Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
15f0f1cc0cb8e841a65b721ca7f6dc70_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15f0f1cc0cb8e841a65b721ca7f6dc70_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
15f0f1cc0cb8e841a65b721ca7f6dc70_JaffaCakes118.html
-
Size
10KB
-
MD5
15f0f1cc0cb8e841a65b721ca7f6dc70
-
SHA1
cd9dae3e9a2815cd3bd78301bfce6e6179156561
-
SHA256
9caabdd10fa0d03ff45ba39008ab582d1e968c7e6b3faf543996ce0941c20e34
-
SHA512
c8efca0bf5d6406543560a8399b35ab4121b580326a6e0227b3cb9bc89958017d5e5a3378dccfa07f0edafc0eda93d31e060bd8f4169a5dabdda58936ea97444
-
SSDEEP
96:uzVs+ux7CWLLY1k9o84d12ef7CSTUpGT/kRM1pbmhAPLlVHcEZ7ru7f:csz7CWAYS/gabmhAPLPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000060cb496f9622eebf1967193d449cf3d7ea32a7e41dd2af83e871b040e4b72f51000000000e8000000002000020000000286bf7e57758d562802a3622ed5e74e6e8a2f9d039e9013b28f4138a8ee8067190000000df87ec2732b5460383888bd044e41aec7beea5d76d4d9cf670b3b805c3876d0939139e61913904a0eef82552061b876adedfc07899e25bec5383a5c2051f6c818a7847e096440c3f7561618e3d1f683a7105bc801ef5fdadc88cb11a0a2df7cedefe29f5ba5d18a5682f1c066ec438a2a214b8eec3cf11557fde85be7e85ec399928b68214853551240a7f7ebf17b23b40000000172c3018ffbe2560a8bef9796897f1a8fdbb3ace0eb69de5674743d9aba4527120e68257cdffbe5d0497ae7fb4add08d297471148c29f30880365c686aa0a633 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434259886" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0A9DAB1-82C7-11EF-9C86-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000071a5bca840130cac03f73f63b5c5dbe4c29545cb94a8f4b5744f0307a6057ac5000000000e8000000002000020000000eae3a6f34a4351447ffdce5b0a145c668878653e5e70ddb15846c80f504d156f2000000077cc4c0e3c4e87024c6830b17937b4d3a58ef98fbb38245b020c76d1743c69f64000000034f7f3d8cc1066aeca21d86bf3a6f489a8fd541edc9988a4c7a98976f2245eaeb5b49dc83db7c88c935c25b81edd70a014ad4ec65c286d4f95d46aef043a53a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 808f3fa7d416db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2484 iexplore.exe 2484 iexplore.exe 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 1820 2484 iexplore.exe 30 PID 2484 wrote to memory of 1820 2484 iexplore.exe 30 PID 2484 wrote to memory of 1820 2484 iexplore.exe 30 PID 2484 wrote to memory of 1820 2484 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\15f0f1cc0cb8e841a65b721ca7f6dc70_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50199ae4dd72379494204fd6df6ff42be
SHA10e40a3c61f44d9bea920ecd0a09b11fa5b0ae256
SHA25602695534ded034cedd60cd3141fe2f4606cf5f15b8d6716297757a78c3ce473b
SHA5124f3f6db4def7a283c5aa80aae1aab237cd8c1616e92e4d60bb52d28fffb60b89bfd9deb0c631e9d4718900ecc5ad6c80b0eaa8c0cef5702b1eccf3d2401bff82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7ddee01cc26eea2157287d5f405385b
SHA17f975cc86c0abd8d94f1d91e83bb926b2369669a
SHA256c554c1f556adf4afd87eb400b263358b7c931700e87089ea9c838dc583974772
