Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
cfb7d6e7b05c766b154af20b41979b33_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfb7d6e7b05c766b154af20b41979b33_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfb7d6e7b05c766b154af20b41979b33_JaffaCakes118.html
-
Size
128KB
-
MD5
cfb7d6e7b05c766b154af20b41979b33
-
SHA1
8e7cd2b15de69a7a75609a865dc569b636456029
-
SHA256
23b21add3511d03e4b43abfd96b7660a745232665b8318df7c4a21133ffc3e21
-
SHA512
242d09bfd72a39af6296ecf45e9f2eff125769dfeffcf0952fe0175228f797013d164936e7f0aadd3b79c7b322de9f0d7d9855c4ff8e387b2e87c8af078890f8
-
SSDEEP
1536:SHE1QQfwhUIjq+JQ6q0VyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:SsfEyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14BF3B21-6C5A-11EF-8287-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000bc6f6da06688b91bfce1791181240fc5b46a90305294006e15522d4306327c06000000000e80000000020000200000007f8b6c9effc4ec30a71ba4e47e3ea65a698faff117fabd680c5caa588a32f2dd20000000dbffb4c35a504d0880984f038af342bc76237768871065096473ff7a691a4797400000003872032a6c0d4a5ccc9d20ec3fc93ef74c8915fd80e01e37437552b81ab63f000c400869f21560da4e27610da2c0ff73053e16529dc7c0489b7d1a2ea00b539a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431793830" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ad82ed6600db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2376 iexplore.exe 2376 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2068 2376 iexplore.exe 31 PID 2376 wrote to memory of 2068 2376 iexplore.exe 31 PID 2376 wrote to memory of 2068 2376 iexplore.exe 31 PID 2376 wrote to memory of 2068 2376 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cfb7d6e7b05c766b154af20b41979b33_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550b05902d5080bfa2c0c73bba50c19e9
SHA1c146eb467100610486c9e92ebfb172dbdbe1795d
SHA256efeaa0d4eb398b26a12f7e9bca93b6b3c5a54d819cc05af71e5f8eb8a52216f3
SHA5122664f3d0606ff346b988bf8f4a043e97904e8e20075c585b35eb9bf403a48191ae5288307c314aeb1f888e09e42a3638550035c2ea32c8cef2c2fc983f328a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596fafe4064478feb736c4542bb4a69f0
SHA119b29313ac05f110304c995f4142cab090d478b6
SHA256d5637442f5d5e156f2a6ff20520dc6e861b2bd2690ea5dbb032fc337fa8a53ff
SHA51221b90fb7fae4238a0822833e7afa780bd8c7ec7f7928b7ce0994244c0374981fc81ab8f39089d40f9577557b1a7d55303f468f2eaa2d7ea775c006f64a1eeaa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5867dcacfccdb647c7bfdba633e958157
SHA1aced69320c64e299b1aa69720313002ef66419d3
SHA25612e7721a040793e19be5a1554c30c23289686e3b825d9ffbab0d78c6c508e0be
SHA5125206413f0e3d0df4660c1dd443549513e7d36da53af3349559b30b8f65c9bda1cf73970391c2e4d1a74a71372117eacd4635806f2080165fcfbe007ea0c77276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c8ef33268f07d8f8a3d2737909f1cb7
SHA16c0744ffa2f6d9c3ee4604ae770d744895cca1ca
SHA256c213ede58683ddb03fe41a6c6ed2197bc14bf77e29d2589f1183a5622cf7e713
SHA5122766fce9b6a1584e6b1eb1d73a2857089d0057639c3ed36273729dd593da6da55a66e738ee81a38dd7a697044e4b40ed60e8008bc9f3d8c9afef8c13465ba29a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dec85acca19873c7cd27124e776b2ac
SHA1beafa737f3b8b800388ce11a61c66412c46a4578
SHA2564b3fd161edf7ddb57001f5984fe78dab1dc303478f5c2c7cfe65ec1b50717efb
SHA5120179a41eac413d3f4f27f1ffdafe41e431836f2310b924fb3cb6f1facda271c05b1b9b46a325dd54bc5ae6d0478946b53392464362fd5914ff859a988abdf899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7e28a5fcac5f1e9af20c421a2ff987c
SHA17cd451e6e0f0c4c73d5f38c0a44a0d14990b653c
SHA256b2c123cc1ef7d44d6e3cb23725690d245ba78d7c1a77716cb758ceb68e6c7544
SHA512571dc8d324c08ba4cdec44233e0eec7948f98cbcc20084b800f9b63fded2d0a0a58f48c694b7f5394aed02622560f3aae3a051a34c7e64fe61da7fd7a1f50e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5881a28ba629f8ee9f9d24fc15b0a0e
SHA176e453ef2ca4fa71d694de2ec7425edddc051a94
SHA256dfd78feaaf59cedfe1acf941b3abfd41b35d8ff894e54a5bfef7fac5b8e3f33c
SHA5121c8c02204cf1ac99f51d32d04fd2662174ffe6168988048fdcbcac78085d7366ba52328a19a7d9cb85ad74a0c2cd1df8cccd9d42d764f1b542b23e14bbe9aa94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5f24c48eca98b5346402447c04baceb
