Analysis
-
max time kernel
101s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 16:55
Behavioral task
behavioral1
Sample
ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe
-
Size
38KB
-
MD5
ee0796c12b300a9e1912b92d2f41e974
-
SHA1
eb5c6c5b93a59e738b01955d060bba4250815960
-
SHA256
3162d5561f09161e2df96ffff0cbc7f84ab562a0aacf49c0466a56a106418a7f
-
SHA512
ceb7f9e48d23a2fd03db4bf4dcc9759a867ceff5f0e247652d7c03a46eebc9c8a3912fcb53caa3a0d939138c000237f798dedbdb3966a2023b688074dee2be96
-
SSDEEP
768:b4kOfz4YzCKKg1OrmKIJ63tnpwVfBLa8pRcEozuTlk9F7gMVfPYk:1MxC/K63ohsQi/Cl47gMpYk
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svchust.exe" ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Nessery.exe -
Deletes itself 1 IoCs
pid Process 3592 Nessery.exe -
Executes dropped EXE 3 IoCs
pid Process 4352 cinmon.exe 3592 Nessery.exe 2644 svchust.exe -
Loads dropped DLL 1 IoCs
pid Process 3924 regsvr32.exe -
resource yara_rule behavioral2/memory/2472-0-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2472-1-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2472-2-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2472-32-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x00070000000234be-41.dat upx behavioral2/memory/2644-50-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{10FDCE1E-C36A-474E-808E-248C51693DB7} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{10FDCE1E-C36A-474E-808E-248C51693DB7}\ = "Accounts Manager" regsvr32.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\svchust.exe Nessery.exe File opened for modification C:\Windows\SysWOW64\svchust.exe Nessery.exe File opened for modification C:\Windows\SysWOW64\syswine.ini Nessery.exe File created C:\Windows\SysWOW64\Nesery.dll ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe File created C:\Windows\SysWOW64\Mouer.dll ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\syswine.ini ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe File created C:\Windows\SysWOW64\ssdti.sys ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe File created C:\Windows\SysWOW64\Nessery.exe ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe File created C:\Windows\SysWOW64\Nessery.dll ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe File created C:\Windows\SysWOW64\cinmon.exe ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe File created C:\Windows\SysWOW64\Nessery.sys ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nessery.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchust.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cinmon.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10FDCE1E-C36A-474E-808E-248C51693DB7}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{930E11EA-3A91-4FBB-B141-DC53DF650DFF}\1.0\HELPDIR\ = "C:\\Windows\\system32" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{365676AB-E92E-4D87-A735-17AEE185E0E1} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{365676AB-E92E-4D87-A735-17AEE185E0E1}\ = "IBHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{365676AB-E92E-4D87-A735-17AEE185E0E1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CKBHO_2.BHO regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10FDCE1E-C36A-474E-808E-248C51693DB7}\ProgID\ = "CKBHO_2.BHO.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10FDCE1E-C36A-474E-808E-248C51693DB7}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10FDCE1E-C36A-474E-808E-248C51693DB7}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10FDCE1E-C36A-474E-808E-248C51693DB7}\TypeLib\ = "{930E11EA-3A91-4FBB-B141-DC53DF650DFF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{930E11EA-3A91-4FBB-B141-DC53DF650DFF}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{365676AB-E92E-4D87-A735-17AEE185E0E1}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CKBHO_2.BHO.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10FDCE1E-C36A-474E-808E-248C51693DB7}\ = "Accounts Manager" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{930E11EA-3A91-4FBB-B141-DC53DF650DFF}\1.0\ = "CKBHO_2 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{930E11EA-3A91-4FBB-B141-DC53DF650DFF}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{930E11EA-3A91-4FBB-B141-DC53DF650DFF}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\Nessery.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{365676AB-E92E-4D87-A735-17AEE185E0E1}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{365676AB-E92E-4D87-A735-17AEE185E0E1}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{365676AB-E92E-4D87-A735-17AEE185E0E1}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CKBHO_2.BHO.1\ = "Accounts Manager" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10FDCE1E-C36A-474E-808E-248C51693DB7}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{365676AB-E92E-4D87-A735-17AEE185E0E1}\ = "IBHO" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{365676AB-E92E-4D87-A735-17AEE185E0E1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CKBHO_2.BHO.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{930E11EA-3A91-4FBB-B141-DC53DF650DFF}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10FDCE1E-C36A-474E-808E-248C51693DB7}\VersionIndependentProgID\ = "CKBHO_2.BHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{930E11EA-3A91-4FBB-B141-DC53DF650DFF} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{365676AB-E92E-4D87-A735-17AEE185E0E1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CKBHO_2.BHO\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10FDCE1E-C36A-474E-808E-248C51693DB7}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{365676AB-E92E-4D87-A735-17AEE185E0E1}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{365676AB-E92E-4D87-A735-17AEE185E0E1}\TypeLib\ = "{930E11EA-3A91-4FBB-B141-DC53DF650DFF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{365676AB-E92E-4D87-A735-17AEE185E0E1}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CKBHO_2.BHO\ = "Accounts Manager" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{930E11EA-3A91-4FBB-B141-DC53DF650DFF}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CKBHO_2.BHO\CurVer\ = "CKBHO_2.BHO.