Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
0fab2a9a3192211fd77cbe9520047646_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0fab2a9a3192211fd77cbe9520047646_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0fab2a9a3192211fd77cbe9520047646_JaffaCakes118.html
-
Size
11KB
-
MD5
0fab2a9a3192211fd77cbe9520047646
-
SHA1
5e02ae8a52b00fcc9da159db95b71fc77b047701
-
SHA256
62043a44ffa83afc91b6a0786a810614f5bd3f864abdc018d090314020960385
-
SHA512
c6baadc0c67fb604fceb1550ab3d8bed6926b2d8078af870ab298a3686e74479e4836ca1a175412fa1fdcaf051082386eea68721b9075aefce6efd5ef7379614
-
SSDEEP
96:uzVs+ux7rVMLLY1k9o84d12ef7CSTUkj3OlpKIoB9bRcEZ7ru7f:csz7pMAYS/YQzb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434135533" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000076d017ef388c3341810ddcfeadccb01e00000000020000000000106600000001000020000000fb6b82e4b670c2344df4092f0f12848169b4f2ceb7860d1293993bb323d65c6a000000000e8000000002000020000000baf141b64e7e7277e95fc1dabf358dbf21c2a739f4b2ca0371b5e1e53046bc4f2000000034117a7c3a65600da6bd0f85117b2034ac64000c1e5e0f89babf60799c5b2610400000005038073ceeac0f7c800acc40cbe2fef98643e8371775c501c7a85db834b588907fcce7a57534f3cff78bbd89038338580dd472b2754f3bbaf53a7632a2e81007 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{487BEC91-81A6-11EF-9E0F-4E18907FF899} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d07d061fb315db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000076d017ef388c3341810ddcfeadccb01e00000000020000000000106600000001000020000000c800c666e5d271687aa1ab16051ec0bc09c872a67e3b49de1daaf8c9c5a9d1ea000000000e80000000020000200000007421cb37eec3f58f157e4c9b772a69c021c7669bdc242d6d959fa8e952e4ff3790000000360c698ebe32779315ca9478303510459ca747a433a45772904815ea6640f83db77dd89d60baba71bf61c866a90a09ce698a847527ff0d8d3f6eef9c38622c6f82adfb7c5b4b46c191d420e4559b88de6c953674571407339d9a52b4b021d092b8a7a80844bc17a4abeeb874a0e69ac2105b9c3d06880a94805f3e3e200046dac96e8a8a3433c37ed402ad0496c0d0b640000000ef4df6e15468f786a7008b71c9f5490429f2b00fd167a97e8456614a3941b704f3759585a660a339c2b3cc2bb050e263eecefd2d1279dd7d2267e36155426661 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1864 iexplore.exe 1864 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2300 1864 iexplore.exe 30 PID 1864 wrote to memory of 2300 1864 iexplore.exe 30 PID 1864 wrote to memory of 2300 1864 iexplore.exe 30 PID 1864 wrote to memory of 2300 1864 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0fab2a9a3192211fd77cbe9520047646_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1864 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0d811a5f95247298571f79e9b7c1845
SHA1c34d5d5108bfdaa1a0ad4ed92e5e5d067f80feb9
SHA256a5897033110bc392f2ae5def97fc344ec660f1ddfaaa91677efa195e2a35374d
SHA5121d2c6876131035269f7d194482b47a525fb805077c8237e65a3a8bf6b5138ec386918f88784966d6dd1d7a405bf1a1e5d5a5d52d8b5ffa508e28fe81d829f087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aa20cc150e1172150b25accf484d7a2