SHA5128664efe8503d0fc3327f82de3db3c399a89aa7a58c4a07b93b9b78c4c1da86568a53a65bc61f07c4d4f6fd28b36b334944dea49337bc115c6237bb90761fc468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccd6987b47435f864e01fe9d53f75bf8
SHA1ff5575e6364ef81ac1b82a6e1d64fabfef0c4152
SHA2560949b727073a62d553a5bbca5da2f660af279495c88c9767b7ad084bef562bd9
SHA51219aa6f03955f222bda246904988413019a06334cffcf07dcb8a1a508610cd9fafb34084a302e053841699bc1c6ad2e7321c2247d2c3d40fb19fbf3969e429040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b7767c3bc400512861fa3b7ef1e5698
SHA16af6041bf93921e7d49a1f18c6a711bfb2d62dfa
SHA256b67aeff30a3d14c9cff056262dfca32f8b0203ad9e50741aabb462f7004e78e0
SHA5123fa3bf1cd4b7bba4d4eeb58fb465bf7ca17bb20068e6b7ea1e99b18ced8d959246bc64eb3ce7c50728bba9ff21775be2ff46159219bb5c0917507ba4827ce6bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d0a66f245034514bc4f9a7ef73804a8
SHA17c7f4143585e9bb6400b77e8a2f121d2373cbaa6
SHA256dcca90e04e7c51711247c9de9c161bd328536435484a9627ed0935c0b054e989
SHA51214d9d53cce9f1e127369f2c1c15eb8c647c69985b0dd60329c752952fd24d1e5406f60639892d1b2cb5bbef12d34121c30bc9c6062e888063611bbc78b8dc462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e335c43d834fa97e1d03eafe5ec0454e
SHA19f8b9a7789543fd054e3325a9725ca5a0f008035
SHA256d9e67518a0cb26f0ecdc09d20d50520097e213d1e7d6c1023811a32f34b6a0cf
SHA5123401767dc7eb06f900d2dc0d5e6f920177efaf41fde9bc861bb826877406e4e7cdf48e4e3cb67a62069f3e5f3dc5038345fd064cd00f0a12f9df3e0dadeb2ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5635a712c74253baf112ccb24fcf5f122
SHA13664bfcf8eeb0baba4749153ba491b973747f299
SHA25634a01bf0d551dedbb15a6c16ad52a864baf84957dbbcb841228b4547ce61ffe8
SHA51224d367bc5f35c8942a4e9284e3ac0c5e266d0c792c672300fd3152724a3162461d81c4cb379dad5d8399d67968883e2dfa359d777cdcdeac5fff6e04ad1bb8a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e14027f1605760816a7d05218b51908d
SHA1c1063ab6476296b7fe9ceaed23aabf1118b52dd9
SHA2563c1c4ff6e23e9e06eb2bbe4846413be493895d715a5e507dfd72f88523805459
SHA512965d0b17b5bc6374038559b7a68775538bfad0784a1345ac9e116c3f3c5147a29d6733b646287428d38de046525e455e70405f221f10317582417fbba4dc22ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575c58606630b297c869aae84a4a72cf3
SHA162d2f312ab3b7f9a83ff35c0a5e4da2350ab0859
SHA256242f6c58d6998631ed772d42540dcc015edfffae196c3875880ca40f31853567
SHA512ddae5ad7f091f2a8ec07e846f51a185542c341e6936ebfb38dc9edb7ba696953d88e3d8fca3b3e56282585dbcd5008e3133e28d110b6f6873e6e417bc8aab717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53176b290a631c9edfc64ad35a4f559f6
SHA1fbef64c80d32fe41fd4a9d1180a2914aa3da81db
SHA256c2405c80ab6d4f977a3deaea38a6c07ee0fd5d348963299944d1daed434c831b
SHA512fb26bb03349ce416d3d58cd5e615080a2e12099e792c05b159109b798043f44e0fee4051e0c0b3058f910e016841e2738bff6d95ea5a5b0abb9680711babee73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a5b6821739ef4075bc680e70ac58a9a
SHA104947a720cfac15686cdc1eda40f61edea17f1db
