Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
ead22849e5191568eb1902d8e141e65e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ead22849e5191568eb1902d8e141e65e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ead22849e5191568eb1902d8e141e65e_JaffaCakes118.html
-
Size
32KB
-
MD5
ead22849e5191568eb1902d8e141e65e
-
SHA1
552d3cc523fba7dae7b2ef46b15e636843e12e0e
-
SHA256
c76494a32cdc17dbcb00314d23e089b5896fb55941f1683280e4141cb0f95c32
-
SHA512
26cf9102bc76d468714c24b1989d77890a9e5655f7edb4cc610821e7326c1b5e053d1e9739ba58f04f2f4f102b5f2d6a02c8cc33714d7086a14583a46adf6bc2
-
SSDEEP
192:uWfhb5nARnQjxn5Q/PnQie2Nn8nQOkEnttNnQTbn5nQ4MCXA7YLWPY6NJoky9t/X:7Q/txL6P9NQt3jOOR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000004529fc8fda32e3db1e1e7e4b6238e485c3f2500f62bcd34a8ed61ff130666d15000000000e8000000002000020000000a2defa853a7d524d08f4687684545e964231822d0360c6bf65fb6aad9d38b66220000000d087927789eeddddca1c049a7bbc0b5ee88e5a609fabbe9c5e935b36cabe6b6f40000000264eae7384825d3cdb02d58706c54e6c26216e497ee871da26f80c8b9bb2e7ed3407741ecee41b09e56d83f93543557b70f6f495d43ac312009446d5e83f72b8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{192653F1-7656-11EF-9C49-4E0B11BE40FD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00370ef620adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432891631" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1692 iexplore.exe 1692 iexplore.exe 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1692 wrote to memory of 1620 1692 iexplore.exe 30 PID 1692 wrote to memory of 1620 1692 iexplore.exe 30 PID 1692 wrote to memory of 1620 1692 iexplore.exe 30 PID 1692 wrote to memory of 1620 1692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ead22849e5191568eb1902d8e141e65e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a0a4639afbf3274f9995229731bdd28
SHA185d522472fdc06d61867b2dd14969366f4e390dd
SHA2562b6c897a6225e03dd573393991d8b170f1a4c79d7676ce39f47be3886456b4fe
SHA512e0a4ee65e01b555eeb9471b9dad0ce159a7b38d9002b45c47bc983040d0b623b59994003a4949c789034b48f05ce93a44aa7d3e8a63f57c940f659f63ef2ad17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523a08dd3629f7f65546b775055b1843d
SHA18abb6aedd96bb540a8247f4e67ace91b800ba5e8
SHA256820b5b301ded52a03b2801493d8cdd42a80e8213f6e3797b73e3bf8df91404a7
SHA512796cd4dd9137b30629cf3e6ae95d7e2246869cd8ee8865f641b9d5a60c8ff4e5533675e374227f4ad791305229d5fc2d1bae73e818e7f3f8e727bdb142cebcb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50565f9677f5a6a3b31c7982d966d854b
SHA121572677c836d9789ae2bbced9916e7dd9b46054
SHA2561b6071507778106c35053a125a586114bace8c634e24384af9b3b3aac83a43ed
SHA512f96138bd9a686cd7b65558b3f3e65094be8094544d7563b2e16be354b59cba7d4b3afa87c01f9e2b6f075a45e5ada7a826249a3c752d4abfb46bde786a19520b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c3db8b948c5cef36d914dea5590db8a
SHA13c3d98affa2d2ba74d8bd33610ce906eadfd492f
SHA256f3a47b9e956ebc95413384a4f892856df219933100d21188e459e6ae1e4827f2
SHA5125e3b14c8e286f83170f8f826f5f0191a5a58a64051dd8a1963455c9c1944221ef8775d1a5d22a05c8059267e106ef99c4baaa3a305c2ab705d655841335e45f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55889722c667493eecc3bccbca361fd7e
SHA19981cf52e2c07bde5ca7d4d813945cc9dd12d12f
SHA2567235ecb6d064a62cdae7af98e51c1efd061b173424aec0073155947e4f0c7a61
SHA512fc89b3b0b9d8b2e3aa8470139c9648f84cf6d28ebae1491763a44e9aa32a316ff90e80cdbaf72ea9b8c408f1e5cdaa418e2f65152bfa7f12ab6897948ba3c531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f55c66503cf3f206bb494e5ef2d2f5e
SHA1aa5e5bdd3bd33ad5bd7677a45bfd65a8dee7f9ab
SHA256c306762518ab153a352be02bde2f0b9c72fb85bfc8b08ababba554581221d2cf
SHA512bfb78131295de48ac233242fe5f1476fac06ad73035baeaea80acd7592ef9899e264eec56a9fc47f3bc455b97c4a675eb7a02974bbe01663c6802701484abf2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5826859d0d349c493067d11b933cd6a00
SHA15e6464b41657e3c438b71a7da6cd6310976e6262
SHA256bd699ff6b38976847f9746ea3ea541b66846fc393273bc23720d0936d803f134
SHA5129723755e3e647cc53fafc776d9deffc4c9b0361940f598cecb411bfbe7cd256f1997e89e3b6323c1593f2ffe8282749377a08299192759055dedf83ab2d184cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548914026dc506b97d02bc416ce6f0194
