Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
f7073a6e453d83c985dad0ca19a96daa_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f7073a6e453d83c985dad0ca19a96daa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f7073a6e453d83c985dad0ca19a96daa_JaffaCakes118.html
-
Size
37KB
-
MD5
f7073a6e453d83c985dad0ca19a96daa
-
SHA1
2bd0e942f05fb76a26835ad2d4ecc347f5e37b73
-
SHA256
daa3983e63f9470dc7e32dab0a457256392ba77b95bed8a43ed679bfb74fc01d
-
SHA512
49492b50fbf2bc93aabbe297d43dc26c67fb90d3f0b58f2e47a0ac12e95e4843cd8257263dd3b5546f94ff8eb9059df709d51ed0e1a6b7781fe7ec50b850b637
-
SSDEEP
768:NobOjw6rTepbQddPC3i6MgynvMx5MPPqJ/:GbOjw6/epbQDPC3ijgCvMDMPSJ/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000042f1b3597ebcc58fb388bc13a28b7d357883c1fa84eae1218d9cf274634bed83000000000e8000000002000020000000bfa9aed3f6173f15c45f240dbefb4f20603955158b3456232548352018b2808e20000000bbb97f5edbc9611d1cfce293e7164184084c2d403037aaec50abb664f9ed106640000000e0b3b74387bf638c9e671ecd93ccd9f1f6ac674b7223a3c4c37f9d96c2cf30dceb478fff2022507d74ac21f2107fe70a3ba5b1109f48f270674878391fc811ea iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{18300A91-7B92-11EF-9D09-F245C6AC432F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433467154" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000595955a9ba31c8ae7852d73dcbc06b6c90a7a50e6d6a30e5ce5269428d5d799b000000000e8000000002000020000000573ba4173f23752ecff5a5248efb863d353fc2771c208172b88c4e84790af61c90000000f0b433ad0ad69aac7d9012392c515dbee9ecf6853eb551ea653ffd4fe093899f703d832d06ec2fd7072b1994d4870e8a7613198c26d35aab486d8e9da9d222a3d29d169f57b43a2d76951b77e93d6ddd39e38b76b8b21651a1b62eacb8a1b4d3e2f49542920b700ad738e0cbd0047f1930f9d7d2271776a1528efbc6ff7ee69101c10b361f60cb4b5e5ffedf7381dc1f4000000028cbddc0492f3fe8416feaf67e98a376204a1695ac95deb395cde659c00a5d971b1cce1e2856f82824beae7eb5fbee2c4bf8cce3545929bf4b2104018f888c6c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7029b2ec9e0fdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2748 iexplore.exe 2748 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2680 2748 iexplore.exe 30 PID 2748 wrote to memory of 2680 2748 iexplore.exe 30 PID 2748 wrote to memory of 2680 2748 iexplore.exe 30 PID 2748 wrote to memory of 2680 2748 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f7073a6e453d83c985dad0ca19a96daa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e049075fcfade4bab39121e575193c1
SHA1fbd4670977f2289abc062f0ddb491fb44897766a
SHA256678ec0d3877264bc8b2d92d7898d5ffe446efffead95320684898a01efb2ca3d
SHA51275dc059478fb91a96d56c0c988ddb30b757053c0c7fceb7e68bf916cc7c57dfcc3075c002657984eb573294eb4e4f0c115e1ecac7eb50ee4cf885d41f3fbdefe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdd472c0ef513e0ba2098d1cd239f6a0
SHA1e86f8aa0366b67d9ad3ae2adcba3deb91abac7e3
SHA256f438dee55a7226e3928d1ca00de44fd01916b838a76953a8de468975ef320d7a
