Analysis
-
max time kernel
11s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
645c21b089a03453d15d80fa0d50385a_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
645c21b089a03453d15d80fa0d50385a_JaffaCakes118.exe
-
Size
252KB
-
MD5
645c21b089a03453d15d80fa0d50385a
-
SHA1
951454a04924d8e4be3f5f3f3f419ccbd9742161
-
SHA256
064843e733169a9cecdac486d7430720a2cf99ce77574134eeb8c35e292ed5b3
-
SHA512
b68c8b39859bb8197c46294c6d7dabc8291a4e69740b8c927d9499f6b3e84d7b3f232bf2badcb8fbfc0bdca8e80071d93fd5db0d44528ec9ba8d4fa82bf20807
-
SSDEEP
6144:91OgDPdkBAFZWjadD4sdggvkQNLu1P9aPFjnvayjTHo:91OgLdaf5PQFz5Ho
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2460 setup.exe -
Loads dropped DLL 6 IoCs
pid Process 1612 645c21b089a03453d15d80fa0d50385a_JaffaCakes118.exe 2460 setup.exe 2460 setup.exe 2460 setup.exe 2460 setup.exe 2460 setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{237A9A7F-ECC1-4152-8803-F331480DB205} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{237A9A7F-ECC1-4152-8803-F331480DB205} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{237A9A7F-ECC1-4152-8803-F331480DB205}\ = "ADDICT-THING" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{237A9A7F-ECC1-4152-8803-F331480DB205}\NoExplorer = "1" setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x0006000000019078-22.dat nsis_installer_1 behavioral1/files/0x0006000000019078-22.dat nsis_installer_2 behavioral1/files/0x000500000001a324-79.dat nsis_installer_1 behavioral1/files/0x000500000001a324-79.dat nsis_installer_2 -
Modifies registry class 63 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237A9A7F-ECC1-4152-8803-F331480DB205}\ProgID\ = "bhoclass.bho.1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\ = "Injector 1.0 Type Library" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID\ = "{237A9A7F-ECC1-4152-8803-F331480DB205}" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237A9A7F-ECC1-4152-8803-F331480DB205}\InprocServer32 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237A9A7F-ECC1-4152-8803-F331480DB205}\VersionIndependentProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237A9A7F-ECC1-4152-8803-F331480DB205}\InprocServer32\ThreadingModel = "Apartment" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237A9A7F-ECC1-4152-8803-F331480DB205}\InprocServer32\ = "C:\\ProgramData\\ADDICT-THING\\bhoclass.dll" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237A9A7F-ECC1-4152-8803-F331480DB205} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32\ = "C:\\ProgramData\\ADDICT-THING\\bhoclass.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237A9A7F-ECC1-4152-8803-F331480DB205}\VersionIndependentProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237A9A7F-ECC1-4152-8803-F331480DB205}\Programmable setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer\ = "bhoclass.bho.1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237A9A7F-ECC1-4152-8803-F331480DB205}\ProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237A9A7F-ECC1-4152-8803-F331480DB205}\VersionIndependentProgID\ = "bhoclass.bho" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237A9A7F-ECC1-4152-8803-F331480DB205}\InprocServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR\ = "C:\\ProgramData\\ADDICT-THING" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS\ = "0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\ = "ADDICT-THING" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237A9A7F-ECC1-4152-8803-F331480DB205}\Programmable setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\ = "ADDICT-THING" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID\ = "{237A9A7F-ECC1-4152-8803-F331480DB205}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237A9A7F-ECC1-4152-8803-F331480DB205} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237A9A7F-ECC1-4152-8803-F331480DB205}\ProgID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237A9A7F-ECC1-4152-8803-F331480DB205}\ = "ADDICT-THING Class" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2460 1612 645c21b089a03453d15d80fa0d50385a_JaffaCakes118.exe 29 PID 1612 wrote to memory of 2460 1612 645c21b089a03453d15d80fa0d50385a_JaffaCakes118.exe 29 PID 1612 wrote to memory of 2460 1612 645c21b089a03453d15d80fa0d50385a_JaffaCakes118.exe 29 PID 1612 wrote to memory of 2460 1612 645c21b089a03453d15d80fa0d50385a_JaffaCakes118.exe 29 PID 1612 wrote to memory of 2460 1612 645c21b089a03453d15d80fa0d50385a_JaffaCakes118.exe 29 PID 1612 wrote to memory of 2460 1612 645c21b089a03453d15d80fa0d50385a_JaffaCakes118.exe 29 PID 1612 wrote to memory of 2460 1612 645c21b089a03453d15d80fa0d50385a_JaffaCakes118.exe 29 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{237A9A7F-ECC1-4152-8803-F331480DB205} = "1" setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\645c21b089a03453d15d80fa0d50385a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\645c21b089a03453d15d80fa0d50385a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\7zS7530.tmp\setup.exe.\setup.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- System policy modification
