Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
da292aaaec7d5599653b5cd7aadf1a8d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da292aaaec7d5599653b5cd7aadf1a8d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da292aaaec7d5599653b5cd7aadf1a8d_JaffaCakes118.html
-
Size
28KB
-
MD5
da292aaaec7d5599653b5cd7aadf1a8d
-
SHA1
58317883980d23b9c47e7459ae7ff7254dc6345f
-
SHA256
0ea8d88e629b36b56ab19372bedff0eba64d0813dcf3c93d94cdcbc90a768978
-
SHA512
a3f54f9c9121a7b0ab5864826082013305562513690d7d8746bcf548ae2b3f9e2c160d9df6410683b7ad75c157149608b8c64801cef6922eee76174941966d63
-
SSDEEP
384:/PF7FQFlCLFb71m4cCgEqq9c1vPTcTvXFCXrvnWRy78z6fnnfq6L:/PF7FQF4LFbRmZDq9c1v7cTvXAnEWfq2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C63317F1-7029-11EF-9E32-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000f5345b600fe7daaa41f2c6b8934fda31e5c39a617b5be17f259f40d6d8b939a8000000000e8000000002000020000000c25a1d2f6d392b74099ddff724ecbb3194afd319c9456cf1f56f370fc6468b769000000098493c9f9b61c22b121565b6eafdb95553db036da430b7cf43a2a1b830c4ac6c59f2357451927232c8d56333dac49172695d902b3dc9477788f7cc085e6478644b63e1b7218fb311e43e4bb5fd0b8484c8772d7b9c85c054a3f5793aed0de47414b64d642f47821879c8cc30111c4a094791cc80d60492b969e414f4b2b330199ddd31f570ae350611ca101538c6d89e40000000dcd6e7181ec69f74ee571d6b1b524c9dc5a5774da51897047c3df9a42c2e3f0552963d7dd09ef1a069bf8bb01b8f95cf4a6813b95083af3c1575a8bddef4f133 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432212887" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000b8a19f70bd6f4a33b7bed20433871495fdb71237ececb14b67b908639dc3f6bf000000000e80000000020000200000000a25c661518be31d98ad3acd675dfb878072ff4d29aae777e6a892d92399bca4200000003ea4404746b5bee9860007d6264745643d61fec30083ea097e86c3c49a959ed04000000062e8913e801bba0c109cf311fb4a874a004863b251f5b7b50560a51f35ea908b7af37ac5f318bbda421f72f0ffc31e2fbde2759ae6fe3c5d6406e59a4200e7f7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30cd9eb53604db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1172 iexplore.exe 1172 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1172 wrote to memory of 2480 1172 iexplore.exe 31 PID 1172 wrote to memory of 2480 1172 iexplore.exe 31 PID 1172 wrote to memory of 2480 1172 iexplore.exe 31 PID 1172 wrote to memory of 2480 1172 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da292aaaec7d5599653b5cd7aadf1a8d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc45ac0b86623b6c36b1c7abb4c938cc
SHA1d743225ff5295d1270d9f578389ab7cc5f138ec1
SHA256e579d8953689da1fcd281c729fda55952d851ca4677ebb0fb5e43bc839d25b59
SHA5129624bc860f7955973d2f6382f62c84755b01477ab1f9902f55bf6545de33f5384521e562aa6974ea3b64106a1cad0c5cd2dcef6ef7163190502d0b3e48f75769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ee03078bd88f945b3e9674ce6926003
SHA192186dc0dab77142cb272103f11c8810a5ac771c
SHA256e984d5245e1533f54a8041fbd70a7af905e7ef7d63da7aa65128b1fa9746d608
