Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 18:59
Static task
static1
Behavioral task
behavioral1
Sample
1b690b07da320ba1263eeadaae44d990N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1b690b07da320ba1263eeadaae44d990N.exe
Resource
win10v2004-20240802-en
General
-
Target
1b690b07da320ba1263eeadaae44d990N.exe
-
Size
328KB
-
MD5
1b690b07da320ba1263eeadaae44d990
-
SHA1
7479d5abe7c5f6018ef097f73f8336cd05494cb2
-
SHA256
16395b6495c17fcc6dd834b399b1acdc672b8320a6248860a2a25638720b2c87
-
SHA512
622a87647867eff95eabaad5c519079ab495d8ebc460e6a51f23171e3722db2088038a7d2fbc3599a0772374d015492ad084813d6f4ac73c26433a673293c11e
-
SSDEEP
6144:J2XgY8FFX7Z6A/P352p4gFs/e8PeAZuon2T5T7UcIGMAQTeJ:J2X1cFx/PAp4ks/e6Fn2dEZGjQSJ
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\conhost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\conhost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\conhost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 1b690b07da320ba1263eeadaae44d990N.exe -
Executes dropped EXE 4 IoCs
pid Process 1508 1b690b07da320ba1263eeadaae44d990N.exe 2520 conhost.exe 2736 conhost.exe 2248 conhost.exe -
resource yara_rule behavioral2/memory/1508-7-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1508-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1508-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1508-12-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1508-38-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2248-51-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2248-54-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2248-56-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/1508-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2736-67-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2248-68-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2248-72-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2248-75-0x0000000000400000-0x000000000047B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Console Window Host = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\conhost.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1724 set thread context of 1508 1724 1b690b07da320ba1263eeadaae44d990N.exe 88 PID 2520 set thread context of 2736 2520 conhost.exe 100 PID 2520 set thread context of 2248 2520 conhost.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b690b07da320ba1263eeadaae44d990N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b690b07da320ba1263eeadaae44d990N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2524 reg.exe 432 reg.exe 8 reg.exe 5016 reg.exe -
Suspicious use of AdjustPrivilegeToken 61 IoCs
description pid Process Token: 1 2248 conhost.exe Token: SeCreateTokenPrivilege 2248 conhost.exe Token: SeAssignPrimaryTokenPrivilege 2248 conhost.exe Token: SeLockMemoryPrivilege 2248 conhost.exe Token: SeIncreaseQuotaPrivilege 2248 conhost.exe Token: SeMachineAccountPrivilege 2248 conhost.exe Token: SeTcbPrivilege 2248 conhost.exe Token: SeSecurityPrivilege 2248 conhost.exe Token: SeTakeOwnershipPrivilege 2248 conhost.exe Token: SeLoadDriverPrivilege 2248 conhost.exe Token: SeSystemProfilePrivilege 2248 conhost.exe Token: SeSystemtimePrivilege 2248 conhost.exe Token: SeProfSingleProcessPrivilege 2248 conhost.exe Token: SeIncBasePriorityPrivilege 2248 conhost.exe Token: SeCreatePagefilePrivilege 2248 conhost.exe Token: SeCreatePermanentPrivilege 2248 conhost.exe Token: SeBackupPrivilege 2248 conhost.exe Token: SeRestorePrivilege 2248 conhost.exe Token: SeShutdownPrivilege 2248 conhost.exe Token: SeDebugPrivilege 2248 conhost.exe Token: SeAuditPrivilege 2248 conhost.exe Token: SeSystemEnvironmentPrivilege 2248 conhost.exe Token: SeChangeNotifyPrivilege 2248 conhost.exe Token: SeRemoteShutdownPrivilege 2248 conhost.exe Token: SeUndockPrivilege 2248 conhost.exe Token: SeSyncAgentPrivilege 2248 conhost.exe Token: SeEnableDelegationPrivilege 2248 conhost.exe Token: SeManageVolumePrivilege 2248 conhost.exe Token: SeImpersonatePrivilege 2248 conhost.exe Token: SeCreateGlobalPrivilege 2248 conhost.exe Token: 31 2248 conhost.exe Token: 32 2248 conhost.exe Token: 33 2248 conhost.exe Token: 34 2248 conhost.exe Token: 35 2248 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe Token: SeDebugPrivilege 2736 conhost.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1724 1b690b07da320ba1263eeadaae44d990N.exe 1508 1b690b07da320ba1263eeadaae44d990N.exe 2520 conhost.exe 2736 conhost.exe 2248 conhost.exe 2248 conhost.exe 2248 conhost.exe 2248 conhost.