Analysis
-
max time kernel
132s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 20:56
Static task
static1
Behavioral task
behavioral1
Sample
e83e34b204e77abc4d113c5fc64c63fb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e83e34b204e77abc4d113c5fc64c63fb_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e83e34b204e77abc4d113c5fc64c63fb_JaffaCakes118.html
-
Size
158KB
-
MD5
e83e34b204e77abc4d113c5fc64c63fb
-
SHA1
3b08b44d3e46894f09abaca32cabb096d962bf91
-
SHA256
8449880c56f8edb1b1e56f6a027390c08d50652b3bafe21f6790ae9a69da4a06
-
SHA512
34d68be02f9755d6cac359684bcf631d02c8849518c2304d8bdd4dc634e6920a074e5f56ef9f45c726a5ce8fb29df52b39e6e292687a24e7fe3bafaaee5019ad
-
SSDEEP
1536:iERT550LwRlOB0TxyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:i2G5uxyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2240 svchost.exe 996 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1228 IEXPLORE.EXE 2240 svchost.exe -
resource yara_rule behavioral1/files/0x00390000000160ae-430.dat upx behavioral1/memory/2240-434-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2240-437-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/996-450-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/996-448-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/996-447-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2240-444-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2240-441-0x0000000000240000-0x000000000026E000-memory.dmp upx behavioral1/memory/996-452-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\pxA5D1.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{92D75C51-B8CB-11EF-A0C3-D60C98DC526F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440198864" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 996 DesktopLayer.exe 996 DesktopLayer.exe 996 DesktopLayer.exe 996 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 2496 iexplore.exe 2496 iexplore.exe 880 IEXPLORE.EXE 880 IEXPLORE.EXE 880 IEXPLORE.EXE 880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2496 wrote to memory of 1228 2496 iexplore.exe 30 PID 2496 wrote to memory of 1228 2496 iexplore.exe 30 PID 2496 wrote to memory of 1228 2496 iexplore.exe 30 PID 2496 wrote to memory of 1228 2496 iexplore.exe 30 PID 1228 wrote to memory of 2240 1228 IEXPLORE.EXE 35 PID 1228 wrote to memory of 2240 1228 IEXPLORE.EXE 35 PID 1228 wrote to memory of 2240 1228 IEXPLORE.EXE 35 PID 1228 wrote to memory of 2240 1228 IEXPLORE.EXE 35 PID 2240 wrote to memory of 996 2240 svchost.exe 36 PID 2240 wrote to memory of 996 2240 svchost.exe 36 PID 2240 wrote to memory of 996 2240 svchost.exe 36 PID 2240 wrote to memory of 996 2240 svchost.exe 36 PID 996 wrote to memory of 1848 996 DesktopLayer.exe 37 PID 996 wrote to memory of 1848 996 DesktopLayer.exe 37 PID 996 wrote to memory of 1848 996 DesktopLayer.exe 37 PID 996 wrote to memory of 1848 996 DesktopLayer.exe 37 PID 2496 wrote to memory of 880 2496 iexplore.exe 38 PID 2496 wrote to memory of 880 2496 iexplore.exe 38 PID 2496 wrote to memory of 880 2496 iexplore.exe 38 PID 2496 wrote to memory of 880 2496 iexplore.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e83e34b204e77abc4d113c5fc64c63fb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1848
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:603146 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f3b52895df7e1ffd5ea24842a00254a
SHA108acd79a44a4c325a4f41e6f63d6d6bda02eb468
SHA2562f84eeb6d6ced8c6499bce73aca21955d587f84a0ccfce556b807853cc1c52e3
SHA5124860094299a6ced5376c733126dc1235d7b17d6b406e0da9e0be607e733e43e2a9963d2d700287ca86561b814cc37931e130395615e02f1692140486844ce5c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599da65c2474d5078d541cb1853d6a1c4
SHA16d12c77904a0d03cce9df1065df57deb45d82600
SHA25678f018093fc54ac4381f64d35b5a2fd56b39268e852ae6ae9757b2c3b7f2a4d6
SHA512f95c0d1bb30b9d634de5abfb5f100f2ca27b4a59e2dde1c1892f54223380569f3e7ee5e4073ad79ce9d2210b13e3cfe493a780682b01758f43acc68056c94dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef84f070bd140ba827d857e24e35c961
SHA12026e9a60d640d67aa7be5620ac5931b0ec33e14
SHA25673bbf65b93e4b553925fce173201e41564b883f97fb2d6b71727eaf606b09b49
