Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 06:12
Static task
static1
Behavioral task
behavioral1
Sample
0387b50177bc54a760fda075bb5b6f7a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0387b50177bc54a760fda075bb5b6f7a_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0387b50177bc54a760fda075bb5b6f7a_JaffaCakes118.html
-
Size
110KB
-
MD5
0387b50177bc54a760fda075bb5b6f7a
-
SHA1
0293f933570fc633aebe3f9b1b9c7dc166f9f696
-
SHA256
afdfddc7c8ca39c26dfd2396c91dc6d8f0f5dc2829be241ad01e75179f15f878
-
SHA512
17b178c14c6ff9c216ee58fb93f3b84acfba26c1d2f9c4937b2562da6917b9776aedc1d1b0ddc15168c522bf41d18799cde0b11740ebcb791aa3dcd389a77ba7
-
SSDEEP
768:AKnE2WQhEKTlfIfmE7qrMa62z2bZ9WSkEvtNm5brccWBgqaeyFiRkYfye9bStZKY:ZIfmMzgodgja9AX5hZ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 802c50dbd8c2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000068c67a904ed20d4c845ffbaf650f29b100000000020000000000106600000001000020000000c75fc9096609049f429e1684a941116b494ba1ce96cda1a8483614aa74608abb000000000e8000000002000020000000a73231e65e805b2fbbe07d44ef0f451b7e18c4b7cf47fca2e19bc69673c730c720000000ba6cd49f750fb4de113aba8c538ffa33195b8b384f6df4b3018a3a9dad66148b40000000b9e1f2f791020c1cebeacea7082aee1599a6c854b8158d4b7d011724ec5b48a6b23ea5f70337c874195aacb69998a3117e5187205f047cb5f00551eaf9a2f052 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{06B9F901-2ECC-11EF-92B8-52226696DE45} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000068c67a904ed20d4c845ffbaf650f29b100000000020000000000106600000001000020000000977939e05df6e2f91b0ce64995da103e212d4c279e3e252ec2d3141bf9228d1c000000000e80000000020000200000001879b88b571411c51ca8d7107f0d06674b29426b69577416f50a630811f90ce5900000001fddff3b34cfee7e551b3bc2f93a8a975526385b033d87a450561806fe57fa2ef911906d0bf0d215dcc629e1d75247ff684a27ccfe5a490c0f50f4859007bb70fac54726a9b47670bcf451da8e4809cef233b0fd2cc76636cb755e7d1a5757f69eaccfd2f33d1eaa1bdc1bbe510dbf10b6fe14138cdaf9dfb92a118ab33b01dae40c720925a3e72e5f9161c2988d348640000000c7d299b2b1f67a6e5d8ece03f4a9705da5704a11040ae5fae668b9feaf0a269acf9b78feeb15dbda6d12b67a429f5295b815723d577ba4751c6e0ddfd827e52f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425025797" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2936 2208 iexplore.exe 28 PID 2208 wrote to memory of 2936 2208 iexplore.exe 28 PID 2208 wrote to memory of 2936 2208 iexplore.exe 28 PID 2208 wrote to memory of 2936 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0387b50177bc54a760fda075bb5b6f7a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f841ebb038a99d344000c9a8dc9cf36e
SHA1e7a093a99a6f4847f295a63760d28522c03bf71f
SHA256cfac967aba77242f1951c9774b0aceab348746d60a2045b2690b3b3b4a8dd2f3
SHA5123229f27bfcefa00da418508ea9e1eaf3646f401d873adc150aed63f2087db8140f311822e1cd80d4f247c030551f098d010fd7f00bffda32d43e48a75cbdbcda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55424bddbd10c067bc419d58eeb974a59
SHA1eb146cb16324a202c9ac5de69d76abcc77ac6a7a
