Analysis
-
max time kernel
165s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 09:09
Static task
static1
Behavioral task
behavioral1
Sample
4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe
Resource
win10v2004-20240226-en
General
-
Target
4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe
-
Size
8.1MB
-
MD5
ac8a5010569727ed6f4d02cbb4dc7879
-
SHA1
6a7ed927eb14e661d01b707bf9454a28f962b3dc
-
SHA256
4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1
-
SHA512
8b14647d6d3d82fec3a83c680b1371dae5ead249e5b7b068bbd713cd157c85f58afc51eaa08c6fd82a70e3858a7d472e11ddd688223d5fa8cc54109750a07d8b
-
SSDEEP
196608:BGRahMaJLQTXCZ6z02V2eipAVpEXGpJYChuRGApVh:EtaJUeYzZV2eipApTER3bh
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation MSID335.tmp Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation MSI3FDB.tmp Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation MSI50E4.tmp -
Executes dropped EXE 9 IoCs
pid Process 2980 4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe 2160 MSI5AC8.tmp 1956 MSID335.tmp 1356 Liberate.exe 4536 MSI3FDB.tmp 4496 pr.exe 572 MSI4C40.tmp 3452 MSI50E4.tmp 2188 k.exe -
resource yara_rule behavioral2/files/0x0004000000000717-77.dat upx behavioral2/memory/1356-85-0x0000000000400000-0x000000000053E000-memory.dmp upx behavioral2/memory/1356-138-0x0000000000400000-0x000000000053E000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: MSIEXEC.EXE File opened (read-only) \??\X: MSIEXEC.EXE File opened (read-only) \??\H: MSIEXEC.EXE File opened (read-only) \??\J: MSIEXEC.EXE File opened (read-only) \??\G: MSIEXEC.EXE File opened (read-only) \??\M: MSIEXEC.EXE File opened (read-only) \??\T: MSIEXEC.EXE File opened (read-only) \??\Y: MSIEXEC.EXE File opened (read-only) \??\Z: MSIEXEC.EXE File opened (read-only) \??\B: MSIEXEC.EXE File opened (read-only) \??\E: MSIEXEC.EXE File opened (read-only) \??\L: MSIEXEC.EXE File opened (read-only) \??\Q: MSIEXEC.EXE File opened (read-only) \??\A: MSIEXEC.EXE File opened (read-only) \??\K: MSIEXEC.EXE File opened (read-only) \??\O: MSIEXEC.EXE File opened (read-only) \??\P: MSIEXEC.EXE File opened (read-only) \??\S: MSIEXEC.EXE File opened (read-only) \??\U: MSIEXEC.EXE File opened (read-only) \??\V: MSIEXEC.EXE File opened (read-only) \??\W: MSIEXEC.EXE File opened (read-only) \??\I: MSIEXEC.EXE File opened (read-only) \??\N: MSIEXEC.EXE -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 56 iplogger.org 57 iplogger.org 63 iplogger.org -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000400000000073d-94.dat autoit_exe behavioral2/files/0x0004000000000743-115.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2472 dllhost.exe 2472 dllhost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2188 set thread context of 5116 2188 k.exe 114 PID 4496 set thread context of 2472 4496 pr.exe 115 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2064 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 4732 MSIEXEC.EXE Token: SeIncreaseQuotaPrivilege 4732 MSIEXEC.EXE Token: SeSecurityPrivilege 4144 msiexec.exe Token: SeCreateTokenPrivilege 4732 MSIEXEC.EXE Token: SeAssignPrimaryTokenPrivilege 4732 MSIEXEC.EXE Token: SeLockMemoryPrivilege 4732 MSIEXEC.EXE Token: SeIncreaseQuotaPrivilege 4732 MSIEXEC.EXE Token: SeMachineAccountPrivilege 4732 MSIEXEC.EXE Token: SeTcbPrivilege 4732 MSIEXEC.EXE Token: SeSecurityPrivilege 4732 MSIEXEC.EXE Token: SeTakeOwnershipPrivilege 4732 MSIEXEC.EXE Token: SeLoadDriverPrivilege 