Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 02:03
Static task
static1
Behavioral task
behavioral1
Sample
df4ae6fd45aff606525993b61cc3b64c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df4ae6fd45aff606525993b61cc3b64c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df4ae6fd45aff606525993b61cc3b64c_JaffaCakes118.html
-
Size
20KB
-
MD5
df4ae6fd45aff606525993b61cc3b64c
-
SHA1
5484b19f1c8a0ccaa1803c61ca212848a149bf65
-
SHA256
2f9040177dc1d843d284664ce24cc71e550b00c1e8f5148292dfc2f694caf44b
-
SHA512
81c0dde962f443ae937775af4a7ac25d05a2ce94b8b63ab3342dfe8780ca5d69034839dd52d95dedb898f992e1634d95c63ae98404add86bbc69116f93c7f20e
-
SSDEEP
384:jiRKcRAa5r9DIiINfVBD8cbtjQ3RTi5O5vEu5GEdd5WScfIk9xhep8zVc9bJK:jima5r9Dsgcm3Q5EddNOIk9ewqNK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f2785f4a06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{893EF9C1-723D-11EF-B2BA-D686196AC2C0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000d88174dfbbceb519adb79199cc628fe33a870f3c42dbac317fbfdcaafb22f63a000000000e8000000002000020000000aa8d6c77087c89b8b1e51707a1879d0b1a0d804f9b1a31ec729d46b71db43a98200000004baed68d8b44c9bc2d2cbab4a4bd16399bb399d3f049dd527a8a7ea1089748004000000087f9640fcf4d40111c7714e42b8d01ae2ea33ccbc95fbff060bd960e0356d431aa0d567f2aec11b220c881803756f0edb4e8dc2f0016ae6e662033429a227a44 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432441280" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000d64cb5064e29085b87bfeb85676755f2799f1d3fbeb85c95b78759eccb0ed6a3000000000e8000000002000020000000bc375ea934f8f793a2e48bd432850fdf2b1c705be21a00f1d3ffc61ef3b7342890000000ba13df7622ea92f275eaafa462a8db38aea722cf4c77bc8b48bbd01bfe89cb22f12d5a1e1c387269bdd616aa96f9bd7c737be1c327970f897bf4f37b2aa90c818c0d86f4248319c5c448dc57103b194e1038d2a66fe163d44f12e1fa74ebd275d548e14b525377a3b4a1a0992b3167815ef2bd72031520ac41acf0b82ea1d9fae71e656ff4ef18c6c9213126c230f86b40000000ff62dd64479520f2ed9982a80a0c8db0c705780dcbb11ef4c5367b74eba23bbcc3e3ebe546d38c73fcedc8bb3c851134a213ff2150ea752ee334290d4f2bda8d iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2536 2360 iexplore.exe 30 PID 2360 wrote to memory of 2536 2360 iexplore.exe 30 PID 2360 wrote to memory of 2536 2360 iexplore.exe 30 PID 2360 wrote to memory of 2536 2360 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df4ae6fd45aff606525993b61cc3b64c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cbe8dee23df65af21ed4bd5c7e555f1
SHA1209e69708583a3e394d28e6d3cdc90c9e898caac
SHA25626e00dad48d367dfa8865686b199375c4ded2a79c5f0353ede77caa81e18b28c
SHA512dd24ea0483011791980810001f6d930c75038ac926932c052dd2a6ea33672c82e73bcdd819a1dfd03fbb6a7201425591ed5b6bdcea21e040bf250b98d770e65a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb1b869a7743968f2fd1ce3621af1b09
SHA1ae9820bd2c7aa66284ea2e56d17aad9d44674dff
SHA2569b52b43c9fc8500c69a3b5d0daf2591c3fa170ac9b663a348b4baec6a19ee6cb
