Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 00:30
Static task
static1
Behavioral task
behavioral1
Sample
ce3f0858c7392745e2f9033218ac9fea_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce3f0858c7392745e2f9033218ac9fea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce3f0858c7392745e2f9033218ac9fea_JaffaCakes118.html
-
Size
26KB
-
MD5
ce3f0858c7392745e2f9033218ac9fea
-
SHA1
2bc93f7b9dcab57d38ea3ef82c0744d9623acbc5
-
SHA256
d5f76c836f7562dc4654fbc0bbaad779a792738b8158ee22cb08a3217f605586
-
SHA512
ba5c5eda3e767cfee0aaaba4dfbc9748edeb474a1589e4968a2fabd205b4dce3a60b1e912434a87b87cfd7f91edef88ef7dfe262aa87065010e07b360f6a4db6
-
SSDEEP
192:uq5/Xxb5n3enQjxn5Q/GnQieVNn2DMnQOkEntm0nQTbnhnQlCJVevo7NtcFo+NzY:n5Q/ADIygc7HPF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c3ea07f4ffda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000d14edf3e8f02e87bf88eef295a0a4a55cfb46923ce01a788b034479e74370d90000000000e8000000002000020000000912fa08d81d68bd12dde0fe5f3f5994aded70ae736c7a9af0dc7b26c172a4f6b20000000ebdd60f9f5c57fd45ab9dae8bf317844c22b6f37dd51622ec0f38403883cbd7640000000bcab3c6934044bdc28c25fe5e029f2afc20800838dd415f0c5867cc50b88db83decfb08e7711628e7b2f9742ece7000e96aaf8b0408d028c5078809754ab252e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431744485" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{316F4D51-6BE7-11EF-8B3A-FE6EB537C9A6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2036 iexplore.exe 2036 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2900 2036 iexplore.exe 31 PID 2036 wrote to memory of 2900 2036 iexplore.exe 31 PID 2036 wrote to memory of 2900 2036 iexplore.exe 31 PID 2036 wrote to memory of 2900 2036 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce3f0858c7392745e2f9033218ac9fea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d60fee0282cad8d97e04e4b4b95966e
SHA1888438fea482c634b070d6bafce7078f14084a83
SHA25696b544b2bda06963a5579891fec3a41075be34a826d4b3a441a90e641b8d25e4
SHA512480f0f622a0f11060fddbe84026d27b0d9fc7de04f1d0f3566c4a2575723714612069bd93f384089478bb37acfa2c5fe6d7d4c2d078ae84962adb0ac0b57c8ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad182c13a23f2db3ddd83a7b297d489c
SHA18ffce7de84d722f7874065c0605a78d3e2318074
SHA256a02bb25f1fc44ffbc8cd3d0ef8fda741aac0373fdc17247978cf625df65f3c58
SHA5120e18071721a08033663bdd7d872c29b65498a4534886a713f73be56818a597a5764e699234a4268a264e6c246085603fe39e682082c26107d26798ec5e36ad05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ae8f239710573b2d23c114f27bab4b2
SHA16e2de953cbf22b795fb17e0d7850542b1c305c5d
SHA256581bf8e10f0fd4fe0a99381d85465e776662755c7f25edcf9158a806d188c713
SHA51296edc7506496c45021d1065dc75a28405f9a787da40c44b0f17fca320fee3ddab8992b3785888d0d0af4e3c2742265fb6858a9c7bb407fba45f36e586c26eefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d058e343e3ed8599831ad90ec8eef42
SHA1db22cd4ccb9483c0da18d3708fa566a7e33460d9
SHA256f81a38aebf81636504db93f7599d6f92e6f8ae12877f1d9b13881073f3d8d278
SHA512c1e9cc49fb147490fe3fe7b8044d55f418701f5b975dc30c60dab102104c259df135dc60b9e48840046cf9454604c8241c5d9c64436d8af55e29041846b92802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5651f8af43ccb801a592a9abb3b8b4150
SHA120af1db7aabba56e772601ceba72722f0ed9ade7
SHA256f962eb200c4fffc91562ec2c6e37aee89b44f0a379fccefd795af7155dd1000c
SHA512bf52ed419e6a80d11bdb3169726359b5e292ca22632e2fa6539bc146b0c999da4e1fb57c24d1c9140b4ca0a4ab5c6d85f14cd89177c800156c7911a924c1000b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bcc83086fd3acb0019e0f59b9671be7
SHA167334fe19c6c7a23d593b17d22fde293606365e9
SHA2568bb9c655ca1c9bfe064258b02328311180a5bb3075c17393585d925e24cf8f23
SHA512ca474550e70df74cdf84430f0ef5f28839800e91cebd43bcbde8c4b8dbb05f0f53559d5751682eb0eb2d95bcab22f25e6c104e6208bc4a585f23438957ae3638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516fece268b40f034a6c86ca26f5fb74b
SHA1b157a4da08347a6748e509ddf19b2378e5ada5a5
SHA256e21493485df319365c09d6e69207a774aa0d0d0685fed3cf161881ff1528fbcb
SHA512df325dcf765f087da1bf7c85b91ca0f837655aed09622d71e1bc0155e7970c8c2f3535c6f6e152258c7cd1854f3c5b2881c3fe4e0f72e182a4717b7776b7a890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a975337ab8846ad0138d336342548d5
