Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
af16596a8df5c4b283acfc98224e384e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
af16596a8df5c4b283acfc98224e384e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
af16596a8df5c4b283acfc98224e384e_JaffaCakes118.html
-
Size
119KB
-
MD5
af16596a8df5c4b283acfc98224e384e
-
SHA1
0b0a8009f58ac80f7dd38461f7b832f3de2c7875
-
SHA256
62b931dc58019c8c43142ef42a23defd605fc85c3a8b342d23a6b3fd23ebad17
-
SHA512
2541899ab0e4c19f4158d2e7511f72f04a888084578ca835106966b1b1ef2d088a608333141210b3ade4c9f55360bd7bc1ccf6e565e17f3866d29c79ab45c05b
-
SSDEEP
1536:7+IrZ/JreFsRx7TwHur1H964azqwhC+/GD:3rZ/wFsHD6qsC+s
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430316209" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d79cc839ef79887db0324eb1ec20b3c725819f990a1bffba83e45957b24ed32c000000000e800000000200002000000050ea55cefb546cfeb006b28db75b1b11a8719889334af5dee9d34d0dbc83b54e90000000a7fe19bf07a7341c6930e4bc202773bc904e029d0fd0092c0992d2cd22039b484f44d218eaaeb09539a81a0a11a1681cdbf4cb9c7044dfed9087e58789ecf1a3b575bfae712b6b0134301c0556357d1d5db0e08e8c2041e381fa3f257eb51d29f9cdcd122956e4c1034c67c4473c47e6e4cb958062cb6df94b08c81e60233f4126f5f6fbb2b8aed7bd0ff14ca7240efa4000000018207fb9aba541c2b1b1aaa437cc1cddf3e24ab2ad390d6913c85e29533367ca3531baf64899b33d447bd9aa8bea5b6ea7ea53c3c2d4fa3605eabe89967b2029 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA12CD41-5EE9-11EF-9CED-F296DB73ED53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000c075285ae70263844e3ddd43815d34f17583e4d975f702257fc049163fc9eb5c000000000e80000000020000200000002015bc62057967526bb9fa461003fd8a21871ae81c804f11da91063947d11a7f200000003df3a7e2c12262417f9a1d689bae99992dc9dab79ad399dba82fbf7d6ab3e92640000000605fb9f9999bedab7e94114dd03e8a100b5fe3ae050b50394d3bfb80e2e0ff2fb8599503bf4e563e609473e1e003b1053e603efa3e336c7ca703f47b45f5cd2b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a754b2f6f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1652 iexplore.exe 1652 iexplore.exe 1116 IEXPLORE.EXE 1116 IEXPLORE.EXE 1116 IEXPLORE.EXE 1116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1116 1652 iexplore.exe 30 PID 1652 wrote to memory of 1116 1652 iexplore.exe 30 PID 1652 wrote to memory of 1116 1652 iexplore.exe 30 PID 1652 wrote to memory of 1116 1652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\af16596a8df5c4b283acfc98224e384e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9456b2cef78190784ead829fde0af4f
SHA14bf7fb8f70b24ab9984584265f940a9893931f3d
SHA256ef5569912f7d63490a7ac53cac24623b1073ce954c947c653e5648a31d3099a1
SHA5128bf2b2ab3729919d29b6038a37d40dc457ca520122b7a7b84eae44350320d630f6345f4d3f680d9a098e2db23918fa46e395450b6b4e61c01daa76bc13354df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51572777227a2c4089ba60cdd40be4c3a
SHA1f8a2fbc1e56ccb6346649f2e2ddfa9da1e18df91
SHA256d275fe0b8dd186907bf1b2bdb2f25fc2d6292b0cf7e34235410c967cd61eeaba