SHA5120865a5fca602a77d7c0729c0769ed92bba60e773af30e541b9055099d1363dcecec010786171a2353eae245404b383fa2e5d46b278081360b43b6619a1bad19d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bbec53c0096047e2810c773c13d4c68
SHA18f58a1a4fc4d8f8f1fcb077e7391c9938eb1baf4
SHA256259af0ae02609247a58cc672f31ed7c1a91a27de4cc6fb31bba6e8c036b45309
SHA5121d8685c0801d7f5f1b6ce1044844901b66f321ce9705bb16325accbf9f73e5e8cae6ac35769a6b1efb851e74ea504563c23865d1584f930f5abd84f462d27d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fb059c7ea976459bc7a035c0ba5162a
SHA1622293cfbed3dffd6558987c413b611af8990f46
SHA256fbe62c3237e2b5714ff56e3a6ae81659ed020a43d12e5c23d8f1da6f2b492f47
SHA512a958201db6e45818c5fdb42acdc94b3bc66d7ade62f626e8ce7257d6f95100e585be687d4abe00f63c08aa7450b1d53c0d17792048af80b57531b5848cd10263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5637838d31ab8a85de1c155e2ed89e044
SHA19bbdc42ad2cff9241ca2e7d3ff9964ab0b54e6ee
SHA256b9374b569c4b30970260cfe466a61237a3ba4878828babaf801c08240b7b9da9
SHA5125bff15be8a132d139ab298346c77765b8c6a4d1510bda1f7c83b1754a87a4868647d1eba8e9bbb85392c6fd3c4d3059e1ad7189377cbdc9362db3d4ee2733d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ebe30cfcd60481bef3f3c09e865bbc3
SHA1ff80ed05b2e866db62a2c6cf882cba73a609578c
SHA2565457919162067a16a872786ea936715e0ab16b313d83b6c30e3d13a0ea53662b
SHA512e8941eef5f944b280eca06b8389172b9fcb25fe022ea9b4024d6a5411c54a07316764e9638784324936d746ef5928b28b9d6ba68db9d85ab18b48e7b7dc7fd37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578225825b8882c172ff1c4648a6b018d
SHA150da6b48070acfbdf6f0a0134d91f45667ca1ee9
SHA2569034125334c965ee9808a6525b66f0c2653950f38291bb50318259c3fe0b03f8
SHA51253c203c19515843eb9f32a91fde355d5cfcd62f1a4d8db83dd41e8f6ac39de92ddcc91655a0ba1be0bb3cd8e23ba89a94b2205509621e6115ed1e7645857bf85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afacc73170374990e23fce75e350fd7e
SHA1c22b241f09de0341fe78c284bea427c500e1180e
SHA256bc7ebfcb884731969f6b3d50a47f9ce11b35736a7ccec855635466cbdf14f41f
SHA5125af89dd926b17b7e2171b4dac1ef9ddc3c6e0a06bd94a07743aa459c9413e2a5d22e45f9b98a7c527e33dc7606edce4dbb2c80ba7169b61af58f1311370c9f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526a65d4ca6544dc0ff1b6bb0d3e151df
SHA1c5bbc62a537b9ae6f5c45132e0979af70cddb17b
SHA2569beb66475b7d50018f9061b7c60502ce63b8d0e5e19590f017136fcb75476838
SHA5124fc91faefb460115fba5e6248210175130cc046a34956cf052ae0308bb106d3718c625dba2eab4fabd013bc9cb3781b9ee8f6b38544a71ad4bb59715078e79b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d464f22212bff8d37a478ced84d2e4eb
SHA1e6830348d7b729a5c552db10d8d1fcede851689e
SHA256695437a9bf20b4844d674f8dc6f3553771f1d34c4b340b10e19dc5107918e752
SHA512c6d68d924c87d2c8fe6f29c3b77a1d0426f64ed82dfa13d7021e9098462f05828d9c3b178eb7dfba763f3f9709f7a6a5a9ef8bd35ac42c11ed3bb6dd3e6eaa3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581831a0a1ec634faa906a684fc0783f2
SHA143f734368eade488dfc965da70ac875289a4afa1
