Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe
-
Size
484KB
-
MD5
a4908a78bde63d1f84ae1db3f526e607
-
SHA1
4e15dc12814e96fb247f283b01d3bde647da9dee
-
SHA256
094de74404d9bb751babb3ce8893e41bdc95507abc10c7a41e0486fd759bb16d
-
SHA512
e2b686c45e56e1a821a696a831d96410ecaf2f3cadefdd2f44bed04ceff712b08946dcc7dcce0136b09a0aa74e08130b503f8deb81b7216cc549a42e96d72483
-
SSDEEP
3072:d7uvSwwaYbV4Fzk3RskJmSyozSZLTrmZquL71ID:ovNwaYJ+k+a5aLuZZn1I
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run sgcxcxxaspf080922.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\minyust = "C:\\Windows\\system32\\inf\\svchoct.exe C:\\Windows\\wftadfi16_080922a.dll tan16d" sgcxcxxaspf080922.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation svchoct.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation sgcxcxxaspf080922.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1180 svchoct.exe -
Executes dropped EXE 2 IoCs
pid Process 1180 svchoct.exe 4344 sgcxcxxaspf080922.exe -
Loads dropped DLL 2 IoCs
pid Process 1180 svchoct.exe 1180 svchoct.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\inf\svchoct.exe a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe File created C:\Windows\SysWOW64\inf\sppdcrs080922.scr a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe File created C:\Windows\SysWOW64\inf\scsys16_080922.dll a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe File created C:\Windows\SysWOW64\inf\svchoct.exe a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\wftadfi16_080922a.dll a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe File opened for modification C:\Windows\tawisys.ini svchoct.exe File opened for modification C:\Windows\tawisys.ini sgcxcxxaspf080922.exe File created C:\Windows\dcbdcatys32_080922a.dll sgcxcxxaspf080922.exe File opened for modification C:\Windows\tawisys.ini a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe File created C:\Windows\system\sgcxcxxaspf080922.exe a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe File created C:\Windows\dcbdcatys32_080922a.dll a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sgcxcxxaspf080922.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchoct.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430702155" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{1A746585-5CF0-11EF-818E-C63D5579F9B2} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31125756" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4009554248" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4007210997" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "no" sgcxcxxaspf080922.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31125756" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4007210997" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31125756" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2592 a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe 2592 a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe 2592 a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe 2592 a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe 4344 sgcxcxxaspf080922.exe 4344 sgcxcxxaspf080922.exe 4344 sgcxcxxaspf080922.exe 4344 sgcxcxxaspf080922.exe 4344 sgcxcxxaspf080922.exe 4344 sgcxcxxaspf080922.exe 4344 sgcxcxxaspf080922.exe 4344 sgcxcxxaspf080922.exe 4344 sgcxcxxaspf080922.exe 4344 sgcxcxxaspf080922.exe 4344 sgcxcxxaspf080922.exe 4344 sgcxcxxaspf080922.exe 4344 sgcxcxxaspf080922.exe 4344 sgcxcxxaspf080922.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2592 a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe Token: SeDebugPrivilege 2592 a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe Token: SeDebugPrivilege 4344 sgcxcxxaspf080922.exe Token: SeDebugPrivilege 4344 sgcxcxxaspf080922.exe Token: SeDebugPrivilege 4344 sgcxcxxaspf080922.exe Token: SeDebugPrivilege 4344 sgcxcxxaspf080922.exe Token: SeDebugPrivilege 4344 sgcxcxxaspf080922.exe Token: SeDebugPrivilege 4344 sgcxcxxaspf080922.exe Token: SeDebugPrivilege 4344 sgcxcxxaspf080922.exe Token: SeDebugPrivilege 4344 sgcxcxxaspf080922.