Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
f54235b5a32b320f802f07be5336e44a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f54235b5a32b320f802f07be5336e44a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f54235b5a32b320f802f07be5336e44a_JaffaCakes118.html
-
Size
461KB
-
MD5
f54235b5a32b320f802f07be5336e44a
-
SHA1
968a5ae3c54294192f1999cda9a5448dff23ce14
-
SHA256
73762653980638a2ad4555a32575e94663e3cd4d585adad50f450c0409078e8c
-
SHA512
e22e085c2f2ac06e633a9a150cb0e2a3dcdc03b1a194fc59f15028c9477fc9a71832f20a14838ccf9ff341ab29e604371815a5ef64934a37a0ab8f713d21821a
-
SSDEEP
6144:SFsMYod+X3oI+YvsMYod+X3oI+YBEsMYod+X3oI+YLsMYod+X3oI+YQ:E5d+X3J5d+X365d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70455659090fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000002d1dde35cb827f89023439c6de8778d511dba022aded282ced27a81cc129c098000000000e8000000002000020000000b95608783101fc50ef697cb900a3aa372086dfd7115256e38d70ceca595d9c7720000000edb5eae5df774079de598c90f17afdaad8f459d6c162476565c12d4e4233c009400000007a7599472a2df9c670e0ebeaa44eef10adc1d34cc33194448c5a4af5de61ea4407ff1932b08f449724c4a7e04f8c7da398358b9e95fbd1de12e32fa62084248c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433402905" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000086aeeeefe02f53e78a0a35cbbf17d821cd2ba82cfd112a32f0aa40a9ddf70b3b000000000e8000000002000020000000446fed007249f86cf539d84fec8e6cd669f8398a7fc624feeb96fad61d8f5642900000007fcfbe9d8c6271ce61b9a3ecefc7b144b58f6b171a2705a0b4359624394e791d855d9ae081c0be55721602ecbc8011f83de35388f03cbc9838f2a21adf9c750435992ffc4fe6269c709db105d6613d347b89353f0a4d9ea7a29965bf4452397a05b252594feab2bafd2072f6b55369027eb0f4d748f3c8d42002eab9d608743c37057fb86fcd1483a37371a31f2b2fb9400000009f1beeef104855d7da4701e5a482166b86464e13c2ebb8455eeec8de99a87f499ceb8e1fba43a13318b4c31424b2b651c54f513f7e7a886118fdc9ec98e992fc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80C99301-7AFC-11EF-BE3F-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2640 iexplore.exe 2640 iexplore.exe 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2876 2640 iexplore.exe 30 PID 2640 wrote to memory of 2876 2640 iexplore.exe 30 PID 2640 wrote to memory of 2876 2640 iexplore.exe 30 PID 2640 wrote to memory of 2876 2640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f54235b5a32b320f802f07be5336e44a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ec5c6c25c200d3104e71b8ec44ffa2
SHA11270c74b1c12bd77bca7a8ac96958eb2e4e191e7
SHA256fbe0843d1b02fd31772e935d1e141b6b66c161f67d59ba1ea8869e5ac83cb69d
SHA512252579f5adcb27a7afe2943a7d1ae091543c66c10eaddf3e69b657ef142172a6fa9a112996837e859ba1c1e6e377439db3542a0920a9bf002f97f860f6f0f12d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea100d102cbe9e82e50323e3d895adfb
SHA170c277f6a36a637ad78732af42f743c065cd3ecd
SHA256a6062c16770f4401002cfc218e2d9ef8a5bb4a8556ff6f620d56e140a3c96173
