Analysis
-
max time kernel
136s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
94db8884994eec225429f0bad15e99a6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
94db8884994eec225429f0bad15e99a6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
94db8884994eec225429f0bad15e99a6_JaffaCakes118.html
-
Size
55KB
-
MD5
94db8884994eec225429f0bad15e99a6
-
SHA1
c435aaab207bf1e7edb457537d8181854c8d2210
-
SHA256
636b42b998995ac39497fdef5c74b464109f97aac2fca70ea1e1d42eae576d40
-
SHA512
83935891716829f1124f7fef31862d7ce6da724bbb9ded6fe931257a8c5b0b0bddae5bc0ab457dcd5d6bfe9fe202f3b9568549d813a2fd2d756cbc4cfb3e47b7
-
SSDEEP
768:SC5OhnQ3hTXcANT0xVvu/kZaEPkKrTclPw7EM8OY:SusnYlLNTYVvusNkKrTclY7Gz
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C6789181-226E-11EF-8745-52ADCDCA366E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423666332" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005f4262dfddcf8340b5f1a5c2a0503a11000000000200000000001066000000010000200000005a192bca7dbb0427f35858a1ba5f51f06977f25c14cf25a8bf4347d09b0e492d000000000e800000000200002000000018175fb6f153ebdad974fef74b3808706923fcba638c30ed050bde1cfa828274900000000bf059a7b1de0c7039471f3573cdaab27842fc6964ec51c0804a8c64ae29bde989666eed682ee0e506590181cd2c264795dd101fee37280348fa2e6367c15407314cf4148c27861a31b39c0d190deb46c4d3bc08a1b86f4ecf53471d5e8f1da6af70e94b6fe311aacddc4f1753393f330b48b20882235a5033bf8b0e113c9044a4ec1d10dbaaa08c7086f2ed06bd8e4f400000001b3247cb315050f56f41bb1013c763642396308beebaa6c27d9335d8ed5f4f9b3535f5dcd5646e64566234acb738181dd9cab73b772dd304b2560fc7b8eafdf3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005f4262dfddcf8340b5f1a5c2a0503a11000000000200000000001066000000010000200000008d1e8d75187aac1269b06df68b66a6d759a82662663d0eb5a51a747f965bb3ee000000000e8000000002000020000000cfb9fce382be1d55561cd4e6b5f21272ea41085f2a51d5421c3e882c2a8dd842200000000d735404d2fae7d08ed1863a5da34f88ff7dc99dfb44b82802c5c0f37f0fbf8a400000004644f329470b68e2c95711ff18298b8d3caf8ae00b90a2dbcb51ee524d8a9f2f662f805c685a33efa41727cd5387639c2130202f7f72564c4b0f562e8dc6f31b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0057cad97bb6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2776 iexplore.exe 2776 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2472 2776 iexplore.exe 28 PID 2776 wrote to memory of 2472 2776 iexplore.exe 28 PID 2776 wrote to memory of 2472 2776 iexplore.exe 28 PID 2776 wrote to memory of 2472 2776 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\94db8884994eec225429f0bad15e99a6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c39658bdcc3e385d376144e30db5210
SHA15c79f478fe4f62a6f21e104c4c3d5a8cf6354985
SHA2564b95ae32fe5a689f68c4850a807694097f2c84d294eb9441d01be382b207b5b5
SHA512ef185ad14e9448f7ecad1e0406c36979e56158d12b2391ba80ba47de1d6afa139bb24920058482d9898008c7f7e2046a8e1a1070b37744ba05e323835560c7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0783f72d4e870ebb09783216d7b4ea7
SHA11d0f6b686f90337ac472b2d3a677f8240330b749
