Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
8e4372a0d638988a89c21a19246ec41a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8e4372a0d638988a89c21a19246ec41a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8e4372a0d638988a89c21a19246ec41a_JaffaCakes118.html
-
Size
35KB
-
MD5
8e4372a0d638988a89c21a19246ec41a
-
SHA1
aa50d0a7a58c7235464da71e4cf9e65f6024621d
-
SHA256
491547ec1560b7e25a5b30eba88c32126de519987dcf37a5c0a9863f37245e9a
-
SHA512
16add3db52fdd48d1f95aa51f9aaf324a8b652355dba7e58d2a49f2fdc5bd6a0e33b95a3e75ea593c3874436fdd42716cf7a14aca6737646a4a5d36df311601d
-
SSDEEP
384:aMxUtteBssdbWWGNjCNvxvRc98RWnehVa668:7xUeesJvg6vR88Ae/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429618052" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{340AAB01-5890-11EF-B798-7A3ECDA2562B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 400662149decda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000e38da3b5f371442ff4c567ed79d3f93aaa325e4e63ca93a42a51ac11bd0035a3000000000e80000000020000200000003ece7780cf32cf0d675488ab584b1fdfaf93762236fde83ef269c7e6da7edb4a90000000f22f2f2c5a4215de224160c78c4dfcc2357520a9f8129c93dfdddb7848210036f57c72772879e61f41edfdd3cb9e97b2597c13daf74cb273fa6a27b7d02648e8b2c128b95a3ed02650069d179cb0111c8ec2fedc5ad242f6a0aece0c3b008968ed27a47975e3fa9072c7609fed3d1d29068d205625bfda4ec3fc083a2e31864cd0da29a8e28989f29c62817cf2a1e8e340000000bd2c5699bdd82df9804ee1ff7b0ea9ba5a891edd2d9e380058522374b3636a6e3f4777141b06eef04b414fa3584099e50de0be58e32e4e3ea94a0939f2104e11 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000ac80a285f250feba50ea6a6d6fa6d41527435ab17ca980758200e0aa080e34b0000000000e80000000020000200000006da255c6a017fdf75ef7d2211ac7ecb269c8328a6dd81b6e641320a55a898f682000000075193112d68ed977e273e0cc4e3cc8ca8ff57f0dc52f636cfb26b2f802173a6440000000bb01f294ef9b91fc3df4edccc66e1bfd3b2268a68688fc14e25e9322343721e4c794083960fa27eb7643782fd07244bddcf040befa827d894b4792e72bdafa55 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2400 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2400 2528 iexplore.exe 30 PID 2528 wrote to memory of 2400 2528 iexplore.exe 30 PID 2528 wrote to memory of 2400 2528 iexplore.exe 30 PID 2528 wrote to memory of 2400 2528 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8e4372a0d638988a89c21a19246ec41a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5285218c000fd16d6874c5973d09436fd
SHA1fac2919bcb4d98815431aef98d16595b929e766f
SHA256796b76e1098023346c16c828b0ecb48d2bfcfaddb6d0eca2aff390c7f1914ac4
SHA51276384670642fab0eeef60f916f2da43e8178fbc620b8fcb398a48d95c70345aed0c63322704a6f28a2fd3c15c9ccb8f3be940f93e9a678b3493c1c15a42afe1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdf0c2b169437206d31892fa39601369
SHA1b38d1855497cdc5eca5ba9406f8c28c2da1be510
SHA256b02a424f07726d0ea20cc97ba31adfe9e7f6ae567d9be8a5f8ca99ee1ba6d4fc