SHA51234ea3174b8bae92699795a5c15f6e937f60c838685d85bd8bb71ba24c5aa2d9e03fed53f00946bf1c78c6644ac61e258fe6c2a3556080891526574692b871e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5695220e5901a6c79b1815f3a67d3c504
SHA1e8917cf2238f8f69331e31ca32a4c8554d365625
SHA2563256c925be450b9284b4f5bff49539b541c07dc8b4271c8d471a4e41b6153e4e
SHA512bc2330143987f59452ce41029d5b6520665a79c5abbfbefed2d68a5cd38c9251f6ab895ea94815e618a7344d1c2c60b64b4e7c86fbdf16233ce630e09dcb9d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d0a331750392999bc103770bc4e1cf
SHA1bded943b5ba86be0ed975182f5f4e5736e82a933
SHA256dcfba8c5edd38bf9a1360f4b6aa1f02115b35af5242f6eb1e54040a034c80ec0
SHA512893c5c8981b52eb6dc0a4cffb52151d64a2a94ae898ec60528fae9dcecc783aef1a3733300de1feb1762d0d431ce99db856ce3e87af4d21409c90c38326f043c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef2c5f5e096bd039280194a634748e48
SHA1571e6fbec14dd990e16774626d5f9ee8c023da04
SHA256b635f86e3a191314af94f6c8d784315bb27639627b82a89d82fe6f1ea5f438a0
SHA5125d3f4ed6d175ccbac54a7a292dce43606ca6dfbaf0f2de134fa9293e1a9f7ff51d7f27e8648a9790ab49330ec8d4584108bc2a0a0074325d365a04e15f824140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5943372340c15bb7fe456105cb350b689
SHA1e2fe33d509e4e63dea7acec3dfc14caec8c7ec60
SHA256a113db4d95cc008a9df43b3b987ad02f6e95bb1b357c6b40e818fecb88f69e1e
SHA512525fbc83445e11b7408f23853b7b33983ab9750cd528a4d97c9d2ebb853136894c819996cec1a890bec86357d729bfa3a2ec8a8fd21a91ad1f074e56023af50f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe3707be68d8366d9ed4f5f8594adcf
SHA1b6507c3d979763d44db28f223051a7e0db472810
SHA25669a21d1aab3e4ee2fc7339e6eca6ab4fc7245e10abaf91e34c6c99ef83bca993
SHA5121dfb52992abd51c3263705a3d30caec3da467715d8b02d0b9555b038226afd4a8a769e4dd31f053e6179921f906499c9ebdf14df1cfe61bf56ddb42b20a52654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b422d395bc0357d5678f436742cef7
SHA1e79da3c00d6f144b30a1f4ae214a9dc34cd74d8c
SHA256b17a19d71cf7f4565c77663756cd3ff51282449250dc7cf14727b5c658e2f783
SHA5127818f93b6dad5f0d996bfcac19592cd08a3e05206121a632b35a3546bbaa596d404f14938a164e18c646bfa68047bb04a6d6449a2593837e12fd4cafadbaba9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd212e10efca74f9a7f053c754f735e4
SHA144047e40b697d33a2c68d2627998ef4dce304899
SHA2569fa5e94b65b74e6b6550932d84c82086a888c57a6d6a780456b428fe16062dfe
SHA512871e6331232a89a8e0cabf0ab85600b337fccf98034d4c9b5d82c8fa47c9fc5415f2f0ff15b8a11311a6a37aaada5414f6ce808abf9d9878dc290863af942a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59111cc11e3957b4c00184a53f827c625
SHA13fa9855086554e3a884d25e8b3654a8090c0023a
SHA25633b3164fedf3802a744ef18f62de115f36d11ee15edef624696f7e78f9ea2e57
SHA5128d3a48e70676af8fa726d9741d2d47709b2c2660556d81b87051d37af0c1d6556b7149cb75b73d580f03ab0a3801cf948f60d9319e1105247728763ad5dfdf66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2f186e7c2b23c10f99a5c20120afc80
SHA1983a207bcbf72b1f1dd5c065bce6486ce9a1c94a
SHA2564df632f7a0ddf73fdb0f8f2aca79b31039f8552baa7336c2873b7526a30a1f19
SHA512daa78d90cfefc0303ce9d76a9c573bc6fb68cfc57e4b6887702c7efa962e142dea4d184ca0db6d8f11868cbcd6b70b94fef26109253c5e39a3563b0a98253000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512d4cab5c4ceb0cd5ccf36af66fa6400
SHA14f6d0c1329bfeba6a0c291ff5ab8b48c6faee80f
SHA2565e4e49108c4525b0c3975885dd53a3266697d4ee76e24c4b90241380243c7f7c
SHA512961a7dacf7c42ea6eaa2da44a48f8b9418f952b329e0d2dce44c83a65b84f945092451892cb43c3162ef61fdd4c9d8b4684037861b2b0d23033b4096b5993e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f80bd923ae426ab54e97408722e71170
SHA1e498054ebb7c1574ed76602c9b466ac134218b84
SHA256480fa20ea3884f8516c2865f22a417f457e9abae381118c6df9e1482146dbfa8
SHA512405173473e88946e6d67ab5613868619b78a22bfd0d8ad5afcbe05149d49120bd33f1abb63d89db164a7bd5c4162acfcfa3002a98e78731be4f90f11f5c8789c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546df45ea35996f91227d21871806cba6
SHA1e9a7d7999afe2b7fa2ddd785644b17e2a909d8f7
SHA256c3ebe49694295950439d483184ec11e07c3812c39a11c163ae2839f391b13eb8
SHA51221584fcbedd779946c484f710f6fc4c1dfe4271cf2d3e443b2d594bcbfaa5809dfccf429696a4595d80f4ba7da5e7b2f8591ef48d3549a0052de071aed2c8547
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a