SHA25698f97edb1df7e82fbbbf663d263727304295aa1bb82239230672d197cce03fbd
SHA51216543cf6db4a179f303a4a7b9a033b86cf478ec22441ac3d93b07e58b40e6081d37420a9e0c01f89c63f49d7a45723f5f61df32b79ec29f03c7c3e5fcd5b6cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc5732f1af2d4c7e409cece9220cdfd0
SHA1ea10515d879d7c63c5557c4e408565b7d219e8c8
SHA2563c79f2742b721e2ae2d87672994b44ee7f25e6c5422af6f16a8cba9faee14a3a
SHA5123d473642b6b53c1c62cbdaa863ed37aa7d11dd91136863b66d254e19eb243138cf99c480eab518fb5882dfbe4a602d9c3b1ced641d152102294730134518d041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5259715d61780bd761762d8ce3a2c4fbc
SHA1b93adc5e7748d2039fcb3727fe2c94808de0eb60
SHA256b3bd60a1a431c27bd27ceebee803d9657836ba3d7a52cd831f59a1515338949d
SHA512a19b0088f33279134e0a129c9a62b95b91e27c7ba312c61970889144448d7be40a5982bf5a5986a63544081a98ae05a0b26f495d2fb6062a59a573647f508cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566dd6bcff0e50b8fed5377647172b5ac
SHA1ce34d26d759615a072b7c182d21f606371d58712
SHA256202c397fa17be4bcff5ce301184c291caf19dcd9d0cbacdba38b7647344e2ca5
SHA51208ce0b0fc26c0d1a74f3da423220da6c65e0d2f25161b6a463e97aad0cca0a5e40e4405530d8e741d719608bd9bca01ede3be00606450c024d0335778ee3babe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566aeaa14a74fc6b8d938effd2b6e456a
SHA189c7d2b038822daecea41f8be5e629791a93dcea
SHA256cee67eeeea2449de45ea9b501d400e0f93aeea880f9d3d57c6502bdc61a17135
SHA512169e63c0a1a75ab73ad7ea6734cfba1262269d78f40ec6e3fddc8d5561e5a577cc1a96cbd0eee5f7000484df289c715e3c813e3db375c373f4b6eb18ebd1ccfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d5a021af85397d9c75f05d49499c763
SHA19a7d1dab3fa5a80ce397c1ad750f8738f1fe4720
SHA256704d85aeb4f7168dde57ffc0291b3909aab132633d29dee5dcf40bfc3636a123
SHA512572c90fa14ef75cb869bbe751884c36aaa0d0ea109e1f9e58a02b9fa02266a957de9a0c6affd493b2856b66520882bca13dfe41cba85a0979680e90d8b7171eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ee4953de1ab65f079dcb86b6e75b1c1
SHA142c2eff5ecb1fc10901c36e80b5277e4831f5b4d
SHA256dcebedd0255738d58aa2993086e29e7351496e8c9302fee43bfc14f7f6fea627
SHA512474f9fb4730e41f6a06019902ccc48ecbf3cd3a222cb16a885ba9fe1b4694679c087d849c272855eeb0037c95b706051c5194b727def9645dedf991ae8a5123b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec1f1c73a03861b2ae2719ea32c84b2
SHA105581dfecac84fe131474f39624298e742edb19e
SHA256c1b269158b37160c9577f254a986900fe522f909af35c4f6db0e3d50d9f64004
SHA512ae7ed72b90298b08723f02d66ca2ec9a67668e64744cef93d6ab9dc805a48e0e293df4de2b9fc229ceefa9ca6b8a51679352cbe4c7717529275cc5fe6f1345bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537d03984be68b46537ddbc165845f60f
SHA1f27a91fc937251f08461fada5ef7df395efa515c
SHA2561c9cd9494ced364c67ad4b5c7d50c3268b1242cd9194bdfd3644e858fd277bad
SHA512d3f1635f8b06150c544112b3fe20ffbb9eb3b94df6993983e3842d5e798e5b6655d812a3bee9a156e8f8445d8f25bc8a42e0d7831b01c74c553e966f8d962050
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b