SHA51222230a30d63400a69e6cc1c2030d874166296aef62d99be836e4b0946b5c908bb702c85c726d83f701f76dd2ab5683b7cbfe4c53c875e6da939adb6a319b248f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c967b826f2b97eafe71ad10c7463a4bd
SHA103c23828efe176bfe5413bb696baec766520b3ac
SHA2569b75443284ecddc367f4b4a9834cb32ac5ab98f080ba2e3311066b33468f2725
SHA512fd6fa55167638f2686713599b2c63b971ca1ae3cefe9a25ad3fc814abcceefb65ff588c258accc57040d159fe4285e827e3a423bcb6ec6ba71bc30a04a8c913c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b480275742be0e81106ea02fcc35be60
SHA1940e7154bf442ff7599cdcd1bb3f19b599a96fdf
SHA25619e77732df8f1ea3913103f5188108c22a66e78079b2d543d7d1d37110bb6324
SHA512f820d55ac2b85439f4fe6faf629be56837cc5bda5b2f19ff154188ba327bb2f699b0e642c94c473dd1d1f7fcf8a83e37ebd5e81ffd8897b726da2dde218be84d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3f4a0d2b143f29f5a915d5da804063a
SHA126cf58d16bf5b6a3b27cdd58c9aeadc26018c8dd
SHA256db8c6caf9ef49fc1f182c64ce5f4b713ea88bb95053f0a3b6df0d94509ef33dc
SHA51252fb6e28c20a2c335e6e7b47f59e0db5fe0d47f6f1134e57c9ccfe1f7c057c5349ea05cc85a6b8fa9c56985e41c5b2dabb13d27a1d5f5bda8769c8421c56a876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530fda9e42225a60d855a2c168b6c93ca
SHA141d75942f81e62cb5c65039fd56dd690ce96c169
SHA2564139529c35608411610825870f4424df7ea56bdce15b60fa2d4fc8edf76d08cc
SHA51282aa5e926f7b430e49c6bc38e7782a10ede9df83a0ac011474da392d30d67f178872f4a2e14544caf987dc05be670d3ff2c4e5efaae3f3414e2d5b90760abe23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510dc7d1e55cd6d49b245592271ef0cdb
SHA1e14cc89f9ebaaa8c6cfc5a70b49509925825eab6
SHA256cad6f43687853bca3bfefede8619d07049ffb87baa193a90b9f8b84194c9ad47
SHA5120b1efc4ae6cac012fb5f56c2323b3ad142e10057b68e3be256f512fab0727f0622942dbaa92db6a52d50e3a06cf5c6097cf6c55fcc8a197c4d95e4981f72c9c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5109050c0cccb61ac1c2f158c90dad3fe
SHA1910c5ab12128f0e9997fa22f5370e043f09b3a71
SHA256631074651176a3ce60b97cd3c68d71868a411c1b7d42d138a01be91651698cdc
SHA512d8d5af263ff8847491da2cb37f63532bb77cc8f55b68e785c33ab2b3a592c3a841279ad11888851c6d2bdb53dc63c1fbd8582ba81d49fa75453431d3a0f82a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9cbf3c70b8cde4591d408196ee51d2c
SHA1672747854b2b7f9b3942d64fffb35a347ca14328
SHA25679bed4e78a444aa2074d2085b1e448c53c785f82b874dedec5682fc22df6d36a
SHA51203d5f545eb674bb3c76627c22c2b8f3d80e67d6ec749603dcb4c73d5ea9f7d586ac3284e644dba0863a9947d33b332df01b5cce0e25e954150fec2cba0191f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd5eada8be8c934eda0447bf86736f2
SHA1e15721516d92a295b6f21e3ab893e52439e0241f
SHA256f6f56f188e0d722ba89814f9f5984f67f46646d37269160e9dd302d438139784
SHA5126f1d54f8e164818a2aab14696769c8f90014afd9222b5f79549644a83e38acfddb6c4b7f7f38746ab1851c09b7ed67c4f16f553f0a2f50d65002db4d2f04b2b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c9a80ce1ce538809b6d69a9e7212bbd
SHA186c94964d0f55f58ca0781c97ed8fc9965845d55