SHA1c2165c2a3095f82399ab38916ac18a467a0e1807
SHA2568b10f45f68ca4a8a19e396893d3e0c3750ec7a2a765db561b8f2791ae49b2929
SHA5125172f4853dc15c8eb5a0993b35ccf4a2e5b8b135463a301d45f1237bb6cbf06e052a0beceeef87d734b3c3a8d8abc169cea4aacfc9fde0bdbd40f2a35dc53235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cb62ed00ce4c79e00b297253fe84787
SHA11cfd2323c89e2f657f52333f194c5a877a5aacfd
SHA256a27846ca68166046ac0104748daad8a403e58b23fa55a710efa1266120b2cfc7
SHA512dbdcc18907ef1ebaee37218daf8a64913b153bf61ee38753ff374e41703fd6a01af660b9ea94dabee1f92e2ab8f5de43771d694d34ad05c374f142fb45d22c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be264384c00ed1cc47b8a7dec638285c
SHA16376cf1f67178800445fddcbc18836dda38e3be2
SHA256ffb05831f2953ae3e46a3ee5b95a691572a9296a3d8a231f15b99848e267f763
SHA512363598ea1be37c9c60d203f124a7e1881735d923f69a6d698ffbd28d634cc38a20e2208942fd9ec7fa1bfe3d7eeb3b28a554b3a9ae7bb07bb8cc783fbb6b3a84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550893a7feacbe56a417b4a04569c6888
SHA1ccffa3be94500fe372c5ce060ac5f5f3d17c30c2
SHA256d42dfcba354f974c5a711a817c9195a90b55c770bf3c758d0faaeb9e2fb151eb
SHA512be4a7394ed40140c05b77d83ce190c24d4f0f86bfdb4bc8339153f5ef3b13c309279bb9202bcf34f7d1ebd8850f3b112ec4943437e50481fc542080ab9d3084e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a13dd2b5910dc582d696c86358900dd7
SHA1e0f656914bae649bccb2385457d0fe1fa5dbd38e
SHA256f45131293cea29f030ab6399320aab9476320284bd26eda89f1c24bed381307d
SHA512928f663e6a22b2e9d50f2bb5d5fe9f800aba725d76bb4dd431ce4a0ed176c7756e5d7486eea1d7a9ac3f565d68bc1f9983b7303f04956dc95d14c6c664c3fbe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b85dc4aa123e9c478c37dee76943435
SHA1018e2d32cf69050aa32ff99c8613ecccac236ec6
SHA256b6b85bc54543324e021483b2a97f66c4862383194c858b7e931b1262697ee659
SHA5125eb1a1bd0d95f0e9c5e45c82ce1b64984d329fb6bb38a474db694e46c2c6f66fa7412ec2cd52084028235dbf318e2cde40d0cd703c9dcd87479dd8276375d667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a20f976c966afd2db38598440430c038
SHA13f2d471e2e9d4f5ab8720d858352fa3bb82e323b
SHA25642f36a6a0db7c18d36879a723bfd862c6077d0eb2d436d8a54f5f8759a611fd1
SHA51243e0465f00376c4013e47bcf410584e139929b14d6454d0429809fd24f2cac276c22563f06eff6def2875865ff5e65604ad96a2db1a999c269ded2cb71f5a6da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534641f5b4673016c294c5d3c789b0b3f
SHA11894c96378041ab08c47e08dfa596a504877bac3
SHA2567b022843f7a920e0b380df5d8f5fc6efd077b9b5c713c358dc1e5122575a53e8
SHA512550c5faa9f7ccceec3c8f0b7ca8ad3ddc2db692d6fc4cef1be35c9830c6c5c3d65834a96d2e9a00309f2974c34fdb17d61d74ab59930741d4ae3ea80add81419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59729abf942e1596d57e09750c1bcaaad
SHA10a12544aed814102e262899cf69d3676f831dbe2
SHA256b7ce9ab0432a4b230c656a61390ea9a1a63142f88690526bfec87e8ff30644dd
SHA512da06e98a8f5b1baf07821edfef875b916db5d2650b059d026ab20910048afdef03f29d06f139ea43f7affe61e31c095abd91cc7775604755fcabe86d4b9097b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e03e4190ec7802c9115a7a21c567aba0
SHA14e688875573ebb129fcb34dff73e8a904236fb36
SHA2561be969c43aff2d6aa818c1fcc07672255a7785c8680bb8a1648bd98e08b97dee
SHA512c970001782c1ec2774f19265d533b9a7a8f486141ffd2f3925e0d4a98103c03a085905d7359f1ee5a2c8b0323daf3c7c0e7f31d0503099eb5130c7bda7f2eea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b3ade091766942d7f09f399675fe7ef
SHA13c44c5a4a33ce4018903a9da15b87bceb7ee7f19
SHA256dfa094a033729f6539d2e6c1fe28ca33ae842c8ed802aab526865da9fb184e84
SHA5121e0798b9f3e2c8bc9727bdd4bb7e7335faa023816b5f81e0feb95ec37129643b01680c7d42281e2635e3346e9e2276041f1493b4c2872c628d7977e340378251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f04f5f5a8fdb46201b4b1b9783e24c
SHA1a893ecd4e82ac8ad5359421150e3cab0ca63de44
SHA256c03fc64f5b304e0341fe4ef326d4fb24dc8adff38bc4e0383a6ff15e34cbb14f
SHA512d031c66e1fe3cec57402a4db14aefd82917804bbbfd288545e19e58f8010ceade1389f5167eb3c1f3a35fe5a7e8a80bb7ef489d141f0d1fee4ea3663ea5a12a1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b