Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 11:07
Static task
static1
Behavioral task
behavioral1
Sample
a24b1560a14bef795753973c46780916_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a24b1560a14bef795753973c46780916_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a24b1560a14bef795753973c46780916_JaffaCakes118.html
-
Size
9KB
-
MD5
a24b1560a14bef795753973c46780916
-
SHA1
d50adc2c0ba7453300ada96e80a3b48def898691
-
SHA256
84d957dbecc363941e30dce2bbe4ad70c37e9241595b1a7165fc283366bb05e5
-
SHA512
53f32cc107043a8159557e127816a9275e4e04c28db1dae130a31199161fe51a759d7c0fb0788a9fea929f7d72f7a94f96f83781158b313d3fd32fb062641f5d
-
SSDEEP
96:uzVs+ux7Ox0LLY1k9o84d12ef7CSTU/GT/kMZIUp/jID/MKsSqVclVHcEZ7ru7f:csz7Ox0AYS/+MGq/jdNcPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000001a8da322b2199b5cebbe1a46f7df119dd57bf4f8ed83faa29c78b4229dc156e2000000000e800000000200002000000050f16cf8fef114078fd49bf021540575640a0b999ff09ceeb0bd2c43d62e60559000000040a880e35ec0ba6092879f8cc54642d04b5cb119b6cdad8cb0d23c171136691137828f534d4ca576e42f8816a129f443b487ec91b7eef3df85b102af61e2ffe3d7e42927941d265b729297a4e564d94acc0c7259479d33b7d0605e8b974e1c8a246f4f5ce75d9ffe525ac9dc74cac3b83ebf20c6eb1c7f9e7a2fe6fdd3b97cda207ef8a29aab222b61a2a9d40acb6beb4000000042aa570e45e5795a3c48c8c75d763bbc64ff41fea8cf4ccf37635058fbcd9a4c13bc67eff926959fece2cd4f88d687e65798e664fcdaac508a02770d077b7ca0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000095f4cce1b5c880efafbcb41c686829aeccfd03b8681d4f37c061bc4be7cb65c5000000000e80000000020000200000000d3163f195e3f8e9cd8cbb92ace4f4e7e0ebda39d47989c5b13ad3c4210ff44420000000a89e09c75742d1541c45d2efc26e98b77772ce64cbe39cfd200c4f3a5d1c593f4000000077a544fd78de1477b1d2753fa4e2483548d0c60453bd7aac1f3ed37e35cd5cf84c25d513076ca9ba30c3f137e6a0e1a6ce615c5bbf9de5627ffcf4cd985c33bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08321cd95f0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430054746" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5E6A5C1-5C88-11EF-8334-424588269AE0} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2984 iexplore.exe 2984 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2832 2984 iexplore.exe 30 PID 2984 wrote to memory of 2832 2984 iexplore.exe 30 PID 2984 wrote to memory of 2832 2984 iexplore.exe 30 PID 2984 wrote to memory of 2832 2984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a24b1560a14bef795753973c46780916_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecafdcfbc335dfffc4307f58ed5d4092
SHA18c1fab0b10a565da07f08715d0aff938111ef82e
SHA2568b7b2871979b0240f02dc24b044081d1d0b964a5bda4b231c285747dbfb9543e
SHA5129aa52826239f815ba06604aec2f443859b9261ad409d5470138d3b17070d93a17cb94466f19fff6570242ab5453865c586b91855589da63e8b3316396a8ab1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b81c35897fb884aae6dfef5dd9c7f5
SHA1e708296e22f19c0407b0e5eca19c36b2d972ea38
SHA2560ecaee462b14f47c9e8c012591051ee1771d53356a1174000c4bbbf652272dc0