4732 MSIEXEC.EXE Token: SeSystemProfilePrivilege 4732 MSIEXEC.EXE Token: SeSystemtimePrivilege 4732 MSIEXEC.EXE Token: SeProfSingleProcessPrivilege 4732 MSIEXEC.EXE Token: SeIncBasePriorityPrivilege 4732 MSIEXEC.EXE Token: SeCreatePagefilePrivilege 4732 MSIEXEC.EXE Token: SeCreatePermanentPrivilege 4732 MSIEXEC.EXE Token: SeBackupPrivilege 4732 MSIEXEC.EXE Token: SeRestorePrivilege 4732 MSIEXEC.EXE Token: SeShutdownPrivilege 4732 MSIEXEC.EXE Token: SeDebugPrivilege 4732 MSIEXEC.EXE Token: SeAuditPrivilege 4732 MSIEXEC.EXE Token: SeSystemEnvironmentPrivilege 4732 MSIEXEC.EXE Token: SeChangeNotifyPrivilege 4732 MSIEXEC.EXE Token: SeRemoteShutdownPrivilege 4732 MSIEXEC.EXE Token: SeUndockPrivilege 4732 MSIEXEC.EXE Token: SeSyncAgentPrivilege 4732 MSIEXEC.EXE Token: SeEnableDelegationPrivilege 4732 MSIEXEC.EXE Token: SeManageVolumePrivilege 4732 MSIEXEC.EXE Token: SeImpersonatePrivilege 4732 MSIEXEC.EXE Token: SeCreateGlobalPrivilege 4732 MSIEXEC.EXE Token: SeDebugPrivilege 2160 MSI5AC8.tmp Token: SeDebugPrivilege 572 MSI4C40.tmp -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 4732 MSIEXEC.EXE 4496 pr.exe 4496 pr.exe 4496 pr.exe 2188 k.exe 2188 k.exe 2188 k.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 4496 pr.exe 4496 pr.exe 4496 pr.exe 2188 k.exe 2188 k.exe 2188 k.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2980 1680 4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe 91 PID 1680 wrote to memory of 2980 1680 4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe 91 PID 1680 wrote to memory of 2980 1680 4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe 91 PID 2980 wrote to memory of 4732 2980 4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe 94 PID 2980 wrote to memory of 4732 2980 4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe 94 PID 2980 wrote to memory of 4732 2980 4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe 94 PID 4732 wrote to memory of 2160 4732 MSIEXEC.EXE 105 PID 4732 wrote to memory of 2160 4732 MSIEXEC.EXE 105 PID 4732 wrote to memory of 1956 4732 MSIEXEC.EXE 106 PID 4732 wrote to memory of 1956 4732 MSIEXEC.EXE 106 PID 4732 wrote to memory of 1956 4732 MSIEXEC.EXE 106 PID 1956 wrote to memory of 1356 1956 MSID335.tmp 107 PID 1956 wrote to memory of 1356 1956 MSID335.tmp 107 PID 1956 wrote to memory of 1356 1956 MSID335.tmp 107 PID 4732 wrote to memory of 4536 4732 MSIEXEC.EXE 108 PID 4732 wrote to memory of 4536 4732 MSIEXEC.EXE 108 PID 4732 wrote to memory of 4536 4732 MSIEXEC.EXE 108 PID 4536 wrote to memory of 4496 4536 MSI3FDB.tmp 109 PID 4536 wrote to memory of 4496 4536 MSI3FDB.tmp 109 PID 4536 wrote to memory of 4496 4536 MSI3FDB.tmp 109 PID 4732 wrote to memory of 572 4732 MSIEXEC.EXE 110 PID 4732 wrote to memory of 572 4732 MSIEXEC.EXE 110 PID 4732 wrote to memory of 3452 4732 MSIEXEC.EXE 111 PID 4732 wrote to memory of 3452 4732 MSIEXEC.EXE 111 PID 4732 wrote to memory of 3452 4732 MSIEXEC.EXE 111 PID 3452 wrote to memory of 2188 3452 MSI50E4.tmp 112 PID 3452 wrote to memory of 2188 3452 MSI50E4.tmp 112 PID 3452 wrote to memory of 2188 3452 MSI50E4.tmp 112 PID 2188 wrote to memory of 4468 2188 k.exe 113 PID 2188 wrote to memory of 4468 2188 k.exe 113 PID 2188 wrote to memory of 4468 2188 k.exe 113 PID 2188 wrote to memory of 5116 2188 k.exe 114 PID 2188 wrote to memory of 5116 2188 k.exe 114 PID 2188 wrote to memory of 5116 2188 k.exe 114 PID 2188 wrote to memory of 5116 2188 k.exe 114 PID 2188 wrote to memory of 5116 2188 k.exe 114 PID 4496 wrote to memory of 2472 4496 pr.exe 115 PID 4496 wrote to memory of 2472 4496 pr.exe 115 PID 4496 wrote to memory of 2472 4496 pr.exe 115 PID 4496 wrote to memory of 2472 4496 pr.exe 115 PID 4496 wrote to memory of 2472 4496 pr.exe 115 PID 5116 wrote to memory of 2064 5116 dllhost.exe 116 PID 5116 wrote to memory of 2064 5116 dllhost.exe 116 PID 5116 wrote to memory of 2064 5116 dllhost.