Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
dd4bc83f67df469c0360a156e35e3575_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
dd4bc83f67df469c0360a156e35e3575_JaffaCakes118.exe
-
Size
120KB
-
MD5
dd4bc83f67df469c0360a156e35e3575
-
SHA1
46bb84f8e7868760bf9b1326e37560d5995a4a5e
-
SHA256
19a4800588b1bb48a84982b7688903a299891556a412c780ae5de2a0eba29645
-
SHA512
6b587dfe534f6e66e3d54b2edbf0481007ca91612dc2ea65c2a4ff21f5b0a90a47954b24e93a2a98636e056d6f4da91c136cabb8c4f9e0df5c51615728b46811
-
SSDEEP
768:/QxkwifBsIqHpcrkMEYEhA7P4RhAtmaZFb79U9MKAjBEig6/1k21m3uHRdMNDj2Y:/8kwilTEhU4HDa1KkjWXUa21mc/Mue9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 804 WaterMark.exe -
resource yara_rule behavioral2/memory/2352-2-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/2352-8-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/804-9-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/804-11-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/804-17-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/804-21-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/804-23-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe dd4bc83f67df469c0360a156e35e3575_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft\px9877.tmp dd4bc83f67df469c0360a156e35e3575_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe dd4bc83f67df469c0360a156e35e3575_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3732 1936 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd4bc83f67df469c0360a156e35e3575_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A4199887-7164-11EF-818E-5ED96FC588C3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31130993" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31130993" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31130993" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31130993" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2024360289" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2022328800" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432951228" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2022328800" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2024360289" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2022328800" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2022328800" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31130993" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31130993" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A41BFAE8-7164-11EF-818E-5ED96FC588C3} = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 804 WaterMark.exe 804 WaterMark.exe 804 WaterMark.exe 804 WaterMark.exe 804 WaterMark.exe 804 WaterMark.exe 804 WaterMark.exe 804 WaterMark.exe 804 WaterMark.exe 804 WaterMark.exe 804 WaterMark.exe 804 WaterMark.exe 804 WaterMark.exe 804 WaterMark.exe 804 WaterMark.exe 804 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 804 WaterMark.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2792 iexplore.exe 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 4032 IEXPLORE.EXE 4032 IEXPLORE.EXE 4148 IEXPLORE.EXE 4148 IEXPLORE.EXE 4032 IEXPLORE.EXE 4032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2352 wrote to memory of 804 2352 dd4bc83f67df469c0360a156e35e3575_JaffaCakes118.exe 83 PID 2352 wrote to memory of 804 2352 dd4bc83f67df469c0360a156e35e3575_JaffaCakes118.exe 83 PID 2352 wrote to memory of 804 2352 dd4bc83f67df469c0360a156e35e3575_JaffaCakes118.exe 83 PID 804 wrote to memory of 1936 804 WaterMark.exe 84 PID 804 wrote to memory of 1936 804 WaterMark.exe 84 PID 804 wrote to memory of 1936 804 WaterMark.exe 84 PID 804 wrote to memory of 1936 804 WaterMark.exe 84 PID 804 wrote to memory of 1936 804 WaterMark.exe 84 PID 804 wrote to memory of 1936 804 WaterMark.exe 84 PID 804 wrote to memory of 1936 804 WaterMark.exe 84 PID 804 wrote to memory of 1936 804 WaterMark.exe 84 PID 804 wrote to memory of 1936 804 WaterMark.exe 84 PID 804 wrote to memory of 2552 804 WaterMark.exe 92 PID 804 wrote to memory of 2552 804 WaterMark.exe 92 PID 804 wrote to memory of 2792 804 WaterMark.exe 93 PID 804 wrote to memory of 2792 804 WaterMark.exe 93 PID 2792 wrote to memory of 4032 2792 iexplore.exe 94 PID 2792 wrote to memory of 4032 2792 iexplore.exe 94 PID 2792 wrote to memory of 4032 2792 iexplore.exe 94 PID 2552 wrote to memory of 4148 2552 iexplore.exe 95 PID 2552 wrote to memory of 4148 2552 iexplore.exe 95 PID 2552 wrote to memory of 4148 2552 iexplore.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd4bc83f67df469c0360a156e35e3575_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd4bc83f67df469c0360a156e35e3575_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 844⤵
- Program crash
PID:3732
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4148
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4032
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1936 -ip 19361⤵PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5dd4bc83f67df469c0360a156e35e3575
SHA146bb84f8e7868760bf9b1326e37560d5995a4a5e
SHA25619a4800588b1bb48a84982b7688903a299891556a412c780ae5de2a0eba29645
SHA5126b587dfe534f6e66e3d54b2edbf0481007ca91612dc2ea65c2a4ff21f5b0a90a47954b24e93a2a98636e056d6f4da91c136cabb8c4f9e0df5c51615728b46811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD52f8846f8a108fd0d20fee7d431aa16f0
SHA1b14aa84a60e9d582a2332d085938efba97193eec
SHA25697de568fb14eb627a9999cb64dfae568cdd6fadf1718ec67b14082588445f531
SHA512c718a566b155af6d078f45c632184d8cfed5d2a42e633f6b22dbbb02d887c539cdcf78baec47d9d99e0905b4c6a60fa57f3edc3deaf1389a37f9d63bda1322f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD582026883bb0628be0811ad3beaf139b1
SHA17a5278d5048ca316523bbe38b279944a17bd0225
SHA256e76aa15122e1ed8792484e4de8c51a103be3773ac02dade0049df2a172dd55ff
SHA512eef553ff18904e6ff21551383e0b7cf31db3e985232fa9c0c1bed27f4e6a4c04652b15b97cb19291e3a8d8a9d60c470f6c31b6c4244e2271b1c41a86480ca2bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5ce0f215ba11c37515291a028523d7a45
SHA17ab6de3e2c492a192883fa8e9bef67467edd4326
SHA2568e4506c096261b32fb6a7968395c3f581fa033b6b951eb904af87254fb0f7410
SHA512a37d3f683661cd13ed21886f35fd3e720138893b46ce7c8b2aefdba3c804845b414e94e2bba1c6e679c6cd3a33727f934c0c484fae2354a8cc29c930a560a466
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A4199887-7164-11EF-818E-5ED96FC588C3}.dat
Filesize3KB
MD595c3b780aad0e42946ad725ab9eea15d
SHA151aa3f28ff8cdf692aa8a0cae29ee248ab8b9abe
SHA256bda41644e833213d29b07674a91ebb7e57804c7ee6224817bbc1385c6521f089
SHA512cfa82ebcc610a349882d46d86b5d2a0da9a44ee9931579fcdb2c30bfcbca0db5b0544a2b2f1fd47dd61ef1f2ce48b56dcba1de7d918b08071fa528c46d252a90
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A41BFAE8-7164-11EF-818E-5ED96FC588C3}.dat
Filesize5KB
MD539274ba08c05baf68d485f9edc07b59a
SHA1590a25d7b1a9b807822fff7757a5edbffec6c69c
SHA256d78cb2f6d75334b7ce7d340989eddd08ef28dc9aaf4813d58881fba90d6e778c
SHA51223989c7098d0c572fd9797b5b2aa1ed17b80769dfcf20abfdb5a146ab56c33c9317063d55f36f972ee80b92d1144c41c2631f77d0d334edf7d3b5d958cb67ce4
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee