Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 13:07
Static task
static1
Behavioral task
behavioral1
Sample
dc55037a86530395e7209bbca2e4d1c0_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dc55037a86530395e7209bbca2e4d1c0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc55037a86530395e7209bbca2e4d1c0_JaffaCakes118.html
-
Size
27KB
-
MD5
dc55037a86530395e7209bbca2e4d1c0
-
SHA1
9a43de31651848f6117205d2bf4bebf6a3efe3c2
-
SHA256
899df624d9bd165f0a2c39f13dcf2c9b63566a69ef267c7d852ed3972e522759
-
SHA512
63186cf34c7c0cb89a635c45d832634a7732f3e42498d9db27ba1411c55ad0fdd80f0716b25a4a787ac565568b415c3d9ce8003e1640e5dda977789c5816660c
-
SSDEEP
192:uwj0b5n4mnQjxn5Q/7nQieiNnHnQOkEntRlnQTbnBnQ9e4qm6uZW4Ql7MBCqnYng:VQ/JRCQWLS836
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f02495cd1405db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000027f2d5c450721a168599e4a94c88203921b5b34f2dbf4b4c94e09553774bb178000000000e800000000200002000000098bc31b97928895019d92014de4d9cc9d1e6bec22635fcd93586b525f1ec4070200000006a0a7a00a30cef15f82c9cbbc75b66c7c74616c90c626884824ebb500e7ff43040000000bb6f76243e2f79c3915e300e410963035dbee44a30ac2b24df47298df7662a66c201a37c3ea22a2a1d0ed5e6930f2593778f2df20c9fdbdb372caeab8f52d156 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F655CA71-7107-11EF-9628-7EC7239491A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432308317" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2744 2488 iexplore.exe 30 PID 2488 wrote to memory of 2744 2488 iexplore.exe 30 PID 2488 wrote to memory of 2744 2488 iexplore.exe 30 PID 2488 wrote to memory of 2744 2488 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc55037a86530395e7209bbca2e4d1c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5802640b0989b943c08a5377f3eef2e68
SHA156bab78d8ad12bf6a28f3e6e3742cded61f7db47
SHA2567a9c39ba90788b9db2ce643dfa8a1493f7708b8381812bc1af13089670cf35a9
SHA512c42c2d550ec48143fd4516847a6b59de9934d331920d6ae002442abf9f1f30fc332c481c54726dc032dd08741878785df395f694c262234a3c2da303982d7c03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da90ca822b8310fd5ff0f588b8602bbc
SHA14123c79579fb46c6f977e97871fd7c7b435afb97
SHA2564afdc9b75d2ee1ef8a73a8e2a4f62ab4f73511207a59458ab96ea6dfd9de7bb4
SHA512ccb86dff378732b0ea6f4b42de47b3eba9509d452c20ae4e7695a9d4f2b464cd6e3b478683749706c0253c62cd3ab2f6262641b44f321fe41e8f74d87af65341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c129f5e4faeaf77f5096e8cf92f765c
SHA13f12c95716465c274d76cbfd2cc0c0754ee27682
SHA25670eab5f7a236327f34456507303a19823329d6325d1e5f846509b735c1cbdbff
SHA51232095af47b398c21ff132ee515db92dca6bd8984ce4f458a9fb50eb4ecccf9008da0df73126270ca8a27903935804fe3e11e480998042fbe88fa2b1bc31d1f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a41fbb4dd17a9bcce3992afd9293a8
SHA116743d24d85683ce4da89362f603f6ae08046f43
SHA25622312631cb40683df60e507e746ddf82908e2d040026910a5805139474bb234a
SHA51229896e08921d4323fd5a27e7507a4d65f38541b759d734f13eaeb3c8c79ffc0a7f1f8a2b508c6df0ab63c667543a6403a571781b8d7e41146d3294b3fba3e4f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c545843a5c8425c0fbbab22923205e
SHA13b33d4b08519c6ee2bf6028f5878316e063703f5
SHA256dce24ca0ac017c88b76a87037836cab44cacf2e877ce16fb06f2abf9445259ec
SHA5128ebe6dc6cb3b3edb03ac24ac82c424cb1ee45cb92a0944f51be47cdd48118cfc5d765b39c78936b2740363e928b860f96008cb226eaf0c384f113bb24d77557b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8d1afe7d53b2446bfcb2f8e0056bf3c
SHA1b7adc8b4bbff7fa8a7d712f76730ccd3cd4a3b8f
SHA2568986c72d6a9a3efadc45edf85b0fb55e488a3a6e305ee57ab5d2c74d3f5b98dc
SHA5126bd84ee9c4141093a017feda0eaa04b40b92f4b96d92558f5518632337d3360329d366fd3eec5581501b76943ed12d6ffd746fb128dabf14df08ba1dd24852b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bf09785bf9cdcd1dedb0c0ccc2d4f75
SHA10a85acad5a7f6a2d46379eddd466439ea420ebb1
SHA256af50fd4984009bff67e33c2ea8de98d7fa2cd0926be46ce687d3950980d3fa99
SHA5129bc9ebb2d88f13440f5e257810b98a8e01ab407dbb7b33acb917e7f5167ceb307c0ff7f2cc5b3b786dc884ceac0f385383503ab2453aa02484a27993821dcaab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1cab7a28bfbbc2d0bc854c05e00e06f
