Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 08:28
Static task
static1
Behavioral task
behavioral1
Sample
fbe5933d4b37527957f432717d6ecd1c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fbe5933d4b37527957f432717d6ecd1c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbe5933d4b37527957f432717d6ecd1c_JaffaCakes118.html
-
Size
22KB
-
MD5
fbe5933d4b37527957f432717d6ecd1c
-
SHA1
5db3a3d9caa41be8c8cbb5ff94fd64b387e83253
-
SHA256
b06f206d51f36dec594d0960498882e71dbe918847c40227d9ec151f5a8044c8
-
SHA512
1f642ef308c30b1f2d3139e59e179612586ebfd2018a52bb2017d623bc44f957376ce4cbdf97aa635065c909485fe47d0e2136a419b48ab923f388df13168501
-
SSDEEP
384:oPJMwFmQa5AnZbLiluuPkwMQ/LiJwWgG3iv06kvId1V48iUb8UdBbvv:x
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000934be6250d81916f16821df5d2d417680818ea9f0c761e210d71f9c6a3586f91000000000e8000000002000020000000e272e1683dc0f2fd10b57cbf5c712c288de45ad365c32e79a7b6ea59867f94fb2000000049963ad32c76af2e29d177d4157ef157b7b45f707599e8eb702b3f2de930f2bf400000006b9f8df16e14a197ce788e43226975c68cc654ba53c6716fc3b829f665677cced476e978bed37208d07d862bd140995722c41f464e41325ba98f670ab74d6487 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433674007" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5A92941-7D73-11EF-A3CD-E6140BA5C80C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0315b8a8011db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2720 iexplore.exe 2720 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 3064 2720 iexplore.exe 30 PID 2720 wrote to memory of 3064 2720 iexplore.exe 30 PID 2720 wrote to memory of 3064 2720 iexplore.exe 30 PID 2720 wrote to memory of 3064 2720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbe5933d4b37527957f432717d6ecd1c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dec0c722dccc3cdd2b8d91d3f0bbf8e3
SHA1600d701b7559eacbd446aad8cbe7c9f9048087b4
SHA2565d70bae12b4746eaf54ff5a7f940ef5ab5ab16f96a005a00176ea00aea2c683c
SHA51287a2c2a041f896172aa0267c68f5b6f6b693d39f56fe0beb1a30ff32175a443297d0eeac5ab3e6f231de588cfdb08a10f0f5b667d51fca84cfcd7944585fb3f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9075340756a1debfed9644fda130a86
SHA1835fd9acc241aca21c6004baceff807854ab0428
SHA256b33f04a3ef7202533dfebec0f1d36cac59ccb8bdb5048dea613275cbdfc7d1a3
SHA51203adb1a1931729a3769b2bfec1345113de7d8773edbfcecd00d9608b414dad86d7d100f72bfb3d3a6ba34ec0c2c4894afd9bba78555429ab27a844c46396b3ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52176d5f91e4b0ff18729f43a53b3f60e
SHA1ea4f6df6bcbb4ad601f540bdacfc380395cd17f3
SHA2564b47a9b46ed6f679e6205235eba6a7a5dcf611eed713d2ae7aa386d5c6c6c513
SHA5127536073a3e62f03fcca030af6929d6cc1eb4adc4e247805edd08df07bcb5cb595926b135cb622cea3f4451914b42b7e7fd7464dfa726d1433017e6c399ea8c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f5fe3ea38fa1a378b6d0b9d69c29564
SHA1cdd730cb1f37a0697131ab8a94bf082d9b55a2ce
SHA256a97d6c93fd2b50baf4c5c3aac15d7d045923c809c247b338c511ef6ec995254f
SHA512bda4651358b4ba4f4d805f44c6749458e9c7de5706ab4de1d56ae50cfef1c9d771ad178d96b611c77ebcce8bde8bdb42aaaa9f2e000e4a26dd2ce40f96521451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f64b2b99251a84eab21fddc28b4da202
SHA1d1d79cd4e5e85e453ddb2ad13ff0e8123d2c12f6
SHA25627b31a7926e2a19eed42ff5646cdd3eccbbd1531a4bef5801ecd77adac3f2b6d
SHA5122907984821c783713cf2fa610d12429a93da5d82dc2e4073b679a638570b9ee9564911fc7a441fb949c598b685e99ad42f2ee9a6b21c1226ad04b5b7ae7bc69d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5617e4062e7718fc366de3357f8bb80ce
SHA1e777c3e7218987df545f5de35c9a2026f5c288f5
SHA256e3a9935cd58304e31694d4ca774c56558651f2612140696526d9eb6b999ba7a5
SHA512b06cf7b02de1d7a6cbf39546c630d9a4db40212bb1fc4b10ae1f8335ecdbebca5233f2e48a6ef98c9f36d9a3071c910bd3b06dc49f230739875929d334a05fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce023345d48051a2b73d24aea15e0b9
SHA1b05ab41c5d5db4c14e1b1fd50bdd5041ccfb1c39
SHA256d4600daa2689cb16ff5749d76cad9a9d1e95575ad8545778842f83124ad62d36
SHA512a3ca7602308d3cdd8ebf94d62d4f151afab11684f548f218bd973c3ccc162004a9b0286c1f66e92d378651d47d479642f7006b921bcc8e6bb763f8f170788d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8a6d3754ce4db3f1084d679a7237608
