Analysis
-
max time kernel
210s -
max time network
207s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
13/09/2024, 18:27
Static task
static1
Behavioral task
behavioral1
Sample
Bloxstrap-v2.7.0.exe
Resource
win11-20240802-en
General
-
Target
Bloxstrap-v2.7.0.exe
-
Size
10.1MB
-
MD5
2c752edef5b0aa0962a3e01c4c82a2fa
-
SHA1
9c3afd1c63f2b0dbdc2dc487709471222d2cb81e
-
SHA256
891846bf656253ca1cdd28584a28681e9604e2a03d74cd6b99313e3bff11daf8
-
SHA512
04d25fe7d40c8c320ffc545a038ad6ea458df6a8a552b0e0393b369a03b9bf273c72f30169bd54e8eb10757c04bdddf3859c601c1eb9e1a12fe4d15658906dfe
-
SSDEEP
98304:TYd5DQd5Dk9Tsed5DogTrBKvGWD3nIOYoHwfLk3vSmaR0+Mc4AN0edaAHDfysrT4:Tasx3vG6IObAbN0T
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 5256 RobloxPlayerBeta.exe 7316 Bloxstrap.exe 5924 RobloxPlayerBeta.exe 3596 Bloxstrap.exe 2704 RobloxPlayerBeta.exe -
Loads dropped DLL 3 IoCs
pid Process 5256 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtCreateThreadExHideFromDebugger 3 IoCs
pid Process 5256 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 63 IoCs
pid Process 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe 5256 RobloxPlayerBeta.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe -
Modifies registry class 19 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox-player Bloxstrap-v2.7.0.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox-player\shell\open\command Bloxstrap-v2.7.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox-player\ = "URL: Roblox Protocol" Bloxstrap-v2.7.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox-player\URL Protocol Bloxstrap-v2.7.0.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox Bloxstrap-v2.7.0.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox\shell\open\command Bloxstrap-v2.7.0.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox\shell Bloxstrap-v2.7.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Bloxstrap\\Bloxstrap.exe" Bloxstrap-v2.7.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox-player\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Bloxstrap\\Bloxstrap.exe" Bloxstrap-v2.7.0.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox-player\DefaultIcon Bloxstrap-v2.7.0.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox-player\shell\open Bloxstrap-v2.7.0.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox\shell\open Bloxstrap-v2.7.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox\URL Protocol Bloxstrap-v2.7.0.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox-player\shell Bloxstrap-v2.7.0.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Key created \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox\DefaultIcon Bloxstrap-v2.7.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox\ = "URL: Roblox Protocol" Bloxstrap-v2.7.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Bloxstrap\\Bloxstrap.exe\" %1" Bloxstrap-v2.7.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-661032028-162657920-1226909816-1000_Classes\roblox-player\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Bloxstrap\\Bloxstrap.exe\" %1" Bloxstrap-v2.7.0.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 RobloxPlayerBeta.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RobloxPlayerBeta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 5256 RobloxPlayerBeta.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 7316 Bloxstrap.exe 7316 Bloxstrap.exe 5924 RobloxPlayerBeta.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 2572 Bloxstrap-v2.7.0.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2572 Bloxstrap-v2.7.0.exe Token: 33 8788 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 8788 AUDIODG.EXE Token: SeDebugPrivilege 7316 Bloxstrap.exe Token: SeDebugPrivilege 3596 Bloxstrap.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 3596 Bloxstrap.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2572 Bloxstrap-v2.7.0.exe 7316 Bloxstrap.exe 3596 Bloxstrap.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3544 MiniSearchHost.exe -
Suspicious use of UnmapMainImage 3 IoCs
pid Process 5256 RobloxPlayerBeta.exe 5924 RobloxPlayerBeta.exe 2704 RobloxPlayerBeta.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2572 wrote to memory of 5256 2572 Bloxstrap-v2.7.0.exe 83 PID 2572 wrote to memory of 5256 2572 Bloxstrap-v2.7.0.exe 83 PID 7316 wrote to memory of 5924 7316 Bloxstrap.exe 103 PID 7316 wrote to memory of 5924 7316 Bloxstrap.exe 103 PID 3596 wrote to memory of 2704 3596 Bloxstrap.exe 107 PID 3596 wrote to memory of 2704 3596 Bloxstrap.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bloxstrap-v2.7.0.exe"C:\Users\Admin\AppData\Local\Temp\Bloxstrap-v2.7.0.exe"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-43ad1853ad91427d\RobloxPlayerBeta.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-43ad1853ad91427d\RobloxPlayerBeta.exe" --app -channel production2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:5256