SHA2560d01d92f1dd1cffa5370d456bc433058d2c64681c669f7de588a6589b8caf5cc
SHA5120759c9cdfe7a8d47ea61d3851da2d6220732b79a8288bf3c66c4980ea4f5c840a55308a5371ae44f72a8999387612cb42de97e2963c3695d8382745a54a98faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584ee4d9d9d4c3bafbb0258ed22e225cc
SHA1c8d3cea4ac972d19937f78af218fd4299b10e3f7
SHA2560074e49ad7d0acafe1e6ffe6e69591fd5a1c4a6452cbbc0e8a421e899e57c503
SHA5125932d408674adfc876eb0793925992b04336bff4caa7521a98f19dc7f319b21e10e7d81f9e7e40af5ad5ff021f9c9ac51f3740734bee9dfc918799dd2eccbc52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f59e7978e8d5ac9ba48a657501019e37
SHA169155323fc5d6109d3b01a3b795ff59c2689998d
SHA256da0d2b5220fd346d201b07ab7a0678b0ad4102c9cd51d50bb8e352a2d4e5fd39
SHA5127f654b3055b389c87b554b9ccfa7158b959038d3b211b5becd955472d34ee8003bce4c46a82c8f469b26b34065a8c1e29179e8ab078f21596f7d6872981ed8c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54265a6fe89bcaf3587fc8d9101de3835
SHA1c26db9da8e59886889e7baafca705315b9a97645
SHA2564bdb2be7e65123a8e8d63cf22cd97544bd21ca6f98baf2d1291aa26b1f14173b
SHA5129f11b493cb5e218d416e1fc70f72179e31084f8de61901f1062379e228c5ab93650654ccc9755b56daf634078501fa4a06985f6bcf6495c3facd22359b078532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f402f8816409157a09e852d37bee968
SHA174d15e8bef2a3ab6555c44d300ba855c20a88126
SHA25650a58fc4a484730342f0e5a84727653d8e20556277e06f0e4e545004ddabedfe
SHA51234c39d8edb8ba85b4a61341c37df4f0428abd9bbabcd9e652b44cce4164cc588e284462794b1b88311b331a927851af10dfa2b161d8b42ead169c0a741146c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cc61456cd1e78b6bc15b538a1baa1ce
SHA1f54bcc047e1a97002c9876692c754f8f9d771103
SHA256c8785f9b77c66087303bfbb984a960d76c9d06ae89cf9f98883fb00eac980765
SHA51239ce2fa2b0101a15df6b5a74466107cba384eee086768aeff18b4e0f97f3873e8073cf1d7d85c9f385226ce329f60e98418627966fcd87e15ff9f7ee67c8e24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c56623cbbbdc353eb77e63e15e48bbd
SHA1749c44263c36d2ab170173d79fd84cfbfdbd5c7a
SHA2568e9a366c1f97d012cde86a28b6e5ad280bb50e7aa1b5c18d083b95ee3a7ab73e
SHA512179819c0f33b3c79e86cd538920a94402c7e5ccfa57745410ed8384d39f41232d832d96c7f2b61e988c97ed65cf65f43c94542160c6147ca45e192881cc6411d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e694373e962585821a7fbec296b1ad28
SHA1ccf43cb10eb7eda24b3c85a030d14a4c8fc33961
SHA256f6b82bdfeb3d43d39a508e13f526bf8e3ba27bca2503f529260588f79a24c5b0
SHA5121645dfb0ec17f90cabce7d861a119c789f5034657a7937a67a78765f768c0fe27f5ccdc97e12b741a3d05178c3c0c0fd0ccfdf285949bea3710c409db7e6e918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD536a6cc5affd00b479891b8eeb2015354
SHA1f79a4d8187140ca81e48140c2ac47557762bb099
SHA25663d4ba207bfe6542dc889becfa4c133f7cf48151cd484d53df8027191b84eec3
SHA5128f95c252fb1c0757114177c1b790b426d86c60e8508516bdbc6a814b195df9e85df514fd157bda2a7b6c9a6809928e5a30c8604bfbdef334339468d6872a4fa8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b