SHA512fe2f777f198e28c073a4f233392df5eb206264ad6900f29ec79fc914d4865617826040076cd3fd5aa4566019fb377123c8325fec0ad32867afbf8eaf5beaa3c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dbd43e74b8979ff9629d4be1a319438
SHA1a1993ae5010c4777339a6e1680dde44b34c49f8f
SHA25622cc1fc6a2134c92d87a100a286e967eeebc7dbfa4687ad66420a7b3ed40e76a
SHA512e9c366229ba0dd5c7f80bd62f7905528b48cfff93237eb683713e76097e88177fada10aa2f13f8e4f1d729635482d2380a924fbc61dfc7af688089d1fae7d2ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565378098ac04c894a6328b3307a6b620
SHA1e8bd86431393bc2dcbe4fb796296b04fd0107975
SHA256ccb5a7e695964d8ba67b7fc7d36e86ffa33053733a155e16aee58f02bee54dec
SHA51238f89e587d6dcfea495b354f159fe2c785665b3b6b16cc65c8d8ed13464649dcb55ac1b37717ae294eb32e34b6ca80122c55636fd890f3300e5f3d4d861e95b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb26c41ce74f8637e8bf539e44f59c3e
SHA1ca8e95a3556209960ae71e1fbebe0afb2143c165
SHA256a9e301f31c366b19b3c931e79b9f7c2baa72413c9ed7e14e867fa9d292f1c849
SHA5120032694091aa0b9c91281f3521b250d8b2f51b0b47acc8e692717b6682f597565b08cdb6665e8a5587a6e59a1a6423a0aa708523346786bb290589789ef89d84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf73ea5f610297363df743b8580a9d47
SHA1376b0bd995656c4e432e035e7d180715f3edaf76
SHA25611c0191e5a99d9277a6e7db2c411353dca929c1dd36fcd0cd8bd841c13de6001
SHA5124efccefdd1150e0a20412f8f418d1f6c3bc6eeada9b5fc72fd515fca28efac69a23bd4d7b4add737b29aef2cce9f2ca66a2a124f9293049253fb5f10c778a26d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dcc58ceddc3a3c21e40c1966ec5f3b2
SHA1ee59901e764901a4e38ed442713a2bcb05bf2cd6
SHA25657f48443ff4e5e1c4623b238c358ae1e2b4277de869260eb2b52915f9b48ed13
SHA5127d651b2492eae64b105a44c789c96b33f18b311c7890f3403096061937ded85ab64c2da1a71cfe2bef2f6972541940b0c965e538653c1510b8511183b4220feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ec5e16acff37c69079e69ac26d6e1b9
SHA144364b29c4a401583651cdc03f2635c7fb6ba3dc
SHA2562cb6f7be318d72e2593914d2f7280e5f82c4010c6d5ebd580a5df9a710ab72ac
SHA5127ecfada9b9432516ea4257eba2c494f7d5f3a11dd6edb63fb46bc9c2344e9274d80ffbea334e48595f03abd675d9018cfb30778775b45b45be3b12d6cc6f8272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568c9c1bd980b8b628e1bb259aa9bdac5
SHA135d5e3e5768e48c9be356b5f60d3d4f221d6d993
SHA256a01301fbedbdd7cf02051ab16c4936cf6eb5d0d013d48fc70f5266e6e13ede77
SHA512e636d48deb656453d274819e93fa268c165895ce12f0e8cce9c6a78ca107d0da5028ad85643237fb32448774656508074eacfb9a545f76f44c37bc3604f80a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8a5a85da2a88a756d466830c429d3ca
SHA1378c2d08a0f86c76985624192a966f17ba912f5c
SHA25693ef5703ff2ad69c35fb5a15b73ee55aed7b85eebb1bd9903ddf8b6e9bc38a0d
SHA51238e3eda2a173625a82c54c038f247ef9de279b4adca1e3d283a4b93f9db294353b2a09a45d482d7897ea5a33888b56d9b2f54029ccc383f713c0d14b6429516d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b83a946841eea721e0c16c398e36ded1
SHA1881b670f45277f59b9e6167d5658f70a2cf8e8d4