SHA256ce70acd54b40ca1bde44ce8c797380acd9c2cf5cf0a3071dbed01d8758518f2e
SHA5127aab9b82173a30e350965e61b2f9a973d4752c870cf3193a79ab15105dcab603fa8208b49f91250cfc3bc821f653ef414b34b58d7303dfcd29223eefb2676416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567b0a18b8a53d04235086eda92d09b02
SHA1d375872b02d213357a02330360ae965ccce492b7
SHA256e28a58e7be7e74645871b4c0a7e1d5d40379ec7e977e65b0fecbab641eff91ab
SHA512aed452869ddd34ecc40d9b05af3532a4179383f8b6829ab44485ea8f0e41ce4c7a498418e1c0a785843f94361984c328e19b66db3a62b2091ed8ae94c513e2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b8da916d29306ea5631b70b8ee1aa55
SHA1017f375e6ef8e1c5760ed57a475020ba726ad7b5
SHA256394b1a6e34a8093644c29b0f43468335c1a7b028c55e8d1a6be83f9509bd4306
SHA512082c2ee051dda27cdf05ee8a4463f96c6900ee74c017e03fa1a2fd14b636c5814e3b67cda082f89bd4f442d61eb520a708f34432547748677bfabf82b8a66551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bca2258869c9c714eb2b1b813487691
SHA12bf3a74e773db5cff0164146b6e357618d8ee5b7
SHA2566b318b11fcd2d3d0de776722c549bf9dd271a3a4e27630e808445ed1ca82b827
SHA51276049d4c44cc747dd8b9f707e7e6d049e320344938118782a5db0f413ace2585d67ed4931d211e734d4cc6fd8a833fa433c3b42ca8313567ce606d039bdf5981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1a10c6fe6863cfeab796a0463906f74
SHA12a11ba93d6fdb4931c14cb90ee78850a49db241e
SHA256facf82914381f9a9ce0dd217e545092430979ac40de6b039130bc7aa30b6886e
SHA512d4ee619c07d6eb3845fd162c736ef2e992501ff1ceb51c84dd61fcf336246a72f6de79a4d82f5792bf7defd8d859eaf537b8a0efe391ce098f3ea4a9f4746533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bee4bb94609deb20591f22e4fd6503a
SHA170acb6005eda7f6af609896d311c1a4321d26d5d
SHA25630b4415f5bcaf7b22f84d3da85cf00c55b88cabf2ce06b8c7018ebbbe9dbc23d
SHA5121ef191e98b8c6fd3bc8ff406132c101ab630520684654b5f3994c0eb4a09217a1f9262ed3716969f61074918710573e21c37f275b9fce7d7c33d2d2c4871df6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b4e3ea6c3573689cf2a499548703f67
SHA1ea6989cdeb170b3a96b9a32f218f141856ea3957
SHA256c199ba1b5aef9d7d6ce36963d080d1e10797576dcb07c822e022dbdf18c24667
SHA512b3b43f1e2713551e0486dd4ad009412ed132666d17440be26ee37f63ebcb2aaf9a685482d7fa5109e7f1ad109a2bfd62bdf61d012c5b112f374d3d726aa90dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b2e1043c8a3d7aad0b14c925e1ff17c
SHA12c9f1310618ef4ca0d81d20f4c24f9c235363089
SHA2567d678315a705600c4c149006530fee89e1945453956089f38fc935cf118534f9
SHA512eb5e1f8934d734de913c8823f764a063609283e8a7cacf8563ceeb28f027e79f2eb32c2096b01d3eb676af08ed29b667fe879bdc6d4e0dca01d4bbf48d37f430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f739f702c4f962b3970a08df403899
SHA1185a0fe908ad8bf66c1ca373935d06eccdf1bf9c
SHA2569a91bcb461096fac5a464348549bcd2d63fbec84fa00e99b313ba6f69d1eba62
SHA512babc28077d70b8816ccaabce71d9279109321dd500b9cf75c757bbcac7755613c90fc3b6045b5ec79ef3313898bbbdef63232cf14e99b167d2670c5859dbe2b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb38d55fe57e10e2931918c0d872ed34
