Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
eac720685fbc660e0941ff09c74d2d1d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac720685fbc660e0941ff09c74d2d1d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac720685fbc660e0941ff09c74d2d1d_JaffaCakes118.html
-
Size
51KB
-
MD5
eac720685fbc660e0941ff09c74d2d1d
-
SHA1
df61c841fad96f8a8f1eef48760ddd010f64341e
-
SHA256
fed7cae16268921659323c2ab2ca22ce9f1e95c3380b1f5ef71667f39aedb37a
-
SHA512
ae2b31521e15cc6bca23d6768b01a344b5ff55ebb4d42d90826d66d6107b99957caed91037a3cf29658c2a5dc5760320be6ad7e020fae9705dbe69e99c7e9571
-
SSDEEP
384:iA6DiFaLXcYr6uNoJz13KJgDvVOm1nuNYaYo1/aMAYY6zAcS5dC:7pFazCMAYxArdC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000001b49cb435d2e2867914488d3d3c4054ec33fad3f0e71a833a0307477684adb90000000000e8000000002000020000000e07211fcf2a12c999a5518140840b71fcf9ff35b78b2a86d24e8c70e1ec82ac82000000051b44330fe4dedaad21f4c9ba63c253eb822dd0744356c0fe6a3dc7761020f5840000000c83e0e7dae0186f50cecc932f7d1ccd456f5a01bdf99dd4bd6519050279f83fb3b0e77377b6a3d382d9bd70ca2a31d258c634c07ea0bd01c5ac722f9a7748b46 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30013cf75e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000008e58906a74c88416af7a2c63afb29f6c48f7263ae562f2e459bab7ae5e337f7000000000e800000000200002000000074bc4ecf759cc4616811fab52b1d70b1915c576be3e724893ddc7234a5f3bbe5900000005ab9440cda899b06e4574bd7047640f678c95d2328778bd53e8bb23d1c786d0038cdfc7fa17f904f1f95b44cef5051b103ea0296b372c825eff9950f1e5472f0568cce64c64df3c312ace7b4b0652fedac1a4b6b69eb796a5dbc8cee24eff2c6d53a042ae95d08673c089cd9cb1aca9e136757d02814326cdc6db010ffc98db6d0e8c00809bf84dd91ea132922d6781240000000aafec65d887f642019efba118083ea6b329418ef43f2a5a07080c9539e080bb6ce48882b77a7cacdd4658d84b4f01a47e10baacb2eed3958b01c367451203792 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889928" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{22AABF51-7652-11EF-96BC-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2816 2220 iexplore.exe 30 PID 2220 wrote to memory of 2816 2220 iexplore.exe 30 PID 2220 wrote to memory of 2816 2220 iexplore.exe 30 PID 2220 wrote to memory of 2816 2220 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac720685fbc660e0941ff09c74d2d1d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7412d0755282696167361d2a044bb82
SHA198c72f780443ee211aa29be7a55f554b7a3fc739
SHA2569221232fa69a14c14d58ecd204298399957f9a39344dd5216b9dc2e9b3e958c2
SHA512813c875c2bf6c52a1a5d51136e61120e4d164af0470b994d5b23a5ab300e72840aba1bf393139a8057b9af0e7b4ad1775c0b4132f0983845ee1324536e670174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50016f82a09ed7f5b6fbdafe566eab2e9
SHA1dfe12dd97aa6da5ff6bfd39032d6b5bd60e892df
SHA2562c2dd63440698a608ca1eba564ae834f9392ff2d88346ee0da0ed132f3c83ae3
