Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
0a21886dc8bb516aba039dd39e8583bc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a21886dc8bb516aba039dd39e8583bc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0a21886dc8bb516aba039dd39e8583bc_JaffaCakes118.html
-
Size
18KB
-
MD5
0a21886dc8bb516aba039dd39e8583bc
-
SHA1
f754b9726b9c24c3242f34293954bc1e6cc4f554
-
SHA256
b4e0c687a89e34c3c8a5373a1e21ad1852c12ddefde36dcfafc8096a900d4853
-
SHA512
c7795bd48866897dfd5b91ce88c18930bc5067237eb00a9995cb1d8f65471044c70cd30148fb0403b4d58e1d631f4ee87d3ee19accc30fca364d7029e384f248
-
SSDEEP
384:sxlIcEt+4HzlGTHbxLJNCqAx1iB/gYbBlDrnoFzwr06aguLZ:xQuCgerhaxLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434025459" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000003f10c69048040d41881119434ddd131783235071d28e1709969a47001eb6070e000000000e80000000020000200000005da7d3cb435ebfca77a9267d9b077a07b3720ddc1106771d2f8db72ef04c8288200000008e1bd215cc36d70ab76808de10c28fb6e0fdfae675579572f826f130a355c7474000000067eb29e9392db1c50fe66a75e491a5b411bac39920b4eb6999d209cdcb43692897afb7b7a78bc1fd126a7ba04f3f67368e6cdd82e0fa339d6f4ea9f46fda2989 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF474A21-80A5-11EF-80CF-C28ADB222BBA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000c849f0b0d6e462e17e50dd748552d5e0d5ca86974139500528b4ed6262b18837000000000e8000000002000020000000095537903cafc4320b3f61043acd39399f4c08a133b3f0fdeb784253c757928290000000d1ec03c17853e45cb4ba16f03ddbd3e0075f81b68d5a53f242fcc16c56ae3470a5b8002e7a50c394ac7baeade831872ae0ba92b00bd50fd88c3b197c65c477a0d1bd96487f57782d20452b5f37721f7f6ec046d7d32ea3a2afa1efa5a9c893a4945a971668a0ee2452b4b474d72c75db6cee8291ded9a8d802e7a69acfc988bdea68252e937bae88ee468a4ea87f6af34000000049376a1f0f09fce177b8999e0d07e212d2e3ec0a28f2f7dd972fa51702c034806bcfb9786f183aa5e669438dc793f3a2444629d5ad736c1fa8775a3c8759ae7a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a043dff7b214db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 3016 2180 iexplore.exe 31 PID 2180 wrote to memory of 3016 2180 iexplore.exe 31 PID 2180 wrote to memory of 3016 2180 iexplore.exe 31 PID 2180 wrote to memory of 3016 2180 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a21886dc8bb516aba039dd39e8583bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5225e316c2d57846b4ea8a1dd8c2cf3d7
SHA15e16813319d00adc387965fd915af4c2ca5c2f63
SHA2566c292f384af975a33bdaa81e67ade8340bf12cfad9a88d55a37b48788e9bf160
SHA512fbfcdd9a9c494618c5f0bfdcaabe966d8750d658f1d6d3db064f7e6a5c9e06878950cc3a673e5dd62b25dfe13b4fa93f09a6eb09d6123e99162500041afdeaf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dcac4cae0835819b3f76fea518e1770
SHA1f9b58da1cf2db626655c7c5ceca0cbffffd71620
SHA2567992bcaa004ebcad11a282966da88037e589a9d4c7eb0634da7b8eefb08d28f1