SHA13b0c1dc423a867288d0da5013e5489bbed0c9b91
SHA256a2b345c3741326963af2c05dc567a12fd48769b7094bf994d78737512ff8ce60
SHA512b542502b08054499ac4bb862f02e7942a7484b2bf9a40fe8c4443a95225f1f9ab6b76ec0e6286383e968024cff68c89dfcb3b664712a98d631f9df75a3c2e376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580956198f4b5dd026e71f6f9995f77c5
SHA196ae579c3b282520bc1df9f0c04718059c4f3651
SHA25625bd25e626472bdc0d3155de9ab8454aa26ffe9992280bbee5d9e7aad21df6ce
SHA512c6f9581e00b805ab79cf22b7d718ae6a0ec63ea74eeb3dab1ce6299a8957674af448505f175ad6e3ca9892b15b7e1453e0cd08cdc59481b54d22d8664d18567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa204d92fb58520e92edaed0ec4a39a5
SHA1d16f9ab823fd76ed6abd03bb80fa27ea8d59ed60
SHA256cff1ebf937cadfa98570ff7f9dfa249eb3b9b8249ef0c5fdf46ea42e65172b41
SHA51205914cba68a0481dcab6840d3f0242e9d195c98e64eae86b683348293ff7fa037cb8f33e6b74fe4d27b9ae7a768399108600f5d4dae37b74e07d9d504d134b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd3ecc15d89632a1a595638ae71c71d9
SHA14d92923498f1cc0a32a1446384bb21c9aac4d509
SHA2565e633d1606fdf9dd8b9c3870f00b33b6d34a99366e910dc3c0ff4231d2d2a6c3
SHA512dba0fe10c38d419c2fe8adf0d6d4b8755cb9726a5e91b358046cee3340cc0882eac61f2528742b9b2b56050bc5a0957151d62dd08d03084e9e52cd77e0f84828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c1f2e3023536d135359a168ce31557e
SHA1c35df116eef1c9031687226313cfdf83dd09cde1
SHA256c84b654f9453b827ed21d22b119735a0fc11249a68cb3b57cbeb52d1661e1c80
SHA512c82e54402721b167c669ae15970b6a3df0131be7770c0e8989817e957e93414e626f34ad098759ad1e3f147227ddd33250e945387b2f314f94dac60e5cd655a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c14e31335bc7b8b4c18115cc38d99811
SHA16f6d5efa96c389706e7d6ecc8fc0310267f384fb
SHA256d66150be099af5a2138bcbbdb62f785add0905fcc7199de9a58ff7c6820d251d
SHA5127095abdbfb5736fd896841c2816a8d206f0c40833d5de61079884119b08a0814b463c730bc4206054c6f95a296bc5f341ce377c924d026cf480ea712b9829431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d73cb14d7f04ad58c108445e27602dc2
SHA118dd08748eb23b9a9d14ffcb4fce760fd70fecdd
SHA256e31c26ccadd3f9903dfff6570183ee2e4b0df10a535f575fad76a6a407174391
SHA5127c373c35b0c08095a9f734ef5f0e95ac70e782eef8b78f704fce11ef75f2902a5f997896fbf0fbee65ad405c3d077985be4c4e3ca6558d641144eac0fb4ed247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dff01d921b686d3b63316415290832a
SHA148b842b085b525a40a7c4ed81c2e484126a3a7a8
SHA256b1492822be1773d236d668df6954c1bf891b1d5c0f046e3c8c03660f9c169084
SHA5125b49cb41aedafb6c5eebdc51cf9cba5cb762e9a0ee19ec491b86efccd399d270fc1073a78e7fc46cc192e493d2f7873e7a19a7a81270cadcefee502c3ea2d17d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5165aca28194ceaeeb43b15d8e2aa719a
SHA1f48c3c1e22b066b895b26cd6596a5b055fc5517b
SHA2561ae92bea8baef7635f627d414f7bf70ae30c2c0dc5d8651889470365a5179249
SHA512707892cee30b79ff978e9e3e02b2ecc3e1d37a4eb75b194a7762d60d1a6849133f15424cb92d1457731523b39ca0555cbdc3aceb4ab196aa4d3751d4d96e68ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b6c7496c8a0601c26a080ef74e74c7e