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe"C:\Users\Admin\AppData\Local\Temp\4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\{E25F3476-F3F8-44A8-9B1A-53C087E3BBCF}\4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exeC:\Users\Admin\AppData\Local\Temp\{E25F3476-F3F8-44A8-9B1A-53C087E3BBCF}\4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe /q"C:\Users\Admin\AppData\Local\Temp\4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe" /tempdisk1folder"C:\Users\Admin\AppData\Local\Temp\{E25F3476-F3F8-44A8-9B1A-53C087E3BBCF}" /IS_temp2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\MSIEXEC.EXE"C:\Windows\system32\MSIEXEC.EXE" /i "C:\Users\Admin\AppData\Local\Downloaded Installations\{563AE6FA-277B-44A5-9B6F-AF247F4FEDFA}\Clean Disk.msi" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe"3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\MSI5AC8.tmp"C:\Users\Admin\AppData\Local\Temp\MSI5AC8.tmp"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\MSID335.tmp"C:\Users\Admin\AppData\Local\Temp\MSID335.tmp" -p123 -s14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\Liberate.exe"C:\Users\Admin\AppData\Local\Temp\Liberate.exe"5⤵
- Executes dropped EXE
PID:1356
-
-
-
C:\Users\Admin\AppData\Local\Temp\MSI3FDB.tmp"C:\Users\Admin\AppData\Local\Temp\MSI3FDB.tmp" -p123 -s14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\pr.exe"C:\Users\Admin\AppData\Local\Temp\pr.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"6⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2472
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\MSI4C40.tmp"C:\Users\Admin\AppData\Local\Temp\MSI4C40.tmp"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\MSI50E4.tmp"C:\Users\Admin\AppData\Local\Temp\MSI50E4.tmp" -p123 -s14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\k.exe"C:\Users\Admin\AppData\Local\Temp\k.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"6⤵PID:4468
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /tn "Microsoft LocalManager [2124359457]" /f /tr "C:\ProgramData\{52114825-5211-5211-521148253222}\csrss.exe"7⤵
- Scheduled Task/Job: Scheduled Task
PID:2064
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4456 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵PID:3200
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Downloaded Installations\{563AE6FA-277B-44A5-9B6F-AF247F4FEDFA}\Clean Disk.msi
Filesize8.3MB
MD59c2309c593fad53ec720fedce3fb5c8e
SHA13ad0e41943d3cf9ccef04b1762b6f7c2bb2ad904
SHA2562431a89eef494a81f90a49eb7527af3936abd482d12a4ac7b4c51ae5aa33b277
SHA512aafe5cb6c828b5d908152e32eb3ff5c11d7dc14c4fae8adfec4f7f6a1dba3a66be1d4403758bed9366df83da33dc2eceea6b802017c18c575f47c26819925368
-
Filesize
1.0MB
MD50d7423d9dff6fc646258db3d76299d4b
SHA11ee2d2590896ff7f116574e68039ead6ecafed17
SHA256c0127722274b1b821443ee5d6a8f59e7d01e75eb32c41b8a74a11e950d6bbf80
SHA5120879a41834683637108c3084d82e09d3d5734b27926343ddbeafd2f004458259405922b749980cf80c543b67031784eceb9711e3e9add2c6879e57122023edea
-
Filesize