SHA5121c43298b636c4745523eeadbb42be36cde9baa3388f637cc1c5da2cbf394b7ec896e5f122e3aa75fd614bfbe6c8f1f825c05f743784605d48ce9a553cbb3a86a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57368d5324574ad99dc62bdf71f767b70
SHA18481eeb318911c3115b5ffe35e513d7c4045c97d
SHA2565f78e99a1ecea18cb64a94002b98a8d1678cf93d1c498f0739b864f1a4f54e86
SHA5120f41b4bda2b6f961c25ddf817151acd4d99112822de09f4d76dfc59c1abff995f79164d9c6664bc215c480924cb755a67832c8436df42f2ab98db204fef29098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c56ef05038f8fb948c85a703121f811c
SHA17d5e0eaa71cf0ce825c39343f8fc75c83b5b8a7a
SHA2567e056b6e385ae6f60bf31e2dc7ec8586420a903999a789c4d859d47735843f69
SHA5128c02863b7f441fd47202be61ce2ba716fcd93e8b60907fe006a24c9f1f3007fe1cba758c89781b0d6f4c9579def2cf640569108dfd72b818bd819e4d299e0e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b709e076e57fb84487e46b80d1381c0b
SHA10f46312a3d455d87f53309af4add8094bae382bd
SHA256d9a867bb099b3604d080fea5379e5afef197dc522fd9f4e0de6b92c90d137cad
SHA512c47d34b3073d87835ec3138e4563f0243fec4d1bdee0e6835e09014857f60ac9309d49bdf9529f588f9003ebfa7bbcadfca67da4d66290959911f67d748d903d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544c18efe0298eb7812ee29c5ebaf8520
SHA1483349a4fc7a638dadfc0cdd75c7be5223d217b4
SHA256fd34fad213249855a48273792db00faca5065ff5a605ff4974216189518b5b20
SHA51271bd66a174289a9b0c1f70f8592e697e106e5e4b580005661d59db42354fd55f454289843e870fc691710cbdb92046b0306d41c51e16ae24c543e9583352bd8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b630f5dddbd12a792ede59e39f6a43c
SHA19f537d6feee96c5633d814279d12de959f621df9
SHA25677152bb174f4b9bb5aac91ea58209fd5b5dece6483ff9e098a43e5b0c22609da
SHA5127a15f9740be04f06b5aaca2649ae35c41ee818b61da201a1221a47ecd9c41240761630a8779dabbb59fef6113b79353dc125b5d8bc731e34c4ba7dcfa4c5b21f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5785145ac2a41c6d2f0c52cccea7e1ac9
SHA15e8c7f6a6a349839a7512204dfab2d42a1f8b2f6
SHA2561b0c5e592f34b09236ca115a53251af3c4a58b90b7eb0d0d02da5c1399530cce
SHA5120b03a0bc3c39ba867ee3b59968dd3cdee599a46cbdd23a4ef7f1d0e1a8c5b3888563ac4adbe8f4c3b57c723478aff4dbb111496b2e01000c8707b712b159baa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5799d21c2314bb43069e4b69a97cfaa55
SHA105f040710b4ed1ec6dc3969d6e0bb9cf27901ee7
SHA2561ae9f708f76fde339171cf6a46d79bca872ff1632cfd3774de2c6f710386125d
SHA512cafff2155a6a68bdeeab290ad4c68390b54c8862c6d7f5e35830067d3e1f7c8bc41a6a67c21d41408695bd0fb47d8f55afeb0917110c45df6de5f48a06fbabae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae40dca1df74b14bf9da762add425186
SHA13e649ecd0b9d873a12b461faa3305f13a8f05d53
SHA2569c552f684dc5cc1af0cf0da1099afa2ca668b50638545c67a2f4ebf8211f2ea4
SHA5121a68b5faf129b236a4ad4d4c2f5d9bc913a9ace3abede0c6d481cb5b35d83aac6c224bafb279a3c8249b1f606635d4812ff7c910ca833a417bfe0879f7744850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5881973bb87ab0e084bddd97313beb36f
SHA1c41be4d30c1b6754af225612d9cdc9c3c84b2a22
