Analysis
-
max time kernel
120s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 16:34
Static task
static1
Behavioral task
behavioral1
Sample
ebbeae80ae54f109544264b22bbed2e4_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ebbeae80ae54f109544264b22bbed2e4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ebbeae80ae54f109544264b22bbed2e4_JaffaCakes118.exe
-
Size
684KB
-
MD5
ebbeae80ae54f109544264b22bbed2e4
-
SHA1
5aec8d76cdb751d54c02e7ed0905f9bdeed850b0
-
SHA256
9bda2334e6a67963fafbd7d1c6400ba813e2a6b7a847b8930f7519c86575aee1
-
SHA512
ed423202070440f631ba59bc16ab374076717f0237e8c9b990f1924201ee5004b2bd0f3ed90f0aa192874e47a610142862503fa107ac6940ba4097769d32fd11
-
SSDEEP
12288:I2KuWpy+4kIxmE9zZDXLDQh6tO+1f9OrlF3Z4mxxv0MHoTAFbHx:W7pr4kXwXLjtOAf9OrlQmXvK8x
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/files/0x000a000000016d31-53.dat modiloader_stage2 behavioral1/memory/2864-62-0x0000000000160000-0x0000000000224000-memory.dmp modiloader_stage2 behavioral1/memory/2060-63-0x0000000000400000-0x00000000004C4000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2060 4.exe -
Loads dropped DLL 2 IoCs
pid Process 2136 ebbeae80ae54f109544264b22bbed2e4_JaffaCakes118.exe 2136 ebbeae80ae54f109544264b22bbed2e4_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ebbeae80ae54f109544264b22bbed2e4_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\FieleWay.txt 4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2060 set thread context of 2864 2060 4.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebbeae80ae54f109544264b22bbed2e4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432925556" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{117D6A41-76A5-11EF-8A1D-72B582744574} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2060 2136 ebbeae80ae54f109544264b22bbed2e4_JaffaCakes118.exe 30 PID 2136 wrote to memory of 2060 2136 ebbeae80ae54f109544264b22bbed2e4_JaffaCakes118.exe 30 PID 2136 wrote to memory of 2060 2136 ebbeae80ae54f109544264b22bbed2e4_JaffaCakes118.exe 30 PID 2136 wrote to memory of 2060 2136 ebbeae80ae54f109544264b22bbed2e4_JaffaCakes118.exe 30 PID 2060 wrote to memory of 2864 2060 4.exe 31 PID 2060 wrote to memory of 2864 2060 4.exe 31 PID 2060 wrote to memory of 2864 2060 4.exe 31 PID 2060 wrote to memory of 2864 2060 4.exe 31 PID 2060 wrote to memory of 2864 2060 4.exe 31 PID 2864 wrote to memory of 2896 2864 IEXPLORE.EXE 32 PID 2864 wrote to memory of 2896 2864 IEXPLORE.EXE 32 PID 2864 wrote to memory of 2896 2864 IEXPLORE.EXE 32 PID 2864 wrote to memory of 2896 2864 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebbeae80ae54f109544264b22bbed2e4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebbeae80ae54f109544264b22bbed2e4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2896
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5559ef94d0375f362d01299d2f3553ed9
SHA161eb9005dce4af593f73bfb40c61446f701f8114
SHA256bfa89eda8d10743150a38f01eeb7b3721ef29c97b881728e2f69894089a7277f
