Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
d327a7b970d2c59e2a11374ebb2e31ac_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d327a7b970d2c59e2a11374ebb2e31ac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d327a7b970d2c59e2a11374ebb2e31ac_JaffaCakes118.html
-
Size
16KB
-
MD5
d327a7b970d2c59e2a11374ebb2e31ac
-
SHA1
1c8d0ca6bbe5830ab3ede787f3f5ddbd59dd33f0
-
SHA256
68ba0e1c9f8ec0a9463c147fb81345b39dc0b01247a55c7964c9f5eff0fc88b1
-
SHA512
286024ae920e03d4c44df4ac3debf60c59f464c9aa792f9257fd3ea35d66a11e640b03770cdde4bef7689fcb10e6d2bd44b60c054498fd5c80d6e77678eaa381
-
SSDEEP
192:qrYtKUn7tgKk4b/TY3qGItcXXXRyVnIoJZy2JJJ0Cq46:8oHtgPqGItcHhyVIgy2JJJ0Cm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70dac52f8701db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000430aee563211cc308382923a268bf6fb84886778411dee9e67da2b85a392fd99000000000e80000000020000200000005a2a65d2e22ecfc4512c0e50f3f1a2df58c2e9d45a0fb990d91fc9a327bd237b90000000eac8eb00922a649d2db962bb4c9e98459415fafa8ea1dccc964952a1ba6f6b67cbac868bce5ac173c7af3d2e89fafaf0f5781a9476a04ebbfa4743b209c4627de88ca0da06fb391caee5690fe004760c0910ca539e819794249920c89660de76bb820ecaca2b4e22b22e1e4e8a04b5ba28deb63bd52806378a8d629597f4bfd262f0947c175fa8e3192ddc1f66028f2c4000000004ca611f69ebb9923bce4a07210b02b4ecedf39d77222fc87c19371dc6dadb6f5c61dc46cab20d7986956c0413abc1d0b873f26778b135161f6a380b255fe3ef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431917636" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000f333d31044ca651512cc71f26310cfa3591586c2de95f7cf73ad8de7d943d49e000000000e80000000020000200000002c2c35e68537f47d3b67fd8fddafa61b3f2d8facece808e763d38baf96beaee3200000002a1f077c83112901fdbbea610b5a995ad84920744aeb4bea130922257048ea0a4000000016503972b6475dbf2bc35e4d58b83cd813a53e233db3fff243806e4ef28c311bf216ff43d50ca4847992268bd89e47b6a2b2351f72c655fa5e0a86077c3a0e5e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{56F3BA91-6D7A-11EF-91DA-667598992E52} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1304 iexplore.exe 1304 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2252 1304 iexplore.exe 30 PID 1304 wrote to memory of 2252 1304 iexplore.exe 30 PID 1304 wrote to memory of 2252 1304 iexplore.exe 30 PID 1304 wrote to memory of 2252 1304 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d327a7b970d2c59e2a11374ebb2e31ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1304 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5015dfe2158a5dad26652e98fd09a8413
SHA165ce9d54287c5526bf9d0d1edbb7097c25d41dce
SHA2563ca0d19606365de2519b63d75f239a785c251617337efd46e6137a284b3e87a0
SHA512a3828ee798974aa6d71eb1245bccf7dd596e0451aebf84edd4b21de51370396080b8c61c956e1356df57da52b7ebf29c2f7d8fae2dbbe2fffc35afa195076499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4f630f1afa693b1431562ad21bef9b7
SHA19330565b4107f285ab1a0a863895511c3f9aabff
SHA2560f4b287a61f474450ce3001c1acd7d718270b4caf33fe5c77a8d0e6ec12ecc28