SHA256c4a5b29b1eb77a79182c187599d166f2b62f4b39bce50f6037e8288105d50153
SHA512aae8adaf12affc897a991307cfbd0c948f86f3d37d575c465fb5b86e200ca2579a02d982c766e2fdc9c608214e8e0b95229d08b8c8aa8028ef86060e8ad3403d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568b894d4b917f8ddcb5a0ace1a35a490
SHA1db09a905154191dc17ac08a6552f6c75d5673821
SHA256468e7f7d638e81fed56262e8a605082713dd30971f9c91c55fdaa25987f1a8c8
SHA51201a4466ed14b1df537d3f35ee792ac97207d279b7340e7c72ae808e8ad1ee743a279d46ac2c67eea70e6ddfb80e853838649e3fc6cf3b42cb830243d56db7da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f4ea390cb091c56ed83cb5b2be4046
SHA18e640f7e71d069c9caf615dee1dde9a4358ad635
SHA2563231752800167edcd496ec392a52b553682591cbdaeaad26d216b33ea278f572
SHA5121389a692240749819c9f768a0a80e30f3d118e2811d8a9f29c28d18444b4db4992aaa1d91b3d30404b605aa41b47d782ab885c47aaf0d2bb2f5d782e77bdf3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e59aecb841721f13379cb0de8caed594
SHA1b9a7b109cc2811d7c2f167cc717891b1592cc06f
SHA2562661091cf28c5ce6d855d5fae995d0d887858e49ec7368d05b154caded6a199a
SHA5125440789078890db34c67bc0a8f14d2f4b2b2be0a53604270c183ffa1b94e59cebd2dad747215bf571d78b7dff96cb643043b8577d845119a137e7f4c3d0f5656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ee55814b3b5390b9c5fa2c7c6653278
SHA1b8e443040a62c3f75d19f97ad3ed80d6154d9d0f
SHA256edd7b9297ceb3782fa2d1350048ef0d652d974dc15a97b9b54613af4bbd6eea2
SHA5123cb14964351a32d15c4c888d61acbc955f926a401bc8068c5822d7554c5f5e3c9d2214236ef2c07a7b36af26a030013711b1aa365312c21a4b6b089b2283eacf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5774e7d114a757ba46f05f02221daa0f1
SHA18b68e7508eccd213b780248284a988044aa9c135
SHA2565c9cd741b1a3bb36ca41ca5462419c2f7fbb8818d4ed0332cd5d8b149141cc55
SHA51276aeea70f1622c77ca012ada2e06ae7755063bb175effa4f33c59c6c69a6a9b6ea55641c9c3c76726ae7d0e4117f28e5ece9ebbdf8c5f90e5cdede8778527791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a23be789ff2ecf0cfa9c1c4ead3d0639
SHA1282cf8f4dc5ea577bfa0c8f95ed9729e8c6c7d33
SHA256d662eabf4283e490c8ee76b2273a3d2a9815ea4bb0a025b7de1dff707458f62a
SHA51243469ac6986de98aa4ce18def3261b16eda3fd7f7dcf51647fe0d9cde4326cf234754615c9d0200b20dca18f4db86a559be36301f1444d4c6b9d893787a83931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52db8ad6694c7f46d1b152def70d7a872
SHA1d450314048d22ff2eb910de87deef9707944df42
SHA25627b48a7b79a38d3bd8980540dcbc39356d90dfce8efda90b889e72f9bd155c2c
SHA512678417fb53be7d53bf1006e62bff270c429df38ab60f2f2dd66cff3707ff3114fd194f77d5eabe6c0d8569c32b854315c48ed609d62e5e9c3e6f2548d3982922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a932156cb62c498edb1d3211d60e87
SHA16aa97ebaa368a11a567e371bd93a193953abc78f
SHA256cfc5b7b753346b7d181c07201a0a12d5e9a0b5d9bdf9b519110e345d765f97d9
SHA5122f7b8a9092d42e3eeedaa741b1c7a6ce4c264551853bad48d8a87a483090d6254cecca0c9813b5c8b2a0a2213de0552ecd50a31eeb66e1b3d1ea537c0e248978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563dea0cc55ea0a7d58b63a3a0bd0fa71
