Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 12:30
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
General
-
Target
file.exe
-
Size
1.2MB
-
MD5
d54a325b1957875a81d4b807a90d2d29
-
SHA1
3b10409f9a6d57c77938ef7c777262c39869c6c0
-
SHA256
5e28b2432155a87531710dfb3fe61f6bf9837d18e660415965764592e0ddb637
-
SHA512
e8aa01639d5efc3272e56da16613b5ada50b4470b98de240fe80da258e139bfc01bca848ad5115b099cd2ceca9ce1bdd3cd64c18767e5938d086e6d799072c95
-
SSDEEP
24576:WynG+VQ/TT4pwaAbE9/YfUyAzIIsNcHoofPohs+JEObyVY8mI8j:lnjV8TMgf3UYeFos+VbyhmI8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1hH12Ee2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1hH12Ee2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1hH12Ee2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1hH12Ee2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1hH12Ee2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1hH12Ee2.exe -
Executes dropped EXE 5 IoCs
pid Process 2332 IH7XV97.exe 1352 nT0cX43.exe 916 do2QY99.exe 2944 1hH12Ee2.exe 2280 2xq1214.exe -
Loads dropped DLL 14 IoCs
pid Process 2060 file.exe 2332 IH7XV97.exe 2332 IH7XV97.exe 1352 nT0cX43.exe 1352 nT0cX43.exe 916 do2QY99.exe 916 do2QY99.exe 2944 1hH12Ee2.exe 916 do2QY99.exe 2280 2xq1214.exe 2532 WerFault.exe 2532 WerFault.exe 2532 WerFault.exe 2532 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 1hH12Ee2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1hH12Ee2.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" do2QY99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" IH7XV97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" nT0cX43.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2280 set thread context of 2624 2280 2xq1214.exe 35 -
Program crash 2 IoCs
pid pid_target Process procid_target 2532 2280 WerFault.exe 33 2580 2624 WerFault.exe 35 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2944 1hH12Ee2.exe 2944 1hH12Ee2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2944 1hH12Ee2.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2332 2060 file.exe 28 PID 2060 wrote to memory of 2332 2060 file.exe 28 PID 2060 wrote to memory of 2332 2060 file.exe 28 PID 2060 wrote to memory of 2332 2060 file.exe 28 PID 2060 wrote to memory of 2332 2060 file.exe 28 PID 2060 wrote to memory of 2332 2060 file.exe 28 PID 2060 wrote to memory of 2332 2060 file.exe 28 PID 2332 wrote to memory of 1352 2332 IH7XV97.exe 29 PID 2332 wrote to memory of 1352 2332 IH7XV97.exe 29 PID 2332 wrote to memory of 1352 2332 IH7XV97.exe 29 PID 2332 wrote to memory of 1352 2332 IH7XV97.exe 29 PID 2332 wrote to memory of 1352 2332 IH7XV97.exe 29 PID 2332 wrote to memory of 1352 2332 IH7XV97.exe 29 PID 2332 wrote to memory of 1352 2332 IH7XV97.exe 29 PID 1352 wrote to memory of 916 1352 nT0cX43.exe 30 PID 1352 wrote to memory of 916 1352 nT0cX43.exe 30 PID 1352 wrote to memory of 916 1352 nT0cX43.exe 30 PID 1352 wrote to memory of 916 1352 nT0cX43.exe 30 PID 1352 wrote to memory of 916 1352 nT0cX43.exe 30 PID 1352 wrote to memory of 916 1352 nT0cX43.exe 30 PID 1352 wrote to memory