1.1MB
MD5ca56bd7ba051293c3d2babe1003cc651
SHA15f3dae90ba6e164b72f62932b68d0ae0e1f704dd
SHA2568b594f54fa32110651fd1c6400e2ac9fbbd7c0e044b32541f108e7f7807abed4
SHA5121302abe62f2d7a66d08e902f3421d70c1250e2668fe857e3ee9667b6ce1e156273483c735f453b84c52612ee4b3e6323c2fd329dd1c9abfede1d1dda035264b0
-
Filesize
3KB
MD50634017ef4a1379813b2cd3eeca507d1
SHA1389b0af56a4838a70464d1ef7354e937896bae2a
SHA2562878125aaa2e55b29add1c9a6c40be233d9cfe64db9ace9ef240650acfa492c1
SHA512a8d4ee7d880769e04b553549b217b28f177632dee557aa25f39fe24b8d49ff8417619c6f9ddd7c7af7b4a53a32687e86dd5211272dbd08e4e6d62f8abf4bb063
-
Filesize
840KB
MD53f90fcdd9d8fa0ae2bd61d63c120b3b4
SHA194844ed3edfbd5a46abb484e828a702a46693c79
SHA256b3dbec31b0ca9b49c81e86534b922464ad82322258cf47045e668f1ff5c6403a
SHA51253c274beefcdfb331f668b64d60d9d71f5eab982368ad17cc8dda2dba2084dace7e177bfca5c586e539fc973fd6d04ad15ac72d83c36effc3cbab5df0e0e2e10
-
Filesize
3KB
MD5139e7199a5c31ba3fae8e7a94e135bb4
SHA17809aeb1a7cfe7492822aa80737fda974d4edec8
SHA25692ca2d934ba80bbc1ef5466dc6e90e8e0804889927cec62058fd24a765202c1c
SHA512040f19dea675f4e799359dd3743477e23a42108899307a0116cba762c5026c4c1cfb4704d9b825606c7d8e7daae3ac812dde60fc199bebc873cd7228e90f3846
-
Filesize
1.3MB
MD565e67a0211457c36338c27f72d762ae7
SHA12cbeb1d7e1ad7f60f9fb00aa4ebc3dbf6420f9dd
SHA25646f14ec5e746a0fd09b608b2cb4e3d9210cda157b52ddc0d11dad2c79c9e4a0a
SHA512057f5586a5b88baa0f0165fd8831af39a682f0d646c80386a0d60d0e0306d33ddfda30e51f8dad789cb5a8f926d8a1bcc7ac28ef3332518b295b36af88f564f6
-
Filesize
1.0MB
MD5cba4446c336e398cef837616b4185d7f
SHA1fe3282b3957c43d07cef73387472a8c93208b7de
SHA25671e3ec12db6d20afe28fecd1cf5214eb1e8da892719a5423b24688dff457c81c
SHA5121a3f6d4988fb440e83a04e182c96d9888a9223509a70c8981d3355bf2bab01ad8128a2a5c2882195591e5f1e124f00a926189671acc2ac0d765752e59a7b0132
-
Filesize
1.6MB
MD58c935578b2abbbc7171b4d4170975726
SHA1232fd0abd6a58547231fc1208cdd4c5fb8b094b8
SHA256d8f1221aa0e684c9dee0a0798319bf13c9f52bcc1be7ce73d51a71844835a3e6
SHA5127fbb35f0a6d1a86146616489fb6c65808d19611971b346b0f1204ebcbff99435513af480752d0fcf201b7fbc389a3399108d61c07c80f14a1afe2eac041bdbc0
-
Filesize
21KB
MD5a108f0030a2cda00405281014f897241
SHA1d112325fa45664272b08ef5e8ff8c85382ebb991
SHA2568b76df0ffc9a226b532b60936765b852b89780c6e475c152f7c320e085e43948
SHA512d83894b039316c38915a789920758664257680dcb549a9b740cf5361addbee4d4a96a3ff2999b5d8acfb1d9336da055ec20012d29a9f83ee5459f103fbeec298
-
C:\Users\Admin\AppData\Local\Temp\{E25F3476-F3F8-44A8-9B1A-53C087E3BBCF}\4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe
Filesize8.1MB
MD5ac8a5010569727ed6f4d02cbb4dc7879
SHA16a7ed927eb14e661d01b707bf9454a28f962b3dc
SHA2564af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1
SHA5128b14647d6d3d82fec3a83c680b1371dae5ead249e5b7b068bbd713cd157c85f58afc51eaa08c6fd82a70e3858a7d472e11ddd688223d5fa8cc54109750a07d8b
-
Filesize
828B
MD5795f22b3cebda39cf3a5ffb29aea8716
SHA12502807eadddcc0013e586a6358ad30f917ba93d
SHA256ccf0183310651c6122f8a0ebc7849b0a23aa00a6ef5670ae4a555456d1b093e8
SHA512a827e3ac2304c8d65b061196565823ffa6ab70b335814ae3c2063e577e47e1bb1e9f1fe4dd35c552776e8ae903de81cb8727c42874f4ec626b2446169e0e82c1
-
Filesize
5KB
MD564e8655efa105f9108d52951a55e9131
SHA1faf90f80d6878746675e16a006be0831fe2e0177
SHA25629829bcf5233d5b12bff852a2828b47045a9e33c35533966fa2b6673c25f5c2e
SHA512ac0322c37ce1d45cba0978f51b68da34ed7966d6d6a3dda6f900a97a127407d675dc46d84a1f7f98ef21e5fed21e0ff20f1641c2fc5a0c9c7cb7f4defdc61b4e