SHA512832468b249f4c561efb4579103853b66dd57f1f98fa3bbb4934b043b4bb1b04b58993374322c9e31f66b7917e8e3e8bf693d6940ab2f485dce9e7b35c797f5ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b198119d3a4df00ff764a78072badf03
SHA1753a90d8b096d777ab9ae6b7419ce74d72ac7266
SHA2567e21b77a54fbc6719d02294ff90d3bd25897923c0cfb382744cd453584f196b6
SHA512e17dc69a8a132ae2144bee43ae40cbeae01cbf1e9ad2772d4cb12d7c5ba35763c2e8b526d4451693f72240ba5531ea9ad4b4df276b6caf5cc51b78a88dcb68d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db5cc9e95654bc831ad44611bd527fd4
SHA14830272176f33abfe5568872354f89d93230ddac
SHA2566954ee477866a146a38d2530b2ff687e6c1bbaf1d88fca35fba271c0df9d803c
SHA51253278d02f7424b69d7c664b1e3efbaddd17ba5d32f8a22945d19e33ed368019c02fa544dfb26ac955b581cf8196df53e55d2ee86faec5883fc2752abea651e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae89c81a98e11705668e8e988ff258f5
SHA185e60c77930a5d5a144d5c7e8f9e21735c20ef1d
SHA256d9fd1fefb4ba5f8d18a2ce307e89a158d52c61242809ed210abb7de096a646c4
SHA512680e2333dd461cf049b6b274881d1ee71cb2bbb94a8286f9c428ef2997059fee0fc145e1de18e2a1f9587d7233e2a0689d730e669cc6aa5e87e8ae66ea1233b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539171f371f5a1630a679357e148996df
SHA19b64f9a59bc8837299c37e0c09170caa5d46d303
SHA2563667e3ac16c1b343d8b53839f718c0d4184ed3bb2d47f4d5c6a8f87538fe7706
SHA512a1b191eb7d213d14bd7996025457d3bad742f30b5f137075410ba151f864755be1e2e6a93514838626a43c66ff6c1eed9a44ffc379b714fb4c6b5643988bbc5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8d947268fd4133d5c25e2e2355a8eef
SHA1d6a08b2febebf13cc2020a09072c81e821ef6e2e
SHA25633ddbbdad4757eed0b9909602d96ee21a6ef980f47d9ddaa50e808ed94f3fa45
SHA512cfa8383fa03218fbe597b9a19eddce8c6fe9ad16f10be34f8a040e4c9fc17f28f419c383dc35f8d5a9a94dba7b585454164dc5cdc581c552789141429dedfb34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cc967d0d9b11fdba3d192d9a9245677
SHA114740940ccad0d20cb062a90849561c45d6aba9e
SHA25643fa39a582e342641c131a74e5b14470cbeb390cdce72e4359ed2a49efba5f8a
SHA51215af6ef0386e50decfc8cdad8d4ca95492fe60e2e96c1ec2e41ff899695118af2427e1c4250b6ee5acc41604139800965fc3a7dd7bfec83bf59a5b9b6120ec14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b292b4f4b25ef1272f8ba65d68c8242e
SHA140dd3c07e0addcd826e34d8dd32a4fd1c63cdd2c
SHA256887c332604df9708b45869996101f06459ccab70f1704e386249aa3166acbcbc
SHA512b16530790d8d42283f4a4ef29616bb31c3712e83f66b63dc575ac8ae8517a74045d256df734074d16f269b6df7c03ced2c0d6dec8cc2f35dac5dd070751a1e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c394033c44e0c49dd2520db82d5959cd
SHA154f12c52d7feaf60a5a13b8978c88ccf8a268199
SHA2563a691ab86497af20803a462ac8857111cccdbd028e951a9d002bf546ee35a549
SHA5127c515aa3deacce763c08af40becf4fc33e1ffedac8c15362d9b77100255140951bde51ea3df4cb01422fffb34f3689ad1636542a69e42ad872891c2a1462fd67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb5905c5be71b2e555eb8f3aded67590
SHA1bcc3f1445c403357b814e936d3a0f43119cc3032
