Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 03:59
Static task
static1
Behavioral task
behavioral1
Sample
3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe
-
Size
162KB
-
MD5
3be90154d43c1e35591834c10ffb1076
-
SHA1
f61a6a7aa3087f23a11fc717328c2dce2d458db0
-
SHA256
cdf56f4c00aca27164a8d054d9da38fe8ce2594f2fcac2e18de3eea1e68f148e
-
SHA512
b60473135c7c54233ab2d8613cf9eb1c0ef845af5fdba2ced34fe621d84d5c1468197b74c49d0b777fc89ce04621090631be05f1ae3b5ac0d9d183972e3d1a13
-
SSDEEP
3072:IaxAMR633jqNX9B89TX5RFX5/ioEhk9GyoztEWSWNbBy3r9XlZ3aNpjO+u:ZRo3OfC7FJ6HKGVzOWSWNbBQM/M
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\nvidiamanager.sys 3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426918627" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000001cc23f58a46d490a0d048e7c226f8d84c1cde38c2f56bcd10c785a8a5edfc2f9000000000e80000000020000200000003d6720aade86355af534c27ee5af12eb5bdf4345c593751a3a4c4c19c71283122000000011d4b4fb06e9697e8d8c6f1adbaafd01924be30cde246d1f9176eb5b0959c4d640000000de66875dc27fb0c324ae7156f85567217cec5006bd8a3f288dad4285b1d7c663797ef7c30fd3b84a964537136e8f538f0bea93321e63847a5fb37389865327a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1DFE0911-4003-11EF-826E-EEF6AC92610E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d5d7f20fd4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2332 iexplore.exe 2332 iexplore.exe 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2332 3000 3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe 30 PID 3000 wrote to memory of 2332 3000 3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe 30 PID 3000 wrote to memory of 2332 3000 3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe 30 PID 3000 wrote to memory of 2332 3000 3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe 30 PID 2332 wrote to memory of 1484 2332 iexplore.exe 31 PID 2332 wrote to memory of 1484 2332 iexplore.exe 31 PID 2332 wrote to memory of 1484 2332 iexplore.exe 31 PID 2332 wrote to memory of 1484 2332 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.claroideias.com.br/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1484
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b70a98cd1545aeff5eae0045ad5d63ff
SHA17369b74adac1b0915e3f9672e3ae603b1ae9527c
SHA256156163cf64fed52a6e224ca0bd571c60299e9b732d41a166452580773c275306
SHA5125760d345cd180251ba6e2f8f592c4a19c1f7e2b0e0e6cfd63face21374a636b5ab77ab9b6c365f0b5c5868077601289c1c5cc07c1878989fc81dd9a898cd3071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4669e99dca29483966cc8ceeeb20737
SHA1c97827eda9b65eab440d333645bc81a81ad5eb69
SHA2562a0b19bf0f9f60bc74bfdfc90a44b7159ba6de6ae0ccca7959df8b86c248ab3d
SHA512a22c7355eb7fe916e48c8e3ecbe70857b1cd7e4844a3e6cbdf378d2043919100ec66979f959f2dba473bd2626cfe490953295b15e6240ee3fc02d1b825a60604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52515869903273f0f53e022c8ea26683e
SHA1e45a16324561f70547f67b474ad8c6d047156be0
