Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
f5313696a04da17a459634cb0f99d1ad_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5313696a04da17a459634cb0f99d1ad_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5313696a04da17a459634cb0f99d1ad_JaffaCakes118.html
-
Size
26KB
-
MD5
f5313696a04da17a459634cb0f99d1ad
-
SHA1
ef8e9da453d77fef4cdc1c769538234738e6756b
-
SHA256
d71680b21a69c0c253d6f7e5fd9dce5c00fdc54a98d64302b5f1e5d664ee88a8
-
SHA512
0ac077d25dd7a2ff9261ebcf9c02dfd1db8bd43138d73a5c5a9132de10fef56bb4a22919d4b4c33b6a1393c1891534214fac075edf7b9a23e52f9eecdbf9fcf5
-
SSDEEP
192:uqaz7Mb5numnQjxn5Q/xnQieUNnZnQOkEntXjnQTbnRnQ+CJVevo7NtTFo+NzQ4d:nkQ/wygcoK+q
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433400638" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{398DCD81-7AF7-11EF-B909-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30aabc0f040fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000d065c90c0995d876b2471caa0861bf96bae587c25475d8c125d43f338b502c35000000000e8000000002000020000000033df0cacbeaf5336ebd446c1a9da8a1945f2a2403a07f2fbd56bb93d501b2ec2000000000954b935fe6400887bb2405e77321435f1ade520db3a0f2e5fc2f0b32c03f194000000065284ddc7b28abc4461c0f157a5f39e7463698302243131a835834cabd905b6922fb8efa519c2a1bb2efad61e75437cbd3f3e0f99cb328b548033f7341bef619 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2352 2096 iexplore.exe 30 PID 2096 wrote to memory of 2352 2096 iexplore.exe 30 PID 2096 wrote to memory of 2352 2096 iexplore.exe 30 PID 2096 wrote to memory of 2352 2096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5313696a04da17a459634cb0f99d1ad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a338b3829b8a155ea55c19586aa5257
SHA1acbb908e441854f97de6aa7f027dd453c2720fa0
SHA256ff4135dde0605389dbdbd2c5133a2a92fd6e398212a6bf6e3805589258c08383
SHA5129fb4defadf8f48d1d292e1a1a93581ef07c6e02696468304e22aca4f9601db3d58b2e6bbc41e483712e1bf192ee385f95b2d85b6a6930e9c50dd0b53748cb451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a07a8cf4155331d6b65c4dfc3d734217
SHA19e0a6a1180bcd43055e30091178a324b0b6389ae
SHA256229a80f4d0ae64331ce504474d7814817785ab624da8e3c5fc044911afa4101d
SHA5128826708cb7d7d3527cfa3f2ed5763d151888b9263ad548fcccb57d9f9693608da486bc257244264690b71283ae4dba7727162ca77073dc914f7bcc72ffabd170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d657f6da69dcbc479206dc34cefd9a04
SHA1132971d51e41937978527b190d7c47a5788e963a
SHA256692dd5c2e9c530085d96434882313e7a19355f8213d31e0c778f8d720dddf835
SHA5127c8d99fd084f758e8fbabc9864cdf61c192d994918d8f39d780f7988a282e454faaba96179cec4fb8f6be0c9eb67a2126d9a01537d8381e84088171c6cf8c730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574dd5e77205edf4935293b821c015927
SHA11aa010b365664c12047795995b7d480890ba0567
SHA256c2cef224fe30d603f281f1c6421976452c48c7999b3d1469f020da5a7150ce8a
SHA512f9f2be3ed932002af05693b4a329163a857e04a4397131a66ed2cde34982d0fd8f9789ff66466dd0b367ff8d639aeb11b1cc8b2d578e5d4593910743ba921a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fcf33baa927d0cd63703d61d61d6a34
SHA123c64a01d8581642c043401790d277351ef0d66a
SHA2568fd47f19d5ba869dc58f68b53eb1b42c13540fa4ac3f31aad7c850db9a883b8f
SHA5120fcbc1e8cc04bb3734033a0cb562d718aad2de9e06627c4d99bfe04bfed0b8aa145408ad7531e83915bd9fb51ebeaeb8243342f8075b895606b080e32e98ad63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545b02e01dd2405e3763e77204700d139
SHA1873aab62daa2a7926f8fff0dad3b1b598e26a75c
SHA2562347714c5a8bf7b4ee771c94c70a1f70036c7590ce26bc00f25bd7cdff72d2e8
SHA51263744225bccee87cb8f2f482a38a6e17024c215bb4f33893d1a7dbc825e0ecec406dad3a904eab0e1652d7868c6cee0396f1d4456452776a57b17048b2696870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57935039625e7d6397f5e2a16bbddd48d
SHA1c8debd211813135f0a49d73ac195de3134785675
SHA256788348ee6c7ae3f9729bd6755485e5ae770df6b4403afc3d248ed69c2d6f5025
SHA51214a305b1575f0f42590c940445f2c8cf44fdcbedb9a8d6c7342eecba06bac595f32b2b368a0c580e3e42eac4c214fd719d10d96c39a8760dcbf97874c0ba43c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b42cc6233eee2362e082bd1b444923