SHA51275eb6bc8ec7f78fc2ad219f6718fa9aed7935e1c5f6cb8007effb383bc901e625d9c16b232271c48b7360d6b593076021e53e3e73d24a6c5e6adb0572ade7228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01eab5b0217d32a12052625b7a82e07
SHA1b341695fbe035836d31b2027cf18ead331da7628
SHA2566e26687fbdd3453ebbb8ce24a11a2561f400eb20995c96db4a0315c66377d502
SHA51284e9164a9a6b352f6b02b17adf7869cdfb558e4d679eca51a3e4255da3ae73bed7c940120c30b870b35104fffb3e951003481a04869ec1b38f4c9fd5d3bf2317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dbf6e812b77d18f53854e971ff5854e
SHA16587d7848792ba4cf4347c758bda72bc933db161
SHA256b3a9a711ee1f0887a3d72843beff449fdb4bc958b115301f0bdd8cfea5fd05ea
SHA51231fb2b3ea90e1b7c9704b568dc5b0a3413e3a1311d2c90a55480cbf9584a10e39dc366d1fe7395f039e4082919ea16a7b8a108a822078a2c2d366124423c4d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acfa36c96c0e63e98236692c9053d231
SHA1722f9d9f1b49370c2d6cbb0fb323cbeb1c2099a4
SHA2567fb3cbad0ff113b7eb49e0de85331716fa4dc17b64475f50850fddd05bd8a5d0
SHA512cf26f65a5a320e60adf7335440a3680d00c416ae918f46e4601ea311c52591de8f1c09617df6c128e252caa283896f037ebdd2c54442e18f92a226c329b3c0cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e2e7745f4e034ff7e2fc80caad8305b
SHA1c885b229585768e8fc24fda719037d34dbb16f35
SHA256c6fb2e3455ac2449c75b16d0bb84b929b6dcf51ca9bc98a10054ef7b02706bd9
SHA512a2925465ec5ede9819fcafe45d60004915bd7670f8f0d66d3e4411ded023149ad09499f62b5b8eba543e1efc2788bf47bf02df71db4f90a1b83a534d47fa3c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c96c82d7e22a0ca5c8e515aa21f2b41
SHA1110471c4b3644ece5f996660c2f65c54983c3c97
SHA2566b459e22cea568f2177bfb09fc49d231252c4f649c8d2443d21bd60fb58e9565
SHA5120ace902d5ba2e96142774c27de01088b9eff9e61655e48d01b199955193407a53e9e5cff61024198f01ade2f8352ca0d32b31f82b03da193104c03698c1c8449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eace823f6795ad8f59fb652e1660e6f1
SHA1d6abe112b1e8380fa026a65634da35f86d4eb27c
SHA25604e56ac86024523e63243dd277e6f025688ec488bcd788d000d99b21c762dcd9
SHA512e9d6b77308396e7c942e74549b86fed0402714fc1172129631b8010742c50c853d5a9dae70fcb2df5b52c9c9dfecd4751c1e0d1020b77a59548f04bc1326b921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559f051a1710f76de59947bd87f59e597
SHA1c78c5881af32e755a5d0126f0402046c54bc72f3
SHA2566dcb19138ad79108ad759f800c3f448d261f9e64aa0a952945c506b0781ca29e
SHA512de92f2e0d9a39e80444b7589054385f387817d364001e9fa3243a8bc3644b6e3917bac46f4304e8ad5a70b5107d0c736262e432b9f54646ce86c74592de5546d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54187555682256583a3e52427b665e0ed
SHA1d32b9c71095ba38c8a8a0fdb22c5269dce12f2d1
SHA2563fd973ad1caea853a73e5116420f1d551e890f15ae0cd38a3e4ef436f52723f3
SHA51254604609a13785746c3239b10eb9ac111a8ca26a4dd62b74381288bceb898a0ea5da97bd65b0a633c21363ebe81397cc1f9e89d47bc57190ac32bbe23ca3cef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5842de4b45222f1dde9e859128796b03e
SHA1dbe96e98e9d0e050033b3537e0a9fa5350b58268
SHA256ed5e426fc0991815fffdc76e0de9ad9cbdf8d8a0a9de385a320532290151859e
