Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
09088c7bcac74e70337aaa76a336dd61_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09088c7bcac74e70337aaa76a336dd61_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
09088c7bcac74e70337aaa76a336dd61_JaffaCakes118.html
-
Size
34KB
-
MD5
09088c7bcac74e70337aaa76a336dd61
-
SHA1
b5a2a22f666008bf27b5418657a64b82cfce7fa5
-
SHA256
bcba188cda41810989981904bdd6a8bb7cb4daa3bcdd24f32cb2eb2d7af2d8c0
-
SHA512
92b65a5a30527d6a22ccda4b5df358c666467112e0122e58a40ca054319fc75022f1bf4ca0d42fa6d30b492210e7e720634414e42765902cfddc7366d3d57e10
-
SSDEEP
192:uwb7b5n1enQjxn5Q/YnQiezNnLnQOkEntU2nQTbnZnQOgacwqYPcwqYHcwqYQrlH:LQ/EeL95rlNcZXE2iHNt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434007565" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55A2F651-807C-11EF-A97E-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000045874bdfdc0befb09a004eb7a5b3a92988f384048490f09a0e6305ac3c853e27000000000e80000000020000200000001525569556d224106d0db94c121f34116aa059c158e4d18cc7a95a8472e05fce20000000819ce95f26435d20b62eec83e50e69ecf6b704b5ad20d0c02848cadee871f02b40000000f311add85403e23ad125eeddc0cd86a183ee4a5113e9270f60e75dc7c3ef33c7668b301f0f016d313a6257076b981832822df9b9006860e68b556a84c94b4c65 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d7dc2b8914db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2404 2012 iexplore.exe 30 PID 2012 wrote to memory of 2404 2012 iexplore.exe 30 PID 2012 wrote to memory of 2404 2012 iexplore.exe 30 PID 2012 wrote to memory of 2404 2012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09088c7bcac74e70337aaa76a336dd61_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a44fcfadfa172f0804c095d8b87863d8
SHA19c64be7fdf13c7f1f400af53c74ce20ce1c5dd69
SHA256e98fef07b4211948c1670f2c4cb9a12adb4c4d0625e508314f95014901d7571d
SHA5121697a1b94bcb4ffaaf1fc90725112182883f747f111c71edbe22fc0f5b99f582ae738a9e7f36e4a2689bcd6a4cead12fc97b25803bb57eaa4f1c5c01de59b490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd4af2fee08fc80bac85ca5f5450652d
SHA1d25311fc5419fa5b90e65e10517f7eda671921a1
SHA256dbd4479f746bc2e5e5e798e3095eba00565975df40e04e8028b9333bba5c2567
SHA5129b5d7b4e4f8ce5278a83ced8bbb61d8b0c1a919c8c994619a7bd00f22e47f3cb2e9b2cb3dd5a07e7aca80ace9e9a88aaa5c752aa51c39941299aa628bb1bb20a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2d4a5ef7afeb352f02ece886a9483aa
SHA1e2079869b4f26aa6c694917e39348b6a9fae2a3d
SHA2560c8b33551d524be35d5977d3b7e119134f2c4a871926daca0c5e1d213d08cd31
SHA512247867d50aba41a3c687c73fb5b7f55c62910ea3102010777de83d9376c2d9838189c7fa20b86a2e99d6a94c30cc99b7c74c7b785ffdc6e78db071342dfdb370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed8b79f0bac8f5c524d267216257360a
SHA1de407284acb258206cf9510f00036081571ba666
SHA256cad495bff8e99b8db796f1afc352855fe60674ea6463a6e3b4769a79e81f2fe2
SHA512c22ee8f39c4cb8b844dac9df6f58e874081dfbe4cbc43bcd8ddafdd6f944c72f0345ab3783556a4d1e6451367d35143eae79308915eb51a201b7b38e212a1b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bae2365c8a6d9c82c8d471bd56751ce6
SHA1ac1a5ca65b7ce799e5d025ac1bfcd654cebd1b0e
SHA25692feb30907fd796c664cdc7bed19773480dc76ccdcf5447f71700a746e4d10ec
SHA512ff5d43e0582b144d47b146837bfa3bc9ad467c026faf40d296eea2d741b7e08bc124e1c076744e107e23abc463cfa3176f03edd3724f1d10640a7498f6712a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf85341861c82e69aa0e9bb4aae68218
SHA1b8f06ab1da89f4c477acbb2601df3550966f6d24
SHA25606caa66f9a5d4ad79ba6a76b9df46c9c3f561a38e3eab0673df7d714114aeb77
SHA512be46eea9c5191e39c64a58ecac1336f57eefa01a02c2db5f2a0227b4da9157c10a44cbeba8bc687a23e302a4711fc3e282cf1221fa58a34c5da835aa4b7d3c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ec7081218c26e06f58372ebbfe07c2
SHA1e1b06bbf34287a10e6ebd637351e41b7fd6700b6
SHA25691df2c5109db6729e81d53b3c3d204ba4824344114bf1067365ed8852aa6fe5b
SHA512a2da8fd9bbfd13502d7a684e490f30722c8a0cf9a9de0b3db6fb6192b85ad96c1a3695687448c16d1e70cfa21dc1f75c1739ecdb53de0df5b81dd2816a934c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54135e9cf1b975001c6797089040eb08d