SHA2563ce8d2e00009d910fddae7d0caf25e71afb2eae137b7250faa13ffb3061c0522
SHA512f2e29d3d657818d37a555ea4e20bd7f124125cbe43fac4129a20531f61a4b3b2fcf4fc57e4c46452cff098dac4debfb7b9ccf2669a4f6b3073f8b26f09538e84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3c8f7acd11a7ae3c3da701e8b2627a5
SHA1df1e8709122d0c0409db13db1778b34c1adb59b9
SHA25687b37f550cb1cdc8a48d4d2c2e512ee8aec5f32a6e3ace7317c6ffba272cec1c
SHA5126660f807aedc90a0132839bd1efe23822b7d47cefccde41ac20b028edf0231847ead5850fc3ee8dd1747676347109d11251c28e3471f790cf62f46d80b445209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d4f14cec8b9f0f37ef3d8d982804418
SHA1cab8a2a9e8c252d5473ba575c311356ecc9ae2d0
SHA256a48ded4a3c55160d3018b8a0c8e426b1bdf15f09f1520e5a42963145f51cb92e
SHA512872f922fe6d2f64e4b7c580e150d5a3888c700f4e30efe8f4d6da56723bada819f4ac55747ff020ae3244a375787bf26ce25b68128b2379e5dc3403379592391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545ac6fd3616f7cc247ec5ed8188399cf
SHA16c183b09551d7b2ac7494c43b257a22ae32e4f55
SHA256cf1e384c4d09ebc27c5a8f2c80934a4c54fb18850710ce557ff121836a617c9c
SHA512c55c9e3eeb40aad3740634cf2ce3303aae15122e9ce688684a4c5b17085ce3ef6f88978c64ee2bc6de25b7c41e6f3203b31c6bef3a98ab8192f5b1844ab202be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c8d02f61bc24a55fe149e39c494b8c3
SHA1943359e06834bb1e1efe1437d214d7058862e3f6
SHA256387cd4b2abc3b552ee1bdd3dac0094cf08ebc42f6e3b7002bdb1af5d620eab48
SHA512d7ad705dca4e040c2603a3b6c25d8c141c7b489c6a4848cd22656c856ac9507ecb07986e855d09def4f69a93bc67e9420a326efbd3014d0b3be8a8fc87032f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e2d1600eda9e5a69acea70bd156d860
SHA153da6f864fece072978a328fcacd39af06620d10
SHA256bd2f7ae3749e726c9fa59c1faf824445a8a2c753b8010d79bd5242aacdab129a
SHA5125eb58c3efbb22e79176cf2adf77188eff8489a4679eb5ab66b3ed71dcca7be91c9ac51cacdc7106ccf4ecfe3392b407e4569960a90960e75c9f266c26f89a529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d0e5c24b5f4507c610787400c919405
SHA1698f8cedf950a4e9455508a3d25af30a35edd5bc
SHA256db5631c8b40140d8912cbc81f5350176c0e754fada1375b54f46b42697059571
SHA5123c3119698831d01d79e572337d3801526c8a37b346a99a21bdc5ee0b294cbe7f93f5e7e8c4c84e715fd25b164ddba0fb4f39da06da2e04f754de86949eeaaa14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52460949e4c96ebcb165e78274d74598b
SHA18f1d4fe63b9f66a77a9475044ce1d99db0fd8e4e
SHA256758e51f5668ec1ac97dfa9e3e353f9f44515e242d25d4455062b7844e56d8a49
SHA512d84357a213834f2ab2146f0bd689ae4c56ab1f3a76a1e6c0352523576738c74aa25a30303479769c5e883ddefabd92ef73505491d0e81e817864ed42850cfce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2a1c6eca0da028a6af5df5e41c5b17f
SHA1747a70d959004cda71e8e22d32ed7031eaabc65f
SHA2563c072736e4b93146f647aa1abf6f25c45ac1adbf0d93a56a2f50eefd6ebd94bd
SHA512ccc935697e2257ae5e19c404a12dc47113b85f6a8cf19994d1746cff6c71d86888badd61f919f5c8aa4cd116445bf3086426fa67b00d5874a8581459f08f2fb1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b