Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
a71ceb3d92be2ecc89b598b368d160d3
-
SHA1
5f0f6ed78be3aac2255aa8b3a4d951d95171a2fe
-
SHA256
3dc3caaad094ea5e9ecdd90ff2c67a6c4722e1fa1098f497ddad7137e3fc8f6f
-
SHA512
02db011ee8ab3b0bf3b5471c9e22f4c39bfce34dd72cc34c9d1bc4332353085ab24129bbc0ced3c91db43e36d5ed1e8a1ff5d52c380baae06f7f1bb75f37e668
-
SSDEEP
49152:q8mjn1VHaSNGzEADaKMPziZyn2/++OhS8o6fssYCb0nJNm:2nXaSNGZDaBKyna+hS8o6fssYPny
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2392 server.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Wine server.exe -
Loads dropped DLL 3 IoCs
pid Process 1964 a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe 1964 a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe 2392 server.exe -
resource yara_rule behavioral1/files/0x0009000000016aa4-2.dat themida behavioral1/memory/1964-8-0x0000000010000000-0x00000000103E4000-memory.dmp themida behavioral1/memory/2392-13-0x0000000010000000-0x00000000103E4000-memory.dmp themida behavioral1/memory/2392-20-0x0000000010000000-0x00000000103E4000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\system.exe server.exe File opened for modification C:\Windows\SysWOW64\system.exe server.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2392 server.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2392 set thread context of 768 2392 server.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EBC4F841-5D72-11EF-B36A-FEF21B3B37D6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430155232" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2392 server.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 768 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 768 iexplore.exe 768 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2392 1964 a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe 30 PID 1964 wrote to memory of 2392 1964 a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe 30 PID 1964 wrote to memory of 2392 1964 a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe 30 PID 1964 wrote to memory of 2392 1964 a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe 30 PID 1964 wrote to memory of 2392 1964 a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe 30 PID 1964 wrote to memory of 2392 1964 a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe 30 PID 1964 wrote to memory of 2392 1964 a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe 30 PID 2392 wrote to memory of 768 2392 server.exe 31 PID 2392 wrote to memory of 768 2392 server.exe 31 PID 2392 wrote to memory of 768 2392 server.exe 31 PID 2392 wrote to memory of 768 2392 server.exe 31 PID 2392 wrote to memory of 768 2392 server.exe 31 PID 2392 wrote to memory of 768 2392 server.exe 31 PID 2392 wrote to memory of 768 2392 server.exe 31 PID 2392 wrote to memory of 768 2392 server.exe 31 PID 768 wrote to memory of 2728 768 iexplore.exe 32 PID 768 wrote to memory of 2728 768 iexplore.exe 32 PID 768 wrote to memory of 2728 768 iexplore.exe 32 PID 768 wrote to memory of 2728 768 iexplore.exe 32 PID 768 wrote to memory of 2728 768 iexplore.exe 32 PID 768 wrote to memory of 2728 768 iexplore.exe 32 PID 768 wrote to memory of 2728 768 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a71ceb3d92be2ecc89b598b368d160d3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files\Internet Explorer\iexplore.exeC:\Windows\system32\system.exe3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:768 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d9adb7be5ba2fbb6552b829510e2d03
SHA1fb915e192f6cbd3a876eafd6bf9f3c52b8876485
SHA2567f4fef4a63e97bb948aeb1e601a9d8a7945f2010f94ed9fbd74761093231e286
SHA512103505cd57d59c8923e1aa1b32c872ef6f4b2172167746f25713df61e7dccb5acb15dab592f94e3b8ccc3a1e35af265a1d03eaa248f0a5274e14da405c00030f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5069703c069946f339e598638902d03e9
SHA14b728a103a6d139698ab23ad223c4258e42c2b07
SHA2569057235f442f2820952f6d29439730112ed47df5267554f9c847057c1652e9c6
SHA51254d9edeb88fc5629953f3585c76e81fe35ce1be6309267d3ce6b61f398217ea902b2ea1507a5427abc8c4ca8d0ebbb294f8bbdfff45c6aa81a57086ed7e845b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f42af7b2bc286dd2298ca43b6b9941b
SHA1a7d6c9024ca90f40c3da341e4f8c5359a1d53b9d
SHA2562857ae020ba3c384b23054851deb271ed5e20b09108a64cb47bf25f5d37a1be7
SHA512ab0f7369265deef9ca7542108f87473642ef8e6dcc71ae43619134ac5fb6a9dac3aab32cb0dd2a845b1237b6ebe941d06a853d41239a63673c512b4938cf8b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2895762c194cb8d77015c826f544004
SHA14f0862f5a57f10ae5c2a1630a975402849cbc2fc