SHA12493b7a5799901b364709d83deba6517e9a60b25
SHA256942db2403ca0766715ffabff348878eb6c467983a71bd072b59e51b757bc25a2
SHA512504799128a7d5e5ae3d376c61a5e4bdb4fe93932de4aa8382b50852d4c985846c0818523cd2b898179391a242f655a0c44608f64c23711959c407b78af2fd523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0fac06de4d449c876f289c4196a4b4a
SHA13f3d970d6dd9fdae4f678605c1f47bfd5dfe5af0
SHA2566f5bbbdfca7ee06f3e94d225c7ff2ba622f84f8dfab513b36c0a48c80bc6b01e
SHA512add46eae1746cc8da7ea62071f7e999d45dc533103fd514f3a7ca1129946051f83c5f902af8922d2f81a4cbbcd5b2bf6f0a1a5cb25a2356967c16f3703aee386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526de602e4c2eb84ae21da592b6ecbebf
SHA12fb090b96071c6d024f648645661bcdab77ea9f7
SHA25664abb0a6dda849ffe77b630f4614421d1c1618b3babac593406f2ed69ec78b71
SHA51219343eef0f05a09ff0cdadfc04c828eb6b41bb07e81207cbce7a0833a4ca11f1d817760da73b2c828a1f747f361beae04ca06e7aa340ba6050ab444fcf1ee4bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585df176637ab6e391e2c7ca40f4be4ee
SHA18a331e6c4363fd2cb464a08ecc85a1b9c6fa70ac
SHA25672f5b5bbc39cc8d401a847a0d14726285b4720b7915c0e5a48c7a831f29a90fc
SHA5128223b310d5c5d70d538769a650f15fec1c3f73e199173219343518343eaacd207a4e3c8b2debdb781e75bacaeea7287b32bc1b9cbcaecdb6076f62e223c1615c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d538078229e4eac9a24b3324d383ea0
SHA1f02205c504883c6b557d62bc76af89f59ee9d6ef
SHA256d68c243295a85f582f29d9e8f565af9a03ba0ca1e77dfd1c383b4e03eaf5b617
SHA512e8663ae858e3b70010158892a97db4691df432f2dabe33288439d94d0cdbc3a83845a62a5d067d15655d32d97a9bcefe71582d35b3d27014ee22d25b9ffe1f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5924e448b3f89d3f265d19e102ae54ffa
SHA1ba1415c497ca2d547d9d96ec4d12ee1b92641215
SHA25656860d259153c91bdb9eee7aaae76b0b7c895a82be317d7096839a0dcfc6c0a1
SHA51208db0a6e41c41aec694a70f1b9b722f2c4ae14e818a385d28dd922aa200a3e0eea63fc2558b614e24f5d1462901817474c37deb0e6682f92a316ef9de827f4a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d817dff7b6744be5d7e1ef1e0b64ee77
SHA1fb181bdc93c0c75913818aa71e749de135e9fc59
SHA25612fc8c17f94ace5cd0552495fd9aff7eca9bb07f6199ebdba84a06073efda3d4
SHA5128b2105e8eb544dbc719dec1fdb3d46ee3a30a9ca37162d63113fdeec1d4fba47d4666f9654c590ef3f0674132ea8272fba12ca4ae26a72a48a73c1c017e38bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc1215744f37e0db01052d1898490fc2
SHA105aa70719b51176d74afbac4c36c09efbd931c06
SHA25604e153eaa96e56b8e80e126f1c120385c67b12628e4f60844e38b0282004005e
SHA51258b8d2dd122b4213f2ce2104d5877026fad6a8615c8ee8fa886717ff56e8bac6267f6ff0e21e340bf2adac2d7c53e8b002dc093031a8697430a783956213dacd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ca409c4539284ab7c157781f88b63cd
SHA1cde2ebcdf8ad2fa6380a776047365a1dd67f91cb
SHA25648a5afc649fd6b4c40cd31be3d35de40464861606d12a87a03b30c45ee077f34
SHA512c2c9d998b800f89897d60232405e796e7ae6b2e114649ff3853f371b05f09cd00b78c9fed8fb3e1e3fc4bedcb1dec972fb979ddf731bfd8f2fa6a2768f86fb22
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b