SHA5128cb64fe6e08d2679f69b6c681d1a8e5aaf91eca68d89b1a6f9b947959275c7a79145839db0310c6562b33f7ea0577f2dc099fce348a987c62ae8c52c221d78b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542e14fc21e8cde2c3573a2032f2266e7
SHA1d06962cd236d5218c9c7a0d13c02fb0450be9248
SHA256969f3ce7cb9b826d661bba3a021736978c4995df267793ceace1cf8e2952c49e
SHA51236e1be801f1957f87aeed145db6dc1b4c5b35aab0fe95353e3e1eca43f2cef4637f91324f524f4e0abdd1bc9d30eb6e5e5e0ecdf0332578f57a3c4e0aeeeb7c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f69e12c4319084f07c4b16999fa695f1
SHA16b349d184aba0354a966176276b1ba47e2506d53
SHA256377ba17db6534426a42407c5442530f5aa6b42809d7230ca68e04fab90f24258
SHA512c75f32fcb4ee373285d856b5292236eb961529ff67ec7728a8867b29e15221447fc87ce12618aceaa178e618f77f58c894120bc0d4dcf2d33823a8593100c9b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db062fce13454ea97779fe172397b7d5
SHA1d96c762da6b28c3536e3bee7c1af5fd4c0b811d9
SHA256ec5fb7fcc1e85937356438b67692d4791a7bd1e879fec7c0bff7d18455c8ab9b
SHA5122d4e1dbbfff2955046168303280b32a51391665104fbfe285d8e334a303976231c063acd4e58cd2407d84b19937077f18e09584d42cc0a77de37914cc34e77d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523b5e2b1d78fb2fdf55b2e88d2437d3c
SHA1c107c23b49b513762937f067b204aaa18d34b1e3
SHA2561156986a27549913967e4d63125d5e73e60289791f693f310aa9220dd56ff693
SHA51268d88c85963e04aefe4724d9a7b603e15b82eac481c761ebea737a90ed59e35465a28a92374a229ea6cc9a810e1cbe388f6610927a1e995d13c8f49ceffdafd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad5bb618f89bead78117381b85f58a0
SHA11bc27db0642fbc30174c2e646e65c51fc7490365
SHA256e16b19f7313f1821850c34a5b06fb21bfa042e695760ffffa7aa17f0554cdec4
SHA512260f8fa668be611e3631288aee3bff8b4950924b03e83123582bdf4d3753c99443a3192d53a2a2e07e62b9dd5c739d9c985e78177f04501c7b57f0ae787e45fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df7497132e701ccdd16346a3f5055419
SHA1c2b9ec54b4c605ca22e11324c593c3c87c333f0d
SHA25672297e83d5cd5b7d0eab3d21c60fd22dc1a52805cc9042cd0171b8f391e5cb05
SHA51205db37f3eae2afa9ea5fbde615d30bcc557923278df7900741cbfe912cedbcf163c1e03d77cc5a8f13f3d3b3818f302be54205adb11b0ec9ec0c9370723588a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e0dee657e2cf7479f33ad05cf55dfa8
SHA1e0d86f68f33d4e3d5179f6c98b41398b58cb97f9
SHA2562bd125db31873d9768e87368fde1b7a67a732ce1936682c8f49701af8ba611a4
SHA5125ecd4ecedbf992200c9dd4dfa07d4ebcf35c6c9169f65111db1fc4b8faaa633afef1ae6223d7f8fc23d66bfff16ee9354ad80bcd7a98be72b51f5b00ddb96752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec44b1c4f675aa7ed2eca10db7d546c
SHA17667c547e4e0f23af0a0446fdb124ebc5e4bdc99
SHA25607a169fcbc70b5009f39dd1d1b63a34b4bddea215d516665740b1906fb8dd4b8
SHA51206ebbb5dc356c33932a17714755acdec72771f3052dcc619065fccc080138ea93e3a331cd5fb0db73918427a233ca5c7d10c32d99a73db83d14e553e492ef2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57466a0d5fc33344416aca98ee1006405
SHA14c8f9c660cd397c5c3339fe694c2fc66ea8c0a4a
