Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 00:20
Static task
static1
Behavioral task
behavioral1
Sample
fd6f9c75a85d252aeca1ca2b3fc3ab4d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fd6f9c75a85d252aeca1ca2b3fc3ab4d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd6f9c75a85d252aeca1ca2b3fc3ab4d_JaffaCakes118.html
-
Size
222KB
-
MD5
fd6f9c75a85d252aeca1ca2b3fc3ab4d
-
SHA1
ee26c142c8a53386f679be25d1d08e0b6250c97d
-
SHA256
75476e54d48f76cae7d646fe8430330ca597c88c340047053f35c7a44b932171
-
SHA512
26ba5c3bb6bd239c9f24d89740cbceb5ca789810e74ac3c54532d9f951362b638a0132bb8b6ba4cf8998c310d4038bf43e15da679c957d0eb95607308c0bab6f
-
SSDEEP
3072:3yfkMY+BES09JXAnyrZalI+YuyfkMY+BES09JXAnyrZalI+YQ:CsMYod+X3oI+YLsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ee786d0512db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433731082" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98EFF1F1-7DF8-11EF-A567-DA9ECB958399} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000186681574b4327186ff29493c30dad3ab5f46bade295eaa5cbd989c47f3cffe9000000000e8000000002000020000000fb60eaaefa1bdb624148703e0923ea79c53399a2d3d7df141d7702055518a952200000003880e9e17e9973bc189c95624e7e94765b970f527bd2db1c432793cedd9a2c99400000008ebd3700e1c6e3aae9fecb8c91053d841a89443ea4f032d34685f52a8c00e82e51503faf4a7cf09febf0a230902cc294940fd7eb39ea8413183850396e612fc0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000047188228160f40fa95feaaccde6c4259ff9716920242edf59973641331df0780000000000e8000000002000020000000fddb3411fa06fa62eb9363add26012f8b386d50354b9d758d2f7f312f5aa19e0900000004f2468e77ae0ba7e6c6dfc2246c3af2dac7b5b76453166b462ff1b3437569f710030776590c31d5ffa0b1d531b28f2ec10774ec4b39dfa2e8f60e598c8995397c3c3c4ca06414a0672d66fe10e6806204e20879bf1d5365220de0992f31ff47e737e701f5030ee05cb25e35c4972c696ee174bae3f915ac2d7ce1638cbf495abe745501c9e8dd4a298ae497429222bf3400000006df3a0f65a977e2230c34f0e9ddf4dd52686fdb2b45f1ae20eaff22d66ee783625fcd9a876cf36ddcf8ef7aae432b2690c40a92548aa3fda487b0b952aa990cb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2660 2344 iexplore.exe 30 PID 2344 wrote to memory of 2660 2344 iexplore.exe 30 PID 2344 wrote to memory of 2660 2344 iexplore.exe 30 PID 2344 wrote to memory of 2660 2344 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd6f9c75a85d252aeca1ca2b3fc3ab4d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bacd41be516bbb7af0f90d8b303f7a3
SHA1b74c57644e3f0a231c164b133d6e10dee2f86fe6
SHA256840bcfb849b9cf0497a42deb04539e2e74ce45c959f9d3a2099d47b35fea53b4
SHA512b659bc55d292bf7b51d8740c26be9be43424f3c2df64fd395bd88b380dc5fd94c54ffa10411820837088a77548d670d6acac5605f2a538f2a987e7698018e7d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cfc255f6c72f3eff613a336c5d923c5
SHA15e0d8d3bf503aa7a84e521d2033ebef01d75ad58
SHA2568893c5d42f5774c57479eb08a46e2da5c3bffaec3466434485ee0dfc19d09d2b
