Analysis
-
max time kernel
8s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe
-
Size
644KB
-
MD5
94de1d6ae38c18d132f69a221ea2407d
-
SHA1
a048b4b46308cbf27d3f412e2139bb290f284b43
-
SHA256
2ba78cfc0247a07c1fb24e7ffebe1814bd0fe2e486785e978e229e4dd731432b
-
SHA512
f87690592313d7b18eca8be7ab19a8f0572764e5f118f095aa40c7dec4e9baf68121bb48beb4bac33086e2e494381c6a9ae5aff1334ef748e3b5b4d301c41056
-
SSDEEP
12288:t6onxOp8FySpE5zvIdtU+YmefT9/mqOplf2AQNWxgqFjj:Twp8DozAdO98fplf2MJ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" izfuneuesjp.exe -
Pykspa family
-
UAC bypass 3 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" izfuneuesjp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" izfuneuesjp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" izfuneuesjp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" izfuneuesjp.exe -
Detect Pykspa worm 2 IoCs
resource yara_rule behavioral1/files/0x000a000000012262-2.dat family_pykspa behavioral1/files/0x00050000000195bb-97.dat family_pykspa -
Adds policy Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ntbotyfq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ldxwnexupgttigiihahz.exe" izfuneuesjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run izfuneuesjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sbmckscqcko = "ypigwmeaukwvjghgewc.exe" izfuneuesjp.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" izfuneuesjp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" izfuneuesjp.exe -
Executes dropped EXE 5 IoCs
pid Process 2104 izfuneuesjp.exe 1172 ndvshwnibqbzmiigdu.exe 1992 adisu.exe 2368 adisu.exe 2620 xlbwjwlevirnysqm.exe -
Loads dropped DLL 6 IoCs
pid Process 2352 JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe 2352 JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe 2104 izfuneuesjp.exe 2104 izfuneuesjp.exe 2104 izfuneuesjp.exe 2104 izfuneuesjp.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pbpiterixipjsk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ndvshwnibqbzmiigdu.exe ." izfuneuesjp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\eluioucoy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xlbwjwlevirnysqm.exe" izfuneuesjp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\xfpelsbozg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xlbwjwlevirnysqm.exe ." izfuneuesjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\eluioucoy = "xlbwjwlevirnysqm.exe" izfuneuesjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\xfpelsbozg = "ndvshwnibqbzmiigdu.exe ." izfuneuesjp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzlclufuhqvn = "atoogysqmestjilmmgohc.exe" izfuneuesjp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ozmeoykaoyexf = "ndvshwnibqbzmiigdu.exe ." izfuneuesjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sfuoamasiucxhax = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xlbwjwlevirnysqm.exe" izfuneuesjp.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" izfuneuesjp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA izfuneuesjp.exe -
Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 1 IoCs
Possible Turn off User Account Control's privilege elevation for standard users.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" izfuneuesjp.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 www.whatismyip.ca 3 whatismyip.everdot.org 4 www.showmyipaddress.com 9 whatismyipaddress.com -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ldxwnexupgttigiihahz.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\atoogysqmestjilmmgohc.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\rlhibupoletvmmqstoxrno.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\xlbwjwlevirnysqm.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\etkguiyskyifrmlie.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\ndvshwnibqbzmiigdu.exe izfuneuesjp.exe File opened for modification C:\Windows\SysWOW64\ypigwmeaukwvjghgewc.exe izfuneuesjp.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\ndvshwnibqbzmiigdu.exe izfuneuesjp.exe File opened for modification C:\Windows\ypigwmeaukwvjghgewc.exe izfuneuesjp.exe File opened for modification C:\Windows\ldxwnexupgttigiihahz.exe izfuneuesjp.exe File opened for modification C:\Windows\atoogysqmestjilmmgohc.exe izfuneuesjp.exe File opened for modification C:\Windows\rlhibupoletvmmqstoxrno.exe izfuneuesjp.exe File opened for modification C:\Windows\xlbwjwlevirnysqm.exe izfuneuesjp.exe File opened for modification C:\Windows\etkguiyskyifrmlie.exe izfuneuesjp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlbwjwlevirnysqm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language izfuneuesjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndvshwnibqbzmiigdu.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2352 JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe 2352 JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe 2352 JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe 2352 JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe 2352 JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe 2352 JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeShutdownPrivilege 2472 explorer.exe Token: SeShutdownPrivilege 2472 explorer.exe Token: SeShutdownPrivilege 2472 explorer.exe Token: SeShutdownPrivilege 2472 explorer.exe Token: SeShutdownPrivilege 2472 explorer.exe Token: SeShutdownPrivilege 2472 explorer.exe Token: SeShutdownPrivilege 2472 explorer.exe Token: SeShutdownPrivilege 2472 explorer.exe Token: SeShutdownPrivilege 2472 explorer.