SHA2567fa84f148fe9ad26ba7f15b1e43f19d248ff3fa58900eb1fc53a2eb8701a8d54
SHA512595c88505ce7742d7d43f7ce0c831817387a329b3887b6c96f1de6f6ac714abd54bf4849989d3c43b782889dcbd88f22965ac2017062047de830252aca2f7e04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584180a99e24beb022f03f6380fcd8f66
SHA1d1ecf765dc7106aa1b575891c5df814944c3d1ca
SHA2564bbc764326449854b2d0bcb449ad4fe81b1131d40d049da2d51f55ffa3f6bacb
SHA512ca0cbc72917d48e9535bb16b535984dcdcf4a2aac0e14e8d749ad8508b38ef057ba01f34057d5efb204cfd8ba1ca464f505995ce9bba6f7be881ad6bb1e74bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155fdcfb2d646e3d00f65c5bfbc4bb3e
SHA112e282704ef05e33ae7b9623e05777f8e4caeb16
SHA256983bc2f7e02afa2e195669a74241dc09c958c72f58af63645a4f5e91442c8d81
SHA512112ccd1f541c001e30815517a65b2e3f5bf9eb3fdb52824cdd617ee07b1d3b2963ebb0c84f7806460f3bce065f1feb923d0a1b3acfbde6c08ba8f47680e9d4a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfaada77c15e64a47a5e20615898933c
SHA1403dfcf0e34c6d6caff1488173aaba31664f4923
SHA256b9924bc7f024d87f6e5a8a432326ae44a649530884af1e5bfde4d3c4bfd5994c
SHA512c1ff064d0a42fb3a1494f2c539b536455f298915f76e00cae2f1026aff1bbaba7fde860d5b493289db63118a49dc79441051ac48603b325edfb144dce1f4678e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e19dfa2dbd78c1b2f308f995592d050
SHA1ddfab843743274f831ee07bf7e7c141ae386844b
SHA256fc5396eb5b13eb4520156bb5e398f62941f5515548ea8aa827343f0ece9ecc03
SHA5128f55274edd09be9c1de6fb1ffbb9d765813053307e0eace9ace4cd295b01b3a135834be23dc20d73ba532ce59c2a0a2080e0a10534f9c4fe6da1a7297e9689b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f10188933ab15dae83c1ff1a2505c59d
SHA138f4dc193271bcff8cb1573a6a33719967b86a61
SHA256bf925c660ffbad7633e702ed8f8c2b672a579ce0c7caffadd41e274317c2a7c3
SHA512e2634e6d305837dc3bcd70c3766b451419143929e2cd548885d2ee4424ee1ce34e53884f3f2a32dcc7a1d9167ca0e2d26c2ae77fb5b5588077a4125d2ce684b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe4a316e1e55ba2f2b52176ccad59ec
SHA15c8d36eba00c6f4b6a8d593d17ea67ea545be90f
SHA256a5e1f591e011506b1c6f6e221df7d7b05e57409d18cf957bf23b0e59ae3c0444
SHA512cdbf02587351cbe10051586c12b7b2ec366dd732045d959cb5377cfabb7b831839dd146dc08eed89b11d777d81c9d342c5b210e8534cdd7db09963e339df6d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ab5399c4e472141550eb35eea43e4ad
SHA12ac140f4f68b92dbe291800d8c6e8a8c7f2970ce
SHA2561bf3aac67be726b082c224cd25b73fbb41da55786f4976200fe5a6e66b5faaa2
SHA512f3725fefe662a505091ada3f5a581661881bc571b9a6322637b2347f3ca2f72d3dbe408f0cd8bd66f3128721825faae7dee8c6e0b2cf0f0e32293f94dd73ce6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f81f6d001f5bb7c29b4b0d2e86d7838
SHA1b664d8b8e8b9efb9eb6d8cacdf027a76c3456f2e
SHA256a399453861425079b66e90ac280eab5bd8ac393ab71b040423d1d47efe648f2c
SHA512b1b27f36f973e9e03cec4c627ff172a22b5e83c9507dc641bdd3eaaa1b355231eaa612ca8608b6e0a46d5f948094b4d16a45d06cee3107c4f73e6516011910ad
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b