SHA51239ea4e89fdf2908a8ce208cda9e43b67a3f22c08dc872f09129bbf3e758ab123f03d415bae11235e01967da57efe69ee2c5444fda4ce6b711242c62d796d598e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dde8ff974da607dbd4b21a5c1a2b20f
SHA13f8efb151e53c8979309cc9c5982aa05f96b8d70
SHA256e1f6bd7a8c8c39233e104ac72ee72deae0c954c2ac5db56d7aa29c160721b991
SHA5126925f51a36e4f3d242bad3b897842645b933300649f0d1526affdf1bd9688c5d77d405f4ce3cf91cb81579b7926bfe9a3c0625ecdc77baf56dc98c62ee839933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c356e557341698902851b49916a3c0a0
SHA13023d524e6b096981421db67d0fd504a90ba029f
SHA2563f3282e63a21d17c08fdb2e11ee8fbc189e969ec3cb5b38fd21f0ce18cde1da6
SHA5124577ea3ab337de41eddae09bbc9f66481029a7fa1c20603b5f911697c7c05f7496a913889c357283718443f5244b2fedb189e43c95387b1a97f53066f8502e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5580e18ec8218387502e90b39439bd891
SHA1956f62062b89744333e738a7d0c12f18297e1c95
SHA2561a28a3d87d333abfd3025219223ab96217c9a339f8dca5b6a1831f8e33918fb9
SHA5125c5f47d141cc74f4ffff77c2d63c91e0745bf8ea58f6fc2ceb979e9f79e0b1a5a6a6a73df5698f8fd883f4071fc5676c8a53be3001a718c485d94989b2433e8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a93fcd3c55f23d824eb0c69d5241cc
SHA1eaab83642b4bb0ed08ded5e7616117c92e56dbca
SHA256ca23b961a11911fa469c40577e50c1d337229d5d3cb3e570548ff1939ea480d0
SHA512aaddd5765b087cadd8708b21ec8ea76953df29e4fe475d9e7acdd7b3897fce66064a465199b92665e04e67167e2aaeb2c8bf69589a71425b1c067ac2bebfaa55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acfcd32af491bf4bd2f84894bd225182
SHA11551f4bc2c8f9d2811f7979cd8d7433735a3835b
SHA256b3a5f937b644b5f982c60d59bfe00cd832fbc461902bdb26f112588079967f55
SHA51281cd2a823193284c989df4dce9566e177a46c3012258e98ab4be30185ed66499b06eac74dbba33e41a9ffc4687450262bbdfd79f5f4f4be1ae9f9fd05f6fbb42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c751411eed47a5a9daebaa99e66360f
SHA16d110ef9d0f0dd3e121779d9044e61b3c91cf584
SHA2564333a26676458eb8869759ea91341f28f4167be8e3d2f662ce3e91489ad76284
SHA51217df07a445c2d3ee64911f36bb3effb899e827c0d103d4be3b3a9c9932943bdae943f383e6d2c56114854354dfd0da03e8a2dec318bb1499092614af9c220a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f38a4ec826db3dce5a0b96399f7e639
SHA1973def26e3b33759df9bcfb664f00c5d07223f51
SHA256f8bb892982971dccfbb73a20e76aba6d9850262e4b41663c1c3f6f8de1812c41
SHA512ba850ac44be2b3c0eac57bb0d0c19298f846a53048113e185d3d19d50460a26bbb6c8c6a08aa07b626a114b5e0df9fa1c358b98e21c253d3753acb0585b498b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba8a157ff35be5aa5c02bc70ea6d09fb
SHA101c4207b891dcee47b2209daa377e6618585c51f
SHA256170468ae6aa2fb235828f3ae1c7de7f3b68eb799bb24680d70cf5ef2c0bbe8c6
SHA512603e0b6f8c7283400b5e97cee672bd770dc0e553b393cdae6522d75ac2e8712c3148d501122de74964eba07bf9be836c10937af0fc29e8a7ca0adedb23e0b013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554b586bb3ca609421d276a8e260aae0d
SHA12be4309e2212264c8121a3aa26c3ba2ad751f77d