SHA256a2be34b05b375be982e798fe65a1a6244f030af2ae214448cf8136c3cc259206
SHA51252f89f67eb8c00df3b4fcda6057385e80b3861fba4dd8b22d897dc5791c498e22619d96fa0279472f6cdaa85b37101491de3119a6cc54a2ea64d080b31ff82c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5684e19df5d9754df256fcfb94bbd3f30
SHA18dc3af188033507e5df6ad284752169f8648795c
SHA25615c0bc7a85783d9f3d21d01b48369978eed9e8234572ffccadcc44fbe770aa66
SHA5126ccb8091d0bbe7f1be8c714e8c2aeef9c8169c776be7825a9cc9e2c0afd6897a498ae833f65246607e7c00cf41e350fb3201947b76593f44a30eb9272dd0e74d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a03792d673b3e403aac039d9e4c99221
SHA19343390767c9019dc0af379ed83091dafc09099d
SHA256449c9745902c69e76b117e1b66c8f4870cac5a63af48ae5a8b328ce9329ca291
SHA512867e1df24a0ee606d73f82b8d0092d4593d0957ffbc614a7e5aaea1fe2f1b39799a1a33c0b241f108b8539ca91b1dcd37282a9af0ed2815465a3333f005fd8d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549ea139fe5baaac4ea17f4f2723c76b7
SHA1e40b707371d005c8ea0c78fc01229ffa409d43f1
SHA25624aa7df2d851e42a3a8e1d06ba5c73299ea5d90c40d95ad2d36a15d7390f8320
SHA51268ad02824cb1c376937990c3bc3bc52876e1fd0541800849209464a575eaf3df21793a362916d82b3c6ca9425a13a692a928d12faf9423c3e95f5f589a4befb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f308d9f6973a21b0be809e4a69baa183
SHA15895ed5393d00a7c9c74d5062beab4fb306acf3b
SHA2567ad3e23486382402bba5a2154c5d76d451d1493b32ffec3bbd21edff9ccbf0aa
SHA512eb944ffd2750d3d5df5698df2006971f259097ea6a6df6a5b80287cf07ffa166673b39eec95d834e1e7fb91eb4d2e0eea65253ee76fca7fc6d060e74c8660d91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7c0ea65349218bd94f72753fa82c1f5
SHA13348b75febb3342eba66281aa6c575b0574a6e47
SHA256433d65300094a57f20764d1cd7e52cd7467b593d38191e5f27cb703332657dda
SHA512915901d0e1274d0874c68c200c6834d5d47ac1621746aac90368eeb6128c7b4a9e131dabd802efc8378c845fd508d57a21f5190783e12a0e74a92e6d0c6c8944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c0fc9d73032a581d704a1c1cb34c1e9
SHA16fce7da4844ebac14ea4af5c65a1dd0c11d29872
SHA2561c0cce3aeb53c8512492cedd961c191344a073d62e074345d9bd873792b43752
SHA512536460f34bc21baa661bed3a4fb0c0d64f4e27328a140f2b7697b24168ea22afc262791c0671b99e1300dbf01005dccba4f61d16aa434c7103e7c7f93112f0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6404a8bc5bc207238fee84bb54c4558
SHA1003893b3129718cea459bbe1eb29a5bdd130673b
SHA256d15078749fe0f176862c2621193e74d4dd2bf18553896a8eb3937be20b0567de
SHA512c3bae8885067102eec6fc3d5823399e2d48478a5758f998f252236396002ed7e3a2114a2ed360a7a4a932d6497547001e82c0d5798baba936c4dd3a18acd1978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552714a30e58d1cc0c9e6fdaae8768481
SHA1865dd6354984a235a1a32162d2056924530ca7cb
SHA2569f8b358e87ff5ce3b0bde5d460905c16f6b7b13c76b577a1f1af23464696c9af
SHA512474de60c37de92767493cbb16f2605f8ba0cb2b741f4f4b1b34cada9cc31bb7d8db4a5f58a70defe2e0536fa071eb5062c6931e08ed37f2cdbba84a416f9a621
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b