Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
dccd66cb93d07c9f3f1e611faf0d6184_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dccd66cb93d07c9f3f1e611faf0d6184_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dccd66cb93d07c9f3f1e611faf0d6184_JaffaCakes118.html
-
Size
235KB
-
MD5
dccd66cb93d07c9f3f1e611faf0d6184
-
SHA1
6d1e6c24262d17aa12b167da1aaea0a6363fc0ad
-
SHA256
c56e2592117d7f0a1039c8ce890a876f433ccab05c1c598e2ef03dcb491bb17b
-
SHA512
be9f94579f9680c672b294f3eead27c3cd006b7fd1975a76adc6fc6110d5abeae0dd74360670434050b9e1db3c4eca85f8ffae3dee0a68da788f6a9ff447c7cf
-
SSDEEP
3072:SorhB9CyHxX7Be7iAvtLPbAwuBNKifXTJM:Swz9VxLY7iAVLTBQJlM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000939223e3d190004b7b63430eb5f2a292d3953b6db814ac992eb290afe3681dde000000000e800000000200002000000063ff97f49bb2fe4354f79f855dba846f52d34f1ea6dc6e8c62bdd4ed38cb1dd1200000001e4dd9c1884bed9b7fdc896368e750e8d843b47e70ef14e08f5d9035d58dfe58400000006e0727eeb25ccf14549d41cf914f64f1cd283d7e19a5350839d73cf69529d840de6f2bc559b5297d447f8f915319e99c4cbe922446ea449fec17f6e47c04d61a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{596155E1-7134-11EF-97FC-EA7747D117E6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705e3f474105db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432327380" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000001ad2a4b272d11b43ec9a50ef09ad6338eedb452546ee96125983871b087e7dda000000000e80000000020000200000003790fe5240036012f59e9dde185a09c27de3a2a38666e75a7a65a9c83a6c18ca900000007a8e370292449810f92c01e458752161e2f5e207abccab3396fdf2e4980356d170f7feb1a485c71d387c5c60fff620ada1cf602a9a43c0fdc8facf0145320e65f4dcbf2687fb0fa737efb9b58da07f86d5b2a6a89a531c1fb1f4a762af652d6b735bd5755d0013f6fb23ff7f13f912cfce55f432ed0d49d360ac7d7e696bd5b1004f2b083098655a0476f6795904777c40000000769e5349a0fd6be1be9a69113a96ca9b0ac195716bea6a21168033bf5e21aa87a17ed2247180b4c61b9e48f310214bcf8e5a10c77be4dc373ee90aec32204537 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2696 3052 iexplore.exe 31 PID 3052 wrote to memory of 2696 3052 iexplore.exe 31 PID 3052 wrote to memory of 2696 3052 iexplore.exe 31 PID 3052 wrote to memory of 2696 3052 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dccd66cb93d07c9f3f1e611faf0d6184_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b98987532b2b1608d8e1c820ce8edab
SHA1afb46d14f26ed5e4d189b3fc6cd541b724b39e5c
SHA256af9a200cfb4746a5f9f4b5b0fe5b4d61b191c7ec7053b14434d85c0330b4a801
SHA5127eea35ddec8cc9ca4933322f1b4c5e8d47c009912acb451a028875b4db81ec5de2b234f6442ef664cd27f12919820f7473f2a457c6aa9736c45b83d5b2b9b33e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5410f76afbc23664465a77326879402ab
SHA1366e54304f4b388d95d7711c97f9298c4ec5722e
SHA25678cb50e796c767bd278e272b0d0c72fa081450b92be71179880460c7d5662d69