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD58be20144dbd200c6de0c9430ed9280cf
SHA1b81e3aacaaedd66ef0896acabc6983c94758e2b4
SHA256634557ab79a29fe800721bc5f146a9b86799b72eb6755e821492f85ca66818a6
SHA512fd7db954002be6332c8c6f4500fc38c1d5286022bb56f21b97567e837ee3d5a3c6db08cabcd2ffe405e7180918d6bb0b57b330703a9d045851901d01115ff94e
-
C:\Users\Admin\AppData\Local\Temp\7zS7530.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5f0ded83c97e0190109bc35e59c3a86a3
SHA18ba0d099b3ae07ed479f45000f422f78a579254f
SHA2569301e5cd5c9018835f5656cdbc01e62968d2cdc305f4230fdd2b12e256463484
SHA5126a437fc06c2db07568606e8a9561f51e6d038d8afb2c05608167e42c5c134290d96a8be80851b01175e579f07685dc49ac1921f497f2f384670ccb24a1cbbb52
-
C:\Users\Admin\AppData\Local\Temp\7zS7530.tmp\[email protected]\chrome.manifest
Filesize116B
MD55f2ece2d023785ee968650867f578e35
SHA1545a830980da7cdd61c67b779c65ce08e12ebca2
SHA256acec7bab94520d36527b9e65bcc422dd0038c90bd87cee9faba20dc13bc2ae31
SHA5126777252b01386bccfae6e86c01f4a23c44f97769339f79934c0b46394a3805f40300d2564151e4b25034d43937624f99aa2ce82a259a7db7cce2d5555136012b
-
C:\Users\Admin\AppData\Local\Temp\7zS7530.tmp\[email protected]\content\bg.js
Filesize8KB
MD5a09b7009910c14b0287a185ec93a9e99
SHA1cd450956a9ea6113d72c6988ecacf951f9194d68
SHA25645b2bf858f8732de8ea2068546228c9b2c49fa5ceb8fd57298cf5df88e9b1a37
SHA51282114cf4c60acaf4aa4add0680e638962bef75902aee06539ebc0fd54fd2b26ebf5f2a1df44fc5e44d869227a3a7b3310bbd1cbfbd63847e519ec36614827fb6
-
C:\Users\Admin\AppData\Local\Temp\7zS7530.tmp\[email protected]\content\zy.xul
Filesize225B
MD5ed265d918927d1667cd7f8e241871de2
SHA1e891d5ec9c6da2f6bfb1cc323acb5c9bb273c0f5
SHA2563849f2fe60ac42a4bd0f7a18f1cdd4b653c6f63b83c99b20971f24e10343f8e2
SHA512fb8132be747c51f2f2c265877943775a277d2e8de83c1027a13a832499ffbdb3712ec1224ccdac21fccd56cf832bffcc6660e66ba842b5dd3ad8a62a4cf3dfca
-
C:\Users\Admin\AppData\Local\Temp\7zS7530.tmp\[email protected]\install.rdf
Filesize714B
MD5c6f3ffa9c1c3f6ba9c39d1e71a252506
SHA153967c865a33d5f90a2bdf34ff742bb65aeac8a9
SHA256ec05fee1011c351792024bc80d9d06f90d4bba83a6ed5225c484eead2c7f8fd0
SHA512e37f5231251fc8faff26119533ecc3c2a9af301226aa0969920c73f87ed25f677e9e23b49ba4b8e52117c3eaf4e5fa1f9b788ecb688961388c4156ea1e34627c
-
Filesize
4KB
MD5fb033f7b98c544012ee00f9a40efccdc
SHA1d4d19f51c0e64d4cdc8964f80627553419c99cdd
SHA2567537accfd324551816e16205d474cadfd27517f8194675b4b346af4251b8eb5a
SHA512a6cf104a02656666e24a6a0cc2ca82705175bcef2a149af2c38cfc6b9ba9fad74e47737f1e732801991c4b0b5e694cc42f82333da402bacd9cf7116d361ffad9
-
Filesize
139KB
MD54b35f6c1f932f52fa9901fbc47b432df
SHA18e842bf068b04f36475a3bf86c5ea6a9839bbb5e
SHA2562b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196
SHA5128716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99
-
Filesize
3KB
MD5ee5e8a4f24e5809e20f1c2d85b9bf583
SHA123358c1501952f4192927032e550611fc4d23e3f
SHA256b9a59086e2f8c25eb7a9f55fda81a08e5f334b2da7a28f07a347bdf4ea88e210
SHA5123d049026da68cf7ac169b668235c80c901eedb70d976fd783013c8a0bcdfaf03625857353d70ccdb49c5327b4f5cf29d9265aaa888162f690e1ac7cf7b070e5c
-
Filesize
388B
MD58ec0060423b995fc49e148bac6b2ceab
SHA16e6856995b9572b29894fd5b1024d93bd7a8d81f
SHA2566086cf69a9942045a9f41976ce800919c3f1d64989a43bf8bc0f4bf628c279c8
SHA512600567db0fddc2300e8ea96dfdd64c8ceee3a83d7689e5e749921820f5358b69fec484a57dd988769afd9d623545554f9b48d803e61cc77e077a5767bcebae7b
-
Filesize
667B
MD5492233a01380f41ef6e932c0ed7b25bb
SHA1b345cc8c886aed60b78eb21b7b9e6ed0273c2c07
SHA25632de6835122ae02e62977b412b4e7cb626b438bbc6e5b527b29b703ddccb8c90
SHA512b070a10be97297a9ff061a57c5ab83a26c088863b981fa0d1d4075afb4839c3ee81beac745613a721221ba10c96b701763fef83151148dfde0da5173253d6df3
-
Filesize
61KB
MD516ef6e914973925977cdc5ef6b8b2565
SHA14815da2815975b33f5dc94d482e6dbc02588afa6
SHA2566b9a2b64b90799f1d50458dc38fb4e9e13a8abb37210c8f5d9eeedae84c6912f
SHA512c74f0e17878c4598b626edb5e75e7ee098b71c0c26454ba709e2ea438517670ce11abf7d909470e6c935a21d0413c0d14b29960af9bd6a423e3261789a35b059