Analysis
-
max time kernel
136s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 10:20
Static task
static1
Behavioral task
behavioral1
Sample
56e5ef2eb4001b992bde0c406a69b059_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56e5ef2eb4001b992bde0c406a69b059_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
56e5ef2eb4001b992bde0c406a69b059_JaffaCakes118.exe
-
Size
952KB
-
MD5
56e5ef2eb4001b992bde0c406a69b059
-
SHA1
8201517a8f5f90d8f278bba84e3e7dc4f1082a07
-
SHA256
1f870144603d776ce4514b3c745a7b1a0b04d17482b59d98f43b2a5d325c601e
-
SHA512
69b950db5b6287ae662a8eac68be2cb8024b17fcd5927d219230627bf3897462d1d126c0b4eb7aac020b5752a943c3180c45a329f68aa412001291b6a14edd7a
-
SSDEEP
12288:tYYKXuEe/OernBZ9yhoBSR5gO5g26u3SfLyHNlb2u6lAXEh5YaYmpUzgASAGi0hl:+pkmezBTyTNsLytlbZ0AXEv2hGiJtp+
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b81-25.dat family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation SHACO.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation XIHF.exe -
Executes dropped EXE 2 IoCs
pid Process 2944 SHACO.exe 4208 XIHF.exe -
Loads dropped DLL 5 IoCs
pid Process 2944 SHACO.exe 4208 XIHF.exe 4208 XIHF.exe 4208 XIHF.exe 3104 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XIHF Agent = "C:\\Windows\\SysWOW64\\28463\\XIHF.exe" XIHF.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\AKV.exe SHACO.exe File opened for modification C:\Windows\SysWOW64\28463 XIHF.exe File created C:\Windows\SysWOW64\28463\XIHF.001 SHACO.exe File created C:\Windows\SysWOW64\28463\XIHF.006 SHACO.exe File created C:\Windows\SysWOW64\28463\XIHF.007 SHACO.exe File created C:\Windows\SysWOW64\28463\XIHF.exe SHACO.exe File created C:\Windows\SysWOW64\28463\key.bin SHACO.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3104 4208 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56e5ef2eb4001b992bde0c406a69b059_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SHACO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XIHF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 57 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.7 XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.8\0 XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.8\0\ XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.8\Flags\ = "0" XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38DE3BF5-8E21-4559-A8A2-30CBB56810C4}\Version XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.6\Flags\ = "0" XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.6\HelpDir\ XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.7\FLAGS XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.8\Flags\ XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38DE3BF5-8E21-4559-A8A2-30CBB56810C4} XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38DE3BF5-8E21-4559-A8A2-30CBB56810C4}\ = "Ebahaled object" XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.6\ = "Microsoft Vbe UI 7.1 Object Library" XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.6\0\Win64 XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.6\Flags\ XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.8\0\Win32\ XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38DE3BF5-8E21-4559-A8A2-30CBB56810C4}\VersionIndependentProgID\ = "IAS.Match" XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38DE3BF5-8E21-4559-A8A2-30CBB56810C4}\ProgID\ XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF} XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.8\Flags XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38DE3BF5-8E21-4559-A8A2-30CBB56810C4}\TypeLib XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38DE3BF5-8E21-4559-A8A2-30CBB56810C4}\InprocServer32\ XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.6\0\Win64\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\ProgramFilesCommonX64\\Microsoft