SHA1eb3e34a9589f6918e90b87bf1463b3e725d5fc90
SHA2568ef578e180f911605375fa964d0a9b682633ef0f4c709ee80cc67f95663bb782
SHA512add4eed79459305592668a802ec5c9878318ffd3490c4565b8b76a847c239539b2ed5a2328bc4dab731f62577a469433e4ec03fd8575d6e01244d1a7b7a16f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e741095b780aec952a66f3aebb748ab
SHA121c9e59687f15dbf908b31093fa7bfba3ffc044f
SHA2567df9206e41e58683f8fc48c22f535c2fe3ae4d6e3849a2aac802acdb0b354278
SHA512004d2a83433e66b182b60001b23119322bbeab9bb18b4152ef319ca5ae51672947770af9ae429a0e9e4d70ffe6ea96d11db3f0ca295dc821538ef0e7a56824bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5325d156142732b3fe0a7b3ef2a6d5d0b
SHA1bbad924663c24916b0598ceba81f22ed38013ae3
SHA2560f56067c6c931dfc9f8275f601de47b7d5dbcbf28e6b6984c3138986e1bbdf0e
SHA5125c847ec9b9760dd9440b3299279052d380871d48b17341eb358bcc36c133fad44ee5ddfabb1ac43bdcb2edbdedf16396098154faafaf2c3ec6403334e29a47f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4f6aa7a063b0879b7370a6b5c2eeb8c
SHA10e93132e101712490ad817a50895c55c411a003f
SHA256bd11ba213e8e61ba76464ebec8cd31c318c83432df0f8b9766635822166f6e26
SHA512529f632e472b3e4f32a476fc0ae9fbcc0cf4e2443c77b52bff93a5ba99411e67d3e459c4d60fc8d118e7a478cc00388da19437dd9789ee3b3931ecae3e1942ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6cc0c07b52cbe72e7fa6f618a8d70cd
SHA13aa54450d9b99d1289ab0c2d3284bf89a84bc05c
SHA256c9a1af727ff31ed79ed7c3fb0cda60c4b32de3099b4bb657fc12bf92ad935433
SHA512cbdfdadbc46c977c6daeff4c28e2f107663670e94d52fb2a5035b0d5cdd0aa9e20860e29d68698f20b4045ea5559d487d338ecb410e4b164f4183272718bb0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c502418be6e0bcf16b7587a0af0b12ab
SHA144f25a4a6bfeefc9913c8ed078cd1eb3f08f8956
SHA2565dd1fcb143436706929a570b1cf9266fd1b39c2052e397565c7a413c74c602f3
SHA512619689fe49cbbf458cec74362a237f5b88ca193fe38f8d66f8446af8bd319a5ed468e04ccbc3f707ed57e18474f197f155ee523aca960a6f87804b2c211563e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc096b2d26b0ba404c49de70f20a84c8
SHA15374e6c0f7b81b5c9ef9d73495b6047e9cedcfc3
SHA25615af4807a99df596329ae6d2dcf96d138332a45250f32d2c2fc852d79428f3f4
SHA512213a1bb97623cbbcfbbed4599342ba970f100884504e322bcfafcb0927076e5474a61917c67a0d747d5b30387e3a1de66e504a228f51de59f5cb53b8478e5dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5507223e37844be807943890ed19500e0
SHA102b11e7e59871fa253296bb3caf49fc12a91c8ab
SHA25664232805fa86c0be55b7d62f1fe27c6ab46f5f1cfc61f83ca059e5e2dd2056e2
SHA5124aae1e0754e8ceab4596f59f5ad58483ef7b3f628d40bb092eaaca7cd22ea992fd40ed1d045a53e05f17de3dd57b7de4bf5cc3ce75e07e0161b5471565e3d772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6eb8817d69d8a434b4a524290ce09f7
SHA1df0eb8591dd0cd0fe5c2b1e0eb85c2412c0eb84f
SHA2567b486c2c587964e325e615f368e27792b440fbc0641da776b9e3a430bcda56aa
SHA512249ce94fcec289eb2ffe4709eb26558b30549657e8bf14375f8ccc9853ff1c8e9154847bde044b430d8d00fdbf1ce8a6d017e3011dba71c9210605bdd4e5c15c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5e60edd0c1e370a73119864b3f978a5
SHA1e5494c5b25634e994def1ef927751e8e23a0dac2
SHA256617f491f6f6577ccf48abf2b88bb95439c0c6180a2f2bbd47b61f91804defb1b
SHA512ca3336005645dfa72fabd726eec18ba4a42b3490e7f9d033c35c331762516b506fd9c93169097bea12df816a0d976c2cc565b9f9d77635fa3156ccb571f0f675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f9be8a653da131f1c8e9609273cdb86
SHA138c621bd77295df0918ca8771d31e8e2d3a3df51
SHA256541378d397eaf55acbd816c4c59b93382a30c730604f8bcd223be1567adb2ff4
SHA51289d9ecbc24dd0ee996f1d1f40c16b29d0d21db4c9d6d055b55c65e294309d54b5a5418685ba41e62d5ce9e0cd8b8971d3a1f6c71a3199e67f21d2ea736dafb4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5455213483714105cffc7ef03f9319a3a
SHA1f1b0bd14b0709065bbd20605188550d1120b5146
SHA256683ac02c3649bf7e2579e1a059b03920516a6be0d4f17f9986e6088cbefe20d6
SHA512b55bede079054fee49fdfbd6bc65169eaf83ddb84e3c3c7038882ac9fc9a23fc6cd8b2487e718661c8ef218d4a5c09bfd0b8df2795a021ffde83c3af3722854b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b