SHA15fec079ab3144e4e979d7ec0058b2f6159a99b89
SHA256ffdbe35a5cf2dc5f98465abe556054a7222b04e6b02e336ed83a93a46ef1484d
SHA5122aa0faa5635752ebdfe3ae9c40721c8c880a02bfbf2ab12a9edeff3330f0701681538657182d53fc63767a3ae6612c75dee1cbd68395f86a37e333c99debe992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580c37a89d42db0df5119f2dc075b15af
SHA17a540abbca91d8b6103c9ec0f42d6675a81618bc
SHA2565b0fd84066a992fb00b45691f7215a0cba0756d68d7cbd73e67a62081eac0260
SHA5128eb08512c6b87760337d7ea7ba3fd37780f9a4a3577c96c54dd92d0c4c6c5086756ec4ca311cb367358b10dbb611a241e6e6adf8041304e4a6b23eefe9539e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d750a75f2b1d6eb8275037efc3ee9e
SHA14681762061d5ea1a0054615309df8e45b273298c
SHA2565d063b744f14420935c9da0f52bfe77fc7d69131b591f2746b70482f139fbdc5
SHA5126da4957a3fba728a1d00e4a53478d576959d9c76f967332672e6ddda76aa3282849afa43e5c1bbb4a6bd5ea57de6dd10f83d8743f5d6d113ae3ff66d3de52929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa71c914e82cc2bfb7607330b9479e17
SHA19da526268a816d5c71146951d753b3754599ad32
SHA25603e9c9bea2934f523b57eaea53208565d69126b370350417970a003259d49e5c
SHA512f0c626c14732f4c32eae329e4def78093c40350cd73856435ea61518ae88b3be3c3b5547699231b0bd3fca63d80636e75803c68ade87d5617c02dcfc083f3ea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbba6c18b3b443dee8f3379cbe26983a
SHA109829f5e18e43bffe6191de86eaa63d385eae617
SHA2563907527e19d59017b1809210f4d41279917e04712fa2be6a1acffbbbda1ab843
SHA512c4be3c3901df1a91f305aa81a3aa1cc7c8dd130a7a1a1db6ea6ae74ba76fd74f3208e1b4423d01052312c6b5f95c49ee61efaf0b0b98206aab1baa337d59ddd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5704ef1f3400d163f7b200e9d74df42a4
SHA173244359ce9b1d9dd6226c7cbbee4d725a28401a
SHA2568654d454ae9b8b4fc89c07c3524a47468fe10d0d872f8f7495edc4369a48d8d2
SHA5122da35b3efb952df71c3a844c59238f27ecd684c61284992850e38fe302b08d66fc44e0a3ecf75b7ea6df2cf1eb808aeabddcd71693121ed24e32375ff874ff6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cfe61eff598d32e0e1120787303ae7b
SHA17411d0e311396583826f9182ec931ab87f06b899
SHA256ba95df07b4db3261d49c2f6183dfc4d80b7a375a1f5033074a66bac00c2cfb99
SHA51227c855bc69c61025b689f7fed7ac97ea51a309b0f4da248ba6722edef3e256d204efafc33f5abb986ddccf3ac3b18409dc7844def56c91cf1e315c369d011e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e4961d28f00e22a20623dc32435728c
SHA1c9bfed9dbe150a22aea968d1aba42463d083eba9
SHA2562e502136b9a81aa1a8a7beeb984fc86cee93eea15fbc2aa2699a2d70374fdbf3
SHA512edfd7ac5e8e3976cd1e0ba17501c6ea45b960b8995a12202a74cedb496512bb1c2b09822e0aa63a7191c7787016b7da46b17b2ad1fe7ae0a5aea65b7acfa5bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b64b4abb2b1eb412127b6d752d6210fa
SHA101cc1c8a396ee8c8ce654dd724ec987a114ef9b6
SHA256730e15279ac41a2805967ec095b5ef4cfa4798b906b01f6d39f483b9ec4658fb
SHA512f8ee306681b312d72c4419e3209759f46ffbc2ddb01cdc72d11cec4734767a41419377d3686a9835c4e43307d0b3fdf446503c5e23246bfeb625ad6dbaeb138c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b