Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe
-
Size
235KB
-
MD5
be6422ed2b47bc6e81d6146f0d977ba6
-
SHA1
edbcb29d34cad42bb0e255ab7e753ad33a46b694
-
SHA256
1033ddb3daf9b0de8d844d8fd9909142156100cecf8ead6d26a19d49e3c48823
-
SHA512
9cd0e1062ef876d45cf1a5f97973e11d8b8a14122e49e288983e604f00606b59a6823d242a7e19e61a43b8557331fdbc489983c38b7ed2025d58024ed5c53716
-
SSDEEP
6144:LiOdmVPmM46lcDoFlAUVtiawv/iQAQaytn86ZkRBowjXDK/:LiOd4cDoFltVfw3iRUrknowjTM
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000015d18-26.dat family_gh0strat behavioral1/memory/2852-58-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/2852-99-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\DUP1ClRh\Parameters\ServiceDll = "C:\\Windows\\system32\\6oVUDN.dll" ki182E6.tmp -
Deletes itself 1 IoCs
pid Process 572 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2924 ki182E6.tmp 544 inl8B22.tmp -
Loads dropped DLL 7 IoCs
pid Process 2796 cmd.exe 2796 cmd.exe 2852 svchost.exe 1528 MsiExec.exe 1528 MsiExec.exe 2100 cmd.exe 2100 cmd.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\6oVUDN.dll ki182E6.tmp File created C:\Windows\SysWOW64\ybymvlvmwl svchost.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe File opened for modification C:\Windows\Installer\MSI9119.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9232.tmp msiexec.exe File created C:\Windows\Win.ini ki182E6.tmp File created C:\Windows\Installer\f768f64.msi msiexec.exe File opened for modification C:\Windows\Installer\f768f64.msi msiexec.exe File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inl8B22.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expand.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2924 ki182E6.tmp 2924 ki182E6.tmp 2924 ki182E6.tmp 2924 ki182E6.tmp 2924 ki182E6.tmp 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 2924 ki182E6.tmp 2852 svchost.exe 2852 svchost.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 2924 ki182E6.tmp Token: SeRestorePrivilege 2924 ki182E6.tmp Token: SeShutdownPrivilege 2884 msiexec.exe Token: SeIncreaseQuotaPrivilege 2884 msiexec.exe Token: SeRestorePrivilege 2616 msiexec.exe Token: SeTakeOwnershipPrivilege 2616 msiexec.exe Token: SeSecurityPrivilege 2616 msiexec.exe Token: SeCreateTokenPrivilege 2884 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2884 msiexec.exe Token: SeLockMemoryPrivilege 2884 msiexec.exe Token: SeIncreaseQuotaPrivilege 2884 msiexec.exe Token: SeMachineAccountPrivilege 2884 msiexec.exe Token: SeTcbPrivilege 2884 msiexec.exe Token: SeSecurityPrivilege 2884 msiexec.exe Token: SeTakeOwnershipPrivilege 2884 msiexec.exe Token: SeLoadDriverPrivilege 2884 msiexec.exe Token: SeSystemProfilePrivilege 2884 msiexec.exe Token: SeSystemtimePrivilege 2884 msiexec.exe Token: SeProfSingleProcessPrivilege 2884 msiexec.exe Token: SeIncBasePriorityPrivilege 2884 msiexec.exe Token: SeCreatePagefilePrivilege 2884 msiexec.exe Token: SeCreatePermanentPrivilege 2884 msiexec.exe Token: SeBackupPrivilege 2884 msiexec.exe Token: SeRestorePrivilege 2884 msiexec.exe Token: SeShutdownPrivilege 2884 msiexec.exe Token: SeDebugPrivilege 2884 msiexec.exe Token: SeAuditPrivilege 2884 msiexec.exe Token: SeSystemEnvironmentPrivilege 2884 msiexec.exe Token: SeChangeNotifyPrivilege 2884 msiexec.exe Token: SeRemoteShutdownPrivilege 2884 msiexec.exe Token: SeUndockPrivilege 2884 msiexec.exe Token: SeSyncAgentPrivilege 2884 msiexec.exe Token: SeEnableDelegationPrivilege 2884 msiexec.exe Token: SeManageVolumePrivilege 2884 msiexec.exe Token: SeImpersonatePrivilege 