SHA256cab5e3341f0f28bbba6ae4f30658a9015956a5a9abeff65337f5b12ed97ebef1
SHA5120536b25afeb20fab571cba24e2800a0331ad38162bf8fc017b3cbe00042a0a87144b48bdb1e03abb00b3e38e00659c76d0f7a8d638472a37e157cec650ab7f58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52808adc7c00aea76dfcce671c613da51
SHA186858d8cf3bf494ec298c412a9cc0155ed755580
SHA256dfce40b3eec2bce137811279781c8261ad2da97ae86021e97eae85a07d4a550f
SHA51260f88043818b74bbd78824735992f3cb8cafb84693ad0082ea117562690aecdfa8e1ee1fb41d583066dc5f5463a18eb7b6711c829f278d63ab1d611db7f3a45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5911f4658de0e1bb81c653169b8d0e19b
SHA13d116d98702d229f6d34cd60585b27f7123a87a7
SHA256c02b9535e0b673b307c58698758265992e739f16aab1a3af2e12ba32a2561bb4
SHA512f5a0feddef38ede95fa697423a9a17c8b00c7fcc80ec40c7f44b5c2fd98ca5973c19f52db8556952c0e8ca1efef6642826d6e83ec1104ec3e0d70112784fa677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1caf3f692a7d7444a8ff9701924b01f
SHA18165057532a2b2d9e09076d11d97b1045729bc31
SHA2569fa121fd77b2c9c1d15ee55542f09c4b7d275dbfe403f84bad84915973db749b
SHA51255d626986cd1d26eaed4c1abefd3fcd33f097ebbb4d929acdda978d53722b52b826260e62ce19377af2668cd511e91bc7c41acfa13ce720e51a3a070b62bff8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d86a7d18eac4389f3dc1ad0ebe37a58a
SHA1ca980d2e278bc166a5c681758324942c8a7a9e54
SHA256ee90ba79af1ccc8b2abe854c46317a41d631307ddefc22a8e4da0c2c3bd7c1fa
SHA512667cd9052f8333ab0d0082852f33ce3e1544458f796af8574fb7dd33fe69f1b23d3bebc7455658e3a57e0c42ea075db7e5f44d4702c39ed15399a2e368712bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e5a3a3289ca54704bc850026016a9e
SHA16a068c9eebf71974d7b4d53b3da089c4519e46e9
SHA256e63578db17e41aad3a45cff7fea1f63d9d6947fa6f7265ebbf25d0bd9d0f2429
SHA512abcc042ccc74cd15dbb13bb4d09b3fe3abc2fead75c2ce5971b95529fb5f22a57fad700109466c377d40eeda54c309fb71c2596d0460012da08b3e71f5657f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5035860a7a40d88ac39bb28f8be7b820b
SHA15f3be0befdca2ff33f2e1546a8629dd4f6a2a467
SHA25686677b230b12fb6e7e24089331072b26f1722b22a90bd642631b9b651073d353
SHA512d58ad667b8fe1fb62a181d1f115e5451b6909267eac961a9bb08f70a60eb2b176c7f6c095ee097a66faed3920cdf929d8bef17d17c448d6acd11d6a4cb5b2340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3db38bb06720339386ebb4548a02df6
SHA1d0db116417605104690a22df84b1dd518d2965d4
SHA256295300543ed4fdf4ea45f3f2cd5d9e8dac418d9e7b93988f8fb81389a78012b0
SHA5128db6c496e7e0852f935502e19e98a851f73f57a92ef1865fb6bc558d136bc12902afbcbc6a3788add01cd8b2215f8903e85fb42607b25f27638342306e1bb526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e9b4510c0126f5191d5f13ae7dfcfc
SHA153c9974561378ef76c03bb6101bfc02bafa96978
SHA25620b5e591f929cf8e2a1ecd6f87aaeb489ac6b1574db986674f1303e03b4c287d
SHA5125a1e7032fca768cff8bae71e8145a31191d704efcdb02f8a6544496a14a2244a629d29c0ba9e25d8aeebf450595c2a7e89d4549f855ac0905b3cd881459e75b4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b