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1084 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE 4616 IEXPLORE.EXE 4616 IEXPLORE.EXE 4616 IEXPLORE.EXE 4616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2592 wrote to memory of 1180 2592 a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe 92 PID 2592 wrote to memory of 1180 2592 a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe 92 PID 2592 wrote to memory of 1180 2592 a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe 92 PID 1180 wrote to memory of 3960 1180 svchoct.exe 96 PID 1180 wrote to memory of 3960 1180 svchoct.exe 96 PID 1180 wrote to memory of 3960 1180 svchoct.exe 96 PID 3960 wrote to memory of 4344 3960 cmd.exe 98 PID 3960 wrote to memory of 4344 3960 cmd.exe 98 PID 3960 wrote to memory of 4344 3960 cmd.exe 98 PID 4344 wrote to memory of 1084 4344 sgcxcxxaspf080922.exe 100 PID 4344 wrote to memory of 1084 4344 sgcxcxxaspf080922.exe 100 PID 1084 wrote to memory of 4616 1084 IEXPLORE.EXE 101 PID 1084 wrote to memory of 4616 1084 IEXPLORE.EXE 101 PID 1084 wrote to memory of 4616 1084 IEXPLORE.EXE 101 PID 4344 wrote to memory of 1084 4344 sgcxcxxaspf080922.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a4908a78bde63d1f84ae1db3f526e607_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\inf\svchoct.exe"C:\Windows\system32\inf\svchoct.exe" C:\Windows\wftadfi16_080922a.dll tan16d2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "c:\myls3tecj.bat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\system\sgcxcxxaspf080922.exe"C:\Windows\system\sgcxcxxaspf080922.exe" i4⤵
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1084 CREDAT:17410 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4616
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
484KB
MD5a4908a78bde63d1f84ae1db3f526e607
SHA14e15dc12814e96fb247f283b01d3bde647da9dee
SHA256094de74404d9bb751babb3ce8893e41bdc95507abc10c7a41e0486fd759bb16d
SHA512e2b686c45e56e1a821a696a831d96410ecaf2f3cadefdd2f44bed04ceff712b08946dcc7dcce0136b09a0aa74e08130b503f8deb81b7216cc549a42e96d72483
-
Filesize
232KB
MD5f47933cf3995f9a15fdb2c5f54638d11
SHA10223f3890f249cf71bd4e86f03c887a8c673f873
SHA256eaf61cf9748a7a2ac6f02ef2b004fc046f06c5d4d94103c21d5e0eb654e95203
SHA51245d09c8a8d82a91079608aa750f4c0e3260d2c27375ad1c9fcdd9cc9bf4475c6e6e17077ceae05f28852a048252b077f25c125a4ac381a115114c37a3f739634
-
Filesize
112B
MD5b1089c96254dba40cc99cc5baf8cbce7
SHA1a3d005914b5d6a7262de2ee56358c66bca0ff787
SHA25646f75b40f60f299b44d785f80089281df3bbfc48c73e4c9f52b8c9073db7417a
SHA5128748acf56a467e1c5c841e4d126b915c616951024b53014e0e0f976b415ae49466c986fc71cf8886da7e030c7ea35bb7ad8f838f0ac5af184123ba077cba11cc
-
Filesize
462B
MD56291f8ef09a8eddeb27e76dc6a76428f
SHA13f4c6a4c6056d53fb7bbd0c42b3fc198ab57671c
SHA2564b0e8241d523cd3b2e2e51a524d42b823bb6805286502ebce977c0d8ae11e491
SHA512a8477952c46a0b4b94411c7f34f133eb187121bcf1ebe1032c6953dbac4fb3c246d6cd28b2ffb44c9f0602117555c908ae35077689c97b62737511c3d17205c2
-
Filesize
378B
MD5825d149fda12d2dd128ff64ff1cb2a37
SHA1e4c655ac56d1ebe36ef646a0cb24d99787d90d86
SHA256ff62ada9a1c49d54aa8b34d7c0f6b71de5766d3a6fdb1b6dc812ff00a362b1e9
SHA5129d78046fd691c262b7e5b801831281759985e5f185bc9a712d4152072e0abc5a4439077ce9c3fdf29eb5622fbc82fa82db07256f030e6db004fee74fb850e36f
-
Filesize
420B
MD54922f175b4a59b206314dbc304b56798
SHA1243df9beba302a4b064abf545846c70c52f54aee
SHA2560275d8a86614adecc47586811b948958945906b73258219dc3dd0bc0a515efdf
SHA512567d6321abd5bc787673d4d6b0b76695e48d95f05b5d6f97a3c7191f8564909f65fc946033a0dc68ef9188f3a6194b0d5dd65ba5804ce22a048223364e76fe66
-
Filesize
426B
MD57d4fbe3b118864428fdffd875e1df4ed
SHA182e6f3dbffb861eaadbf537598a94146c19669ed
SHA256a03732a62c3cab2da5ca7f1d2c8226b43f0bcdb6ebd9b5de3a605a8e58ffa192
SHA512521c9be11adb8a1d347930b598d9bac0364f7c3c9e01486cd0c866d9ad02655446081bc03da36b9178cad03570d66913225969805d1db1823306cacf9b135008
-
Filesize
459B
MD5cabc732b07d13407a2e05e67a2205b45
SHA134f6ed9109d0a5fc4fad56c78de7a4b490d90671
SHA256608499c9c8f98b0b61ac5dc3615aad9ef3272fb0b0cf03865471b409c597bef8
SHA5121545b11a11d037c273b4ae70bf736161c1d93f45fc1a6540091bcdda2a3f3be6168b7d9f7e5cc614e987aa695395ccc6ceeeead60fbd6fa8180efd26ac4da440
-
Filesize
486B
MD56dd54c7f3c2ec197f2b477a91091ef53
SHA156d38219462a28e240047711c4e54174893c8639
SHA256af8d1ec7e21b8806f8b692efb7b96064c73524fb42ec0609521b45175168be47
SHA512e2e7c008b5eb462dd48572080314560c3aa137e8fef16606db8555d4882e16d02b02ef1aaa0e2edacaed0c2a5d6ec28d1ac3c1e83525dfcf9dd3e170efcd5745
-
Filesize
35KB
MD5193b60c07cd27c3ba7a20a540f01c4b7
SHA1b1fe59690e2ba5bfe22e57b2cb12a92a844c260b
SHA256328fe423812f371f01f97f58aeac99bf8fa96e6804efcab03bb402cb3f34013a
SHA512b3808af9758b978bdf2ac4df2f317d1deadd6c1ecb31c2c0cea028615778441ace367a44a5be207934a93a35d742877f593c00116e63c1fbcc4fd8f599fffd07
-
Filesize
53B
MD547df77fab6045ec684ca921e72dce72e
SHA16e5775a96434c88ec1aa6cf32ed4d35430452b3c
SHA25632d087de0d9887edef87152846ededf9cf14de5e901865d4320f417df082614f
SHA5129b05021f1b4cbf27830548b0d6c512e9317b75d017c21f42711db9c5f17b29a158a1cd50c4dd405d497a567ae1fdf14df0602b12c88be527a2ff9a1dfbae78b9