Shared\\VBA\\VBA7.1\\VBEUI.DLL" XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38DE3BF5-8E21-4559-A8A2-30CBB56810C4}\VersionIndependentProgID XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.7\0\win32 XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.8\ XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.8\0\Win64\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\ProgramFilesCommonX64\\Microsoft Shared\\OFFICE16\\MSO.DLL" XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38DE3BF5-8E21-4559-A8A2-30CBB56810C4}\TypeLib\ XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38DE3BF5-8E21-4559-A8A2-30CBB56810C4}\VersionIndependentProgID\ XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.6\0\ XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.7\FLAGS\ = "0" XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.6\Flags XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.7\0 XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.7\FLAGS\ XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.8\0\Win32 XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.8\0\Win32\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\ProgramFilesCommonX86\\Microsoft Shared\\OFFICE16\\MSO.DLL" XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38DE3BF5-8E21-4559-A8A2-30CBB56810C4}\Version\ XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.6\HelpDir XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.7\0\ XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38DE3BF5-8E21-4559-A8A2-30CBB56810C4}\TypeLib\ = "{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}" XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.7\0\win32\ = "C:\\Program Files\\Microsoft Office\\root\\VFS\\ProgramFilesCommonX86\\Microsoft Shared\\Office16\\MSO.DLL" XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.8\0\Win64 XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\ XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.8 XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.8\0\Win64\ XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38DE3BF5-8E21-4559-A8A2-30CBB56810C4}\Version\ = "1.0" XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38DE3BF5-8E21-4559-A8A2-30CBB56810C4}\InprocServer32 XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38DE3BF5-8E21-4559-A8A2-30CBB56810C4}\InprocServer32\ = "%SystemRoot%\\SysWow64\\iasnap.dll" XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.6\HelpDir\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\ProgramFilesCommonX86\\Microsoft Shared\\VBA\\VBA7.1\\" XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.6 XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.6\0\Win64\ XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.8\ = "Microsoft Office 16.0 Object Library" XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38DE3BF5-8E21-4559-A8A2-30CBB56810C4}\ProgID XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38DE3BF5-8E21-4559-A8A2-30CBB56810C4}\ProgID\ = "IAS.Match.1" XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.7\ XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.7\0\win32\ XIHF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.6\ XIHF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DBCC9EA6-A551-BB46-DAF5-449D4A9278EF}\2.6\0 XIHF.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 4208 XIHF.exe Token: SeIncBasePriorityPrivilege 4208 XIHF.exe Token: SeIncBasePriorityPrivilege 4208 XIHF.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4208 XIHF.exe 4208 XIHF.exe 4208 XIHF.exe 4208 XIHF.exe 4208 XIHF.