SHA5124e6e14a992b15ff6f3b0dd66ad4865d3cd5e8ed51a3260c8deb70f74202716eec9396c51a3e185c6f0492011a1412b43a03a0108730b395fd0e80f59f5f5e672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59504dd5a9defdef1a852f1dbea2525b9
SHA149b77c5e42f2f0104dc2a0ef51ef96c52f5c5312
SHA256670b103dea41fe6dfd76399f65ac56677d64566bf97d84974c12bee50490f6ee
SHA512244657b1e07142efd79b36f202086fe15aa0ae96e1de2ed62c62471a730bd4c8b8182dd2c3caed01572ed8a5813348ef2d1752501379fd5e7a3d59079910200f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b02ebf1fcb0d6c86be11974933677f6d
SHA1219d7dcf52ef1ef0e1ddd957f261086788c3ba51
SHA25623da3b8e4f90e67ddc9bb5c5ea80c8ec382b82147f5409d3e841d9a42053d8ac
SHA512b350bbdc0c4498e69ccea17e47d7d378ed7db0e4e282d23004698ad111adc357a33d5a710845a12b4c7612e6aefe9602145fe742a8852bae9fd4c107ce4d3d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc7d0e0d2eb0d4123319179baef1ca19
SHA12248dcae6bdf2febc6e92eb7e5145e789808bd79
SHA2564abe25d86b4e76816b7e85e3fa5a4c5beda4a0fcae53353bc65e90f50600e405
SHA512ff28f96083f9535bd742f81583aa254d0a57982a2d93ce0a64202410fd9253af81f4d2ffbe7a4454e11198639cf3650e391561dac77f43d14c67714f45abfe43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523760e848edf0bc5d3c9aa3b308ae23b
SHA118bd796a7c91debb1dafef3877946da8cefa8dc2
SHA256ffd2790265afb608a9a2d90cfdd923a0c0e6c56c4862523586af5ab0b45661d0
SHA512901f17e2aa338d2c89c7cc0fb90361866f089eaf2c25a461ae9f7e3beb05029fea3e2253e3a05172cce0b5e17d8e7c9a892ad51de462e0bb2368ab7b1c95501e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557de9fd3d0e546a469bcf1f7942c66b9
SHA144867f7f462da426789cb400619f8021c1f474f3
SHA2568ad6ad8a067ca011416bb506aa7bd211d31d46c6faa0484955f06db77c47173a
SHA512060492e1d08c48f72b179ea5cda5286f7c4d01442687f87f410833856fb3ec8185f6a2661646cc03655fb3215a8a73349add579c75cc908e5bffeb6f8beb1d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5519e6169f838959d868a372d7e61054d
SHA18c9063412ef9ebbee0d4fa47f36683bca036ee9c
SHA2563527e4b3683f88d1c86e21b39fec57c61941bf1c0f6eb628c7a9fad9aed1b071
SHA512fa43923a381fb2e66b632af68d560c96d2f3ce90b4fedcacf3a88fce59c0c40ac4d94b18aa7cde5f56e826c60c12ed942072775f40e33ebed4496a6bb857d71f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53637339efea8f7af65813a02008f9a75
SHA1bc50ee41a17484d604297921ee99b1a32a1161c8
SHA25603517bddb98c8d10950b2b050ac9b28cc34a2d2eee8287268b4b343978e25e76
SHA512fe536f31d1cabd7d830bf2b4d12cbcd4a3971c3597488876f4bf5ee91c04edadb29bc5fbc98fb3f1922b0f5f3e7158060c1987b6b514791f1fa62fa5fac9b97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d8fd06803b0a560068af00c889687f8
SHA16db4567638ce97f6be1f41d22edf0c578f25282a
SHA2567e60193e3c89cbb2e5746cdd325f4f969bede58552f39dda8f91324e5f2fd9c7
SHA5121f82c22bfd81e24ea7e993750023561aef087e30a6cac82b7a81ed9c32db5c8f146db8441b1e47081ec7d1ac014cdaa72265dc66dfb584b6d7731474ec898dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e958910358d1a2ff094e0e8feee13b0
SHA197e31598e33ff8d3fd0fff99e44c2162135cc89a
