Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 05:48
Static task
static1
Behavioral task
behavioral1
Sample
55c9adf907d64baae211658dac750f4b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55c9adf907d64baae211658dac750f4b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
55c9adf907d64baae211658dac750f4b_JaffaCakes118.html
-
Size
10KB
-
MD5
55c9adf907d64baae211658dac750f4b
-
SHA1
8dc397fbbae2015271595f6c351f2e99ee4cde2a
-
SHA256
71de6546c8020242dd90f0784b5c875b2ec2b49ca35b82047b85e7ec062c2b0d
-
SHA512
e7a0d99109a6a1d7a4297967b459f310e70cafce6bc56f2ffd1dc8de58151ee06cdae364ad2baa77c23519140f7a2c783dd4c1ec77d2ea8395ea67de73310df1
-
SSDEEP
192:l+WxvvlYq/1HJ1Rill8kpk15Wfc62xQ8JieM+xR0B3XH96zyCDJyjXIRKDvo/nyL:9JKkk8O6bDUFIRpq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905e83642121db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000041d60427aa91f344791c74b6ce3c64790b13157751e916abc1de94e8487633fd000000000e80000000020000200000009f1441a6a8aefb1281d72dfa59f3f28f51ab366bafb0dc72997d8e68fcad270120000000234bbfca6c2a16b2ec6c3574ef5c9b786eba6542a72e56b21ba2a9e68b97bb1a40000000871dca987be1cec711502c1c3fbff3dd1aa69de77502dfdefec7cff73b417fe6e7684f02441a773085745d739014e0ed5cadf5a33f714c597ddf66eb0cf520e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435392359" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FD41D01-8D14-11EF-9303-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2336 2516 iexplore.exe 30 PID 2516 wrote to memory of 2336 2516 iexplore.exe 30 PID 2516 wrote to memory of 2336 2516 iexplore.exe 30 PID 2516 wrote to memory of 2336 2516 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\55c9adf907d64baae211658dac750f4b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f66d838f8fba53070be1938c527be4c7
SHA1475121d7c2f26da27b7a6202ea8748435b052099
SHA256ecf03536aaa0d5e4f236137e81a380ee2933c1c9c819b1cb52dbd392601441de
SHA5124734f9f58704a887936ef9570c222b3bf19ddc2603d668d73c4413510ff1722ac2b2ab1c3f2f57c5b9582c8564496965e795b97086c241576c56134e1682ae3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540e8a8168091233f51f6a2fd206be802
SHA16f1292f9bc9652245e37bd37e13034557b02294b
SHA2568f2be79cb94e1729145fa8d6656677f4d0d021cf3e2bd3f65c8a65231d6cf03b
SHA5124d01a5d47efb2dc80e36e824d6837a80ca84efd90543994363a5eef397ec53d1322b7d7119c68e940eaf3bd7144908b3c9dabe146b2ae2badc45dc4a27421ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591ed33eb85fbbdb86df270d60f963824
SHA129f48ffa82b109a3f1b24d42572a4ca71a783621
SHA2561653e7d1ea1171b8612f029e198f924b3a5adb4c084b02414d21bb3426b580eb
SHA5120a05cb349e1a56639f3106895c9c9a179629261cb0127f8fb96f7d94899b9811f3f12f33a20996669838979db7eaf8cd85523fa4d2b061151c91312748c13623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5c7dc46a60560d753a3677badfe2e11
SHA1c6fe71f3de90531aa98ced8e92d13acb85e7c382
SHA256e620bda47df0b095649c4c579c787c1aec1cb65bbdbf0d06f51328033903d326
SHA512dcf3fe2ef4db15410b7eab860a1f1f9413e93a97a9371f17e5f0f997f40b98c1e063ce76db1fbf6b5db7fc967c9fc6c3cf8ebb138f7b25ed54cd5bb4a2c17586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574bbd47c25bacd616838c2fe16d0c289
SHA15a8e19f5d99ec6a06ba5c814c6d67e6c6808e553
SHA256a750fed3d301ec5ff5cbfc26f37d0042a31d2e88890b0d232c5a7befadf2558a
SHA51226c31933aa1b2e2ba99d0c9c1bb7ac7f5a8213d0c81e70628c3e86c402742a473f4294e7c1a3734e512b79fabf34583942ba7e4239b0d6837945a17611936986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e688b375867f47df3fe369f87054bcd
SHA11ac75d4dbd156b05475b734ec0351edf71eeb931
SHA2564cd0842b9c8ef5d43b7d00de7b4037a59b2b5f75e1bcb6a303d2e57ece3d705b
SHA512dbf01eda00e8955bcedfd0b9013a541ae187391f61ff6a61499326f5c3cfc2ef87e2761edd97923c371dad7c0811a75e1ab501fa09aef34d71f561e7c6b8d55d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b1f33c5b6aaa560f714c7a9b27a3a8f
SHA1e5f53806ed63a890a1b89189c43d3f76220580fb
SHA2566643b5dbbbce83ab5cea641a854ca7f1edf7914e5e10ad7009092ad3413928b7
SHA5124c71f225edfdde5f7869962723ce45aa07ed7095c5d2f6526bfdd4fd67c1f02fe6596c2e9b6fbd5c30944ed59b680fe0d3640670f97d707d33601dac45d89ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ab5cbccf1872585f67567edc114e5e5