SHA114de9aa5e507e62b9ae9d85346abfbcaa58479cb
SHA25645e60443400f500559eda12a38d3a89087bc5d2ac1a6f237b8352d00ef054bde
SHA51299d66265adc4fcdabb391ace6c8fc9f6b6b07a5f962d03384d04743f129fcf555f837851eb075f01ec4352bab1fb8802491afe3981467b566358b34ff1729393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e931796a1246fad2478468333c257090
SHA12b53755467f21cfa6ec88ea67fd36014483f181c
SHA25629b5f2676bbdfd855b3aae3d16a8eeff1c673550c383b673827e64338cb8a69a
SHA512113f0c4513479f6ceab9df7052c954fde4a05535e54c105eedeabc5b7bab42af94936d4499d9df32a6a0d6fcffcbd5cd6e88997dec6074b1ee9d85bf8826beea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff2608560459db73891495e91190bbd3
SHA1eb806da9927d6f77261e9fbccceddaa83f122ddf
SHA256a61eb38cfa27c28c436e9a7a6e97ae474123e9af826a89e2502b5e24519a8342
SHA512dd625d24209858c63095889d3dedc94296a5c1a2b7351e53a6edd7d896c1c7cae51ae0ae57ad70cbafab2ea23b57ec1cddace0e0807300644428b61e58550dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a175b96ccf17b45b0b5e67025cf6b6a
SHA199dc25a377ed539ade274da821d624a5462f613d
SHA25626814139a26356340362037007e57d31270b3b2844410a8c8bf4b43ef00c5a34
SHA512ecc5ecc9d65f8a4f7321b3736d708d430371c15d099760e944d0b4e213318d383575e524fa0c4e5a5735b700087d39136ebbb666acbe37dfb1038019a1690536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597014625bc9db9bd19e462550763970d
SHA1af3e165658ee13ed7e91d6dd17fb076c337d7996
SHA256f5738c3f709791ddf22fc03fae20fd07305f2fc985e81bf908a866e675f053fd
SHA512d93e1ef25bc180350cec6d39b75e52f2157559d0efcc4993794349b599e7ad62790758a5e3b3b9c7a2fc67855d35f53a99cac39b062690c6060c9178d84899aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8620f4b5b69375b4bdb3c37a038c83e
SHA196496db2469f6138f77319c4ae53e18387336f09
SHA256c21884284cfbc4975c805e2df26d19e7ff44df7fc794d114a2b19a93a5a5b49b
SHA5123f9ff4ad58c3ec9f103fc037391ef1dff81ce6f2beae6e5fec3db6713143fbc1f2015afaeefefe7dab2c9e80718281956f58e45359548099a1ae696e6b755e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50022cb7655331c695c0596371ef92d46
SHA1e81f846841588ca8ce8d6ac9bcca15f29cbeaa82
SHA256d7c4632a6c310e956af6a8ec5fc40c1c0ed7ea32f63cb94de11ad2bacfea2ed7
SHA512888d5a3d90b42ebee1c669b00518940db3e4ae7b2f4308af783decacf12fc793664d1f28572e6a3328c3a553ef696f0e316bba8101e2a7747731fa35a1b3379b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556970b98694c3de4e06a4ce1145268d8
SHA156faa15adcf2eb51a159e251795949cd861f2ebd
SHA2562d91b5ab89f34b5f9b8da7ebbff0885a8e26671567138539d6a13bd0502c8543
SHA5123ae99ab5c91178bef9c07535719141dc704ee2fdfd2b618a306d8093cb9870aea5461a66079e851bafce54ebd5199f115d7ebd7f5f8453b5441ba4bdc5b5ff44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc28cf21a2838dcc19fdc8e830346018
SHA110bad499d46dd9a8008ec28a23aa367c344be03e
SHA256d57fd7cff94b65b681c79100b488aba5c32e940a57fd4ff7635f124efab65be8
SHA512b638ed1409f63d110e48eb6d4a4d2d77b61e9fe488181cd93af030c1f10d7c5e3c3e3ea69c2003102f65da073d74d7d680567f1defcf00898e8cfa3896e27e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e865349fe523e6e25de6a540718bd50f
SHA19df4b830055fa563eda125e472c13fd8f5114e4e
SHA2565a096e29574c812a096a218386c2b833f9fda5e133f2091dc7a83901ece0f943
SHA512e2c5a6c2b2b14b664d965848503504fe840a9d8c2858a089532e6be4dec891ebae482dae8c0c1b5c23d6fca6874a52d2a6bc56d756c2b7dae734d28e8984784b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6d13663d128a60c0a191c55ccfed236
SHA16f5468c5ca3fc243d276953e656e6aa4e74efc34
SHA25652a687e2e1d6b4b09246c9168ec658d7cad16fc752ee8555e900a3eb6e751613
SHA512fe5bfdbdc92ff052c8d155ee741c1e43f01dce779bb707d7718c10aa10e8e374abc19f31c935130bdf81ab12cf6306464ff0f0a4cbdbc0ca7ac4cda181a047ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56de59557c0f8a6fd09d617815afe6c55
SHA1f8b77137a8d6fe47da642db079ffee7768c040be
SHA2566a65165dc63f54ef7398a3166cd7941a456aaaa8303c36f660146fda9e38d6f3
SHA512b640d61562f354dcddeadc20a35cc16b397e7de0f6c742c2f927bcdb4f1e26bc81e78b874bf9a0897cf23605b7e287fd49253e8987e1d88241d274df578e0d6d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b