SHA5128539fe50b61815a31390e9884bf25b53415794a89d5c8e80c5d313a153a95499f909328e15bf9013653e90e2a2f13b2a6854ac7738882f6649178d1b668c0fd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552c9a5c9389136f79005afe4f2f18957
SHA1d5685631a565b4b383b60da092e9146e01908aa5
SHA256e4850755d015c18d19ab92bc0a64e1ef23e83f5db7d7d0669aa5fda190afb326
SHA512cf48073bcaf6ae0882883e345085c45cce72c160dff60269f5cb5b06f7dce22083f6d587c9e8f3f2a7147f4e1c0768abe8ac740dcb91b4a59b8eb012373dedc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff84a0b6b163b6927574b0bf56746277
SHA15dd6bf04d720bb71351dbc4804cb487aaee20121
SHA25672f7cf4960deaaa68b7ed2688a4204f009a9aa2d6234e6326bad994a1ae2b36e
SHA512f018220035e770b14c15db55fba69c5b27b8c92c6eddaa944e2e53aeef7fbe21fc5a9b97b8df29f323b2d5f71665b56d435b0d4b75128979897608a72b65b7a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b9de9596da9748bbfe74e24f7ee67b
SHA16dd32c4f95977d93d4ed169bb9052f3475434810
SHA256cc7b0f29f2f7d289a3469ff2c0e4e77a963ed040bb0372bdf5abf6fd5b7f05f1
SHA5129157f787c3631862d775d8213a30e2ec15e000373c30fb669707fc7c4094a06ac8be7b2de8e907e04a6ad8806e8d4326e7dca094ce3dd65ec76ae8ecc78d094f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d02f0bb9c3d26d8afaf253a841d7730
SHA1e40debf3cc09aceb8062293aad0a516d4548799a
SHA25628a930b3a59bef3c0644a14b783da0f5ab62e94464f6296a6b5e2c140d511c2a
SHA512c9e10cb7300d010b29fae5cccdd8e95f14ffbd0220fc5af200a6f4a4b1404df25715c4a31b16dcadede0e2a175ed2b2af305d751176e2ba335fe87d5cf6b3a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570f69d86f9a5014c3668ebab6bb89524
SHA14adcb0c1f983d3569db3703baff9b46f8e0ab187
SHA2566317841a5f4094f5346d800eb7533ba339621e14f7a72d1314e9cc465c69d43c
SHA5121014ff248b2dd05c46db7659f9dc4b756469dfc6c9ef20832eee4cc48ea05f9fcd543a9b831a0c240588c1ef7c70027015870484b9ee140dd1bb2ed3e9b26381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5305b175881ba76d73dd121efc691d09b
SHA12cc75631db41989a6a5ab71a2414f460af08e1da
SHA2568d6dc1b89702f1d4831efc5f124f43025d633112368968ebb46b7e13cfbfaa62
SHA5127e033460c9f4503ee9274010e80651a1a2c753b8bad8993accfe43e9b2a1683323e5ee0eb7c63c02100e1810669a7a5d56be66a12e9dd5234807ba7b550bf4b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528eff1b3da6fa9da7432d6d703ff00df
SHA1954dbbac494deeb20ce023ed759e4c7deb664ca2
SHA256463865c7008a06bda4b9691ba28da3a53652b7beac7685174d6b9a31c3ce226b
SHA5128ed3e13aec83765aafad3938bc2abe15014bb967f68456ebbc7ad08f8456b3dbbe733db0f338740890e6233b631824df91267d86462c7031647f6c4c885b2d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc30647df754dc925b9e23cbb7eb347b
SHA151e156ca0f439c51e0d7a1369391a509e62bcaad
SHA256b5dc71221b9a3b998aefd051bbd4342c221537a00514e751b46fc0fc5eabc38b
SHA51238b92a96a78502a0541b36305b2ac80d6bbbfa363b2cce65bfda1d32d517f593738858db660eb3bb7392cc65ee60b4396101305485380138403c9dd4df118db3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e0fc7021ada6999aa79fe814a727ddb
SHA143170493a561554b4c189d47350a7856d7ad8d53