SHA15f81b22764ceb8f24c466abc581b59c3f79d92b5
SHA256aef021af630f330a641bb1bc247c239ee6af58d71330334dba7819c6e7b5c6f3
SHA5127e1611d08d9b0eef41636af4a51e6abb322166ed2f94053b6bc43c77adce6efa6865e938e6197a0606d3dad901bde1b3ce65a2a6a6451bf8d035950962d64f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e62d65256406039ef06e3553df60927
SHA1f283eb030078b6ee821e361f388d8d376e620ac1
SHA25633014eda33c58e1e212365ea57a1b8071a938be34ca58a2a5f393ea5c53bfdeb
SHA512c88701cc5a4c779fd297724dd85f0fcd9eaf8ed34bfeff41b3340ce36c9d4a7152df0e4d8b3eae865bb1444d0a410c669ceb40cc572b34d9f107d7ecb6b12787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5510837646196505d45d648ac943a85d5
SHA17244ac5e0ec81322d622979f09a5c248023fe89f
SHA256729e90c53fa5c90d136d5f44fb6b73ac8e2c68f8e1b6f5fcb8002334f0fe3a5b
SHA512866fc6a7753f9ff6416ef51fac53d348004d2109d642a036555f2874075d041d0bd06c6a7ff2e7b8c9d6aed954e16d57048842122c0c33f01babcde660d2bdf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ac44305c7bc673f1c9be0851fa93138
SHA108ea8a1b7f1e14dfee59b14b61f544816ee874e8
SHA25605489e34f7baf4c16e46bbdacc7baa09d1c1798e845545947e43beb93793f93c
SHA5120de4219c7e2cc7e8afa3a0ffa7e2addce25cea1cdc7412a4e6980071946f71d208d220fdc7154408aaf25fd1bab9f2f535fa1c7dbaca50467bf1fe8b1a5eee2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c3eed9d8d11c9ac8c63972dbd82d45
SHA165de7ef86f34ce831778e59445f4737e2b209183
SHA256f670785900740503cdc8f738cf655266cdfb329492cf99f306aaa4668121077b
SHA512cca6ded27cc3be079b4c01702e9b212b542bbc848c61ffb88effb8632bca02d2ec393bf4047f19b55e5b6827dffebae52f0049e3e760b86fc4e46a13fd92c1ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503ff2bebafafcd0536028cbc0d9925e3
SHA1fa51f77bebab696e7a93995b96463faa532658df
SHA2560e8f45c6e836b39192fb0b8eed07291b82bcb056c2863812840b9fd86806bb1b
SHA512f623636079fb338c180397a97ac7b7bd08ad4d44747eb683cba00ef4f72ad9fde4316994e8f7bac653b9f28c70ccebde67155896472f8597b0a0b5c20cbbe189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c9195d6e98542a800c3d9d46e73007f
SHA111fcea032b658991af99940ee4d8e9e782c1b438
SHA256e1f0909f9c972e93851fc1920a15feb37a58af6dc861163eb25976755674cf7b
SHA512d1d71c8c51c4bd96f66d917b00c05a8390a727a52880609a48c73107e472e3b997f2a33f7d6e242af1bb34db5a5ce93216d385c5fb1aa2560b2885831f2afb14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59154fb47b4ffb45b9f8c340a3889254b
SHA10d1c0a6bc99c89311c3b3e4733d8ce3fa1767ddd
SHA2562e312e7979c7116f1623979e52b9d28bb5d169811d791c638dc7f5581f56f627
SHA5124b1978fe3fd2850e46b766552457959e16335b34e15ec8ecc96c2f968f576bc841b99b1d6dd1a0732fe7f452117e15250d7088a716b351903eedfe89da3efe2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57064fc2361e9d11bdeeda640376c2f1c
SHA18a45371b08ff7c1e99896327dba7c82f1bfd733c
SHA256884afef4cfbc2000b9c7d5dd52502edcf250a6a6c2e9bdf488434cce485a822e
SHA5125a39b8b791e26c5341eee7336bdbb501f4f9fbdc2bdbf5fd48d0bf057c87354f8f5de09573153991fb345edd627b25e7817b040d0f5fc78a7fbc3c9198ec43a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc650b05375cd9d597413ee16ded20e5
SHA1a4396768a6e2c02d61c1b2b559871e35e298776e
SHA2566bc4ff7814def1ff50629513bf353a5b060443720965672a4cde26b73dea39ae
SHA512d4b85adc63b5a522f3a2c1b682fa02113b4f8f08f6f353b17004dd991a5827e3f13ab52fc7878e360635a9bb013a44ce6b483435ee8e9ce890072f71942d37ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e62458e59a53b66aeefce2526234ab29
SHA15da5e57a1cc76b0758b43da97e7dcb4d3085ee21
SHA256026dc0fa6d031a182c2b1d4a339989d6d385c1e0c43c2a58ff94751ca6ee53f5
SHA512247f7c4e641b61e22fadba74694d6b8fbee740f14d2f85bfdb26bb5a8809acef0d81126a635345ba76286f96e114d348b677fe90340300d8c899b7136f7b130a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50315ee4aaca4339cbf2f0d32354bb96c
SHA1a5861939b03e4c060c174a94eae42afb2dc4d3dc
SHA256a23a5490189cfae5da6c8d4fa42b6a86e76aac40feaecd68865c7ab50e684ff4
SHA512cb7ac31c65d9f04d5f114187ed312ecb6b020a4cd2d3ea6c666a0ddbae444af3cf011c22bdc61b6373c85b7412285db78613d29e750a505b299f882689e06cca
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b