Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
a12f5338021f654f8df0959157a3a19f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a12f5338021f654f8df0959157a3a19f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a12f5338021f654f8df0959157a3a19f_JaffaCakes118.html
-
Size
53KB
-
MD5
a12f5338021f654f8df0959157a3a19f
-
SHA1
af855c2330bd58ba7feb6f23bde1666493b68a04
-
SHA256
96a9fcf0d380459a2833fdac0871dd9530d7ea11a6dad9e4bd74e70365539e46
-
SHA512
49333054b250849beb7cdf99de6b89f79c27c218095c1019e40bb7c46fc8404ff9aa8fa5b5d1a1e8497223684bd597111ad32f5846ebe13f720d99582ac6b87f
-
SSDEEP
1536:CkgUiIakTqGivi+PyUMrunlYt63Nj+q5VyvR0w2AzTICbbRoW/t9M/dNwIUTDmDe:CkgUiIakTqGivi+PyUMrunlYt63Nj+qQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430030400" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000083ffbb2a134bd6a2eafee5fbb1aeb36069dc405c9d2fbdb0906e0949a7ba990e000000000e80000000020000200000003aa4dc6e2ec4b80910cfd77cb6bbf38c6ec414add820446500aa13e1ffb9dc2290000000506c4a42abcd9d95955e44493cc3a54d9b258b37f7f7ffc54d7457e4fb8e555ffa2f66086231a36c136e0f44db22715d6dda52e0a9a126b656ef3fdf241b03c7839382b22138f2573f9df4f985788e1a083f30a7792c647724bf5ebc0702b30e59161e4fd6c099508664517f346f4b03fe3ca0657209674182c4d1e19edefedb12eee4c36187eebd4f33da8bfbde2cd240000000f6493a8a9af127490db78fe4cfe9a476a158d86c13ea53227868099eccc5538a5a518f58b0dd7b9073dab5e69dfaa8ef5ed7c5cc2e0b8b1caac95cdbcc56d34b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{472D02F1-5C50-11EF-B3C0-E6140BA5C80C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 100bac1d5df0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000a1002d6e7aad3d3e358627eb6b3a7ea6b8d47c9d3bef3d4807aa3b05919ec7f9000000000e800000000200002000000019bcdf11f651aa565292e8a26bb77a3c5bea657acaa949613135fc74f72c99ce20000000cdb4b6ef2ad94b858aebbf977c1ae0cb7c6aca5b285b6e161a464a58c326d529400000008012e8fdae48bf444c6efd7110d43287de6dab6a4e2af922e517a63d529d25e0bf8a06253d1f546dbd564183ce669d41bf90b7e7debce8f51ced6c881ddc82d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1928 iexplore.exe 1928 iexplore.exe 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2596 1928 iexplore.exe 28 PID 1928 wrote to memory of 2596 1928 iexplore.exe 28 PID 1928 wrote to memory of 2596 1928 iexplore.exe 28 PID 1928 wrote to memory of 2596 1928 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a12f5338021f654f8df0959157a3a19f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fe43fad43e96fdcf73704b884668ba02
SHA1c7b961e3f75963b561301d1647f161c9effa34dc
SHA256dc70736e9a8273e81a1940112b71a4569c9a301746351203a050b3b429c3f112
SHA5128ce2a67a5691ba8c5ebb77a54b7ad1c7d14a17c7ba3e5599f4d24c6fc30870af0cbce870e098c7aa1f3e29ec546fd974adebc8c16cbcbac7811e794d38b702f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bfa68517eac0dce67670bd7e3c725b46
SHA1e2c88fd048080befc622b1e9d58724fbcd487db0
SHA256fbda6bf1576dc2473c3ddb1e87af8f0206ba190e062739a99fea37e8d7b42f86
SHA512a92bdb2e5c17a2da1409dd5b5940ffd0d08f4f1d3da4b87d8ede8321a5ea8088cad23c976f50986e28e71769e510a0e5f1ffc1337cdc80fa57999b9c7cbe8ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5aa3227c80cab08a45582e441b9d52fec
SHA15b1459ed2e74999c93cb57914c3269a269dde349
SHA2565714cdf8b50d9a785362f00d69bf0d15106c482f05b547d4d2b3e8cd3729b4d9
SHA512f943986351d877674c627683c88f7e9ded5b47f0112d2ce96e38702fc542228db06f089cef13512f226068b2543f9147c770ca41de58aa3f392687016e2daf86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5917b18915cf4356037a2ba342e497309
SHA1ccc579cea4888737e028b2fc8a37091b607c8db7
SHA2565b9f47572493ab38e1710dd155101a232e555ff2fd932b058e5071e8cd4c74ae
SHA512fe28c775f6feda3c2ad95a7fc29389dd69410aa93bcf34e3466fd855cb318fa2df741e02a9ec0e19a6a685fa047fa05bac5abbed84d060567686928670a5ae9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51ce4901c9a45315496d30d79eef2e8cf
SHA162e04cb924bbcc55b4802a9eb55749c7eca30395
SHA256a77c57ce82b8ff730a222e7948e455471bb1ae7c19b6957367200aa56dc83168
SHA512d09e4992e3827a167cd0dc2150777849a1639a7f9ab088b397cac85581dd94ff9ae8715b68bec2ae6ef9d3c0c08afa87f74a4a04255d376ec5b074370019808a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53ffb5a1b88e0461e87d74b5ad623d052
SHA163871631037d0c6e95c550e2a6589883d8d247df
SHA25635882073e676890fa1defa555231d39c61cbc2ad07be1e4857d9e3684f508a71