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4996 wrote to memory of 2944 4996 56e5ef2eb4001b992bde0c406a69b059_JaffaCakes118.exe 83 PID 4996 wrote to memory of 2944 4996 56e5ef2eb4001b992bde0c406a69b059_JaffaCakes118.exe 83 PID 4996 wrote to memory of 2944 4996 56e5ef2eb4001b992bde0c406a69b059_JaffaCakes118.exe 83 PID 2944 wrote to memory of 4208 2944 SHACO.exe 84 PID 2944 wrote to memory of 4208 2944 SHACO.exe 84 PID 2944 wrote to memory of 4208 2944 SHACO.exe 84 PID 4208 wrote to memory of 4960 4208 XIHF.exe 104 PID 4208 wrote to memory of 4960 4208 XIHF.exe 104 PID 4208 wrote to memory of 4960 4208 XIHF.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\56e5ef2eb4001b992bde0c406a69b059_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56e5ef2eb4001b992bde0c406a69b059_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\SHACO.exe"C:\Users\Admin\AppData\Local\Temp\SHACO.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\28463\XIHF.exe"C:\Windows\system32\28463\XIHF.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 11364⤵
- Loads dropped DLL
- Program crash
PID:3104
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\28463\XIHF.exe > nul4⤵
- System Location Discovery: System Language Discovery
PID:4960
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 212 -p 4208 -ip 42081⤵PID:3440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5cb07753c45624238b4403480372be5db
SHA110af5bfbed599165d996470278f011728e866df7
SHA25663c3ed8cbe11314a2f2cd6ff50305bad98075be9e09d22e45b47af557a3388e7
SHA5122c72cca45ef924104c6892dd96f2e27a5d43bacc9f3eb0eeee24c871cc1bd1642d77734822d9d934f93a77c884fa1c682cf1ceddffe157a613978d9edd184312
-
Filesize
809KB
MD518fc1c9ac123d7b8149bec150a7e1b84
SHA1e1cb8425b3406bd487917dbd87f76f23f3d38c85
SHA256d6b40332e006014758c0356b9875d14237c1e69cb9c14db55e2d11bebce2c2b9
SHA5124b9d47b01206139692a3c05018b5144ce134fdaa92b7563cc2f9923c88b208073a797d0df95488938e392f3678513000984f82a020482cd3d0eed307375b2778
-
Filesize
26KB
MD55360862be8e10d223cabb8d5165b3219
SHA1b57da0070559eabd3691d6fe64cad182591a82e9
SHA2560611f2850ecede61614e81a55f9f1e7989486934723f7d7479cc9d46cca79e9d
SHA51203b7d25745c6871073b34d347751ec18ea18a5dcd26112ffa6c6f2bba7bf3df9af69c1593f4cbce3f622f16cd8233a631d2137138ba3df5b58f3079a0641f3d3
-
Filesize
457KB
MD542e2202ac32edb39ccf9979515018d85
SHA1c1e07fbe2fa759e2775d4dcf7de23a66d2422a1a
SHA256367b4028baf3df4a5f77169bd64c9ef8fd7968a4d6c852ae3f81a726f4b37222
SHA512a97d9e968b1f63dedba74999aabe6fd150aae985c1143d29b183cc0d663a45252c57494c3457136c5e500050c6af6c819f9ba7070b7d62300ede2e9a7c792768
-
Filesize
452B
MD57793385cc452a9d24ced45b11f390fe4
SHA10fe360d954d7fca719779f5a09a6038a008edaf0
SHA256066898cd05ecd5121d5c3cd4931e62d2acaa3ba21d26bee7d0ce439682f04ce6
SHA51281e938f69cd762eccba7ad0f9ffb1a58e43185ed132add77112c03e3f0a9be33b45b40a2eafbb1001788b72314e4dc21f038d31b8ddbb52c5b39d1d59f5bf40e
-
Filesize
8KB
MD53da3041787b72a7909d9f6184ce6bc5e
SHA1fc7f00b8a1341b5341e2ba6f94ba85364bc90843
SHA25618e06896cc71e99b717cff8d68cba86fea3eba5087b93734f6418e53cadab5b3
SHA512150fa3f8eeec3621ac61eab0da3f2692dd776887ec0c1791404df3dd8784982563496e1e990217a99c4fd53c5d5d68e0574737879b72d78ab737033f1b08560a
-
Filesize
5KB
MD550d0bcf6b5a6b11d9e274ccefba3f02e
SHA157acf2a1236b7534f2db661a9d95aeadcd41aa2a
SHA256a5e5cf8b3133031f25db37fd13b029cdfc9d1588ca7f68041e52349f46cbbf5c
SHA512c0288f92c75f4a6ea45434e3960a3c5d8ed3d890121a3fd6da2449e1313db523224e301451d85a15ea8ee9b5c2fb3bf294ee90869a4d5608bcf48fa94458e938
-
Filesize
647KB
MD5a7b322839cedf8d56cb0a7dcdb50ab59
SHA1d27855e65f5d9e87666f39d2af694a0d75330a75
SHA256ba7362315c0608c9203c9d607fd85695fbc15f034ea40b3de7dd1abebd5859a3
SHA51286a416ae639ca458e56093d5c04f3406ac0389cf9a1047f714424ba89ffd047ca58e6927bc941d285d4db9e8a95e91e0d578be3038a83945b6af90586ea9f649
-
Filesize
105B
MD527c90d4d9b049f4cd00f32ed1d2e5baf
SHA1338a3ea8f1e929d8916ece9b6e91e697eb562550
SHA256172d6f21165fb3ca925e5b000451fd8946920206f7438018c28b158b90cf5ffb
SHA512d73dadb3cf74c647ce5bad5b87d3fb42a212defcba8afb8cf962020b61a0369c0a2b1005797583daf1f1ae88b29b7288bc544a53d643f3519cf604aa0ffd6dae