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10FDCE1E-C36A-474E-808E-248C51693DB7} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{930E11EA-3A91-4FBB-B141-DC53DF650DFF}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{365676AB-E92E-4D87-A735-17AEE185E0E1}\TypeLib\ = "{930E11EA-3A91-4FBB-B141-DC53DF650DFF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CKBHO_2.BHO.1\CLSID\ = "{10FDCE1E-C36A-474E-808E-248C51693DB7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CKBHO_2.BHO\CLSID\ = "{10FDCE1E-C36A-474E-808E-248C51693DB7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10FDCE1E-C36A-474E-808E-248C51693DB7}\InprocServer32\ = "C:\\Windows\\SysWow64\\Nessery.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{930E11EA-3A91-4FBB-B141-DC53DF650DFF}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CKBHO_2.BHO\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10FDCE1E-C36A-474E-808E-248C51693DB7}\ProgID regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe 2644 svchust.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 676 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemtimePrivilege 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe Token: SeSystemtimePrivilege 2644 svchust.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 4352 cinmon.exe 4352 cinmon.exe 3592 Nessery.exe 2644 svchust.exe 2644 svchust.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2472 wrote to memory of 4352 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 87 PID 2472 wrote to memory of 4352 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 87 PID 2472 wrote to memory of 4352 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 87 PID 2472 wrote to memory of 3924 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 89 PID 2472 wrote to memory of 3924 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 89 PID 2472 wrote to memory of 3924 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 89 PID 2472 wrote to memory of 3592 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 90 PID 2472 wrote to memory of 3592 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 90 PID 2472 wrote to memory of 3592 2472 ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe 90 PID 3592 wrote to memory of 2644 3592 Nessery.exe 91 PID 3592 wrote to memory of 2644 3592 Nessery.exe 91 PID 3592 wrote to memory of 2644 3592 Nessery.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee0796c12b300a9e1912b92d2f41e974_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\cinmon.exe"C:\Windows\system32\cinmon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4352
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /c C:\Windows\system32\Nessery.dll2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3924
-
-
C:\Windows\SysWOW64\Nessery.exe"C:\Windows\system32\Nessery.exe"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\svchust.exe"C:\Windows\system32\svchust.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5aa150cb1c1f2c77d5ff4d49c7d1a77df
SHA1bf47e0c128dd63fdc829bd9627a0040c6cad0d05
SHA256ff2024342d07676372d01d931c1721585cef53c95973eea80be899ae5b24da99
SHA512cabbce39949792f5d51d53d5afeacf9d96168e2ec59b26c304ad904a6a6b8a83d3042355b340a3d388169cf8239b038cbd55eecedc42ecf463e0c12f19cb9132
-
Filesize
20KB
MD51b91b10b708ede38b6a6a839bef8bd38
SHA12df969fc28d1683078218d6654c77b8215ae430b
SHA256eea031a94080165c2ea86e1567b54f86bb2f6ce2fe927617f2b26ab5e3e4d904
SHA51202dfa0e3c70ad8b2e356df307bd37bd31337151d15b35a95adc652c788f0ea7c54046bab25ee08f47c43507ed484c357094259c719eb6e0d86ce66206fccfce6
-
Filesize
20KB
MD58a61cca1f215aa7d99c5dae79e0737d1
SHA111b80e3c6ef379c91e434d0eb7770fe781b37f11
SHA2568fcb0543bd004cc762350bb1c33f946b899b372b522a442a2f83c217fea12b42
SHA51225a1ea36b2e96f5b3537450f7a60f646d6507acb8bc218f535bf933c8aa0915fe0394a08042bc40f755b7a343ccd011804031d36720ea7352d304698d7e12c17
-
Filesize
2KB
MD582828f68ab2db499eeca9339070f7a18
SHA1a820d9a9da0c716fb59a68413f12cf989bb64193
SHA2565d1aca9f6f38e72e0e3f24c990ef223ff5ab3e9e65f7541a64e8d24564e157e9
SHA512541b27b7a325ab26e30a9e883de75af787a1dd01b2a09a27a064b79de8223b260798fbfddabe828c6d06eac4627ea67b99b2c5fc602bebfb0cc4f4165b2504c7
-
Filesize
38KB
MD5ee0796c12b300a9e1912b92d2f41e974
SHA1eb5c6c5b93a59e738b01955d060bba4250815960
SHA2563162d5561f09161e2df96ffff0cbc7f84ab562a0aacf49c0466a56a106418a7f
SHA512ceb7f9e48d23a2fd03db4bf4dcc9759a867ceff5f0e247652d7c03a46eebc9c8a3912fcb53caa3a0d939138c000237f798dedbdb3966a2023b688074dee2be96
-
Filesize
105B
MD5f024a0181b387f37af630749e340929d
SHA16dc83355713f3bbb390d5a6ccd595fb30372d319
SHA256a1384db950a91f3f54defc38b10adbac999d5e7c52feb99c58d16eab10719eab
SHA51245b673ba9d06ae97995de992410622c448606feab2b0a25d84b86bdc18f17ee21f1cad8e5d92c16f0cbd99a7ac05abcfeca4c11c4177b625745b3aa589f1dbc5
-
Filesize
26B
MD5d8ab3ea023fda33b8017ccc4748534f8
SHA1e5c8b0f40ed03ad98f0d207ee073af2ee925db78
SHA25614776c2d9c1446833752ec1c0686cc74bee4c3bd3036b3ad7cf51249ebe381ab
SHA5120a6ab8641e77dcdc9b33e49462404aaf43ca549122d6fd5afc72448b5f50558859657d64d66d38415e752c05abaa225e545310986516eb1af0f691ff690ec5e0