SHA1c3d1225e69e76f3ffeed768b9cd6f29a87a1aa43
SHA2568cc79985a32f92297c8bad34c6b83db00f958e43e071af48d2504cab05f4e807
SHA512591bc435fd030b8160501ac43173536f3dcd0d006116f33bb6ea2a6e0ba5bcb000f66af1d74ac5c6706fbd88c885401c2343cdb9d3ea313f759e39ab5ce6a380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594d048634be21600d76f8c4c8657685b
SHA18ab891b574d252fdb3f6902e0496418bad127d91
SHA256f6f8256c95904395f97c3763ce5e69f45b0173c6661b19fb1f28302fdf0baab7
SHA512435836c152bf97794a92a7b79012cd860d58510f23762741aea8a7e14afb5cb3c374426d94412892d72d8feb3005d5a823c81ffb2f9b97cd225aae771fcf52b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e482844d581021d05aa9fe316510970
SHA11f7835b30b815abf244a3fa54a717820f3784565
SHA256dbe8297189a20dfc3beaee5ef374d6f3ca53d01057698f1ed8a82c8ea0a816ca
SHA512c4b402074683d2f392519de810a302872d493f403d155b99ed64b829d8c23e7da71ccb75a0b391b9c82e0f7d793c81fd814b80f485954357a4ee188a6d0b162c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534fa13af0124b2af31a60a9fb09648f3
SHA1db918a71f150fa858171d94b591b89d9063602ed
SHA2560bd43218174067d5af0b3d8f3ad9c2bfeb21c9e8504ce9e3d4c10bf07828993c
SHA512946702e94249f82aee1854eb4e367c76b3753524f54f9b3a8dcfb657255929f7670765ea1f3333cff8a92be2bbef66b16bba866bc9cbc82eb8ee4fd963a95371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526be6d89f2628630ee2765750b2f83eb
SHA1a41539910b08e8f62a380d68ed843822d0b4929c
SHA2563c117fc40b68bc87c96a3213f01990d7214c4c6bceb6f8673c964ee738d6ac20
SHA51282607f3606a32207de42d2b15b8c877f313261ab4bffe80e53a596c96e498ca8bebca3760bdafa348fc0ee99b49173bb5b0da27cb35d6fde24a3b087d044b1b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4e282c2792c760c2cc6951530a37cee
SHA13da1db04cd900bc8f193ca47b5ff03a93c0e065e
SHA2561ae8c6314809507229f067c848b0dc3f5af062ea30b4244507f42eb46342ab76
SHA512093eda5c58ec107f9fbe736ca2618c7045534bad56ea6c663697c63e5240250f5079abc660a9b73b7f316b357618c5c574a003ba500ee1dcbdcf7e7fa4f30e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5244a8d7f843f3c4637cfdeab3b866d61
SHA1396e23bfd9fd836f5090d41f0b21f5a1c6baa546
SHA25628cd8c560ca65b21f908c40fac3bfc253cea54c4df8beb4f8d1bab3d1b18fd86
SHA5126db02df304fffeecfa786fb4a0bbff36fb8f059a06f850d4690f23cc6ec57e29dd5dbd76f39d8fbbf2900778cc71f4186acd5a9388e2856332ea4c187873af37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a9e7a07568ec89d8fd6e046fd6d00e
SHA1e762a701f730b01749d93a3a46cb674fdc6b81dc
SHA256df45e51bfcfca8be85e34e825942c2209394914dead3ccc24f860ce1ac750981
SHA51232f0056a8b9f02d84c482857d20819db792f4c6634c436a0d59682588ac12701fa79edf7093d3a4e188bd08a58d1e29fdb59dcd37b44a4ce1058df32922f5485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518aa1902deb87ba4072ddeba4ce09579
SHA19e2ca3805562f92dfe5b81caf1aacb1c16e7e383
SHA25694ad79a26ebfc7709549a513f741a3b66b69e88e6092e7afada7d950931211a5
SHA51270d6a9554d85de24f655f1472291047b0601673674052aaded3325d29453fd6ba29b61aee2a991fc6955f07eb7d87cff94c90b242c5c231d89aff811915481aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558005a7852240058b252ad6abcd038e7
SHA1c1bb191bcc3b2c7f6dfc69ec3d6125f8af256705
SHA256264f1b3b812709c3e6efa6048d5e49031cd14b20ae599331da55afc1478f3211
SHA51281342a82d59f71b7c1f219a6d0e64188fe8b69303133914067a98e14bba4911a9fd4167312ca2985adb74de94a9ba4fba648ecb393b96930adae011a9ab94dd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a78fcb20a42854c9fab37321eeab530e
SHA11b2dfc968b4f262b1274c22f24aa86852a1ede9a
SHA2566f03ea50dfba8fca471cb4a1371944fcb9338460e32105accf5d63589f8a3ef1
SHA512a9e9b987b3f44f4ec6952ac4b19d139659a6b050471567c0cacb890b58176cba48ed63f3ea8cb4a5f34e50761a51557743a06ac91774920ef6a2311900e93fde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee672eb801a3a7c04afca89d67556950
SHA12b98446f1dcbbfaa1d13b4448b971f9ed2154a45
SHA25616a225d14b591907d1f2044b940642b807e8806dd37c22ddb3e562e2997e4e06
SHA51242125f0fe83d3b8efe37395d0b1eaf770c33de2a638c69eb2789b494fd9b2cc32a39e1c28f23e2d3e5dbc19314f83aaeaede991bb73756e9137625cd4a18d258
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b