2884 msiexec.exe Token: SeCreateGlobalPrivilege 2884 msiexec.exe Token: SeIncBasePriorityPrivilege 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe Token: SeRestorePrivilege 2616 msiexec.exe Token: SeTakeOwnershipPrivilege 2616 msiexec.exe Token: SeRestorePrivilege 2616 msiexec.exe Token: SeTakeOwnershipPrivilege 2616 msiexec.exe Token: SeRestorePrivilege 2616 msiexec.exe Token: SeTakeOwnershipPrivilege 2616 msiexec.exe Token: SeBackupPrivilege 2852 svchost.exe Token: SeRestorePrivilege 2852 svchost.exe Token: SeIncBasePriorityPrivilege 544 inl8B22.tmp -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2796 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 30 PID 2596 wrote to memory of 2796 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 30 PID 2596 wrote to memory of 2796 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 30 PID 2596 wrote to memory of 2796 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 30 PID 2796 wrote to memory of 2924 2796 cmd.exe 32 PID 2796 wrote to memory of 2924 2796 cmd.exe 32 PID 2796 wrote to memory of 2924 2796 cmd.exe 32 PID 2796 wrote to memory of 2924 2796 cmd.exe 32 PID 2596 wrote to memory of 2884 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 33 PID 2596 wrote to memory of 2884 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 33 PID 2596 wrote to memory of 2884 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 33 PID 2596 wrote to memory of 2884 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 33 PID 2596 wrote to memory of 2884 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 33 PID 2596 wrote to memory of 2884 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 33 PID 2596 wrote to memory of 2884 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 33 PID 2596 wrote to memory of 2100 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 36 PID 2596 wrote to memory of 2100 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 36 PID 2596 wrote to memory of 2100 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 36 PID 2596 wrote to memory of 2100 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 36 PID 2596 wrote to memory of 576 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 38 PID 2596 wrote to memory of 576 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 38 PID 2596 wrote to memory of 576 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 38 PID 2596 wrote to memory of 576 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 38 PID 2596 wrote to memory of 572 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 40 PID 2596 wrote to memory of 572 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 40 PID 2596 wrote to memory of 572 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 40 PID 2596 wrote to memory of 572 2596 be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe 40 PID 576 wrote to memory of 2152 576 cmd.exe 42 PID 576 wrote to memory of 2152 576 cmd.exe 42 PID 576 wrote to memory of 2152 576 cmd.exe 42 PID 576 wrote to memory of 2152 576 cmd.exe 42 PID 2616 wrote to memory of 1528 2616 msiexec.exe 43 PID 2616 wrote to memory of 1528 2616 msiexec.exe 43 PID 2616 wrote to memory of 1528 2616 msiexec.exe 43 PID 2616 wrote to memory of 1528 2616 msiexec.exe 43 PID 2616 wrote to memory of 1528 2616 msiexec.exe 43 PID 2616 wrote to memory of 1528 2616 msiexec.exe 43 PID 2616 wrote to memory of 1528 2616 msiexec.exe 43 PID 2100 wrote to memory of 544 2100 cmd.exe 44 PID 2100 wrote to memory of 544 2100 cmd.exe 44 PID 2100 wrote to memory of 544 2100 cmd.exe 44 PID 2100 wrote to memory of 544 2100 cmd.exe 44 PID 544 wrote to memory of 2076 544 inl8B22.tmp 47 PID 544 wrote to memory of 2076 544 inl8B22.tmp 47 PID 544 wrote to memory of 2076 544 inl8B22.tmp 47 PID 544 wrote to memory of 2076 544 inl8B22.tmp 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be6422ed2b47bc6e81d6146f0d977ba6_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\run_kl_file.