SHA256f6a3bd82dd71d4fdc2a0d66314a4d2efa5e2fc8e34f40854af8b7cd98cb44cbf
SHA512db569011ddb81db32dc73669bad584213ffad76bf22b82958c4c3270632a6439e3c98ff90069b13e68e5bff2f3b6d7a815d5243f4c3aa3f4b5b6d553ee3c70d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9e1eac7eff5a5c01b3f41edbb064ffc
SHA1bf909800abc3d083d396634906bc2ccd5e0819a8
SHA256d35094c71fe87f77404c12b7388c0b0bfb51137909c94703b560fa29455f809b
SHA5123fade30dfded9e1780a6b7c34fe4a4787406679faf0db7974ab1963debffb8df6e52eeb2ed3f160b304ae5616b99c2edbc5f76e333f1a17c58bbce2c1c8e9da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7953d6e18111b3d9a9b9ef1f9dd13aa
SHA1f8140e7643dec98b12f6ed3afbbe06bbbb7dc3b2
SHA256eb631ca46172b931ad68ecd6cdcd7fa782ba80c6917498a55b87a1582b8c94ff
SHA512d9e8b301a6443e203b60b58355504ae1d802ba05b585c1e45de9342fcf73d95083d82753259ca465755e064c2557efe7653f1530fd71ff25a696a6756e6ba317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f69e165cca49b8aabcd39a83650ad95
SHA176a4119cca8a882f7f547294a9f4fce88c789df2
SHA25693cd0bf14deffc124529c062e43db6647f5d9afb1c21eb4dfb55f9cf7e0f562e
SHA5127099e3a9e6bff808babc83922d4cea88d222144fad761392c4215ef655a77dc22c366572fd677fa00840a9065bb8d12eced3a4022ac6029f1eb2f1c6b249ecb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b8839449f4bdcfae9ada98fe1e217f1
SHA131d96a4a3bce67e1306f8d2e459ec4579bae3717
SHA2563b78bf1cca09750c847fd85ff19659f31d19afb45c650a6606f7dd4b031d19ed
SHA512ac6f24c005c72bab8ea87cb31e868bc58e423c5de4e17a0984f9410ed8671c1ca5818b10781f417a58632aa9791934072246ee1fab7e271611752f69cb762e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5884d3e13f803eeb6d454e0438ca6f1db
SHA14b7f546a5ebcc897ad8545ebcd87bb0bd578a5f8
SHA25632463951a7af3efb63301d96043a212a750ae623a0af64e46ad163c973092516
SHA51219feff5c08dfd0742abc4cf6588c2257ff1e6fcf174b247821f8d3be7acdfbfffb5b83734c68400698df1e6f28a7aec0b4f6733d592918c3a381182eca9e7d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a460ccccb01a0d5527dcf8a4fa0a7fab
SHA168b25beced6e2d1a1b3ca066e75b80cef9364814
SHA2565148af92c4eb5f62847b9ab5d51590726745a6e3e238e32fb8ed701864b9a32b
SHA512b613041c209cebdade691fb08f5a9f19b6ab92e670cee52903864e6e2d556e23c8ee77b0b8f377ed19962d81be4004c0c116d19714d869a6f26a5e8ea82afeca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f207a040ff5204c84f0449be92c2743
SHA187414cb0d1d970b1b2915b57f30431b6c161621d
SHA256fb1a5a7e022af70e2707f1b5d9ffb857b227369a7b6a8f423da3abab3a6b92b8
SHA512681d115c591fc78b4f281068eed3e3710b1027b325e963269fced44442144d380e0cc081408fac5e08755ace5228ee26bb05e6a6c239f31690d447091749f5b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5294517c66ffdeba49deb20c3913a41fe
SHA16ff06ccfb1c0355f3a4cb5f5809104711747e645
SHA256c457042a5c7036bb237b8138d400c6361081ce12347ac70fea7a8c2477474403
SHA512c2f6a5a738f3f2eefd89203925a5e7c3b16573eb05269cd99b608a24993fed51391aced2886fdf3bb738ef317bb823fd90099fad7153deb2ab4a2a3cd9cd1804
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b