of 916 1352 nT0cX43.exe 30 PID 916 wrote to memory of 2944 916 do2QY99.exe 31 PID 916 wrote to memory of 2944 916 do2QY99.exe 31 PID 916 wrote to memory of 2944 916 do2QY99.exe 31 PID 916 wrote to memory of 2944 916 do2QY99.exe 31 PID 916 wrote to memory of 2944 916 do2QY99.exe 31 PID 916 wrote to memory of 2944 916 do2QY99.exe 31 PID 916 wrote to memory of 2944 916 do2QY99.exe 31 PID 916 wrote to memory of 2280 916 do2QY99.exe 33 PID 916 wrote to memory of 2280 916 do2QY99.exe 33 PID 916 wrote to memory of 2280 916 do2QY99.exe 33 PID 916 wrote to memory of 2280 916 do2QY99.exe 33 PID 916 wrote to memory of 2280 916 do2QY99.exe 33 PID 916 wrote to memory of 2280 916 do2QY99.exe 33 PID 916 wrote to memory of 2280 916 do2QY99.exe 33 PID 2280 wrote to memory of 2624 2280 2xq1214.exe 35 PID 2280 wrote to memory of 2624 2280 2xq1214.exe 35 PID 2280 wrote to memory of 2624 2280 2xq1214.exe 35 PID 2280 wrote to memory of 2624 2280 2xq1214.exe 35 PID 2280 wrote to memory of 2624 2280 2xq1214.exe 35 PID 2280 wrote to memory of 2624 2280 2xq1214.exe 35 PID 2280 wrote to memory of 2624 2280 2xq1214.exe 35 PID 2280 wrote to memory of 2624 2280 2xq1214.exe 35 PID 2280 wrote to memory of 2624 2280 2xq1214.exe 35 PID 2280 wrote to memory of 2624 2280 2xq1214.exe 35 PID 2280 wrote to memory of 2624 2280 2xq1214.exe 35 PID 2280 wrote to memory of 2624 2280 2xq1214.exe 35 PID 2280 wrote to memory of 2624 2280 2xq1214.exe 35 PID 2280 wrote to memory of 2624 2280 2xq1214.exe 35 PID 2280 wrote to memory of 2532 2280 2xq1214.exe 36 PID 2280 wrote to memory of 2532 2280 2xq1214.exe 36 PID 2280 wrote to memory of 2532 2280 2xq1214.exe 36 PID 2624 wrote to memory of 2580 2624 AppLaunch.exe 37 PID 2624 wrote to memory of 2580 2624 AppLaunch.exe 37 PID 2624 wrote to memory of 2580 2624 AppLaunch.exe 37 PID 2280 wrote to memory of 2532 2280 2xq1214.exe 36 PID 2280 wrote to memory of 2532 2280 2xq1214.exe 36 PID 2280 wrote to memory of 2532 2280 2xq1214.exe 36 PID 2624 wrote to memory of 2580 2624 AppLaunch.exe 37 PID 2280 wrote to memory of 2532 2280 2xq1214.exe 36 PID 2624 wrote to memory of 2580 2624 AppLaunch.exe 37 PID 2624 wrote to memory of 2580 2624 AppLaunch.exe 37 PID 2624 wrote to memory of 2580 2624 AppLaunch.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IH7XV97.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IH7XV97.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nT0cX43.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nT0cX43.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\do2QY99.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\do2QY99.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1hH12Ee2.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1hH12Ee2.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2xq1214.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2xq1214.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 2687⤵
- Program crash
PID:2580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:2532
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5639b6e51e8e9516e277db15c04a023aa