SHA512e7367700335adec94277763f0d0a0d443cc21afb9ddfa6db782c8e9d1fcab7ef1c62273a6ef3b2ee7e98f82c8ec919d08446db3907c48cbbf978153b02260db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d61bd5e4af4c2e1c98bc6923fb16889
SHA1eed17fd931b4f074a24299b7aeda2f04ba077e76
SHA256c7673c6a9b938c38539a8609446f5eb6072014d8a7148c49ee7f52eba1c9020e
SHA5126ccccf529986d1182ca0da0b20ec44eb9af8c4a4150935844298780c5b952bcec35e00524a8b153407471381579554c2fe2a54bd9df65b02be8cc67224ec3805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f7d73feb2f71a3a7105221796aaa0b5
SHA111fabcc6b742eb965705a06786aa66ab799cba11
SHA256ea435e8d032c42521bed02c729ecd69e0110b31344b4f354c31771c8cd595307
SHA512189bf60976df27475e083c5b3d708abc87a4d7f978cb85eb72c33d83f188914aaec5654c152b970446473466ae1a6524a36af073a5c418d9f27e16a77f9253ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dd7273746c86d9154c32416aea29de8
SHA16fb136b6ee1ef04cf2f6a8d2937653b817ae015b
SHA2569b724c4e1bd1760b398a452be54eab6bf3c0a2aef6c29f46162b41ad2170ed71
SHA5126ff13b8bc969b7573df426988a478cbe581e5d6a5f694b872a7e118cf250fc890d443101fb9678790353e6406fc295f8dd47cd902a90d14a05e25ea28fb07796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d6c65f958a0612c601d2952a4d25ceb
SHA109f36a4eac344432c79a24583e49da2462ff7457
SHA256443b81e8e01736465ff54089972e26b7aa66a19876e7fbb52c8f31e7cce5e7a6
SHA512179d005c2072a7e3a4b491f3a5785afb9110e5e397bcd7a928ab26cf6e3aeb455e2306cc3e12cd250a5352a17de25e138fcefc47cf55143ab052d10d9daa247f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f239e0fbd17899d2ff1b916e665777c
SHA11366c21ef509ad46dc576d55b85714deb169c882
SHA256ef6b2342de6018a6d4d3c69185ca6db8f2df899081df0032860c11f28ea55802
SHA512f5bb8d188a8fb705bba3923c5b0c96a075e0e538199a14e2d0081e21c50d8afb2188cc027be3d2312344c306a53c2d0b234c031ad27b2ec23b74d05e28fd0f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155462a5d543d131753c70110387e89e
SHA18e9f636e62c2738bbf4772948c0c653ddc756ed9
SHA256079d7c720eeb01e7a68cd5c60c84e62ad7a224b1e3a589fa5a8fc45614439851
SHA512a310dfa77a5ec2798026ee5617b5371544b53017f251e0f9a6cf4be10fc74015bf11b3866c1e8b29018d4fa82bef61cb0f19a4dc807170df5bd1dc875872445d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d13d1879a97517f63a19efdb7143d9c
SHA18da47c96a069f9e02f03f3eb628c66e9c2737310
SHA256f62b748595dacceda4f0fec61376742e8c552505b34c7dea1ec198daf33782bf
SHA5129797a17f8cb3c0819fb797f23592cdeca70030e642af0f19fccb10bcb5fa21979eb44afe9b563cc97b917deac4aabcfa0a2ff9e4d41aafc4bed40a158c0f64e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53df4f488e490d6248e5b01a3b2ac10eb
SHA14cafda34c88ecf081246b4717d8167e4cd7c513b
SHA2562c6c1c2ee14942a79b88909082ccf9c6cfb5f7aa5a272408df9387dfc9b82cad
SHA5123a0120d93d5d3ddc25e020c84f0f5dce9f647ce5eb584caa426ade66b7a74bd5603749b7b000bff3dc73fd5fb773763fd5c35df592f07d3d8f907971aea293d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5122ead31bee66ddc6f2b24fe5b86b841
SHA12c0d5834314808fffaa39b30682b7eb456651117
SHA256b5fce5cda2e448eaa3dda117a144d5a0ccba972fe1f0c0c85c4ba723331de8e3