SHA5128b449c20e3ee4e5e9b70b6dea2982c09004411af5ae7dcb61315bf7c77adb6261a37069bd761e20e2042299bfb20125a543da32603b1c6f773de24aed9499da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cdc9d32e9ac136eae3baa8a51f0cb891
SHA13881d48d147adc466303620f9815388810176318
SHA25664c2f1ebda6aaf531aeb9068bb9ced878e91211bdd23a0d6ee4fd51cc4e54d4a
SHA512baf68a67648ff67dc0bb8641c659074280a75b55081c1dc24f9dcd864135254173ca749ddda930f33a954a639d2180c5d4108a62ccd22b02bfc1d5090c251b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5619cb0f6a2e57bc582ce5949ffc64194
SHA168f6dc87a51e306b628d0acea86d0772941b1c05
SHA256bad5a9e7146ebb14390f500e1993468e3d0e21dee22d2b25db1347ced5cdc25d
SHA51213ddac2b6ac900c8ab8162e83721bf11bbddd615a53f4be77cc4b85ca63ad5f05fc71ecb6573f73b057c21c51daa82356679db2acc1c57eb6352ac89288534db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b8824f1a0f4cff3f5eeeebc7e6600fec
SHA13d7c3b4a458e4030c67c2d174263956565951e65
SHA25662744b611a008c29a89ff8abc1c18316809d8548c58a859861b7ed0b940997a6
SHA512942d5224f0b60a0e69a9559944b527bf2983225e45b7a86ce872786182ecab2eba7638335567cf451a1deb5e9b3ef7984d6540d42a35e6533acf1efb207ce8a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD553c46641d82e3303e18dcc138e0f2c32
SHA116996c090f2a44c0d8d24b5534334c50dbc623b5
SHA25644f36aa1d465aae021e68701d4b98790c5f539e75b20708e26e1ecb0918cc337
SHA512bfa624aa89c63378fdf58fb28c2bf6660a1d6b3a7f7bf1dd43bb287ab73a36a4e241a18e6f4626d9f33439a925ae90739183a03cb38d2db05e448d7b42805e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54baf45baa2212451299c0621dcac5b1a
SHA10f721e018228bfc50f41fe43ea791197f6abcdf7
SHA2563feaf706725e8a3284c2b27d4768898966fca06727e97b46255ec6feb03a1212
SHA5129db7d3fce182ce6f9d58e3d47dcaaf027770fd3331199605719a5b2b882c2b4c929f88f6e5debf824db1b0bd5409d077a9567607e25b35130c3ed0560aafbb98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5083b73dfc3ec3eadaa13e92494d6013b
SHA1a3dc5a81ce782edd8287a8aaaf79cc0fe1b13053
SHA256b821e1db39d62c7ee807c383aa130ca17202b8a55f32a2452fcf260e72faae64
SHA512d4ffd426b99d29b325e6e2e1f843c4bb211d5b535bae9470964c8fccb2bd447ea8fd2ff1ad5c7ceb7d69af6d9dd7b6dc6a28acaac83c04329b35620a4fb73449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59416235210e39a27999e445227894257
SHA153160b35756ed319c9c219ab54041b20435c3ac5
SHA25650f67d27f9d43f501026a3844206cea441fd807ccdc475f9e869b6a22134b9f7
SHA512affe2aac02242c71bef915c77d291ab4e069f189006a1ff789fb335e8735db4dff932f180cce15973138937e15bc7a808acac68e4a4b1ea0d309756f2fcdcf78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5be7e9e9c9141bcea6edfb5c7803f83ee
SHA114936a18d0ea3bc7c4fe791b4302a7e8c225a3a8
SHA25620ecd36c31e6c958ee4c6f036f46bd9626149d0ccaa5a9be35f913dbd0556520
SHA512e6cf965add44b757a2cf27c97bed527b368150eddd8a3d8bd072449e46f11f2a3025df7917bc26f46a0574526e845f0eb699c0f4e26f0e43e3745804fe23ed5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f929db1c5f9f770169ddcab0ebf455b7
SHA1030da52e9821a714e414679d92f46227ab97962c
SHA2562dd7401aeb683288809f459125d6fdc06be1504cc3adb05a165cb6bfd5d4d228
SHA5127dc358f3cbef9bc2ebc665da78a1ebf6a02fb13f24a1f8e2c43aeb761574ec43b9ce606dfbe2501af5af7c7ba461b604f038fb48e86a0d31c14de4a7acbf65f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD517c9a28762cac9aabf1d25c4c92d90e0
SHA17ba48174e3e31b4cc62c0a649439068e48dbeba3
SHA256a02058268f8dd1788ddb32da25063e01d9803b982556fb8dcdcf6148ae3de896
SHA5122185b0387b6b3e5261289abf060311ddccda6f85afdfa2bc9065261587a40cb08071b2e875e14e347f2e9afb8593138909280a359e486813030bb8faaaa80c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f73e9628983cff0599e7a9e5d21aac25
SHA146c4a1789263e9c0b65442a57ff917dba2607874
SHA256dd5b2f5afd1f8e0e4d01f7b8cbf6dc19fb74bff713a9b95b7d0a527c79ed1730
SHA5127e8e38e23b2f8277b874dfdaae14866619bebf89dbeb805935935a3e481a39aafd09ff5bdd5dab16cb3716d4833b628e8324b75e5b434e5a78ca7a30020880ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51c0a682b9d448c44d1092c05f25b96f8
SHA1129e8736989382cf023b1e6607e604cd100bc3b1
SHA256bd1e262c66666d2592c1a970ecd411ab861fcf023204cbeb7dd8042ce7c90005
SHA51227c188ecbf7e65396ed97e6b0abb1fac18ffc3fbad44bcde66363362626ea6ee0965152e6b284940141a9662030acfc55c8890b306a8b463366f923a521cbd82
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LF9I1AK\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b