SHA256def8034aa41670e5f5e69c353d312320934b38a27809d9c37a3721e13fb85fea
SHA512a0998af591c9ad0bb2eaf43a97cffc1d9918ecd4017f673ecf70060a7471fcdc064b0f4755ac05f4af2d2fed907041a80952ec690ff08bab8e2df9078d565043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540b55283fe15123a118d3d9407000d05
SHA154f4cc5c1afe696237433ef21a8a6c0e7b58c393
SHA256d891e7f0df5ed24868d55e417714d4ca2beb9eec37a6ac2a5d84dfab10659e59
SHA5120e01b98abcd6e0c35ee08114c0816760be56c25d0f248934e8a7d21bca25b952234fc77316580fd535320c548a395309650024c331c3071518a7f942866c37bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5886ac8337b189f1a8e103646dac054c3
SHA10fdbb2c245978edc4ce79b6d966e7a02383c40c6
SHA256e5568ae49e27ef994ef77324a484ecb3a5438aa630e83900b70a69644c27e176
SHA5125221db30bce43816e5685f4b2abe9d88d476ee7cefa85bc40d4a9c6761f7ca7ee5dba49314400600f0ce69a25e3ba91ff9bbfca1959d4c5649f6190cb9f73e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcf2c94ac0f4482a488b6eeee16b1621
SHA1471fe62f0399ef729c030b01d567f409e8d0b5b7
SHA25646d155a897b738e054d39c83b1b27a29a532300aee840f929642d60be8cd65a5
SHA51208f2edaa08d4f4e4c42f2034bb8e66d256db4a1c11e7cc9931fcecc5e287c026223aa5480ee0c4df69cee9afc432acfb73babee2399fbb1cfc578ca6668331de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df3617c20d372b73e746eab754f9a74b
SHA1a28f1958cb09e866e5cdd600a28adede8d790fec
SHA25671f0207c217790ced62e6713945242bdf937e7e81847d863a1f501ed782861b1
SHA51279fecf50db2f5c001d934837e3d0557ced2d738ba0baef21a4471c49d162e101647723ece37b6e25fd428a2904b96d24a816ea534a1987c3d1ebba47609fd6f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5976686834b56db65b036e5fc9f327116
SHA13dabef9ffc3ef6d5adc7130fa58aaf9d5769ae87
SHA2562e772c3ffb050a132422a5d3c01ab99df03cd5f29b6d6e9bc04ff4d96eecfb06
SHA51253414f1719cfdae32e024115e9fec4d5155016c534db5e0ab7c458c4f03a5d5edf134bda8b3657c3287ea0710fd4402dee8328da6a041bd1d324c7d3ffc833a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57034c998549254629d3fa5b62ddd41b3
SHA1aded866f73db19fa74068f8f093db5c576b9895c
SHA25658fda82ec5d00f5c4b470f6f8bf49732507e701c558e8b37522dc93efcbf2736
SHA5125f1401becf4b8b00c4efd234766650b1d8cfddceb610c498b38aabf2377463a12f40d6af83ed4d57a80e56ed578765b36f5e6696ac8f3c5d36f1ce151aa3ac6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5388e3ee3d1e3ac8e92f2a641ce356926
SHA16fd67629b22d3df9fd795be7210dcf248a8f79f5
SHA2562f5b30eb5c8d4474af69cc4acd0a610619e1a798cd75fde76ef405ac64a5b4fd
SHA512bb89e04630b6e5bc29b424a3d39871e1eacafd40bb4393cae71307f69a2427623d20cf916158288da3271b101b5ba57004e87dec5962cb3e75d2fc8de88ee098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5744a9eb2237555b6dcfda53b1498b163
SHA164982508f02070f464b90cd05416531574f93bc0
SHA256a8750b6cbceb675e2f03d1d71fa1a1c9dbf86a5ddf41fa3129fd1c528645d004
SHA5129f8f13182d1dd59464d0fee03b45d6f484ab0c869afa32bef900fbbf31955bbea2168875922f94a0b0086e58cb9c27f3690ab5cc6f3a3325c7811c4dc9f9baad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59275c89f2350d11ddd7137f837121f0a
SHA161f07c8290db139d14222c1bf57746858baa57bd
SHA256ad67e3cee833b28db9eab00db5a0b94459e6eb978b965fd3319ac4ed01fb145f
SHA5128673763a47e847a04896649728d4e88bab55ef9220ff96481e206fa8e291fb780bdd4f5517088475465af1bdf33c1a87bb8cd5a758cbeb8670ce5857804fbc9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac0f3f29932aa65677ecb28c2bf7968d
SHA151501fdb00b35d632f5d91941cdb8e822fa92acc
SHA2562a46f4134f9131d7b77ed943181e378569041733a195f6f9003e552c6446421f
SHA5121db5137e9c2b1724ba297d4967ebf2492e3fe34c28e5c1724cde99c66ad1fae16e86c73fbc3d856fdec109824c723f78e86a6d5b8a970e07f96ccdc081b8aead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1387c50f6e36c95df43443aecfafebe
SHA12e36f6985992b8b00b984cca77a4c6130f9c804e
SHA256cd088fc83ab1e2bf70b6b0bbd71c81b5d96f1fbbe16dbbedc3b58a8239692a73
SHA51269677cd44f67e71e9e8f17c9c4a075d98a8c770e64b87d942c05e1cf2ab2ec0602451f5d57d73588969b9611b74c0a47a9bc3b3cff35ac399c2abd8643ee9407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575c5afe3062c8b0b967dfe8c91a09363
SHA1da13816bf9b24dfc22ba14adc6fe6b216f71b744
SHA25618a03ab69658719e342c9ae1af2402fc063d49ec86438f944bacba98813f60b3
SHA5122e7c46f0b6bbf9ad8d2d3982fc4e7fc0ab40d1e2a2e05aea53e10334220b5753fe0445ddbfe3e59950f2db6b253f6fd2d4d163e3dd667c27cbe326fc9f3915ea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.9MB
MD57649e3e001d49eac9b44cadb4975aa3c
SHA163a6de349bfab73e639ba52ca603c93d961360b0
SHA2564992c8e39144c0a81a964350c18bed44559ad146e12f534ae6d61963ba323d53
SHA5129085fd002979b30b5a8bbf22d8812066fdafd50f6eb9cfe2ea18186c7a62c241fd7fb5bfa1bacdee8ac87e968da3e43cf877ac12782d825f6cd3b69be5bbcea5