SHA5126efefd74134f3d6092e2dde0ee7fdbd3f808eff70df48725c9d46b9d71af334e086b567702b852aa21c867fa7c5b2db09c8d0428bde22018f0d97fa582df7aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e98a4f85040d6f1d7d99ae3614f268
SHA110270f34d9ae29c3c81696f7e360700dc621b544
SHA25647ab2ea227585f13f5fdf4be9e5e785d7b300cce5fca73fe31c49551472022fa
SHA512684d89e6b9c7c82711d5a2afa99972684652ffaf2d0b9b93c19d3c52c825cdbc7ad64509755ad92c6079b37c6bf29c9fc3ab3a37062b666e7e3290981763680a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b14d801ed7ce9aeb63fb03f3a941608
SHA18265ac1152bfd4417f0def7784588bbf703c0c33
SHA256e96f19f2107a652afa70bde0d2f424483b0d2f83b6068e43d2d4dea938e5c48e
SHA512d1817c6e28fc11197cc55ad57873c14c36474bf0a8438386e2f85b2fe7fc718a23f536c62afa04671b224390bf2439ac1c347a2ff689ef5b470b88b365dd7a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5451c3966a84fdc76e9d0f9c5e75ce
SHA165f00fd8921273bbbbcc16cd5e8ce895ca394a0a
SHA256c10a9776a45d5680308c81512644972d3d0ef8360426f745d1787962167a70bd
SHA5123bcae09e99ee0bffa233207fa23f64810433f50f819acdd96b7061e9326646d97728c9460dd0190685f5cc6c56c98838151931e1b4c9d87ad6b2c73c98d8b49f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5561d321e574e9da49475485addbcf2e0
SHA1e40497bc4b036726d258d4fa11f44f6edc330bc3
SHA2563c8e2069bed133c3491aa8bd7a29d1f9308318e2285f2463e49281568e905dc0
SHA51252432029a91840c310fe437fe6d923efea0885d45fecf6d134732120f06b3cf8d014cc76dde896922d4537c5874983b1b80e9dc6d14a6f077300a074056745d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57273c5615fd33f973137114b23730e1f
SHA192ad60be56b6e90ede6dc664834ccb7ad445fd27
SHA2565d3f455defe5e1a043dc4ea61cbb102cdc45b756dd459a88542dafeee99ff252
SHA5126642f03e1e6a4e4bd1350af40bf49924f3948dabb499ae5362e1a33a95d1f5b257159cb0a0a72a142a378d908647b52a7bb10fd81b6b4a493e3b4abb74ef3184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506f18507ff900e5478c0dcd00e1bed3b
SHA1de99db0d229c1eea6a903f0d970dac2b6ee64590
SHA2568cc5ed525c43e621d5ea9a001143e963ec73dbc95ac9a54650f24975639f7f7a
SHA512688e271e8c493c388493d6eb2f202d4c921f44bc6889233bf87f695b059a3013d004011f73da3bbd4a8a53319e5f2db084e5b2fca086d4e3bf19f33c288ccbca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576cba31d0205cd0ac47b1f69c3852a03
SHA1e541a47ab72846074aca28a2ee3338db92bc074d
SHA256dfe1c52f41ead1c41fb31642ef09355075ee8d7d5d1192be9824049254307c51
SHA5123c98693558a3d5bc202dfb7318203e7fc82df083590a42fd0b9d232bb87b6f0b19fcf3e56ce410cf3563840dc7325999724b88033b9a77e7bbd881b52fc3c79f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552615caf29cc690122a3a45ae23f34a8
SHA17a2456749cc0577957b9fbdb67ee5f4c1fc660e4
SHA256a60ca688570d7a9a850d71496a604f3b99486398ebdf11b86e781efa631529b1
SHA512a3eec162d7f9c2240671a1fcd3d3bd79cc842c9eadb57955cd522936650e65bedf0f4e00feaff1d7141692698bb2710392d8c8a13443610a85f44b7015d5ccb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc211fe555db6dcb716dbb1ab008e396
SHA1f1857151bb607ceaf757bb56e7d505e0f5528250
SHA256c65b899d899637e0fc0a4ba77ae173cdba2f0d28716dfc7eea4f8736f6b606e4
