Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 14:12
Behavioral task
behavioral1
Sample
JaffaCakes118_3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
#/Discord.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
#/Discord.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
#/PackageLaunche.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
#/PackageLaunche.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e.exe
-
Size
789.5MB
-
MD5
b9e441398c6ffb9c8fb7ca199268f09a
-
SHA1
53e866fe192f620bd5f9fe57d6750db6b0bb8569
-
SHA256
3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e
-
SHA512
6e277251e803dbb4f80c50b3e010fc8cbaea32aeb42c2a89617ee1c794b57b7306fe2f6f60bb967e73d19019675ea44a26cb4985fa006444336c63ea128fdd9f
-
SSDEEP
196608:gJjuM3xa11pQ8Q7l9XJ3Js0g3VyY7x3BEPo3upZePWy:oa11+8QJ9XdOFyY7xy8MZeP
Malware Config
Extracted
rhadamanthys
https://65.21.101.233:4714/2f5e662542c10b098/e8c101kl.lxije
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 10 IoCs
description pid Process procid_target PID 2836 created 1192 2836 PackageLaunche.exe 21 PID 2836 created 1192 2836 PackageLaunche.exe 21 PID 2836 created 1192 2836 PackageLaunche.exe 21 PID 2836 created 1192 2836 PackageLaunche.exe 21 PID 2836 created 1192 2836 PackageLaunche.exe 21 PID 2664 created 1192 2664 uTorrent.exe 21 PID 2664 created 1192 2664 uTorrent.exe 21 PID 2664 created 1192 2664 uTorrent.exe 21 PID 2664 created 1192 2664 uTorrent.exe 21 PID 2664 created 1192 2664 uTorrent.exe 21 -
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ PackageLaunche.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ uTorrent.exe -
XMRig Miner payload 11 IoCs
resource yara_rule behavioral1/memory/1244-69-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1244-71-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1244-73-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1244-75-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1244-77-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1244-79-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1244-81-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1244-83-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1244-85-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1244-87-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/1244-89-0x0000000140000000-0x0000000140840000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3016 powershell.exe 2104 powershell.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PackageLaunche.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PackageLaunche.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion uTorrent.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion uTorrent.exe -
Executes dropped EXE 4 IoCs
pid Process 2836 PackageLaunche.exe 2704 Discord.exe 476 Process not Found 2664 uTorrent.exe -
Loads dropped DLL 3 IoCs
pid Process 2956 JaffaCakes118_3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e.exe 2956 JaffaCakes118_3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e.exe 2956 JaffaCakes118_3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e.exe -
resource yara_rule behavioral1/memory/2836-8-0x0000000140000000-0x0000000140E90000-memory.dmp themida behavioral1/memory/2836-6-0x0000000140000000-0x0000000140E90000-memory.dmp themida behavioral1/memory/2836-32-0x0000000140000000-0x0000000140E90000-memory.dmp themida behavioral1/memory/2836-53-0x0000000140000000-0x0000000140E90000-memory.dmp themida behavioral1/memory/2664-56-0x0000000140000000-0x0000000140E90000-memory.dmp themida behavioral1/memory/2664-58-0x0000000140000000-0x0000000140E90000-memory.dmp themida behavioral1/memory/2664-60-0x0000000140000000-0x0000000140E90000-memory.dmp themida behavioral1/memory/2664-67-0x0000000140000000-0x0000000140E90000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PackageLaunche.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA uTorrent.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2836 PackageLaunche.exe 2664 uTorrent.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2704 set thread context of 2788 2704 Discord.exe 32 PID 2664 set thread context of 2296 2664 uTorrent.exe 62 PID 2664 set thread context of 1244 2664 uTorrent.exe 63 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe PackageLaunche.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2476 sc.exe 2428 sc.exe 2204 sc.exe 1680 sc.exe 2376 sc.exe 1780 sc.exe 2076 sc.exe 2188 sc.exe 1184 sc.exe 1988 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Discord.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 50f7a660d756db01 powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2904 schtasks.exe 2060 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2788 AppLaunch.exe 2788 AppLaunch.exe 2220 dialer.exe 2220 dialer.exe 2220 dialer.exe 2220 dialer.exe 2836 PackageLaunche.exe 2836 PackageLaunche.exe 3016 powershell.exe 2836 PackageLaunche.exe 2836 PackageLaunche.exe 2836 PackageLaunche.exe 2836 PackageLaunche.exe 2836 PackageLaunche.exe 2836 PackageLaunche.exe 2836 PackageLaunche.exe 2836 PackageLaunche.exe 2664 uTorrent.exe 2664 uTorrent.exe 2104 powershell.exe 2664 uTorrent.exe 2664 uTorrent.exe 2664 uTorrent.exe 2664 uTorrent.exe 2664 uTorrent.exe 2664 uTorrent.exe 2664 uTorrent.exe 2664 uTorrent.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3016 powershell.exe Token: SeDebugPrivilege 2104 powershell.exe Token: SeLockMemoryPrivilege 1244 explorer.