SHA1c44724507ae6b22386027960783b752112622039
SHA25608a0f8c1844f94b95fff1283fd847706a66bccf247a46b47b682feebdad9c8d7
SHA5125e7d84214bfbd147b470b46902519fa03646c9a0cdfa2767a1d21829d13dfcc7ee0a77c2de19f44e5285e13f69260d82f30c1f8c534076315987ea1e6f6411be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517e1415499d2888b7ee7c34d5657a675
SHA188900ed60ffe0a7bfc845d26906b0e4a5ae353ad
SHA256680596ed12faa9916141c51293f3c23f939d32d032ae73efb3b2ee04a8ef2c66
SHA512b5cc01d2b2dbc22c129588f382890c0175f3a8aa01117fbbfcb5ab3d2c5c20ccf14cefad5b9bc4ae95f465aad7e61774907f09e736cea22405c640e45c107957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df28c4ee53bbe878b736600205b3180a
SHA1619ce651730b59cf7883254873f23708190caecd
SHA25691c93ba524ad3a7aa7f7f57382234a6ce4fd906209fd318932d3a691da132b21
SHA512386de4dc349bfae2aedfaa276d62b1e82dfbdf540319d287b946f88135c99fa4246df5db2b21965dd7d1d64a1f74d691f8ef4cdede0abde6fa23f5e3a2849772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522f2f6350e6acff3de167dcaa92d7602
SHA1a175e6a9badc47c649b6860b8f94556c56485985
SHA256ef92db933e6841a06d5e062ce5d6cdf5c2dfbd9852b56b034cab215e0e054424
SHA512ea696bd23e41d3aaee27e3a9481f5a95315ee9bf8d0838e95427f10cbb31f133a40182dd8f9a70757279d16febd0616d4c80fa698ba5d234bf61be98028920c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574567c238336f2dd7f4bbc27de5059ef
SHA1ebaf96bde0af0cf659e50bad21d670671a7e673f
SHA2560466bb9b205465efaddea7d5ab668d646e183b953d26ac1c7521ac5a9970044c
SHA512f3aed442ea22ec498ac8eeb46d26ac4e8ecaaa30fe400e5b2fa2fe5d7d075ed448a3cfacea320e379b53dc5ae5f685e964dac2fd5e96313d8d9d97266d6892e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6217cecc89aec926f07dbc580cd7a47
SHA18a0802959d38a459421e4a31ad80ce2a7390d5be
SHA2562b0a50a9aa6e683bc770b82a7da4ef306ea1b4ee590bb659279f56b5e90ec9ad
SHA5128e23ea2cc6ec370aba1edd88d41b4ce04d4cfe59ed7aa4a07fe2e466b883f5c5add2238ef00f75a8321ae67a4695d43d4d1a5e95c3538141bc2a0384148311c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b20b32ef4fdb48b3a3d0e3f63138cd
SHA11512b7b35ea6b3af8c399d9eb2169c0071bc98f6
SHA25645e906d01f934f81b08c86c466a47e18d330ee17353407a9b1bcdcfe4c46bc1c
SHA512b00495a34d80e14c9dd3867dfb4547b90403e660d9cf7fd5744f3ebce7e7f7fb640711b88e81914fedc1e616d5d82812bbde5353888c0a4e5f1bb6223104a742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8c9a4497e2ecd692a255a653968c0de
SHA1b8e6ab1ec147a4eb287ff246775131d56c0436ad
SHA2562af08e8d060f3b8b72ebd27a7a4555b65e8552d9823c4f5ad18ee6f133d7be1d
SHA512b4dc588f7957c3e925b2d3a423b09e2eb31aed2659c1b5583a2c7b4942acd3d8158444029afab64caf13d269d013538f7cf29da12ee183a1cd686e5cc482dba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b727768aeca49e42edf61e867b27ba7
SHA1f2b4089a935cc573aba40ff2959949d3b234c784
SHA256c4d9d1898770fdc88790cb5de03084088a9fcb31bebb89773506d5ae61d044b4
SHA5125d7e2a265dc3d2e9c221c6c2601b62d72f9669e483eca650d7cfae69a82c5ae43d3c22db785a2afd21a20737abe7050a49c81c62549297b3fdfae9e5bf316976
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b