SHA256d6b9eda3d1f1e0098a53a0edea3cfc498b215cfcf627401d90f85d011afe2670
SHA5129f18fa48c3c1f2ad1e2d3d375f56707482aba3799fc497821442b8f5d41bc7429705c6dede67726c96fcd9e8c050cb7328d5c867030200206d58fed860f83bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505a8f2f85a77eafdcd317d953ee3ac90
SHA16215e21335470665637dad2b2d3fd91c22fe2b62
SHA25636d17766eb06056cf447ac8d2373ef3eb7983de4cfe357acbc427ad783c99aaa
SHA51222ac6bb8584e81b79337cddd3e404150870b2a2392f19af316bf17104a9d96fc9c7fd3818576599954a67de32641a0975918157ac2370621c26c0b08cb7d8868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f15ef1a3e01874208fbefa9a52b8c3e2
SHA1bfde956cbcc304c1df5fc8ad8299390c68d749de
SHA25672a11a64b0692f3bd2eecdce81e386b9f0ada9687caf3bbf86380f36911618e0
SHA512d5b9b8a17cdfe0062b13daa812ac025fe24911a49e3e3bf9720f295e51c3d32d1033acb35787c57dc7e25f33aba2c1636fe53e4b1f4feb546eaea745d273b6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592033dc01916ed2f6e85372071ac110a
SHA19f8b9ffb247c2a39d12ad7efc381e77ede3ac459
SHA256a679d483ea4557619b190aedd494e9d6d63ad439846173795906bf2cf48a71af
SHA5122db7712a10e48a0a4d2d9feaa568602fe4c4ccc512352d0c556bca893ae89ebf62946854b6bb0ba6971e7a3d36ae4703cf8e44c5c342ab175b2ee2ba80f2b239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520feb62e8f94e1b824ad4d73a86c516d
SHA13d97cd01cf8b8be64fd6e4609139dc51eeaf7802
SHA2569101613a0c2eaa6fe2de836158e3a9a13daefeb141fb82a67ae0c6d3127ea808
SHA512ec82c1098f1f068ec40f2036c6db73a32074dc937494ccff3f166f272823f3fcf52b3b7bdedd6c738b87f743077380e5380dc79ff9d8e4aa30c2f9c3e2c388cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3a9e28a8965c19b39ef7ffcb3d0093f
SHA1283bef124d884d5aa1d7b76d7cf96ae213c493f6
SHA256a349062c3e14636893c8b6652d9269843d7572e58e822272ab802b3c00bb6088
SHA512a472311988b6f3c3f9d1c3bbcf86ca944714846ce47b5e1460019a179d1b11e188a0a229f837963ee62fc20670052b5bc6ec3d61593be7c9fd37667695a959e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5897e509621a3b2a2d65dc810ea26038f
SHA1a966cabf269c9bfd199918d367b222e01e76101c
SHA25629b1e87a5da79c407938cb5ab9f63efd42d4e693ba746b577cb10914e779b9a4
SHA512e9656a49e6a8d2398e3c0425868128a170022b328774530402fe86541b4f17120174509c18aa0de21dfe4f02253e8f1ac46632d600727ac747ad87bacc452055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565b1bb361f2d759b2e0c4ee8d63de2cd
SHA11da3f69925685ceef0c8a8ea1ee03b4f1a628a5a
SHA2560873e3bf8f0bb900e1ef60263c1420411054ed9fbb0aeacca819e21066df3ad2
SHA51267059a496826df9837d4875545a127ed64063e86962692b3875df9264bff529cb2a6232689d134b7e65a594d8c9276e37867493001fe761ebb9baa2f4530b395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59949da420d90ecaa5f5e9c5d4e1b1835
SHA169049029b294f3abd9ff0fe43c82c94d88c17ab1
SHA256b00e80c0022fa7c3395101ca97ac63f7926f368d92fd652a2ce82689f9e9f22b
SHA5129430e91d538af9505b784dc322390f70ed7adcb653b6cb71c73b1db653970eab1ee2fee65758375f3c2f91e847e3b4476f67e04114f2becb871ec4dec314a3b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b