Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
d1b0899ecae00d4a08225464b266533b_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d1b0899ecae00d4a08225464b266533b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1b0899ecae00d4a08225464b266533b_JaffaCakes118.html
-
Size
23KB
-
MD5
d1b0899ecae00d4a08225464b266533b
-
SHA1
74b93bbd94d333dc45915f3f2080e81b1fac3411
-
SHA256
93bde55be759b0781938ab28492253908cfa47cbfa08360f8bc8cc021d021614
-
SHA512
a91be804a30329c8714a873f6c8da5ec337d2f1d9f81db1244339ded9366edd5612fc693b10b2e1f6871ceec91dae557e31c3bdd7cbb6471daceb42a7f8e7c82
-
SSDEEP
192:uWb4b5n4zaWnQjxn5Q/KnQiexNn5qInQOkEntewnQTbn9nQ3CnQt9wMBRqnYnQ7e:wQ/v3f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431865782" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B7F2A61-6D01-11EF-A4C8-72E661693B4A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00b807720e01db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000f03a57c7ee18f202be9b7222c4b538121185d35b9526f770191368936aa7a344000000000e800000000200002000000003270a11a010bef42f4bf9ab66fc76ad676d7dc2e9613497ed63b65bd5acb6e2200000009b3b2b26a26c03fd0b8ad59c18c55f0f2cdcfe99d1e480d0c7683475e6c6c720400000007f9d0a02adee1bd539cd3993fcf240ee13e21f2269b54c3851c5648df3a2ff4470c1815ae2e6d57350552ca0a573e8c78cad96c4cfbb2a1c0d80c04e28baca32 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 1644 2384 iexplore.exe 30 PID 2384 wrote to memory of 1644 2384 iexplore.exe 30 PID 2384 wrote to memory of 1644 2384 iexplore.exe 30 PID 2384 wrote to memory of 1644 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1b0899ecae00d4a08225464b266533b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc8d3471b9224c6d21b1355249a0bc7f
SHA1c7da249a5e4efca5cec88738550df9705704b47b
SHA256818f29670f0358b365b134ecc6033ed4ab13b0beb025b4aeb8518c3f867beefd
SHA51262a8c840f4d43820d5266f66ea0acb7a410fd4943c53a9bc896fcad9f031674f0977bbf7d1d27bf91be8d0529a6670a127884bdee8d04f1ac83269dd3df4d050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5321e9e17cae8ac75d22db8c7eb7148ca
SHA1d2cfb18302de9aaff6401b36be31fff0a8270a60
SHA25675a1fa229b0d7a258de65d53325c205499b06d6729446c28fbfddefea2f418bc
SHA5121f136d5197e5cd7d77cb19eba0107581c21c6ad839b770678623ce84601260ad1b1aca0740fa8eca105f2bab49ef0f15c79c3978634ca002161a4d5804417007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e18d5d958f2bc8aeeb205a2b3715620
SHA10aabfa0e191d78cbf51533a1e84e9b5c647c06f6
SHA256d21de3f109adcbd63f33296839e90da8ba133cc858d5c22b7b490d786e88d66f
SHA512427f4f4b82c3f82105c22f63eda9d7e56c58f6a0b567962049aa2fd41626d8029db30e1abab977faa7864c6b45d62e0761d4448c0628ef22edf2cb99a5dba1f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5b11120acac2bbebf995882cb46101c
SHA1a025366b7f1c7a2f7fe8a7713f32925df87fc9e0
SHA2561bc235e7ae8d2e8310206f5de08a75351dff0efe411e345c3b96dcfd83bc4243
SHA51206be839e72c369a5463930e2bf1c463d68c0bfd4a724869c4682bc15daee55907a572a367dd5f3ab58ea4e306e17a949ab9648afe68917780923747cbdb331cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee524fe2196e14db9eb0ce664e85fec
SHA125e28fe6be85970ab8ed5a1c404e8ffcde72ed8c
SHA256be6fde2767116dd7857a60a9a6f5d9f9bf2ea8abd0900ffcdb8bd4bfaf5b5c52
SHA512b1e29e84e0689ea45ddd9618777a462cf3e5e238d68e3dd017d0b62a52343e5a8a643121d136f3a6800107e4b0906357af77ed8032a08b3dd47cbfd2cc587110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6f9cb7f400188478a401588a476b5de
SHA10315c845247ef2988fbe555456443c369401ddb7
SHA256d6f12011f498df9ec3d1a2965e6ca803fcaa2c85b7e7e236cb06cd56a285c9e7
SHA5120888c337da1232edee7fce252fada3952fca9d884545106f7c7a273711cb1f29bab681eab44d54da90e775bb8ad69dcd3972c966b94dbefc6ec1e281bbf72af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560c25e9efde69c6c6512fd8ef2945b4f
SHA172435b09c041675c342c8afa3f4257c265ed174f
SHA2568d16fcc1a92a2399c8925aee39911065f0a0a3dd7e45581cdec6fc11c043c02a
SHA51291025faed4d6f9ceba26682cb1f1e45f8e5beb9cd3827a3d54d91d8b9480c9d207a7d5df3f5e690681652d59d6c55098f20922f247340c88946cee24a08796c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce407cd52654cbb09c47b059ec32788