SHA512351b7c19aa47e601d29cdbac0e97dbfce03afefd0128675fe7e2e8d290edd1932a7ef697d5d04c4c64acfc34001dec6ce7a58c5c8bdbec0bf13eb10b092c63dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc8bd8d0de71d08bd7d19c945554c8b
SHA10025c86aa9b6a985d7cbef9a70bbe4001c13021c
SHA256ff100929ccaccda0b56751d3f5c1cc6d91a486dac13b34ade9762e715d01176b
SHA512412ed2084f1056f99155de5194a53a13fb79a05154967cbf5a56e7b973bb2e12002138621b0769efeec6e24a51482455e42cca10da7eff1b669303cf601e9116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad06d8a83e7f1931af09c81e4fefa26d
SHA1873b2db6df3aab68038f9bbf10cca5f751e2eafe
SHA2564ad6db96fadb37b04832b82cfe77936879be21dee37cb27abc15de9caa4d4512
SHA512ec21bcfafd7c59447e097e0af1d1e197c30f9a5a4f2f325f59a2b6b429e05818b664f8e18d9c67514227687889ab025bc5b0700dfbdf02a65ff28b8fbd179314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbab14847bd43a58933c9b6c2c987465
SHA13786fcf52898135e6f9f2be32ae61109d2018a2d
SHA2562ac94659bb0c010cd11615065d801f826eb174155a7ea2435a7abd178ecd5157
SHA512477e764b507281720c677b5a447fc0ffe71a6801bd06948cee6a868466fe2ef1f7878162d321bca28409fa89b666d15f5b8a82cd649962b1736c0f1a6d960f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8cc56d37e433e0ae4e54d4725a264c6
SHA1eb11ffc66eff3a5122d5ffbe898c2c59d6d40468
SHA25692af5f8ec3a89d0c8082b4d130919a5e96f8a94663a02d408770aac209d2cd85
SHA5126c296a1fe36770f164fe4465f137a422e6e3b19d42e8e5968ba83e7e6eba25bbfce050aeb7c10459c4caa37826ec1a16c3a008a14694e9dc1a52bc5f20280d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d4f8c2a61ed47b6f2fbd01dad3231a4
SHA1f9584eed58a15277f8d8739584cb6d748452070b
SHA2568011013d15a4d2bbcea07217a10e7c719e964c66f14b391891f92d510a6add05
SHA512b8c1771d1192615015e002e79fff1167bda504bef9c3675fd7491c6ed5baa2470046b6142e2c9dfb52a7174b84e838fd9331813abb1fb503e9706e988e835d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5154022c0e2878c325d13264020f27b0e
SHA1de87979d746d4397924dd7eb3733d9cfe6e75a99
SHA256cbcb7051c11fde2478c0a9762ffcf55bc8ad4bd191c0a125b7a48ad4bdce8783
SHA512cf369100b12ecc56408a435b334ac50eab4c5403842667919be998605e7591b48d3dcac0a89d7451ffe00f1737482f8f4c44224784324139fc15c7da1829b59c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5070cf16322b3ed7687ab7efc4ed4330c
SHA1f24516238d58ee3c6f912736d900426011f8d4c5
SHA256ae6f94049b4ac708e0681fd042a2f10c8841582af3195b46bbe1dd7970630252
SHA512fb7d86ac601bcfaa1e9b8d2073d25850773a89ac40775f3646cc30524f8bf775cad4f4716b2ef110b536cca10a54fc55f735901f2b27b5f28d4b676145a714c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000b691d1f2a992102410761e2b4289a
SHA191c4fc0829f157551bfaa985a6e4f6d2468d1edf
SHA2568b942a16b1580d2071353fde76efe0d70b028b65d9e2e25cdf9a6434874e3390
SHA51230a625c01baf8d64b3ee2f3a598cb70318c28bb9c96abdc45a607cb9847a48c9d7d86e90b2853302652290224ebe2a012116ca223eee95b22dd1b9c2581e092f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
749KB
MD5eda75e8b1355c8c8f7dc1073e36aecbd
SHA12a3021591d35bbc95a32a4ab1e194ae0deda4322
SHA256a5e03f4fb9554cefb8756fe1d66e02b8a0d9e06af6d947efc4277dbb3939b4a6
SHA512212c5c309f7f8a9ef7bbfcad3ea1f4c099146e6af3372d059ccf03e048c37d6a76d1ae6013a5f0cf1f32babdd92ea988f07fee4b1f57db7423ad6d56f4d92a0a