Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
d1f0083076ff21704267df2d3073458e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1f0083076ff21704267df2d3073458e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1f0083076ff21704267df2d3073458e_JaffaCakes118.html
-
Size
23KB
-
MD5
d1f0083076ff21704267df2d3073458e
-
SHA1
b5e6e77e80021b15f155788334a28003f52edb8c
-
SHA256
38b1df959a49f2b31bdec880278b830e136cb3986e7753f9d861239e97657982
-
SHA512
cf532dd6daac79d0308648a52217463cfd9c1c51f70dc2ccad01c2ebd054627bc32d9bb6fd714d8207369a12c5f4d112eec02c2ab403d33b56910e9ab9ba854f
-
SSDEEP
192:uw/9b5nrDGnQjxn5Q/unQieVNnqnQOkEntOsnQTbnBnQtBXZvMB1qnrXnQ7tnYYK:fQ/ameIC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431874219" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 908b7d1b2201db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{405FCE01-6D15-11EF-A087-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000df31f07656377184dd66b8be0c4d78ae07b30006242ca4858b1c1434b1ac4cd8000000000e8000000002000020000000361ae68c89ff29a6465d546b8590f5805993ce00381b3b1e7e014081f1a3b63320000000b311ed1c44873672da1b89a852d1c1c8fd2b7a9e4e9f533ae81debb1b6c4c2b4400000007950b44b50a75201084c95f0533bb24e28bac52dd663d4e4ef3ed975426187cb8a95b8c5c81f1f732cfc65eb74f99cf048f36f108831fa57ee49ce8a903a1603 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2092 2344 iexplore.exe 30 PID 2344 wrote to memory of 2092 2344 iexplore.exe 30 PID 2344 wrote to memory of 2092 2344 iexplore.exe 30 PID 2344 wrote to memory of 2092 2344 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1f0083076ff21704267df2d3073458e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e5b6c8c49f84130352416921fb394b
SHA18d105eab5547a9b42085886521ab22c62ee2bc5c
SHA2561345dad8d02d978b1fc23b41b9c881ffc0ef5984add6f07b2012295ba5cc58c0
SHA5122ecd6330bd98abdd56efb2f4c7ee46fe72cf3e25766f32661b886b17511d89121b6448a72aaf7cb3fcb3610b5046c84e8fb17901fb942b524112ae449f9d0e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bc794d5dd638bfe39e0994e4bfce300
SHA1306323fe2fadcaa8e837673eccf17cadf68c7680
SHA256fae6b8e8fe9bee81dc3aa1a805d7ffbde2bdae04e6dd16dd924b0ba35cc06444
SHA512f8f3a16d5e4878f674d9a12099bae81c63e676c917c71de2cb7dcc4cd449d9f2b1c3bc14e3b0c719a6c60e7035bc74c504a32fc2eda663ac61f0d0613948088a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5230afec72da053217cada526e36737af
SHA132b43749e7b3efbf3438b637496bdea5e94c02ce
SHA25618842db179be20d89b8b63d9552c125468e96f4a1d56ced3c7dff4efa1239a5e
SHA5126f10162e59fcfa8d6cc75f44a8d0313c50bc17fa91422ce2706e956a38b263d9057bf694551bd3710f3f3954932da0f7650ca91cbc00b729d7d138bdb1492627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56005f0ad3bbed5a0441397c5b629fc60
SHA1bf76d7ebf9b81543ab5227387add0bf5ae00e52c
SHA2565f7f437a08c41b94f436da241b338421acb5718cc824e8e642758e8e16b4cb1b
SHA5120d603c4223265754a1938bc7d595ad54569d8babf05f1ec3240cd40f8d9635e37625eb32a2f0446c431d6f25d001e3fac92a9294dde63765b9bac1a7ea1031d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56971587b9bea7924f7a248d356dcfa86
SHA198d7d3fabc0fefb4e1f6703acb1a572ed6187f5c
SHA25616933a3b8cb9070cfb8c4c1d9701b5124d6a8612d14f30deef782b9f92b94b1d
SHA512081b42e540790b2feeb32cf017953af7a35d9d61f1ad82ddbe6a0f98143e524bfe64b70d013e0abc3ad426945622de0ec61cb1b2582c8ef7be095af14f7e6ece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ff699769197cca4102246182ab5ba9
SHA1a6d6220de302b266f8738a94dffceea4ecfe9c70
SHA256b0cacffb877694c3a248f3e3ebdce00eea6e9246e5803e197bc206204af695ca
SHA512b5e6e8bc3332758febb6b691e141949b1690113cd935a26108b7f0fd93bd810e9eb844027bb80b25620a870ba26cf90b7a830bc52e6cc1c2f74f9647b582f08a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599eaa05e62dc0bc8a018cf1078c10b72
SHA11d50c3d05515b81ec6103fbae35f65c9e90160ab
SHA25659ba946e78eaebad72f3f739961db683047fc5ceacd9e066a24829faaf239de9
SHA51288e27c2416782fc425c8283670a9628d1a14d5c138ec68736856572e0846da7f31ac2dce2430cc3cfef0872799fadeabf2de8eac9dc43c6279dedc7a95549646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565160f0ee8a609456c87151f916edda7