SHA5124fd5aa23f537cb5d75359e91a13a72d8935f41b8619d64b41f20526fb3b2e83ed07022976cf6fad119084e2e3a3b17317c633dcbf290db7282c8372548630835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f4a5634fde3c36e8d68fdeb6e777806
SHA17100973bd95204dfe6434f7c181bf706e1441692
SHA256e37055215020c9a687e0ac67c5feef2e9ff5580df1c96317b03073badb874b4f
SHA5129e1023032cb88a9fad300adffd882f773e15c09497d753645260f8c903c42248ab4a44b8a974383cbbbd0b2c92f210aa54c2ccbbba93a372b8c80f14aea264d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af162ea72d26a129222d545db1fb664b
SHA1e61622599d6be5a887fe1916b83da4a828547544
SHA256b50d56c61aac165ae39b58e54b1f1bac619c3bad21e79c4bbd2b37c2095693f8
SHA5124e1722f423e5c1d3d02acdcd76ed0b521d26b68db4b5477f8479f27482b0936bb715190ac9365dcf65bfb61648912a6078f3b5f55b0bb845a1e0fb0452d441cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b1ad052cd727e571909cd98b85e7dff
SHA13661e136b6fb633da0c439333defd95b4c32db7a
SHA2562013943323c69b576219c1a375ece5b93520c0095d0b2514cd1574d12e6332c0
SHA512520719eaaa7dce6d7745a4dc11934ab45f6c764ecd4d8ca6dc8282aff09e25fa5a1c2fcd838b7a96ed63aa5c38ad09ba235d1c665d8a81c829bc49991d96ff0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c79727aca2238fb11f5fa8267cfc68
SHA107ecd7cde1a27a756aa0a5fadd502f2554341e37
SHA256f76ffabbc6c30ed4b27134a2c4ffac91d8ef8a190012960e0264dadd9c5e1e41
SHA5124eaf33510fbadf6c871f597a1016ea58f3b1ed5411310c8cdd06260eee5ccb24b0c4e0b850c488e807ccaa8a559d7685d5e6ff3583654955e3372b310d5dbf1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db4b6d872b8e6bab4e18895d10d4d1c8
SHA1e52331ef88b80cd2c36c1a0954e51ff91f8c839a
SHA256044d13ee5ec343bc01bf8a80b6a166a758f816bd309dc334b1a14131ee26f4a7
SHA512c563af2ab2b1bde1d3ea85459153dead901863212cd92e8fade50e1503cc0c390d56170412380d26d24e613da20ad2e2f6df20a81d9c19d76f98e3eacb89e658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d95784c46d3125e94f870c1e7307f5d
SHA1d779cfa426eec0d806bce99a7724afce471f29af
SHA2569ca4f38f97e8db5d545964fa1ce8c818d476f59f7afc74330ffc3ff02a32e200
SHA51223c198eb62d69de90ae52f68d6dbc5757fb022cb16ac0675ada645180e49e8514a48f7382a1c442b8ba4960b30db6a1519b36a5fa95fb82755305605d3051a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563bd51b5bd0163bbed9fa116942405a7
SHA1cad495dc40bbcb4d1dccb3ea4de796d592c955f2
SHA25663a953af7f48db6f7aa5b6b0ede4297f87b7769f2a72c50ed8de49d433ebbafd
SHA5121de2be1e3bb85970576602f0ac1fcbe717a0cfc16a538a9cf2e4b649c5de56b7c8834a45fcd00bcf9873f3e54e2b2a6eb3e873d8b45940a0595e71d6ca805681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000d551316269e39aa2c3ba7d07848fe
SHA1f8a3a13c8fc48d5108ee900a26c78062cca1c2d6
SHA256751f97f93d1c92d4c7c32836a37b43ce7a37143ac6d310950ed7a4f1645bc2b1
SHA512e32a11aaa562ed88cebda2a9ae12ee36e790e0c681990f094b34271c5dbd764f5f8ebd51321ead2025319f68536d54f1cf15b5918ab7407d746f15698a731fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd3022dca24d0eb71f7d7724a6d3624a
SHA166a4f3dd7ca82ad906ffba8fb1df5babb8f8282f
SHA256bb503043c28b72f80bdcabf25c287dbbf6144301ff87258566f4c9e1ddff3396