SHA1968e3f3da6c8690d5793720bdd4db56b2853161c
SHA256f46e8c166f5468c6080a265904c5438876c199036b495fc573ea492aba88a54a
SHA5125caabd237179dab8b61f7c8ff69b0fc153bb2c0940d62f4be4a102af3e35ee29a46a4a931463c93f79087f1f4775f5ad33ffe0f79544c3218215fc1c8d4a6be5
-
Filesize
1.0MB
MD5639b6e51e8e9516e277db15c04a023aa
SHA1968e3f3da6c8690d5793720bdd4db56b2853161c
SHA256f46e8c166f5468c6080a265904c5438876c199036b495fc573ea492aba88a54a
SHA5125caabd237179dab8b61f7c8ff69b0fc153bb2c0940d62f4be4a102af3e35ee29a46a4a931463c93f79087f1f4775f5ad33ffe0f79544c3218215fc1c8d4a6be5
-
Filesize
748KB
MD5a0958e3938074e2438d08d1a250cc0a6
SHA1a76f846283b49494c6233969855cff6a94ae2613
SHA2566b067299bcc62800759063833f1966bf81f291bcd43b49586a0ec64caeaf4496
SHA512bedca7c84711a3e0d5ccb77c520aa614aad51aa5ce97e5fdaf9a1b7f0ee8ddaf50a451fa9882973f67e00500627b9eb670c4b01cc2a84ec239606ced6da5cee8
-
Filesize
748KB
MD5a0958e3938074e2438d08d1a250cc0a6
SHA1a76f846283b49494c6233969855cff6a94ae2613
SHA2566b067299bcc62800759063833f1966bf81f291bcd43b49586a0ec64caeaf4496
SHA512bedca7c84711a3e0d5ccb77c520aa614aad51aa5ce97e5fdaf9a1b7f0ee8ddaf50a451fa9882973f67e00500627b9eb670c4b01cc2a84ec239606ced6da5cee8
-
Filesize
493KB
MD59973acf13c0e105bc55a9b9d4b512710
SHA10e39c921944014fead1f2fa6655aaa055434ae35
SHA256caa981c3af102abe7a544d6f4691b8a569988c6cbff1df662c11d6ee092b193c
SHA512d1403553247a5b4710010e16e9683a650c91ec75b2ce518bed95ca24dc5c4a70286f0d010546deb2f9a70feefe718ec5e838e6d81f87b736670ff20d94567c28
-
Filesize
493KB
MD59973acf13c0e105bc55a9b9d4b512710
SHA10e39c921944014fead1f2fa6655aaa055434ae35
SHA256caa981c3af102abe7a544d6f4691b8a569988c6cbff1df662c11d6ee092b193c
SHA512d1403553247a5b4710010e16e9683a650c91ec75b2ce518bed95ca24dc5c4a70286f0d010546deb2f9a70feefe718ec5e838e6d81f87b736670ff20d94567c28
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
448KB
MD58f0aa6bdc8d51cd4fa17bb2f3fe8b2f2
SHA1788318c06bd93c60149877fe06cd34805b8893b6
SHA256c2500efe89d25b6a0023a801c992054665b110b1d6dac9f4470e1b34a0f6ee38
SHA51271c8bdcbd8293d5f26dfe7fd886ac11734332767d9b448fa2a5bcf6d9253bc469f7c3b8f068381a7b50f6b061bcf15f7292264ab42ea3bf7b6d7ff1d72ee2b52
-
Filesize
448KB
MD58f0aa6bdc8d51cd4fa17bb2f3fe8b2f2
SHA1788318c06bd93c60149877fe06cd34805b8893b6
SHA256c2500efe89d25b6a0023a801c992054665b110b1d6dac9f4470e1b34a0f6ee38
SHA51271c8bdcbd8293d5f26dfe7fd886ac11734332767d9b448fa2a5bcf6d9253bc469f7c3b8f068381a7b50f6b061bcf15f7292264ab42ea3bf7b6d7ff1d72ee2b52
-
Filesize
1.0MB
MD5639b6e51e8e9516e277db15c04a023aa
SHA1968e3f3da6c8690d5793720bdd4db56b2853161c
SHA256f46e8c166f5468c6080a265904c5438876c199036b495fc573ea492aba88a54a
SHA5125caabd237179dab8b61f7c8ff69b0fc153bb2c0940d62f4be4a102af3e35ee29a46a4a931463c93f79087f1f4775f5ad33ffe0f79544c3218215fc1c8d4a6be5
-
Filesize
1.0MB
MD5639b6e51e8e9516e277db15c04a023aa
SHA1968e3f3da6c8690d5793720bdd4db56b2853161c
SHA256f46e8c166f5468c6080a265904c5438876c199036b495fc573ea492aba88a54a
SHA5125caabd237179dab8b61f7c8ff69b0fc153bb2c0940d62f4be4a102af3e35ee29a46a4a931463c93f79087f1f4775f5ad33ffe0f79544c3218215fc1c8d4a6be5
-
Filesize
748KB