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1508 1724 1b690b07da320ba1263eeadaae44d990N.exe 88 PID 1724 wrote to memory of 1508 1724 1b690b07da320ba1263eeadaae44d990N.exe 88 PID 1724 wrote to memory of 1508 1724 1b690b07da320ba1263eeadaae44d990N.exe 88 PID 1724 wrote to memory of 1508 1724 1b690b07da320ba1263eeadaae44d990N.exe 88 PID 1724 wrote to memory of 1508 1724 1b690b07da320ba1263eeadaae44d990N.exe 88 PID 1724 wrote to memory of 1508 1724 1b690b07da320ba1263eeadaae44d990N.exe 88 PID 1724 wrote to memory of 1508 1724 1b690b07da320ba1263eeadaae44d990N.exe 88 PID 1724 wrote to memory of 1508 1724 1b690b07da320ba1263eeadaae44d990N.exe 88 PID 1508 wrote to memory of 2664 1508 1b690b07da320ba1263eeadaae44d990N.exe 89 PID 1508 wrote to memory of 2664 1508 1b690b07da320ba1263eeadaae44d990N.exe 89 PID 1508 wrote to memory of 2664 1508 1b690b07da320ba1263eeadaae44d990N.exe 89 PID 2664 wrote to memory of 3580 2664 cmd.exe 92 PID 2664 wrote to memory of 3580 2664 cmd.exe 92 PID 2664 wrote to memory of 3580 2664 cmd.exe 92 PID 1508 wrote to memory of 2520 1508 1b690b07da320ba1263eeadaae44d990N.exe 93 PID 1508 wrote to memory of 2520 1508 1b690b07da320ba1263eeadaae44d990N.exe 93 PID 1508 wrote to memory of 2520 1508 1b690b07da320ba1263eeadaae44d990N.exe 93 PID 2520 wrote to memory of 2736 2520 conhost.exe 100 PID 2520 wrote to memory of 2736 2520 conhost.exe 100 PID 2520 wrote to memory of 2736 2520 conhost.exe 100 PID 2520 wrote to memory of 2736 2520 conhost.exe 100 PID 2520 wrote to memory of 2736 2520 conhost.exe 100 PID 2520 wrote to memory of 2736 2520 conhost.exe 100 PID 2520 wrote to memory of 2736 2520 conhost.exe 100 PID 2520 wrote to memory of 2736 2520 conhost.exe 100 PID 2520 wrote to memory of 2248 2520 conhost.exe 101 PID 2520 wrote to memory of 2248 2520 conhost.exe 101 PID 2520 wrote to memory of 2248 2520 conhost.exe 101 PID 2520 wrote to memory of 2248 2520 conhost.exe 101 PID 2520 wrote to memory of 2248 2520 conhost.exe 101 PID 2520 wrote to memory of 2248 2520 conhost.exe 101 PID 2520 wrote to memory of 2248 2520 conhost.exe 101 PID 2520 wrote to memory of 2248 2520 conhost.exe 101 PID 2248 wrote to memory of 1968 2248 conhost.exe 102 PID 2248 wrote to memory of 1968 2248 conhost.exe 102 PID 2248 wrote to memory of 1968 2248 conhost.exe 102 PID 2248 wrote to memory of 4472 2248 conhost.exe 103 PID 2248 wrote to memory of 4472 2248 conhost.exe 103 PID 2248 wrote to memory of 4472 2248 conhost.exe 103 PID 2248 wrote to memory of 1784 2248 conhost.exe 104 PID 2248 wrote to memory of 1784 2248 conhost.exe 104 PID 2248 wrote to memory of 1784 2248 conhost.exe 104 PID 2248 wrote to memory of 5008 2248 conhost.exe 106 PID 2248 wrote to memory of 5008 2248 conhost.exe 106 PID 2248 wrote to memory of 5008 2248 conhost.exe 106 PID 1968 wrote to memory of 5016 1968 cmd.exe 110 PID 1968 wrote to memory of 5016 1968 cmd.exe 110 PID 1968 wrote to memory of 5016 1968 cmd.exe 110 PID 5008 wrote to memory of 8 5008 cmd.exe 111 PID 5008 wrote to memory of 8 5008 cmd.exe 111 PID 5008 wrote to memory of 8 5008 cmd.exe 111 PID 4472 wrote to memory of 2524 4472 cmd.exe 112 PID 4472 wrote to memory of 2524 4472 cmd.exe 112 PID 4472 wrote to memory of 2524 4472 cmd.exe 112 PID 1784 wrote to memory of 432 1784 cmd.exe 113 PID 1784 wrote to memory of 432 1784 cmd.exe 113 PID 1784 wrote to memory of 432 1784 cmd.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b690b07da320ba1263eeadaae44d990N.exe"C:\Users\Admin\AppData\Local\Temp\1b690b07da320ba1263eeadaae44d990N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\1b690b07da320ba1263eeadaae44d990N.exe"C:\Users\Admin\AppData\Local\Temp\1b690b07da320ba1263eeadaae44d990N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NVJUK.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Console Window Host" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3580
-
-
-
C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2736
-
-
C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5016
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2524
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:432
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\conhost.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\conhost.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:8
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD51b690b07da320ba1263eeadaae44d990
SHA17479d5abe7c5f6018ef097f73f8336cd05494cb2
SHA25616395b6495c17fcc6dd834b399b1acdc672b8320a6248860a2a25638720b2c87
SHA512622a87647867eff95eabaad5c519079ab495d8ebc460e6a51f23171e3722db2088038a7d2fbc3599a0772374d015492ad084813d6f4ac73c26433a673293c11e
-
Filesize
154B
MD50d0a854e96bddf0e7df7f5f024674226
SHA1f45ca9c7f935422ddfb0550febdfc7a09baf2d98
SHA2565bab0b5c3ef8a28a7246854074a5a469c602a10ac803d18f2102399597d35907
SHA5128b6db387b3bb5774c691bcdd4d9f3a147e1556eee89fe1de929464510c01b14495157c14cbb355fc850b79dee500b8be7ae7a0c3b5ea0916d6eb9154f9ae73a8
-
Filesize
328KB
MD5244d1acd884b0c0519d86ad0fbf0451c
SHA169cbae00d955fdeae824a55384dfbad1906ddf1b
SHA256823aeb361e7896e9dec5b0f0d946cc063580157701ade97b6576ee1cba949c7c
SHA512159802ea2870fe36a3c8996469899f80b42a241f532e816c7d04936ea7e2d50dd8a6589e9f1f5ac5fada7312921ce1aa9b92bf758dff752d7149799e7db94ab0