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2836 2956 JaffaCakes118_3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e.exe 30 PID 2956 wrote to memory of 2836 2956 JaffaCakes118_3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e.exe 30 PID 2956 wrote to memory of 2836 2956 JaffaCakes118_3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e.exe 30 PID 2956 wrote to memory of 2836 2956 JaffaCakes118_3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e.exe 30 PID 2956 wrote to memory of 2704 2956 JaffaCakes118_3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e.exe 31 PID 2956 wrote to memory of 2704 2956 JaffaCakes118_3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e.exe 31 PID 2956 wrote to memory of 2704 2956 JaffaCakes118_3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e.exe 31 PID 2956 wrote to memory of 2704 2956 JaffaCakes118_3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e.exe 31 PID 2704 wrote to memory of 2788 2704 Discord.exe 32 PID 2704 wrote to memory of 2788 2704 Discord.exe 32 PID 2704 wrote to memory of 2788 2704 Discord.exe 32 PID 2704 wrote to memory of 2788 2704 Discord.exe 32 PID 2704 wrote to memory of 2788 2704 Discord.exe 32 PID 2704 wrote to memory of 2788 2704 Discord.exe 32 PID 2704 wrote to memory of 2788 2704 Discord.exe 32 PID 2704 wrote to memory of 2788 2704 Discord.exe 32 PID 2704 wrote to memory of 2788 2704 Discord.exe 32 PID 2704 wrote to memory of 2788 2704 Discord.exe 32 PID 2704 wrote to memory of 2788 2704 Discord.exe 32 PID 2704 wrote to memory of 2788 2704 Discord.exe 32 PID 2704 wrote to memory of 2788 2704 Discord.exe 32 PID 2704 wrote to memory of 2788 2704 Discord.exe 32 PID 2788 wrote to memory of 2220 2788 AppLaunch.exe 33 PID 2788 wrote to memory of 2220 2788 AppLaunch.exe 33 PID 2788 wrote to memory of 2220 2788 AppLaunch.exe 33 PID 2788 wrote to memory of 2220 2788 AppLaunch.exe 33 PID 2788 wrote to memory of 2220 2788 AppLaunch.exe 33 PID 2788 wrote to memory of 2220 2788 AppLaunch.exe 33 PID 2788 wrote to memory of 2220 2788 AppLaunch.exe 33 PID 2788 wrote to memory of 2220 2788 AppLaunch.exe 33 PID 2788 wrote to memory of 2220 2788 AppLaunch.exe 33 PID 2108 wrote to memory of 2376 2108 cmd.exe 38 PID 2108 wrote to memory of 2376 2108 cmd.exe 38 PID 2108 wrote to memory of 2376 2108 cmd.exe 38 PID 2108 wrote to memory of 1184 2108 cmd.exe 39 PID 2108 wrote to memory of 1184 2108 cmd.exe 39 PID 2108 wrote to memory of 1184 2108 cmd.exe 39 PID 2108 wrote to memory of 1780 2108 cmd.exe 40 PID 2108 wrote to memory of 1780 2108 cmd.exe 40 PID 2108 wrote to memory of 1780 2108 cmd.exe 40 PID 2108 wrote to memory of 2076 2108 cmd.exe 41 PID 2108 wrote to memory of 2076 2108 cmd.exe 41 PID 2108 wrote to memory of 2076 2108 cmd.exe 41 PID 2108 wrote to memory of 2188 2108 cmd.exe 42 PID 2108 wrote to memory of 2188 2108 cmd.exe 42 PID 2108 wrote to memory of 2188 2108 cmd.exe 42 PID 2144 wrote to memory of 2476 2144 cmd.exe 55 PID 2144 wrote to memory of 2476 2144 cmd.exe 55 PID 2144 wrote to memory of 2476 2144 cmd.exe 55 PID 2144 wrote to memory of 2428 2144 cmd.exe 56 PID 2144 wrote to memory of 2428 2144 cmd.exe 56 PID 2144 wrote to memory of 2428 2144 cmd.exe 56 PID 2144 wrote to memory of 1988 2144 cmd.exe 57 PID 2144 wrote to memory of 1988 2144 cmd.exe 57 PID 2144 wrote to memory of 1988 2144 cmd.exe 57 PID 2144 wrote to memory of 2204 2144 cmd.exe 58 PID 2144 wrote to memory of 2204 2144 cmd.exe 58 PID 2144 wrote to memory of 2204 2144 cmd.exe 58 PID 2144 wrote to memory of 1680 2144 cmd.exe 59 PID 2144 wrote to memory of 1680 2144 cmd.exe 59 PID 2144 wrote to memory of 1680 2144 cmd.exe 59 PID 2664 wrote to memory of 2296 2664 uTorrent.exe 62 PID 2664 wrote to memory of 1244 2664 uTorrent.exe 63 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3426d0e0926c092be63bb12c0df0708087db8bd74fa489f24c5672958b095a3e.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Roaming\PackageLaunche.exeC:\Users\Admin\AppData\Roaming\PackageLaunche.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2836
-
-
C:\Users\Admin\AppData\Roaming\Discord.exeC:\Users\Admin\AppData\Roaming\Discord.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2376
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1184
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1780
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2076
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2188
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /delete /f /tn "AppData"2⤵PID:3040
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "AppData" /xml "C:\Users\Admin\AppData\Local\Temp\rvhalpilhrga.xml"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2904
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "AppData"2⤵PID:3024
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2476
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2428
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1988
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2204
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1680
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "AppData" /xml "C:\Windows\TEMP\rvhalpilhrga.xml"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2060
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:2296
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe"C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2664
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD595e95e8f4133ea80e2ea663a0afb2250
SHA151cdf84b91748323d6495df7228b1f15eef9a50d
SHA256b2a465f622636c8ff5942e86e7a77b3b72e217ade80b05f265d3b0e9798cf64f
SHA51248e77eb3d3127140d93c469d929976ce34bd6deffba2d97043c29cc1ad28064e8f650f5b1a8b2373c6253009b8491d4f189a94ec05d9e78603de744ca1ef7ca2