SHA11d96a05fa814f137ec47172aaa23fb93aa9114c0
SHA2563bb8d409ba5731362c6cff8fa0f8ce14276c9a2d20f218eeb7666a0d69e9cb28
SHA51204038bb7cbeebe7d440cf280eabe2c06877389280674fc2548f3b4d8d7e5da831c6629e5240fd1c822c29e058bf07de50f040d613547227403b78998043d18ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a55f3e7614f3573ab68408d5c96398fb
SHA1c5bbb877d79fb1c50a38922cf72fb6e4bc53c751
SHA25647645acfc7221fa41d7605feb899370989d23059ce6af2c21848e38093e275e8
SHA512cf67fd770844a6ad00fc476b14eb4cf38b893056a5f80328309c69f518cba111418e320fd868c38b96425a9ed502cfafa60f091d98dc4dfb41ffb9bdb7a175ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5cec05158a3871258a6ab811147a4c3
SHA11e5bb6e72279171b27989dcb1ed3bcb45219f9ae
SHA2568a0bff703cb83de994a00cee96ab160bc584b93fcf476203e5d208340e593b8f
SHA5124f3542fec3ddfffd4a6a4bf63ddc018ae230f46d12b019953135a3adad6b7a402bfaaf1b3caa51b499bfba82cbc9c13b17e92ea4af65c7479eda0cea6a3f9d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52995b1829967d0c5fca405ff8c26d267
SHA1f9e12d5c1496bb43124c653abad7273b238177e3
SHA256368e1a6a7ae5d3ed08917d2a83dc531f0fd5eda4f9c07f502f4090e5d39c01be
SHA5129c55e14fd74d80516801f8af712fdea39027af379abe512b493c9b530852e2d0705df4016394760f7a4bdd20548a5748e20714b606cab3d6dd51fb56223d7f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52285b9f1f49f4b462f4efd93b6decea0
SHA195fa382c8b150a3139a68b38232911056675cbe2
SHA256b56c037ff16cfeeb5b09f64fa34407a6bd81c1bb40e5d0d701e9abc356feaf77
SHA51232168f2d274e9e0b5aeac1fdc9196d4b537cac68f8c8dcd5ed0fa76fbd6ad6f5a1008221be0f8e0dc268cdcca3e1535e740862b359b61510e51dd143c942da70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df0174cc17ca696bf032cff0ccb34886
SHA1bf6747186ed1639f1adccfae538f156ef6178079
SHA256f535aaf8784493ba87f12234f5619c9ec52d0c6e1a83a69c904b8919936fbd0d
SHA512a6abe40f81cd36f86184d1d502338b63b662ae8d0e6ea63dbdd3857ac13b771cb90ce6c0f7ddb3f4b4c9acc78e0874dd155cc3daa1c1c4e62ca9511b12fb9609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540e3decfeae448313131693cf7c31468
SHA1b857e8bdc62b6b45c41a4ce4289607980c4bde80
SHA256bbdca2b20d6bb141a2cdebadfee560040ef0e3dc33cfcc0d8416310c664dcda4
SHA5124972c861c71fc9944a44454fde10ad8cebdd40071c3ffe7bbfafc591f7a2e8ce9b1a16882f6a963bbde28c9dd62904d2824b8a5f8e36ca1e7a36cd4a85e60af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5888c92b0c5a1ca1793246715c83ae61a
SHA1fd7c89429246ecf0166eeee482fa460f992163b6
SHA25620555ed734249b466a8f75747274786325735445e4464cc50f0630d3ab6d53d4
SHA5124e718234903ffaffd17fe42bfb239006bb9830858c9988bb406cd8a8a0d279655ab2e976fdd9a2865bf1cebaaa604230358c75936a6754b053503e90dc2a5aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee2a1d1b2bc11931b48f7b212f195358
SHA140c3331f315293991d7fae77c52df32489a95b8a
SHA256b756c9519965a58b753d892202dc0fb7db47b5f8d35e5b64ca147d48f2ff6b82
SHA512f45b0c24d6a815d64aa7c35e932c7bae957e5fa66668ccebc093aabff1fc0949056b7b25c8493aa4ad7c888072fdc0e321d96d46cb4c8812722c97cf45cda93f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e9604562fb112d3f3d96e35b7e1144f
SHA1f7ee02b30b76613e96b2d462b723b0173e47f720
SHA256edaceaa3d836cc4182b9a31aaf54741ef67b8f193086ce7a27b1dd41c46d00d0
SHA5125118ae91643a19046222dd044d732f0eed3a9e539db1ce9c73eddb22d320ac0349e13e49bf5d06df044acd8f05a8a579aa6e1bd3ccbdbad170bc4d5d38ad2785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c816f9a3498856a014d5428b4636006c
SHA13f6ce66ef5129c63642026651585a671947383ab
SHA2565e573d1ced5577bcf3c942879a5ef0bff1f6945e78c698610c8c507043d97fbc
SHA5122bd922fd5c0faed14aaf69fa919ea52826e6c81f97de1623cb4087f855890c6543d3993594b0bd46b38b6bf8d98b38f787e4498d44448620ff0122954ad19e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559cad03ccb2ce0c17cc4df294ded88da
SHA16909046bcdab79378852c543e55694211ac69d0e
SHA2560be918dceba1248a0bfa0f8e65c55978fce7b78176d57a872d59e5f515239113
SHA5120c695862d661016ebd7426e111c23c661523ff223442ecc6635ebe070fd26b8c73709001b3839baf0e2984b0d926225a0ee2cc66a9073d8d952f33b02b29122d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b