177ba60515ef9caccb7d9cce56c5450b03ce6261bfa14ba46d9d139b5f6dcc38334f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ae7d1e23074cf15a5ae0f6cef037f9e
SHA1e8825611fa2bb916833846435b35065b0b681af4
SHA256a591eb370631e35984822d6baf0a48a42ed83f470bc72b31e75140488d00427b
SHA512be7a168c8ea0d8560c7e6eee30ad4089ec31cf9611e8c66b6901170aff1537ae0aef56dca05567491133ac010d1db7145774b28504c733d67fcc2adc61ed6a90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7c4ec23a9b3978ec38c9c0bc0eaf1f6
SHA13afb474c5b068651f8b953e087f95f241312f5e1
SHA2564388d94c67000ed26c8d5ebdd7aa30e0cb0e80bcceda310bf85e230252f6aaff
SHA512d96e02e9a763dc18b4cc526c1266340a2ea2ac51e75b47b54cf652775089198bc404e3170f9921b727f82395273205b637b802e44bf9e2eb625d6178cd580097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500dff371cb1010d53ef787d991fb9512
SHA17c9c09589476e974f3037fba835a1bc3a339a056
SHA25683f3c3da0a9f797f403ad8865d7d2fae8dee1b450b693b71ec00dcf4e289189b
SHA51223f78ac29559e230b9a8bb54fe2a5652c3fa21f9fecb317d67676623c4d387a1ba43e1c6e9c47d6b7700bf40888dd803cc2a2f0e39c080190807c6ca837ff753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b77e3bdfcd0433d365eee9151afebb2
SHA1c2b8c4a87bfd7f035ba4216bbd15d5b89a4f9a73
SHA25617b6addf5d3550fa0f20f6a51e2410b0b4c3c2d00a1ed2235d05fe4a54ae7e96
SHA5129931a75c64fac9309d0d1269ce09e6ce301971a240b8c56d9e1541268d43953281373b7560657c64530db875399cdd8d4753378b562931bd7074a54af9cfd8af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2818a44cb20873210f09de8e2c94979
SHA1cc8bf36a21bd57680adeff097f32dc3a7b1f8971
SHA25662b0231278f815d9bc21035522da7b9edf7081afe87f721eea79ea88da87ce47
SHA5120d985b85d3a82aebe038559fd08a9e88eeb71562213c19bbce9c7a9e1a4aa67860c9c9bb71e4455a9e4db8c38e455b6978c95f32b247327935baef4e7fc18c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf694a6374466c062a2c5bdfa4d15627
SHA10784889c15d013bacf6db792a8baeafd59e8e90c
SHA2562881c1d43929bdf09e38908d65c7753107247853c9fc392447ad2186e34239f2
SHA51294e31f7a80dc0c66638a805fb679c614224e2857fe2725943943335968f23f7d487e6d822e1e255c564f5b44ef152002affc21df7e1bcdecf48b8bc9989be03f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56636e34f3def0963d75bddb05ad8a8d1
SHA13d969f840710ba644b3a6098378d417cb1440fc5
SHA2566f11586b3185a36be1805d901aaa429518b54a4777ab298a7da4703939c9e5cd
SHA512be02806e2ab1e24553881ee35cc6b0fdf625c1db87a83cf5cdfcd457b29746e52279fd7bad1c25acb7ef448a4ae2024c1d3fb0b5a5e12b0d473ece18e7e75cca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5861fa6b61f159990d5fcb72f6b2af7c5
SHA1ae858eabaf73d172c1a4c9e5c86bee07909604f2
SHA2560af1b20537f6ac79a642e48c67f4bf06192473a458ce71c7e1537eb39fcd8aa6
SHA51283ecbd649860d67cb147cec9c78003b5b44985ebe89341a142b9e6526cc89fc9b0031caa4d0ab9b3c32af595e370209fe92ea0f59d83a63fac0a9ecbe899da29
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b