SHA1c20f0a4d322ed234e25fc7985bcbe5d2fd8674b3
SHA25664a069442232f7b5d77c41a758279a6abb9d4dba9bc0889ff4bfc346517cc809
SHA51291458ec71083ce883e60f23be93133b0e5aba130e1da57bf299e8e1f2a5e4285b46d60df3e1ce253b6d189aec9f979cd3234f1a979670fbd116b9c5cea7ac6d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574b637f75c83ff51fad551a28f694e84
SHA17a6f7ec950eaa51efab9750d4a0f08886e88bb93
SHA2569cd52fc551de0f8e18027d22b869caf750d383a182b730228e0d30186c327388
SHA5127f91461183317d710baa61f74ddefe691d50868397eee94373269f6197437457fd7d79c13eee8c21d82f94ec1d4a028a521b2d457d4a9ba5aa5714ad4c97e981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53feb1b8cbff70efd3be023b5098a5fa9
SHA1662e727ceadb72b6e412b7ff16a4ed3804c364c5
SHA256b72b78aadb6422a6732d0369227f2390103a660510be52bb00a8ae0cec5a9738
SHA512ccb0dbb38ae6563478e83fcff0a7ddce29574fe2b01a800727b927b2d9ec4a11151c5467948422587d25867874eb21354cd220f2f6cffdabb086e1bf4bd9da58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597813f383e609a63ad027a2872d54f64
SHA1ccf2b53ea5a3eb7e6e4eb67eb676591aa18c4358
SHA2563aa7d35ca5a786ff45d2048298d02e5dd98c3ea03124fa8a521d9426d2eeeb63
SHA5124fa2060c5b8b5178dbe57e9eab5405f07d5b0ffb55f760c18ae53a539e27e70c63a595bbb86d8d44fe94e9399c89ea92591e5cbc19be75aa9cdecb364d0cafb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc4d014ada4c7d26d587adb2610070a
SHA1e3be4f7e5e714a67d85164e3adb0cad2fb6be274
SHA256f67e77167e1f12ec6e97e23a981d3efa6f8196b64387e0a3b3e4e823715305e5
SHA512b9538c512b6f6c801195fb5c2da05d47cfc9b97d7a9194402ba369a6bbea43e693d918f76ce81fd182997bb46e56972a6f7229355eb0c4a94dddee1fce7e64b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538f512b1d2d1d6657b3ad7b7b4ccb613
SHA11c83b5ae727c3919c47ea2146a139454cbf502e2
SHA256fea44071591dd4b49df3df9167883e8e6058556b3842e8cac39964f3abe0eabd
SHA512633ca218eae6e010b3c53512a612fb61719178e8aabfb1deb38967c3becf64ac2023db8b91f122aaee3ee25c64aa490f9433891f2125a56ffe96da2b67d8618d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587ff833083ad051d812994768eaa6b72
SHA171fe4f3346855225df688b403b6536b6c3233efe
SHA2566ece3e1e49df2c9b9ca8f2b57fcc5dc8166254e3feec6662dc73f2776513fb13
SHA512cce2883898a26491301b1e35dc49d0f57130f923b1edf54b58a379e990163a42b66350d361a4cec6beecc614a56d5dea7f84ff1c2795c09c1f05813fc28ca559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5891c61775aadc3a26d2d7dab1fc47f98
SHA1ff2942ac6247ed14fd859372f6a020631f6f6402
SHA256587984483e26ed6265e771d2919211c3ee5870d8d095a5d2c0e471eb8ed89cd7
SHA51226c6a309234a1740433d7d4d66d36d4cad2f0b45aaf8f7853d243ca04a9e1e76780d0fe15515ca1e0d24e752597a9af86024eca215befee4823d5e6001eb95b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feccf68bdb9cb2bcc2247e9bcfb19ecf
SHA1184fd59340b6c8cb644ab81b6c722aad165c5076
SHA2563bcd27e362bba58bdff49538d487a975b32b8a5f0f8f21a1913cbebfb6682ff8
SHA5126f5423770645ad3d7d8bbda5daa00be2ee0f9460d5e444f993cf624ce59e011f83b4ac5e630f1c2ad3d31c75928f3b81fd6e2a862eb4bc966773ed692d5c5d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b756b87192b6d7cad074e68c3935c0b
SHA18fbc27cb375a3ff49f08bd1e668887ad79bcffe8
SHA25614f06f662ec8821bd8ddb60a5629bd05a8d971e7dc82cb59874437c15224a4c7
SHA51278b660ccce52365e30ba28fcd053cfd14a1a0d61bfeafe81bd39aa96dcb791540948009168b86a02b31c361f0065d020d6ea2202e6eafee0bc78feb39fd016e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ece6755af1e71453462372db3e7d4864
SHA1b5a7a656b4a75e7c09189269e2e98920aa92decb
SHA256bcf7609e82de180e88b8382a9deef881cf564ae743f7dff5e499871cba70f59c
SHA512fbc9b502366de6d15b84704be226e36d67bb758731453b582733e04d339cd37a7c8c6885bd84ac57d805418278c2458a3dd6bffe9970771897b12deb0a02ab86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bae8e1452d354f49a002fb4386c027c
SHA1025691803cae9ee52aba84ea9afa78e57ce57d0e
SHA2569cddf4b6f0fe6f569caae170f8b32a0a8567380c10f798716033ee880758ee48
SHA512006b158b1f68a9bc3e2e9290f0da2e0fcf55a04d6fa91e84a613058f2e5f67fde6c804b2956b0e8236011ddba3cd8faefccc3c91fa8f41dbdedb08109b0e1322
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b