SHA25671e07f789dee84044c7dcc77ab981fe377bab2761ae9c28bf0130e771120545d
SHA5122af957c4a9670ba8e1b04d753bdaa905aac4be7ff751127d9e8e46dacb87880ba1c1dfde48d19b8979325eddabe8f2b252b5bfa590755ae08100a9393217c08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506c727caaeb6f0a4fd2db6feb010177b
SHA1f3086448a2fee24e3ac25419997e77c34337d5ae
SHA256e755ef8a7cfc429d0db7828ef72485c637d881878aae51c99e4bc03a2eed8d3f
SHA512594b43a674a3ecc628b45c2559ec79ae761320ac6579c133fb5c493d5ca39ef54b83a46b4a78398b23136da9462757d90c8f33b187e4ec45f38f9c30bd2e6e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50af438ebe67bc0b00915e042414b2501
SHA1ac6e3c56600ca7781a91ce52931bb0fccdc09135
SHA25681a8664f6762e60681f84b3485bb78bfe46a16b19689c3ea391a0bbb56ddc8ac
SHA51271e12be0b048d2fb8b3b5061f356585ef2d1adaccacf00064873eb4fb9128f4ef141484c3bd9ef07b3b65a9e5fd670542aaa52156b1a207030c96c34385067c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a6af49e4cfea16f1c0ce587c8b4fc5
SHA1a2a60ef3c68dc4b3aa3eb239429b48336f38d4a0
SHA25616a47ddc740c26f50ce5aeefab74a06288057315f1b37d4bdb370b87872768e8
SHA512e7922f2628d510573f377cd0f6648f058e2fbab318ff485c9c608aa28b458894f19b85df961c2d16645ab91b4e2d439071fa32a53f901b212c437c17c3e76ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c2f0a8a32c27a60135510ea13f2f2c
SHA1591f85e0fc21d1e5d8b912f60df62776aad23dcb
SHA256aaac518aecde2651276265246add8a2ab866066bc1c35071d1f188102c942d20
SHA5129a3c35c8fef4aaabecd552e3722558c87d4a94ef536c8bdabff6a457edad67e6e5583198f189fdef9bbd4384c12633eb29356275dac018035d62cd5ddeb58101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449ea1d20413ad19b428ae074de0c0dd
SHA1999fd76aaf752f40fa14eb1bce20ea666a0378dc
SHA25651038766a3074c398b2ed85542851d191e33a6a75d1d39658f5909e0e697b36d
SHA5122a7f548d1da807ae1a61e7b6dbab8b70c8075bd597937b672b3ef52032b163909da17bbe09bbe032576089f19a7ad7a0e995ed2b1ec10c7d591079b89289c330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f5a7ba9fc3fb2ab36f8bb35e2b80e27
SHA1f835a9782cf3486f294ef81a138f5f7d6b149d6c
SHA2567483d953cb1e428f4fd7810e238bdc917099636bcfecb976e12e8f037015cb5f
SHA512d04aa83a0c61adf5b5f57e781abb6d69c2d0cc1b0a188adcbef6750f5c74cf31f9dd9bac052db099724e66e2915a1368b9df04897c1f127a3113610f20b13b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5331e8fc278fd6ee506a37970eaa7bd34
SHA14cadca6f398081fb0953243db9acab8d34a8b76b
SHA25654feaf81b697349fda11f1e87eadd8b2466599bb78fb1aae986e567118a1d1ee
SHA512b5e87089642a5874428dfda961dd462b249f8ee0982a06e19eb6c6f8d2bccf82f44f0c110bfc6c0a5b284d44344025e95a9323455e4954f606666018952373bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ae89b2e6ad1945168c37163f423697
SHA18db8a3b14469fba39f3f95ac741270a3369c84eb
SHA256fe1e6b38b4941ab1911afa44485505088375b3d0eeef0bbb1e95571c7af9378d
SHA512e93bae99f7d804df4c8e643d395020ca564946d605a87cae0883c2ffdbbd63aed888cf8308186c172a636d94ec8e662580593f665b6d7d7eed211d72f6d5c80e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b