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\ki182E6.tmpC:\Users\Admin\AppData\Local\Temp\ki182E6.tmp3⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ins8834.tmp.msi" /quiet2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\inl8B22.tmpC:\Users\Admin\AppData\Local\Temp\inl8B22.tmp cdf1912.tmp3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl8B22.tmp > nul4⤵
- System Location Discovery: System Language Discovery
PID:2076
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\favorites_url.cab" -F:*.* "C:\Users\Admin\Favorites"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BE6422~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:572
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 89A84686F1C147C0C7527DD0B2E943562⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Pre-OS Boot
1Bootkit
1Server Software Component
1Terminal Services DLL
1Defense Evasion
Indicator Removal
1File Deletion
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
766B
MD5b69d002455f1a5a100e717a6a84ff991
SHA13a99b22845afb2132300095d84534e65823e678d
SHA256c05465e73465c2d6addc7514ad50b517675ce26bfb1a4cad3d3b64b617940934
SHA5121f2e36f1e8c6f66ba746a3450a9f5c07f300bff4682e32344541596b0bdae7e3f443f3e25deaa7936195c48642f9268e3a626a4018772417ce48d26e4f9d1505
-
Filesize
57B
MD5f30e74732a169c1ae0e2d857c887fe42
SHA162ce0e7f4d66cec97134b1fd467e0c0877821b28
SHA2567b4adab718d8d160b024ed0836c2f4f6568787212760e165e6ed61b6dc88c5de
SHA5123937958f23b9063b1a74970929c15a312312c13e0842968f88d5b95952e679bafda6a70baeae7017d847922e14ba24260dfe5fd85f09221b09ff0cde3f68f096
-
Filesize
45B
MD57f36c1f0e3aaf2144e83bb22a9d3ac76
SHA13a4cdfbe8d62798715e15b1c3351685368d800d2
SHA256c7191eec3fcf3f160e1cb4477c1cd31bc89b86ec6142aa782bf41d80790dd9b5
SHA512092c2856da1b3b9903b565adde9ffa227ab3a05a7e53b5a2cbe5f5c078b360acc1031c8530b3783368f23e41923c7d1deb269968c8f6e0263f17cd3791526a66
-
Filesize
98B
MD58663de6fce9208b795dc913d1a6a3f5b
SHA1882193f208cf012eaf22eeaa4fef3b67e7c67c15
SHA2562909ea8555f2fc19097c1070a1da8fcfd6dc6886aa1d99d7e0c05e53feeb5b61
SHA5129381063e0f85e874be54ae22675393b82c6ab54b223090148e4acbeff6f22393c96c90b83d6538461b695528af01d1f1231cf5dc719f07d6168386974b490688
-
Filesize
48KB
MD59067aad412defc0d2888479609041392
SHA136cfffc3bafeb24f88ad5886ca5787ca008b6ba9
SHA25699f4e00b6908057a2fe5067ff6c8b6e32b5c07558ab79139dc4b998f1da4b517
SHA512e69f259d78b02e6c1a5d9c45898b59372329a5288fff655dd741353f112b2b8eed18b01caa2bf312a91f5e314e1c0b036321b37c8efbebdcf3650ba6b12dee6a
-
Filesize
425B
MD5da68bc3b7c3525670a04366bc55629f5
SHA115fda47ecfead7db8f7aee6ca7570138ba7f1b71
SHA25673f3605192b676c92649034768378909a19d13883a7ea6f8ba1b096c78ffadb5
SHA5126fee416affcb6a74621479697bca6f14f5429b00de3aa595abe3c60c6b2e094877b59f8783bbe7bdd567fa565d0630bb02def5603f8f0ea92fe8f2c3ac5383c0
-
Filesize
48.1MB
MD5a109796ac48112567f566202309d4a1c
SHA16ebad2d126fe18940de6a95cd5d6097ec8a90d33
SHA256edad427c1de64ddbc73767de42311948de7e5472cbfaba1f8d68a5f169bf62d7
SHA51289902bdc4d1d479e61076f9b56176407af508a79ce9ace3aa18da2ca8476dd254ebc8dbd683f4a680a37848a44c26ba808fcbae38b052e6981a8d5952cbca42f