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2104 2352 JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe 31 PID 2352 wrote to memory of 2104 2352 JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe 31 PID 2352 wrote to memory of 2104 2352 JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe 31 PID 2352 wrote to memory of 2104 2352 JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe 31 PID 2472 wrote to memory of 1172 2472 explorer.exe 33 PID 2472 wrote to memory of 1172 2472 explorer.exe 33 PID 2472 wrote to memory of 1172 2472 explorer.exe 33 PID 2472 wrote to memory of 1172 2472 explorer.exe 33 PID 2104 wrote to memory of 1992 2104 izfuneuesjp.exe 34 PID 2104 wrote to memory of 1992 2104 izfuneuesjp.exe 34 PID 2104 wrote to memory of 1992 2104 izfuneuesjp.exe 34 PID 2104 wrote to memory of 1992 2104 izfuneuesjp.exe 34 PID 2472 wrote to memory of 2620 2472 explorer.exe 35 PID 2472 wrote to memory of 2620 2472 explorer.exe 35 PID 2472 wrote to memory of 2620 2472 explorer.exe 35 PID 2472 wrote to memory of 2620 2472 explorer.exe 35 PID 2104 wrote to memory of 2368 2104 izfuneuesjp.exe 36 PID 2104 wrote to memory of 2368 2104 izfuneuesjp.exe 36 PID 2104 wrote to memory of 2368 2104 izfuneuesjp.exe 36 PID 2104 wrote to memory of 2368 2104 izfuneuesjp.exe 36 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" izfuneuesjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer izfuneuesjp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" izfuneuesjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System izfuneuesjp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" izfuneuesjp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" izfuneuesjp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" izfuneuesjp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" izfuneuesjp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" izfuneuesjp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" izfuneuesjp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" izfuneuesjp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" izfuneuesjp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_94de1d6ae38c18d132f69a221ea2407d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe"C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe" "c:\users\admin\appdata\local\temp\jaffacakes118_94de1d6ae38c18d132f69a221ea2407d.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Hijack Execution Flow: Executable Installer File Permissions Weakness
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\adisu.exe"C:\Users\Admin\AppData\Local\Temp\adisu.exe" "-c:\users\admin\appdata\local\temp\jaffacakes118_94de1d6ae38c18d132f69a221ea2407d.exe"3⤵
- Executes dropped EXE
PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\adisu.exe"C:\Users\Admin\AppData\Local\Temp\adisu.exe" "-c:\users\admin\appdata\local\temp\jaffacakes118_94de1d6ae38c18d132f69a221ea2407d.exe"3⤵
- Executes dropped EXE
PID:2368
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\ndvshwnibqbzmiigdu.exe"C:\Windows\ndvshwnibqbzmiigdu.exe" .2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe"C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe" "c:\windows\ndvshwnibqbzmiigdu.exe*."3⤵PID:1388
-
-
-
C:\Users\Admin\AppData\Local\Temp\xlbwjwlevirnysqm.exe"C:\Users\Admin\AppData\Local\Temp\xlbwjwlevirnysqm.exe" .2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe"C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe" "c:\users\admin\appdata\local\temp\xlbwjwlevirnysqm.exe*."3⤵PID:1640
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1524
-
C:\Windows\etkguiyskyifrmlie.exe"C:\Windows\etkguiyskyifrmlie.exe" .2⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe"C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe" "c:\windows\etkguiyskyifrmlie.exe*."3⤵PID:1376
-
-
-
C:\Users\Admin\AppData\Local\Temp\ldxwnexupgttigiihahz.exe"C:\Users\Admin\AppData\Local\Temp\ldxwnexupgttigiihahz.exe" .2⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe"C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe" "c:\users\admin\appdata\local\temp\ldxwnexupgttigiihahz.exe*."3⤵PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
732KB
MD51970da7272c080cb2351c4c563c67b6e
SHA1e00d78182bf28799b73b84872cb2506761f96e75
SHA25600b73439d2aba46203083a812c84e3780da7976e0824e750da3ed46c693afd84
SHA5124d0f0ceb1b1c4cc9f1d09645220cabf54caf5372e59272165ccc0aa8d04436e7dea39eac25f21bd460d36b805cea528df4cc7dc1c70486e956494bd22aaad369
-
Filesize
272B
MD5673c951a745c10193a4515671ef9a752
SHA113b10413420f839de3ce58fd9cc0b01f7159b471
SHA256b1ade34f9d78da213d344278e1b735a2b7272cb3f0b4a7cb11ff1b1793a7f65f
SHA5128047d1651b2499b2a21f3c77a05ae4523241cb0ba271a5d49227dbb292c742c9e1f54a88ed0907a5d56c1d37ddd44f51a708ab33d3494de3631b993463da6724
-
Filesize
3KB
MD583c3737964510e4175555b41c66ff299
SHA18185587ea79ca2dfcc1f19a03e166613cda9ed0b
SHA256a6d179010f704cd41fbbdfa2936c3a447a6fd6dfda044a36c7d1a99d2a05ed20
SHA512422abf4657a2225f6382d472a6828129bfd93aa615eb96506a05871da2cc4ea3a32801d7c28c7305d3d989141070788176aed9d2ab233d9a298e1be1f1ab0084
-
Filesize
644KB
MD594de1d6ae38c18d132f69a221ea2407d
SHA1a048b4b46308cbf27d3f412e2139bb290f284b43
SHA2562ba78cfc0247a07c1fb24e7ffebe1814bd0fe2e486785e978e229e4dd731432b
SHA512f87690592313d7b18eca8be7ab19a8f0572764e5f118f095aa40c7dec4e9baf68121bb48beb4bac33086e2e494381c6a9ae5aff1334ef748e3b5b4d301c41056
-
Filesize
320KB
MD55203b6ea0901877fbf2d8d6f6d8d338e
SHA1c803e92561921b38abe13239c1fd85605b570936
SHA2560cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060
SHA512d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471