Analysis
-
max time kernel
150s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 21:58
Static task
static1
Behavioral task
behavioral1
Sample
e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe
-
Size
3.7MB
-
MD5
e11f1e6bd79d5e12885434dcfd703ae3
-
SHA1
dffa2772b1f9edf18586d70fe83716a032634570
-
SHA256
371f46d6159d5fcba2d1531a470938fcd195840aeaf1147ec894407a7387431d
-
SHA512
05db661decea32032a418e185a9bece0cb1ee6e06e23e7b0cbcd54798c387b3e2ce800c31b5a947570fcd14d63478a2eb862e60060700a7c6f534c6135a2d0f5
-
SSDEEP
49152:+UJ6ZNXox4SgJhBsfHJq/nCFT4Mv0Pt97NfY7+k5K1fyqv+ih69:+tR4xGnCtvwNSK1aqv+4M
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
Godwin@1234
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" wininit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe, cmd.exe /c start c:\\windows\\wininit.exe" wininit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe, cmd.exe /c start c:\\windows\\wininit.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wininit.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" icsys.ico.exe -
AgentTesla payload 5 IoCs
resource yara_rule behavioral1/memory/2560-84-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2560-82-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2560-79-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2560-77-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2560-85-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 5 IoCs
pid Process 2532 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 2880 icsys.ico.exe 2668 wininit.exe 3056 svchost.exe 2560 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe -
Loads dropped DLL 5 IoCs
pid Process 2352 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 2352 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 2880 icsys.ico.exe 2532 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 2256 dw20.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" icsys.ico.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2532 set thread context of 2560 2532 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 36 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\wininit.exe icsys.ico.exe File opened for modification \??\c:\windows\RCX1545.tmp icsys.ico.exe File opened for modification \??\c:\windows\wininit.exe wininit.exe File created \??\c:\windows\wininit.exe icsys.ico.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wininit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.ico.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2492 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2880 icsys.ico.exe 2880 icsys.ico.exe 2668 wininit.exe 2668 wininit.exe 2668 wininit.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 2668 wininit.exe 3056 svchost.exe 3056 svchost.exe 2668 wininit.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe 2668 wininit.exe 3056 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2668 wininit.exe 3056 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2532 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Token: SeDebugPrivilege 2560 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2668 wininit.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2532 2352 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 29 PID 2352 wrote to memory of 2532 2352 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 29 PID 2352 wrote to memory of 2532 2352 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 29 PID 2352 wrote to memory of 2532 2352 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 29 PID 2352 wrote to memory of 2880 2352 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 30 PID 2352 wrote to memory of 2880 2352 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 30 PID 2352 wrote to memory of 2880 2352 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 30 PID 2352 wrote to memory of 2880 2352 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2668 2880 icsys.ico.exe 31 PID 2880 wrote to memory of 2668 2880 icsys.ico.exe 31 PID 2880 wrote to memory of 2668 2880 icsys.ico.exe 31 PID 2880 wrote to memory of 2668 2880 icsys.ico.exe 31 PID 2880 wrote to memory of 3056 2880 icsys.ico.exe 32 PID 2880 wrote to memory of 3056 2880 icsys.ico.exe 32 PID 2880 wrote to memory of 3056 2880 icsys.ico.exe 32 PID 2880 wrote to memory of 3056 2880 icsys.ico.exe 32 PID 2532 wrote to memory of 2492 2532 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 34 PID 2532 wrote to memory of 2492 2532 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 34 PID 2532 wrote to memory of 2492 2532 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 34 PID 2532 wrote to memory of 2492 2532 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 34 PID 2532 wrote to memory of 2560 2532 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 36 PID 2532 wrote to memory of 2560 2532 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 36 PID 2532 wrote to memory of 2560 2532 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 36 PID 2532 wrote to memory of 2560 2532 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 36 PID 2532 wrote to memory of 2560 2532 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 36 PID 2532 wrote to memory of 2560 2532 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 36 PID 2532 wrote to memory of 2560 2532 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 36 PID 2532 wrote to memory of 2560 2532 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 36 PID 2532 wrote to memory of 2560 2532 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 36 PID 2560 wrote to memory of 2256 2560 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 37 PID 2560 wrote to memory of 2256 2560 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 37 PID 2560 wrote to memory of 2256 2560 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 37 PID 2560 wrote to memory of 2256 2560 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 37 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bBNRIXym" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7F0F.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe"{path}"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 5164⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\icsys.ico.exeC:\Users\Admin\AppData\Local\Temp\icsys.ico.exe2⤵
- UAC bypass
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2880 -
\??\c:\windows\wininit.exec:\windows\wininit.exe3⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2668
-
-
\??\c:\users\admin\appdata\local\svchost.exec:\users\admin\appdata\local\svchost.exe3⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- System policy modification
PID:3056
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ebcb49dd288fb843bbee5744a7897581
SHA1ff47bfa3da3c856fe2cd0b33b0560781f71e49ac
SHA2563c93ed4cc1f7bdc52f1b5bfd3be7ef1c87b4a75a93648f66b6c9930649e5eeb7
SHA5129fa8d37a14d1dd47b6ab9a91e97cb88cef45ee3f22535bc1d2f669eb805f02266a4bd5bc72181b0bc54cf9d7aeb8c417b1c3fcf06df45c33d45ee1519bbf88a1
-
Filesize
603KB
MD5022821920ac46b52a44cdf0196c1b469
SHA1bf036ce07db9edd5128319c1635ce05a1a611f0e
SHA256257f5dd7532b70252668c3572d4be15938e7d2addfc825af0d545e2be750db35
SHA512c074c5e4bd861be1322fc381a6238389f6f633b9873f9bc5701d858d15aa592cec91df67f8dfa218f0a7c910529cbe726f48f2495407c912bc0b3dcc4cd295e6
-
Filesize
3.1MB
MD5e5f7631a65e188b5e4c712df3eedfb4f
SHA178182de0cdf4fd956358c96258fcf9c897109fa9
SHA256d35558550ddc97df1b77c3d4d1327e7282115db4d83386894e756a74633096f0
SHA51283523b3d75c0c292c2e48d7037346890c6451433c5c23dcd77df271b80a4b9fc07fcfd42c9c1047892b11c91b49c9366c7c1622a7604581bc728991f02911b9d