SHA2565efc5e4b289d640ead65e9e7b99a8b393feeca600ae17b246a851a777b02e065
SHA512853a202ef87cb9f2269c81d27c91fb34b3c8cfbbf2e7322845f775f745a62f138636a284bdfeda8f0a93287de87bbd1272158de6b2d1bba3cd99432e430f9bd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f7e6eb66b1e3539764d48046ccb66b5
SHA1d7ed47913e375f11126f636051ac63d459cd7a28
SHA256c94d41b93f2850092207ed7b110dd3a2f67e8dd334f8de0bffffde828731b47e
SHA51207a6c2d19c5a5b4024211d8b57947165fcf1c096d79222e880c6104305f4247a087fa9df99e007ff3fde598a1303bab5a4bd02eb6acb2bbfee7d9885a8913461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed8c4522c575a2462559c9d674509ce9
SHA19499da72eadf53cbe33819509b658166a7b4b548
SHA256564759ef0aedd4a8dfbaf973c98e383b18b69aa015c7ba84b6c39991d4fe91d0
SHA512b4bb17e8f39d2c2e0ff0aaa79626c710a2121b0c0e22f38e1c3541d5799c43d1d63a9fe92902b0dfa657c267045ed25bc9437392f2d36e51a052b1d88364860a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b0d5d855a18ac9e5a1f0bf00ccccd07
SHA19bdc5104f2a911ec607c5773f74e8e0b7acbe69a
SHA256aa48e99e984d11c4fd47c565130e996be755862bce386c45fb0eae7a87d46f62
SHA5128f8021b15405dc67c976fee4d7786f90a7eb937ad52290733b978e72d37f260f5791af380d368cea64c37620f5f60661cfc795665e236f8701d5f3786e0eca22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bdc477b10e686786a958e856012b072
SHA14008c1eaef2236e378ac60c23f79050f1dbde234
SHA2562d01a871b28b76903ee487f26ca6c2d8f23c7587b7eecf5834fce4b8e875cd11
SHA5124eae7cf4b9bb461ddb9562bd3fba2a2abdc5c4ebf381889b9dce593e1f59f98f903239a44cafa597879d70b9927aa4610f3f7cfcaafd1c866c8bfebcc9c86448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dd9ca9bed9236a5afea6ea4b2464909
SHA1355f841d6cc77df91fbe283b6aa5edd3cd0408c2
SHA2568ff4ae8e3312841548e749446e67ad32e61aa8edfdd5f1c71d936993d0c1ee79
SHA5122076e67208edf8aa398ae3e1f168469185a9acade3bfdd433acb5333fe091e63e99f9cb9f65fc8ebc5029ce7b749db0fd6492fb4c0e4124ff99c70902a70fcb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfa94f9c52f3ddf72950b5b05f3ad672
SHA11dfd09f15d5f12c900e897a984d8838de22590c4
SHA256219fb30a99967d5e0aa01de53a1eb0f985a1bcab69657fee70082bdb8ba683e3
SHA51266adf0fa92907181e1b3b18de94eea6ca25d2e54f9a0814688dd77d4c67b22326903775d575b41be801b867d298fb135f163f0f489e1d65e0e69d61f5f8b9eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5859fce829efa3e550c058221badfcc81
SHA1b6b1319f75416c12a2de853fbd604c8b5970be7f
SHA256132d2a871fbc0bd9d5fad92a732291c92c1d8fc0523b04c8586238877e84568c
SHA51206895cbdf3f148e67256bee3a5b0116caa5a1051abb446aad064983edbc363f9182951ca2ccc140d549492dfac86535ac2f7b4915ff3324c03565be2a3b14048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586161ea4a475351c09c3e4f39133f21b
SHA1810654409d97598962b57b6d35d47c83d69ff227
SHA256813e5855321b0a4106c3067b2a343e6c9eac24c14f42f9d59fac5197af2181fd
SHA512dde2e1e419b7fd33567f476983b52ab5b37b11b90d92dc731a3831b45361f57569bbc7232e25c8924c5f56e474c3f3af64cfd70a7cf14788fa22003b0fa87c7c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b