SHA1f08592a48937cd215be526030e9dd7bb6db293c2
SHA25625434d8fed6eb3fd81f57a82343b8d5287bdb251e27a5b07d8a79e8611b08723
SHA51234d8be6a05baf5d4e0d18d938a5fa81c92bd011b30ced549b3379b84f51575b1fc9a4f93a03737d147176cd8e4099ecf7e2f5fa63dd59418b051e8686b272291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fb1e52a423c9dcb8a3f8a1e44f2f6f6
SHA1fdc4ab70768dab420e9fdb18e4d18d225b6ab755
SHA25615dfc1656bd47399d80effdbc8281e6bc3eb1a83c4a5c034fa78759ce391066b
SHA512aa637343e0ebe11c3f624c3e6794da3e00e809dbeb2f155f3504d13bf7f112d81029ea6a0f3e1f559050ac1d233fabcac4d2f57d3519c2e19132b07132e80bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d3a2ad23386ef0e2f401a12ca228d7
SHA1ef93f7ce0a5d7a2d69a99e15540a3687bdd45cf3
SHA256831875d7ac80cb59a7bf5ecba5b45bc633065de543299cca1cddcbe300b1353b
SHA512b434d6526ba1520eeb5cac20ea71deea73c26c4e19df9122ae2474cde77b651e1500fecaf5fccab27a55d6104d48de66105aa63b67bdb806dcd48ca488c17555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c427ab4dfd0af2e0923e2d63f087c3da
SHA100c55324dc5829c5c94220fbf0e1a4c0abc4114a
SHA2560f628f2865ca27c371452e0dd183b748f992ebdd56fdedd3aa2996b7b7773a88
SHA512ff3dc52852a2ccd8bcaee26433e84f61e615097c9f941957fe71939b4cf0a8037be00694fa4b230cca006b5a36d7d990b5dc2fce1364c8c767d9e8a3fc33b028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e974abdd13d3e714c22070588caa6a8
SHA191649334f138f5a409dbe38dc7e213883350aa95
SHA25624653357550c327871ac33462018689edcf516443b7cab734c7f91b57235385f
SHA512ca2f3c6eb88dc102bda78a609f38271f1fea42178ed66c8a52d81b951a0f69c936a8d2093314d32f231ec906b948d3e4a77fd93c19d91f449e764da40ae882e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3123e1a0546057a7585b8a1c44df100
SHA1ba29c88fe7993c6d819ae15470e1d6807c120b0f
SHA2561f77aa12360ee088d767c14154300773477191d97368f77cc04c4485df6e5dcf
SHA5127c7f0c8841fa9d84d14a684e9f72c4ee41763d5563b9462b6dca8fa1daa9d741d815d6aeed8810704b12f5aac9e720d768aab20a7b72a0f7030e70472477e945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5728a610105d7f2c8b03be933b5f595a2
SHA1b9a4650df3dffaba80549ceb6f2839b712040b6b
SHA25633a757220502484fac5ad148dbbc8b8415da8fecf10db4328fbd0a517f80d4a4
SHA512d263433edd13e5413963c5034667b2ccb09e05f4076cafbd739126f4c882d245d89b1f6d981964d16728eebf18d97ce002aa55c01e9a1bc8f717b21958a25365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5954ea30259ab020d4edf884e10aecea4
SHA1d2776cf17b90bb7abf866c5ca83aa100b06b964e
SHA256be6de4e946df2b50087ee99e79d8260dff6a79f70368687fa3eaf05068772640
SHA512c0e4c3729a9aaa07544451ff4a7f9e924cc5d57f6030739644afea8d336c5cb77ac995248dd4dd96a2da4193565732e0b3518edbb7e0b03febb89430c4759192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5270fd8f0f2e70ad80d7e54668badff48
SHA15af4bccb06baf15b67f251849a9aa6a9921a8e01
SHA256e8c31d8eeee441951aba317b6c54bedfaaee507167c79a7b26bb7a948e7966fa
SHA51233c6aa2bf403498a25f9c16021c19af2ccefc6f439229f19be0896e31f302802b0c58060075cc46413bd52abd4f5ee060d3c3d7641223150a9e9663f86bbfc17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59322f06ee3090cf93ff19e84a180a2b1
SHA18864fb4e3dfb81e7089d7eef55641c38968f73f3
SHA25623d91ce46b75425e1245a4642d5ffd0502162ceb00fd68c08f7404a2e52703e0
SHA5129230424e1dfded3b8c39fe99957dbd991b0e4932d5ebfe81dc91f1536654d6265bdf49b5ce6f7704d6ea1cbf9d7893d37a290f22d629cacbfdf7eebee2afdc7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789833faf54da788053143f3b150a214
SHA176a10fa20c06fb32fa4af5746cf1e20cd0254480
SHA2569e0a152b62e0fb5408a4d1b64daae0adaad9861415d36b722ebbc4440f24dd55
SHA5129be50d72a95c07f591b0b9b7feb49871b33356642fa477493e9f4443f015e831e737aa76b218a9b32ad6b70a3f97f4ff76997a1ed946445cd41e5db97acd9748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582f12aacebf430c326b2d55c5e955ed2
SHA119c55322b33222d7bc4892cf0b0ae98415f04d44
SHA2560bca908bdaed17fd29e3056ac741c8389e3b1df3051d4f0438162de5c822623e
SHA5128f6ace99a7480f97a79c301f528ed8e6b8710b07c691997d872957eeda696098eb8755bb57a6fee822ec34d15abea86fb1083497dea8a599283d288def006216
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b