SHA5120535759bdcd66fac99d32b65ab74b62dcc7051cebaafb69cda647a37d4a20e122a0691457c8cafaedf57b94b3810fb267e41997d7991eb3f40127c5fb9b7e15c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe86fdfac6b71aff755df800b4e98818
SHA114d670f12da0f39eb30f5706ffe04361dec578ff
SHA25644374424b71fd7a18db201d8ec9060fffc5d435e7de36e0595bdafcb289bb204
SHA5123baf34faf471588c0ba4daa385ec240d6ec63db19da677c4a089c4a20649c3ff73ec6624f9b3d39ad89a25b1816d9ef2825514dfc8747af2b16be53e9f389d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf816ae31485b5e368f615b7106e5412
SHA101658355ebfdf15504e0a7ddb013aa94012444cd
SHA256b1c8ea6dc25b912aa22342675142d8598b91cfc1448d3589ba5e7b30d2839432
SHA5123bf52138a9593319d38586f16c3c225a5098ddf0e442d66cc2d0064da3c7a19dcdff4dfa0c08f216444ed2c4803cf2d51f6749d024980cb465d1f5c70c5b63f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5839a7a2ac5fc9dc6450b22e2e3f87d4e
SHA1e453b9bca5ad051d2239940838d9883d2d409ab8
SHA256b6426dca223b1d16bf1c5e9d7889e9a8ef3a6ce25542639c29349f345a510b66
SHA512e001e60b656a57ffc0ebb0043504bccd49f35237c09de38df4a4614abccee012442e3bc3304a9e4e66104dddd51a143e0a6be9acc782a7e633268932a95b20ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5628a3b205d79b0a3c0622ae79b0e0e7d
SHA17c417c2d55b4ee10f12899472a66edbc7b641b72
SHA25693a7e251fa5c1dae796075a1cd4cb765f3399cf8427f2a01303086e34581aa92
SHA512859abdeabade744e1d117999cb5f4129cea7c7adbf399cf8517e6675cd4e1aa8a923fafb439aeed0c648b24ee04dc0e5d8d1419e1ef65abdf3dc7204720395fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50699100b9cd96fe68f65c28b38acbcbe
SHA1ae9d10c6ee2f857952edc3c12e426398546f8548
SHA256ab4da7ef7f08b40303acc31ff6104b6ca20ea408367c2b835ad6e3e4bebe90da
SHA5128af4b4bc88fe563049b73968d103c08d7bad880e0ce7c0963e1013c84b09272adb3d6ff027c97c787325921b9e367435243f3e926a6fa747b3f129d1954b8618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d92246267ad2d19effc1763bbc74ee17
SHA1f10f18ce7a17b45dd3e9836224e89c9ba59df98e
SHA2561aab903e16f4d97a2b920993e2b5657702132a7d92daa96a17f9315b00efe4b8
SHA512febc372ddbb5eb3a421173e6bbdb3e3fccd42af86d3c5eabc91b032a9fdbc9445757b843d6fb6ffe3e708ccca365da736020a091065b4ca5a0498f8a03dfedcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f749ab37333239528255bfa2e6024ebd
SHA11fbbf3eb88794cac497b6d56582ddff3715230fe
SHA25689a721b884ea2a891da657187b8c774ca5baa4afee70c54927c98fcd7e1c1fa5
SHA512ae78d65ecf300e1796d0a4c2f62d97a965481bcf70a027f934e8c3deb179d2e44cb345a150d95f40249789623fe20c83e073135dedb205c08d5ee4704a5d97d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce79da0186cbc274625610b374b71417
SHA1b8790d09b8b2f7e201ab02abf6c97d2667c35159
SHA25613355accc0963b481781cba75999cc0352fbd3469323bbe62681af84a3b490fa
SHA5126d157d5dd6bef28d89e71738fc48373ca2b4feadd9290ab7df330f91192ba5e1781444cfd6b4a5b4f58374b81d71e8a7224e892d89b61787db3c86f5d8b736e4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b