Analysis
-
max time kernel
137s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
d27f7300768d657aa5587a374b5bf7e5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d27f7300768d657aa5587a374b5bf7e5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d27f7300768d657aa5587a374b5bf7e5_JaffaCakes118.html
-
Size
139KB
-
MD5
d27f7300768d657aa5587a374b5bf7e5
-
SHA1
6ef821b0c0f043bf7363566fe12496e52854bf98
-
SHA256
7c5d801221bd52f6ab78929fd3e60aefc86891895ec942a05a04a23a589bc690
-
SHA512
7cdee4df83af9476403267dad7b9a3a3c66ff8ca30a389a103e887bd1f22fc30a64b3b01e022e31047cd8a564ac9e2d88efb770fb0274108e316cf6d0eb3a704
-
SSDEEP
3072:S6am7EKEhqHfd6yfkMY+BES09JXAnyrZalI+YQ:S6am7NEQHlsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E4ADD211-6D40-11EF-A914-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431892963" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000009b4da0acee5df1056c64f1235a8231393679ca4e9954e033c983ac52c4e48e42000000000e800000000200002000000080a566d70cdd3b7845d0bac1caf67da9f8d6dcd6a8f75c29ef99f719bacb502e2000000000c730b0e5cc9466894962a6fdb4c5a53ca5734ace2b3017641414d429d50d6b400000007e7b4354c4b88160ecc2c881cbd8b1894b1714f4af58b176eaf770d1ebfc8d50464c19f8f036567e4d66701fb4c190422a90ec691c14b0c6044e9abbef2d5659 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c08210f94d01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2752 2316 iexplore.exe 30 PID 2316 wrote to memory of 2752 2316 iexplore.exe 30 PID 2316 wrote to memory of 2752 2316 iexplore.exe 30 PID 2316 wrote to memory of 2752 2316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d27f7300768d657aa5587a374b5bf7e5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d19690f5c886a2feec177504364d434
SHA10c2fd0a6e1fc1e23cb39ea5e1a329cbadf427d6c
SHA256350c7404b49b5b4fd8c0027248670a97a21d0fee6cb2b9381080d41f08714b2a
SHA5128d503c2f2a49c706cafae229bb8e0a82e1300bebe8bb2bc74b28377e5defc4f6dfb0cf6929080b3f30e47578a1612e8a2379bedfb0890dc218c71c1ddb994d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572018d1c9ee7f649c14f99ec643bb86e
SHA14ae01081f0e13cf62242cb2bbb2955195d7defc1
SHA256581c48a07f17e638ea4bfb3f3af23b6f508e54ff3464479e67d0b77f2f34769e
SHA51232e895ef70ac6d3d13156e14512934b64a68cec0cffd1c821ad2cbc06ee423e351af288c129720561ab7fe59811081accbdd05fd12d38c009333a097ee421be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de26f0782ca2744b5dfcc710963522f
SHA1f77c6b0b6e80b738dda2cf093b8090a3771529c5
SHA256f5ab7d000a776d8431a86dfc542d26ce4b91ad76ed8d9aaf3f289dee698c0b0b
SHA512b8a548364dd188f4c36e33f599af82e0959ee672a8c83309385211150ca07377f59fa888f61c350b8cdda99b3170901cd6420065b2186c6b2ef0f4eb9a76e8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b716cd8b3dd2b96bb97e40ff9b52057d
SHA17d9f03e389511f66decf2ce02a558712358b273b
SHA2564d37d71798a69751785432e0bcb69bdc650ef8a992a1372443c7e2899823ff53
SHA512589bf88a82cc8df4111c9fa5b594aab174d97b3bab868cd14383209c899ec118f4acc964fbe879c57824eb98184e3d375e1e72db079ac32caf4bdf4090d553d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c884138c31097c185010aebc3cdc69a4
SHA169adc7bd0cce2211407173bed3d1a2dfee9c6a4d
SHA25693013e98e9ccc88ea108d2419b48fd04ced62659748d9b25d6946763e659d53a
SHA5126e14b044ef42ea254237d6c8b6018249bda4330e65e1da39a5c412a33074ed5441263c9f21d4ae709b202569166c5ec73fc18ad76099114bf3f91722abf87e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8d2867500bc16ccba0b449c0e38acba
SHA14d41a1d9246ef8154afcc564fc7c1ec8df5377bb
SHA25600ead8cbcfa888dab9e6e0fe2eab3b2c791b3422b08784cb5ef24455eece242b
SHA5128c0e72bfd979c6d01626e57ca34d6ae2541dc43a50c952008aee7615f21e7a11fbb98146d402e1f3afdb1d8244c11d1b98f94e36c7f70c1932337f7c37a73895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5866fb2bc5a095df376daeb48ebad6663
SHA1d011f375cf084877903687fb47313ca3908cbf32
SHA25622fad5a345cd90d5da3e362ef81c7dd40e92ca56545855e2e64e1855fa2e8d63
SHA51227f63e6738fca278843deea9eb523e9680e373ec5b76b85f3c20d06363905a50da6a74a651ac425edcd7f6d51100bb419a00750ca6b399b1b842c1a758bcbfdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55295aa1aa2b555ef13e21d00be4eb5d5