SHA25650d1834a9be743d2e02ffa0cbfe22bdc132943e5a5c687371974e29eb8fdf411
SHA512f6e81caeca5a1ba081b7fe9dfeefd9d64dc9af25b39c29663f9981e3a511794f6d7c900f59df7b33ee34ebdb5c827bf0a05125037b2e9d8cd4977d0640c39597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ff1b8d4e546e94e22a633b7eba52ae1
SHA11c693716942d6c69b8210c1086fd3ef13e67f445
SHA256b5b8a9a07e6149a899d9e30ce2f1a28478efddc5c9f0f224f6de217fe631d4b8
SHA5126ee961e5a932d5b2bf43e6f010417ab5faced3147ca7958d7a28c63c386329951cb1fcf4eb5172ad47a002bcca8b2bfb650be510c3730c4c5ea4dc9391e4d6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e56885462193b03f554bf7421e7785
SHA140bc83c34701f23b9bdb70d25ac9c25fb9e852e1
SHA256c8bf965bcee632341390334917be9fd66b2b9d87daa5caee47a3baf4d5529ef1
SHA51215747665f02923618cf1b2254273d5d67ac1e5954150ead2ae7629c83ef5f68ad396686f7a3045cb7a9d384aaae011974536a79986eb51a07ed2a92f9b301ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d691765d227c2cd745d4aaf95d029eb
SHA1d43eb1170762b5014e7e3fdd1d24c2d55788cd2b
SHA2560dbc6412569bec05692f282125729b4abc6837ff11656443fd461c8fef8de374
SHA512e80dd08b15e1be2904fa9a0c2f15d1cade2ade174195155bb2ab3e880c97f7d8d81f57c75b773afca436d09141bfabff059b9d23006333802c03994a467c1fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afa48ac52008744f795a6f8853483cd1
SHA1635941dde8a995bfb5a154647f144721ba9c168e
SHA256dd9cfaeb0f376718824fd6fb7c4559e3e4c66a10620507efc97d0eafe9502379
SHA5121408332a07816f9413bb165d2edd43eab3386ac8ca13d5ec695095679d55cd0a5666216647089631aa011b3cf818e34e71ee5427af56f3a63e279cb8a648318f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebc6821bb51736e20d02a9162301939f
SHA1bfc648b875b42bed8508f67cc23f5179ca06dee2
SHA256103efad2e8fc246c1f15bba39a894c3364fbeb4ce9ff4ffaf91996fe6044f35b
SHA512ea9f876296ea69e858a3b3ae3007ef9cd18e32bcbc206862e96305867fef6945d4a07bddfce7d6d2c45bdf157bab40487a78326e49fed56239cbfddaf38cc875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5434470e2e012a8d4f64e4915fa27d97e
SHA1b973ca5e11c71b367f32218411512b40d1aa8208
SHA25632cf67f982568a34b7af0cdbe8a2eb7a7e610d20cc6f21014092d1cac09d430b
SHA512d800e37fd5115a409da91ae22c65fc352e1f36582f3fa551bb2d9af1a5b438d09731408c199e676d222e71685dbd0e737dce06c64c84d7b7af23fc4b4d1415b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b649329a4e619662f70acba948b7a079
SHA124900762ccf72158db844da201635e1299abda29
SHA256851c2a9fabcbaca4ef9d4139695bfde6c8e56b601b3c0100fe3a0969903db1f3
SHA5125d9636d0c5e7743d17abb43bd1e7686640677e1f10c8e8d711b9cd5ba1bc9cb7ff02e5d21ca403950143f328dc347bb7907a7f93271b5cb4ce760c779a6e8767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d56ff3da896e8dfc6c8aa243db264f4
SHA1b1a59896d8fdc6ec79a37abdb3d37091ce4654ed
SHA256a3f7220c054a1b17b1eb2c36627bfe4cb660f9bad002706fcf4bb4cb10191c30
SHA51215947634b8fc24ffacbb7ce9ec80a2c8f040323efd6f4596bca304a291afe1c497f199379a563fb4be37325055e853c1a2ba1b3ff1f436e42bad7016c0620922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c566453ed2e31dd44c470716da69668