SHA1dfdffaedc8069da7ad82ceaed625c65aa4c1227b
SHA25638caecc5bf70e5f5f0c5b319c93c8b0c469ab77e84bb24f35ca83ce7fd59ae32
SHA5124e079250e0025ce8f667a799d7594ccba3310e871dc1f0f3bf17bcf6a1942e48534213fcc8c686502c93b106cdf2f506f95c1fb4698ee820c4d3179b72ffec4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d166c6ab48687b42bf3d1a7b2ef1b1d3
SHA1f3bcf467ccad769e5f6a347549c801aba664bbb4
SHA256fc4d148225668b47a6254c7f3475fadada404c34e9deecca964e04955ac3e009
SHA512d9fbe58b877bae3b9529555bbc4255bbfc632771586d3e1025e42a5886f6541bc295741a3251af2f88839e5241936df87f434b613e6b0c91266536bba1b20bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1d740bd62832dba1bd46396e6e06d26
SHA1ba0799297efff6cb286830bd397b536dd8294e25
SHA256885a844b101cad98d84768c5952981f6c038fa053370163a3d28a35507e53fae
SHA512dfa6ab9285b05b8279fa8a88951a3b4fe7bf825142faae2c9af0daa59daa707a38490b64dcfe2eb82c7d3fd7b3e79c8a219090fffb58cc6d5397a0c5a337d1bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589562b4c533ce588c8a0768621e50f53
SHA1d830aefd1205e8281b74ee4b7f26dbebaccd675b
SHA256f1e36f006b1cd839847314066ef045d5025af3bd5bb4f461daf455ce9e9ac8ee
SHA512a25b8e63f658b08d5c8f4238a5ce0e22f5192d2b6ac3a12f7387f903a01984e15536ed494b5f301c29add7a3d1b0c026c1b67d3b7b8fee4e58704d09367aad99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a802da5933264747cb9d01961db728b6
SHA1e62c4e1a5524ddf70af38d9afd23261f8b498844
SHA256beecdc16ccda1db2b02c803677a12d5086e3cf8c56f712a185fa838cdbab4e5b
SHA5128a916b83e211ff03732f94631b426ae27f334befaa5489e286cd04cb6d197ba838138cea910a449e659dcc17d83b0496cd73592b0b242859efb8376f2fa4bcba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517a176e2f2cc10ff7f40417a74ab282c
SHA18838c351d20713cb2999591d87b75c62d0a42a42
SHA25612c6d04c29ea97f201cad69330bf9b51cfdb611d2ab9baf67454394f2070d521
SHA5124c39647d46de23e93564be47b41f641fa7734ac8e5eca35b45762663ceaf6ff414bcfe50ab6cfd6fcca7ecd5198794451dc33579d008aa8f88a0ffcc181db2aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536a208d2786b7995e42fca5e7b819371
SHA1aedc6d080ec284b6e47e890c5b086d3b40b927db
SHA256379f30f142399c4e65828c3c8030d4b988009f1579a4ba44056d2d24dc75e5ea
SHA5125159b32abcd72fb792ebcea7e800ec3777b876a3105bd07d7c5b253c9120bb41f7b3e76dcffee5d8e8d88f03e034ca4c16d1a1bb03abf2ea71f6b5587ef02cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5226a49f81442eca8c33d0954f2101d40
SHA1a627f76a5260eb254c84a55e8d73196c218e1797
SHA256f093d6936a6bd413c9258d6b48883628de2f23996835f12153ba74f5748882ae
SHA512ce2013fda5cf8ac32873f34089d3c33c8b0a640674fbc1ce1f1d958239c78100e85b0afc37deef1ed8cd4f05b0e989e7aefb2490d061d8cdcccb2a70f7208672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c865e3f2f95a410c0884a24b8e6664c
SHA1a1397d0682d6438eb926b05039cec89c700fcc60
SHA2566ffb4aaf0fcdc50648c4cd6afc58ae8e111c07038cb1204770457b5459073a5e
SHA5121585f12ef4d5b156e2d12afb8e724e3fe0e89fcbf072cef2a604b5d0ce2a64fb10b8e02eb4459c33e7dfe85521bb832ea6d0ed6390eba65f2f8373db4f77ed00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5445434d29bf00afa1134776a50faaa3c
SHA142c16e872ecdbfa958e47def2c678684e42b63d9
SHA2566dd89e7bc60d8c848772df134278bceac95a128978102ac56bd1b4750432bb20
SHA51239c868586a21abd28e1f6bfec93b183e9fde82d78e443181ec99f0b6b60f2e395467f6fcae2b84e29c27719fef3c95501f177cf87d23342f5de77f708ee9bb20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a10d4e1710a719a1d9092a7667e9cf8e
SHA146f1e2248c8901f7b976ae2631063afbb91c3f41
SHA256a19b7cf87a6950093a5ab07df22ec0bbc43a0c3659e835fa9e21b346060d7e39
SHA512a2493f3cbb38c1039f9c7d42899ecb201c20cfceed243feeaee332bcbcfb1496cc97aae1792df8669e1d6a2509c5ac01a8975c190aad3ab2d16ec8bd5e811c03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8e42f755c792e914bca0e3f7a5eae74
SHA1e942cee449427ba136872aaa3bd87b54e2074ede
SHA25605fe71d882bd2a395b796a654b12ac1ba1851c9b97c579b1bdaf3524ef2cc9a4
SHA5123824a0b2fbb33d7504fcab78c3a55d67b8b22dc9f6382bf452efe9dfc1722ddc95f81c48e6915c81c7af4f5b5841690fa34cbd605518a565907ec37a626fa8ec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b