SHA512f872724a41a369bc7df3a24d45ee13a3bcf0d99757145cc29d555e128600a0ebfea8460f1382e28b8eb255e9031d7a62df6e30ec2194a9d282e044b8043b08a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdf3b26e8a5210fb07c922c4dca28ac6
SHA1a326eaeda8c0eff9e93c961b47b67fc80493b41c
SHA256bbb29b72ed4fbd4ab07eafc8f9041bdf7f9095dffbe7795cbd6953523d0e09b3
SHA512a2e84000645d75f898817819ddd26173129028ae1f669a8c5afade5d367bdb37a5a03c2c5ebe2bdcb0ff40f73e0b3509919f7f269d5c86fe8b80355b3670a1ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d9d93b48f8c05fb96193731283ab582
SHA1d721fc1bd17b6236bac7787595c451d95640adf8
SHA256e308236320fbfd2002b60e9461a6c5282fd81bb3d3a7462d8ef174ff513b2ca2
SHA51285a484ca57fad9d3cf450262d825cf137b3d2770cfc18a1df0c0421b857be939e95b00b806a19a4e2c530332fc98650ee8a04ca9f3492b95dec1ec19444605dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571c5a8bb135e79347dac516a5c5d2e37
SHA19cf46c476726682448a7e334d823c5bb332e6a9c
SHA256445b8a2f65fa1f8c6e86f5883670722bcd3017eb0b72d1bf53d03016cdb034f8
SHA5129cd72141e5d56ca1b342e710c4e60b2075c81f02594c05c8b5ff3eef69cba9cf79ebac65052d7333bf686afecbc2423ae9dd67a6c4798834cd793c7e154202df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5330c7d2dc383bcc7f56eb792a8ccaf23
SHA119a7717b1ebc8c8b1017672b39057ef50c58d224
SHA25625c9dc798cd2c9c1d4ecf67f037b73ed6b0944072d18faf6ac4601d58889ec1b
SHA5123ae059db15112e3561aa7a2ec944df98ad6da4d270219a0d384db34ec8a87bd32765fcfafdfb41469d476c7ffee8e682ccb1b9afdc416c9750509b264f92b678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b810f86a752609947a524d5eaedd6ab4
SHA1881ec0ba789b625c6f3d632033c32ae21e4bd2a0
SHA256fad0bddda21afd4a1775555089442011760d112411441c6827ed87d2ec8f3cef
SHA512ee377cecd821901721d12b36b8ef5d0b5db30aaba0772fb1b97fc4ba0f308b06fd098b940397670cf17550c3c435188c14b3a9181a8d5654175b91674d889380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532ec07ae7cc61e35b3f9c0d505a561ab
SHA1e21e813403b5d69e8fce448a536209f550cef884
SHA256dbfbe3573ebec76bd280eb89ebbab3a0be40466b0ee2f5ba74fb8c82bf64b8d2
SHA5127667f1586f36add112ebb04ba109f9e14319a74448ef36bcfdca19b2bbeb95b26275ce7623b8fb9319e856379a918ea38c7f231ac82a54ea008a760d5ff8103a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ac704f3ecaae6fed7a3d55cf5c79d26
SHA1142356ddaf05831f98ec9b84ce1ff68e218ed8ba
SHA2564373ca1b1cf2ce3b2474a4971d52d476d4b5206a4f2bd78126033bd92e1e71a9
SHA51299f4c8ba18a24ec4b553a3ffb4bb6e13a69bc818ece49a3f7e5345c45d21f7de61b59875018f5911623c0d15716aa8e1403f75e1e116c91abf7e56c4fe168c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e06c3608340df72ae0701d3a9233b4e
SHA1abb9af2169e65509c29f38770c6a3abd62d99fdc
SHA2561defffafec76108754d69d157a6bcf9ffbecba2ca0e5166990cb9db8d941f36f
SHA512e1ce897a111fff848c0507a2b015f6cbba766d54df800e5dedb0fbe06f4c94125168edb454a6840213b9bd3c910afb85756a4f09c544433453934dc2eb3a2e21
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b