SHA1af22c009ef3c4354f588e553795c126ec27e83ab
SHA25688c81d07d241420ad83304dbfb44fad32f039659f94b17aa10a35f0c41aea630
SHA5128043fcd8fb3fed645d0362f51f53abc01ef2cfe4db2b82cef6ab01f9f0af1b6b28cbf84446032f048ece15c3efe63095c0fc9b092735b6bb7679de1ea1415880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e167f2c704de63a78379a1a5772d82fb
SHA13e38007b564aa724ba5d5dd0b265bb0180c88be3
SHA256bcb257c8e39360f10b46b1a1654475c04e9174698e7f82e9190982c2a2f5ad46
SHA5128958f53443a79b1763417b7d6f91904ea73c57416b836442ef310f5349e480cd3a5ee2b05dc414bb4ca32e8bf3bc2c2710c0b6548167eb5c6f65dbee0159bc0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6e5cfa3c27902ca5fbc8ccc9af11771
SHA192754ffc4b20917a8eea63cd43fbcad01614de78
SHA2565930d783c77711755b52c1c737a509033ecf2d34457b34a669e2efc92dacb3aa
SHA512a4e5f9b76b8015c089f26871fa9dcf0ebed56523daad7b9900042e9b40833b8d6dcf89f616b7a4e064cba4f9221770ca4fc8ce5974ba3ffadf8b2cbf39653429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c133f12b51c586e40cb433551cde073f
SHA10a5a13f8b53ce01b30aa4db78eff3d9ffa5a1475
SHA2564b0e465adefd17bd70dbf891b4e3d5c6edc15e73b47a708a6f016262d37b4607
SHA51267185b76d017f6b5a1605d69422cb94687f4821ee41a04debe186f7458cc7179b60fbb6476fbd6578dc04a7081d5665c99d04d869f74e19765774740d527c41b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc5be9e184606c38936e2751e15bbd18
SHA18e28fc32a7a7a1be10f263b4b308a06121583152
SHA2560a3819c98ffdcc6f18e57450e8fc742f04f50e23c4e6da9afc9487a4938b5cd9
SHA51209ff29658617dfd260354d0d72caddb2a042e3c25aa2edb17d2e796eba2b28bf6656d70b99ada83e56567d5887f5f92602907cd6aa9e98b5ff750f1f92761891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5452f4b6e0411d14c316a0e8a61e36e62
SHA13c7d6c86f93c695d20abd287f696975d3188fc29
SHA256eee07673b196a80c4fbb4fc77c011c7d7e0c7e501775b20818fd9e5c9d489dfd
SHA51271204c7c65a303d4c23f697c6669bbda6fe4d4ecb529c0c5d16b85a3b52104756362717ca7f54502b056ec77e4daf81ae4ae1d5cb98243b4bbfde730eb169a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583063c44f63d012e7923018bd32350b5
SHA18a9e59831ff6b9f3b9439b9d02cedaa676ea4d12
SHA256a9a588c4723ebd599ade1ad38c05794d9625ca970b452719625dbdddef784ffd
SHA512c0190a2994e70a3693c6c9a62e775d023034546ae7a8c4b3760533d5ac7aecef15afc6444ade840ae84e0db868bdce621f7e97df41ad5d724141b42143c16b15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54678b83a66810bfe3ff5ef5fe28030b9
SHA19db87cd6ffa0f7d57390e1f8e2481c874e0900b0
SHA256b61e2eca9749241e41b86ed25def69d7a7aaa3bb3c3a4ff2cdce1fa267434ae7
SHA512bfca3cca93847973a9e0ae2f4c947e2767742ecc2d272975bcfa084237c58816c28e253108e9f7aef821b55546dc04173c17a07744b1d18e5e044d9ace20687d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
89KB
MD579a272ea29d322964c57ced249798c90
SHA13c9e5e6477e4b2df5f10e2217d33a4ac41897b72
SHA2565f5b5b347c482f404f434d200cd3a3514b9a9bdbf229e7bb3a7436e0ec34f541
SHA512c897dc934c2f15bebef37d4dd1108243b991d3fe173f00149951dee008a068320886be306bc5db82d0c1fb78779999488e6d25301f294da3d51e631138932ebe