SHA512d8721d0198d921d66ba385e149d70ec6a538dcaf9c557c0c6ba4ea62eab09da0ed0c126ff8c05894ee2993a1d6815d3941a1fda25f28db65f03f5f675d3b45d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523234955e4ca6eb74e70f2168ffce29c
SHA122162c83f700c767191b275e5c8839f7cc8ef33e
SHA2566396f5ba4f36acf6da67eb66cad7e4dc54c488452b49f70a7300cee577500911
SHA512c391cf09d859d012b6dcdc72186e0f7956ce70a4216ff835859d39aa4bed9ebdeaa47a352c552e33bf861c0c76241b54a24082f642d505c6a126742c52539d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c76c413187b9b8a53223c548e58cd9
SHA1c673547dbaea382c738731229ab73da69da084c3
SHA25643685d765f5a93ad89ea71e839018a970b7cfdb3e672fcb4656de3ecf491538c
SHA51217ad1d38b3587f01b69de01532ea3c230140b57c1e09cbfc3d5eed374edc84baad6ae4ebe723a55ebca5c71548767fda530164054e1e57654d3cf20f64ef1f27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf1423259fff5e8083274e916f1dbefe
SHA135e120970caa619ba5feb5e28a9537d0db715dd2
SHA256ecd757526058a65923e2e1acccf00cfbf9c2ed8beb6bc2ab06e6255fc6fec656
SHA512584970b1135a88ba8c938ab4ac25ae5401014a4612444a9d403c3826e1e1b4e41f219f96c12b23357f52fef09a1751f177c7c8e2618e48241cf5112650b1bf96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae1be29b979de35c3f12588348ce9fa5
SHA1ff2d8a0b016dbf4191efa8201c2bb422453cdc1e
SHA2560c621c507133a3aa9c92b33ebf7897d25dec8ff0eb743c1f02ce6e03af083679
SHA512735ee44a635bcb6e4f9f0ec1a9e6bc01fea556edf9460f07d142be58367f66a24d306aff591663ecccc0e0c39e6313613d2c994a6508c1fd8ade31b81adf2be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b52a11ad7fcd9cab26a8e60447823985
SHA175e0206ecbb052efa5d140572b56aece7f479b73
SHA2563d991295cfac13720b6589a96e1da0e3d4b9fa87d6802a91a16cb4e2d3220f3b
SHA51252034d8f5e63dcb2403b7c68939af67b79965afbdb153c794271476b63c85742d4dea5d86dfffdd3c549caa62f0e32e71085e9836efeb6f03ab8d33db4e161b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b8660ea563c337b4b6915c7329b8475
SHA1c5fbdc828c176d221b14c0ec0ca0873e76632a7a
SHA256ed274228588ba5be8ab6b6d49e88a4fdf2e58ca0d8265226dfc26ea9e2e1c8a5
SHA512696e8ccf448b8cb50e422f3087f994e0b865e9d68272222ba6a2c343e11bcd1905dc13bfd4b71b663d8dd4450a84ac6e6ffd4015f995ffb5c369e5d6f428e0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df40d2b1c5209a7f26c00d064416be0
SHA1aca32135fcf1d746160e34ae0f9ec5083e3beab1
SHA2566ee0da1de5ab9493bf4329d47cf95091455f2edd662a7ba993f9f8980553f5d2
SHA5124f9a965c1c6c06df7bbdec94b9d7dd6e2ba0b085f7c3f8a4567f5ed15f65b5267bacfe3e5a9700b5f5b7495280be19a583de9bdd7b18da6e8e571055c411a9db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543d25e71ba8e394f375cb31c221d042
SHA138c5ea17b97870c9b481e3eb5d231c8999f41718
SHA2562058694d89fd443240aea29b0c072b518947cf0df0901373e956ed3f68f71b15
SHA512cde5e1148bc5c62f6662a0db39a287add4b31903dd4004b15dabca3edfebbc0cee84fa19581f84bf839f7c709c043326065d0710b73e4818a0b89ee8e37c0f3d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b