SHA1f05a1e6d0afec47aa81a8368d100ed14b6651db3
SHA25622965975a73dc15fd280d7755bea86fc3e2d69ce092f9815d3a895e86c9380d4
SHA5120d1376455eba558b8b6a34735e90e555570d5f92a7d316cceaf6b014aa03d7147d45e9d4bf09f12e6db152073e4bf8a0fdeb06600b993fbb40dc0c3f4a0a2a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bf678332b40c321ba05ae8b33d6c01c
SHA1c6393b642a7067b7fabe9f0648d8602fc09b9a42
SHA256a9f046d9e2cd70310576bbc83a3215c8ea09b393b2340d01b7e79c95545bd5d6
SHA512c065bc76e65448ebf92c84ea6a3f314b6f41714e723602addf71398dd3fb765ec032847af9c9ec9e1af2e3d13185429ee705b09d8d09a36a7754431b98ac7af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f49afeaf3f23364dcd81400e23aecc1d
SHA183857f0e2b792883323686de0e2bd9af5e73987e
SHA256be45db34f8692c9a33df3863825daea1de44817968b9d2d966136c9133f6e612
SHA512fa6d8ab7c6a6a449387bd5073dfab9706db45a659c50da58381749e9e38ab8802735d74a57cac155f60773e0724d2eefb39f69a214a2d5f1ce3f842386c84798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf06e5417799439fc1d69c0dd3121e6
SHA11c88045bf7311ba558227cd9169bdf1da47a61ed
SHA256573481152c88152a08cdc58c73d44145a87d400bf8018c7623a132c474ac48a1
SHA512abe2996707b08b8d30c4a3af1bd15466878e2e0d455c859fb7d6a8a855b49181b323de56783e3d4e914479b0fa1c46be460b491a5791bbe6ee8df1027f76c232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552e88ee234dec0595b879b496a15096a
SHA10fd2bc26d200d5e482eedbb4b42cb6c5a90671c8
SHA256abb2582b376bf15304f57a63df1bdd032e10427154afd101fc75a2839b36e69e
SHA512f331ae486e6ea3571646ec263e22b62e2cce2ab01efc17e966c2d8be64245e6d6dae856a6dac3712ac45cccb06b4a8ab142e74af2fa7f70681e39de175422f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c988b2e6bbadf2e8f46ac45c43a3683
SHA1e6484d3760f1a35ead32dacf3449fc8854f72205
SHA256ca14fc788fdb1e42463cf213386d8bcccf35501edab3dd19c1fbc621972971eb
SHA51269177b5b17c78890e317ac1a97627cad599bb6f7c5a27bcd63ee1adb66e48d6f61e4bb3187baff084f8d3d0b6236d5d4add4a3651cc38d11f63194758b0bf896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f1746b4a3288cc0a3374d84cc27fd0f
SHA1611fa7d40c9e6cbb74902e7801855aee5f22defc
SHA256b695b39087eafbd9a0b7e6c3090dab0bf7303d9ac9f6761a78adf7fe59e58e5f
SHA5123139766fd3c03ea54ab09d385c1d6b4fae03c57de89a97a1817f91cf06072fc9a2bbbd2ac9695200c2690085402edf075b459eb1de21f480b1a292b404beaca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b21452c5613bdfeebdd3376dcc32ad1
SHA1a1c46626096741c38fea7bcdaaaa08e7d3dea898
SHA2562647ebb06783b049ad3a4ee2e84d60d2657f162953f8d9eac3a3dfd9d702e62d
SHA512e63320a4a7871fe9da4a695bde30909738b84ce677f7644f304cf808467d1ac85a3d9df4f4a646b10ca82dbe8395b548cb7c733aeee13f5afc9f58ba40fe1f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b5b6d510fec1696dc9b99b8d6b1311
SHA177683cce09fdb8ddae1a77700ceef693719fd971
SHA256ea69da3e280f09161f1c4e8c4c899f4c134a520c070952a7d0905cc1f3034281
SHA512e5302c85025479db33dedcec922e03b2114dad4f2263d6a90908429a71958a99f4044e2ebe10827eb85b965abd4db4478b51e4ba80de8de1f59fa3c8baf71f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574767c0166b7f29ef07a4633b64d2b77
SHA14a0666b0ec3d06c61370f97a5dc514c8625966f0
SHA2569f7e1946ca57afcc65d10b57bcf11a81f6260a16a5b0387c93d56337fef3095e
SHA5121b8529e2bcf7f0fc88ada8146cb7e2ab472e65f65fb375a74dc8f8bfcc13fb77cedfc8f124fcf23427872b17220b13ec164c9d4d2522601be8fbc9a89d112936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c39194846f863e6386c0bb23ab090bdc
SHA1db740881c35a2141358aa3274507f7fce5dbeb66
SHA256dea2b258edb048de2b416041182d6f411c996b41a3edea0bf9d5c54d3df87141
SHA5120c92f4fd25c6cf81f9062931fbda1c68ff2ae704963fb7a2bec335e2df1842d0fe3a9ca28aa48a1535a48888ce32a5d42568cfaed628435bda0df13aba572dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5446803e4bdcd63b2b94c36c7bc2f5a9c
SHA1884f92d7bfd9ca2c99a657050064095353d62476
SHA2564a638bae803b113bc1e7f5104a2a44a372a3c7b0e6e8d3b72d4a5ab9a4772317
SHA512f787e974716e008ca82fcb5e4d53470204ec60faafb876070733c9db27a13dc3c01360ec5e669de22eba05de0f2e42490677630c6ad71001a59b5d7149319521
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b