MD5a0958e3938074e2438d08d1a250cc0a6
SHA1a76f846283b49494c6233969855cff6a94ae2613
SHA2566b067299bcc62800759063833f1966bf81f291bcd43b49586a0ec64caeaf4496
SHA512bedca7c84711a3e0d5ccb77c520aa614aad51aa5ce97e5fdaf9a1b7f0ee8ddaf50a451fa9882973f67e00500627b9eb670c4b01cc2a84ec239606ced6da5cee8
-
Filesize
748KB
MD5a0958e3938074e2438d08d1a250cc0a6
SHA1a76f846283b49494c6233969855cff6a94ae2613
SHA2566b067299bcc62800759063833f1966bf81f291bcd43b49586a0ec64caeaf4496
SHA512bedca7c84711a3e0d5ccb77c520aa614aad51aa5ce97e5fdaf9a1b7f0ee8ddaf50a451fa9882973f67e00500627b9eb670c4b01cc2a84ec239606ced6da5cee8
-
Filesize
493KB
MD59973acf13c0e105bc55a9b9d4b512710
SHA10e39c921944014fead1f2fa6655aaa055434ae35
SHA256caa981c3af102abe7a544d6f4691b8a569988c6cbff1df662c11d6ee092b193c
SHA512d1403553247a5b4710010e16e9683a650c91ec75b2ce518bed95ca24dc5c4a70286f0d010546deb2f9a70feefe718ec5e838e6d81f87b736670ff20d94567c28
-
Filesize
493KB
MD59973acf13c0e105bc55a9b9d4b512710
SHA10e39c921944014fead1f2fa6655aaa055434ae35
SHA256caa981c3af102abe7a544d6f4691b8a569988c6cbff1df662c11d6ee092b193c
SHA512d1403553247a5b4710010e16e9683a650c91ec75b2ce518bed95ca24dc5c4a70286f0d010546deb2f9a70feefe718ec5e838e6d81f87b736670ff20d94567c28
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
448KB
MD58f0aa6bdc8d51cd4fa17bb2f3fe8b2f2
SHA1788318c06bd93c60149877fe06cd34805b8893b6
SHA256c2500efe89d25b6a0023a801c992054665b110b1d6dac9f4470e1b34a0f6ee38
SHA51271c8bdcbd8293d5f26dfe7fd886ac11734332767d9b448fa2a5bcf6d9253bc469f7c3b8f068381a7b50f6b061bcf15f7292264ab42ea3bf7b6d7ff1d72ee2b52
-
Filesize
448KB
MD58f0aa6bdc8d51cd4fa17bb2f3fe8b2f2
SHA1788318c06bd93c60149877fe06cd34805b8893b6
SHA256c2500efe89d25b6a0023a801c992054665b110b1d6dac9f4470e1b34a0f6ee38
SHA51271c8bdcbd8293d5f26dfe7fd886ac11734332767d9b448fa2a5bcf6d9253bc469f7c3b8f068381a7b50f6b061bcf15f7292264ab42ea3bf7b6d7ff1d72ee2b52
-
Filesize
448KB
MD58f0aa6bdc8d51cd4fa17bb2f3fe8b2f2
SHA1788318c06bd93c60149877fe06cd34805b8893b6
SHA256c2500efe89d25b6a0023a801c992054665b110b1d6dac9f4470e1b34a0f6ee38
SHA51271c8bdcbd8293d5f26dfe7fd886ac11734332767d9b448fa2a5bcf6d9253bc469f7c3b8f068381a7b50f6b061bcf15f7292264ab42ea3bf7b6d7ff1d72ee2b52
-
Filesize
448KB
MD58f0aa6bdc8d51cd4fa17bb2f3fe8b2f2
SHA1788318c06bd93c60149877fe06cd34805b8893b6
SHA256c2500efe89d25b6a0023a801c992054665b110b1d6dac9f4470e1b34a0f6ee38
SHA51271c8bdcbd8293d5f26dfe7fd886ac11734332767d9b448fa2a5bcf6d9253bc469f7c3b8f068381a7b50f6b061bcf15f7292264ab42ea3bf7b6d7ff1d72ee2b52
-
Filesize
448KB
MD58f0aa6bdc8d51cd4fa17bb2f3fe8b2f2
SHA1788318c06bd93c60149877fe06cd34805b8893b6
SHA256c2500efe89d25b6a0023a801c992054665b110b1d6dac9f4470e1b34a0f6ee38
SHA51271c8bdcbd8293d5f26dfe7fd886ac11734332767d9b448fa2a5bcf6d9253bc469f7c3b8f068381a7b50f6b061bcf15f7292264ab42ea3bf7b6d7ff1d72ee2b52
-
Filesize
448KB
MD58f0aa6bdc8d51cd4fa17bb2f3fe8b2f2
SHA1788318c06bd93c60149877fe06cd34805b8893b6
SHA256c2500efe89d25b6a0023a801c992054665b110b1d6dac9f4470e1b34a0f6ee38
SHA51271c8bdcbd8293d5f26dfe7fd886ac11734332767d9b448fa2a5bcf6d9253bc469f7c3b8f068381a7b50f6b061bcf15f7292264ab42ea3bf7b6d7ff1d72ee2b52