SHA115606e4496df027496b5fb75983489fbc240c4d6
SHA256e03b91feb8cb57480b858dc9e5ada2ee4ad749001d5a94101790184a2556d33c
SHA512bd2986df312d566760b76ac68b016cbcfed6bbc9892f11a9453b50790b7ca05b06d2ca39a4df043ab643201d900b15ec7649b1abdd085f2066bc3633fa56a65a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599eccf70505d0905fbf8a3c16124f1bd
SHA1e1b3b3aab9a3ceb5f774303e22d565a038b401ea
SHA256a52a3bb64c35fc84b9613c16f5078b1973464f46b12985e488138a1fa46fdd15
SHA51200d4d403e3d25f4d47c15b378c99bc7f4cbf513d58fd89effcb7f0c86a17ba6884db0b2c1b641f526cdda15f8f05c7be3a8e7092ea66283dfb4387ce66f0a305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51863ab7cad19cc23f5409ac90bd43a09
SHA139cb66440df884227ece123df33e71e4e7018a7c
SHA25675a452841d12e31c70ec5831ec1dfc4d7b9f4b5d12305ebead2411ef577cb6fa
SHA5128d5da53ffb792721a1f2f4edeb9a7579410661e46ef4a3d6b9d5ff0608a9f0da18c67036a7ac6d6f6ebdb766254ca960e1f162f754530f931bc0c86894bb29d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f613feddbaa959484160e658405747bd
SHA144ebc029bdb15cef4ff539b8fce1f20158ddc22e
SHA2566059c46544f9ba5f7c9e74eed8685d092a609bacf457507507aad8877ae74d33
SHA5120df91067415f0862b254f49f44d941b8daed72a91e6959b63776f427d5104c87fdd8673fd78e27539c30c323577ce8c72836cefc2a486c3c58241d3a7a2f9ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c525ed448117357e8f1a869662cdd4a
SHA1dad24c3fc0a61afea50ad528cf469cf1b0d5e067
SHA25634a9bb39dd37417bab30f12566615fa9d183065fee980995a79bd5e95a663dba
SHA51222b740c56078f7dc5ca091af9f8c5f63bbee6c57ec04d0f9bdaa2441635c000f9f2f7ebc5fba350400b14f437e4ffdd30d58ab89f78dbaf0e3e8f0c4ec6de364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523b78dc3e9980fea9891e9dbe8fb5e95
SHA149652f482d275c2a4bbc56c44b468bbeab616170
SHA256a1ba87036eeed14137403f0de8cd7748fe9084512a8ed0fe502283d0b5a765f4
SHA512a99bcb3c8e3f5033a761ba8587c55c814ff97e407ff39560a7b710c60bc11717ab880be101eab36e13f4ab963015e88e62fe76384c6463350a592e95c74e4630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53afc48db910c2554f99413ea7c0059ea
SHA1cb30100b059a943fe3e837e9e675d932f7242b6f
SHA256cba6eb82ee39c2a68c7d74fbeb6e657b53d624db3a73f767b60a94ac8afbaf8d
SHA512768d26b57bbc5e9151578df015798f620a7a324eb6672c30160cde9cc92870b4b6dcbd9a4dff7aa05f10090d6c63556cecb35657ad67ba3f4287d6793fe87d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f94def9e3ac5190a1052cc5c77c72b40
SHA1c82a8bcb077186aa5baf4220c629b59b299c844e
SHA256f94b5895cfeec0d65a059f0622ef1b3406c4e0c4de893ab982d50c91252c4d3e
SHA512063fb013b03596427844c067b4c4ab181e0d58618827a87d2e5d351c5d9b45cc6189d7faa4a15e0bdd059f5d0c33cc730bb34ec8aac263def151ebb60b9b2187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d42f8edeba513fbf1beb2271cc9ebed
SHA1baafd5709f720c833e1d5c4c9ef40be5b86b4c6e
SHA256c5d0cbb41bafae035e7c5c7f8600dec680e4ac12e6c0f2f911343ade41af7792
SHA5120a85d4af18f03635ed588c39f6cc717cfaa5d019f15db00dc6093d84250bc8c6a570476eb5bee2ebf499ef8399550a06fad64d26b0cc1ed6d5842864283794cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572aa78dfba85e0cb1547f8353521abe6
SHA1693c97b98be06ce4ce39279871db687734dddad3
SHA2561fc7f82f32a8bbd4374801d0b189508c50c116fb8167ba498b20023a95b554b1
SHA51210f658f8541b200f51e1fd89ed920fe7a1237b22124cdc0dd0d7623f0bf2f117cf7a0b7e82764dd8b41f636f8aab8696a098ada0e1d88ff98035b8b147775473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515bf8ac5507bb3f17a215ad0b3797a45
SHA175e44fc9a4c6c6eeeb84f5aed8f6a06f0225b7fc
SHA256dc09fa008bbe2509f18123669f8ce921784c80c9e472584d75ea394d9bbc713b
SHA512f1110a1c3be9d259b6e2a3d005dfe71b40bad72d5809fc4d3a2c1bbc1d839fee765bc6af2ae1afb4285cb58c9962b8a9a974989be8c8a2ab9465f550ee4d2399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cfbc880651eac0f515791d733a956e5
SHA1b027c81ced8120e8052138cfbdefd74f3abc9c59
SHA256dfedb93e5f99305217ea7531d2918f2b798e8cfbc66fe2c3ada5a8c86ec56d55
SHA51213b59883fb2b70ad97d6ac8260741a0e8d5bff488f7326001b89ca4d393c8d5c20dfa9e2bb0bd19564d5e60b32d3561a346d14c17a8aa970c6798f4e83b386cd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b