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:3192
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004B8 0x00000000000004C41⤵
- Suspicious use of AdjustPrivilegeToken
PID:8788
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DevicesFlow -s DevicesFlowUserSvc1⤵PID:9200
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:3308
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:4528
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:7316 -
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-43ad1853ad91427d\RobloxPlayerBeta.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-43ad1853ad91427d\RobloxPlayerBeta.exe" --app -channel production2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:5924
-
-
C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-43ad1853ad91427d\RobloxPlayerBeta.exe"C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-43ad1853ad91427d\RobloxPlayerBeta.exe" --app -channel production2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of UnmapMainImage
PID:2704
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.1MB
MD52c752edef5b0aa0962a3e01c4c82a2fa
SHA19c3afd1c63f2b0dbdc2dc487709471222d2cb81e
SHA256891846bf656253ca1cdd28584a28681e9604e2a03d74cd6b99313e3bff11daf8
SHA51204d25fe7d40c8c320ffc545a038ad6ea458df6a8a552b0e0393b369a03b9bf273c72f30169bd54e8eb10757c04bdddf3859c601c1eb9e1a12fe4d15658906dfe
-
Filesize
79B
MD5eab6dcc312473d43c2fa8cc41280d79c
SHA1b4e9ec7e579d06dfcaa5ac616de2751308a153c3
SHA2560a27d3c9100ab7ab6f03c45daeb0f0cd586f3aeb59daf7986e853f9614e954fe
SHA5121ce0fdc237110d644bcc8238f184554f25813ccf7142fd312ce96fbb6659081db677b04485bf66d52100136da6bb9688e48b1287455725c7b4950153aa2a4595
-
C:\Users\Admin\AppData\Local\Bloxstrap\Modifications\content\textures\Cursors\KeyboardMouse\ArrowFarCursor.png
Filesize235B
MD5acd9e073f889363b3ebd9f7cc5c59c02
SHA1d6f667a7706bb4c19634f7db37d0a8db31d73cfd
SHA2567ff3078f857af8d09824c1091170eb991cc3cc32798a17667d45c813fa606388
SHA51208c944cefab8979dab2796c1fc94f8ac5f22f46b524d940afc7ea2d47872d3239de5bf04fcc577d4ff2931574318524a430e9484b815941c14346d46281211a5
-
Filesize
714B
MD572236361f82f124698574209fbc09807
SHA1423255ec63e552339c81ab8109c5fa5cb29f4c80
SHA256d4098b3e4d600370dfadb50136dc28e2f96e95779f112bb035806278924cdc86
SHA512b47645d047b0dfa2beb4c0455ad4b20a6434ed736000b37034a1cc9e162b91c75a63e95607e5f93cec755213d925d1044a98cfc221fd27d1cdcb6c4d10023acc
-
Filesize
406B
MD57ff31d80641b40942a6a454553200dcb
SHA1b361b6ddaef55077557d0709fd338cc5fe4e4456
SHA256f8b1ed238d697325d4ca34272af0ef25b983fee92a27efc706d7d7d02e03bdc5
SHA512736da931f7d136036bc1d473374942ac78c2d39a3b63f70b08b72ad1fc9b72f5aebf1a7438b9d91e7e5e8d985bd5381a04a826a9b004118a414207d6a2f8dc99
-
Filesize
19.0MB
MD5c2bde2217e783b033ebed99c727029c2
SHA197ea2a15f34f15b43b6bb6ef246d0f04bd37e406
SHA2562978eb1d2271311f300f27d2b30689c9857338c72683b52d3d5a02e8b0c6dd89
SHA51286b96dfec2f1500e3a94bfe8146bfa430ad000e9392faa072070f9e1d947b5263b76b714043bd92236799e9fc4500913575e7c44f85269bfe7440e1ad81d0a9b
-
Filesize
6KB
MD59404c52d6f311da02d65d4320bfebb59
SHA10b5b5c2e7c631894953d5828fec06bdf6adba55f
SHA256c9775e361392877d1d521d0450a5368ee92d37dc542bc5e514373c9d5003f317
SHA51222aa1acbcdcf56f571170d9c32fd0d025c50936387203a7827dbb925f352d2bc082a8a79db61c2d1f1795ad979e93367c80205d9141b73d806ae08fa089837c4
-
C:\Users\Admin\AppData\Local\Bloxstrap\Versions\version-43ad1853ad91427d\content\textures\Cursors\KeyboardMouse\ArrowCursor.png
Filesize232B
MD5126ac632390df9aa91ee259d80c98a2a
SHA10e1016a9e8cf4914adba426414acd81e57567a7c
SHA2560ab24d553e82033f2333d6b6bbd22ba387f2a1a31565a1dba808ee50415f4934
SHA5123fb86c0a42482a37fa588bfbb0143fc1d96982a68675e9a745ce6520fd5178ef9a979e8bfc8f77352b25b8660e41f6b74aedde6623ad9e792d8b5187227de614
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5198f782de35af7a91fe69620c36b5678
SHA1dc32e8b9a6b01dcca84af8d429f51f9751c05666
SHA256bad741c6cbdf43ee030b033d3f6d879be5a0df6089425fe135f648bf5b5afae5
SHA512eaa1b075328a024209813bd628e82dea85e47a08c47a463025e0aaad3139125259a4e5a1d1de8d33a0fc01aea6a56fd106bd64c3a61ef3ed4ef9fba777e7b43e
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5cb7f12dcfdc6b608d86b97369da20559
SHA1a0c46e2add40a9688adec2f4b935fb6995b708b7
SHA2569fc7074def0916577b2407558a84bf96a9275f88a0bc825f531abcd6b946d997
SHA512a252846389d80fdba0998b5dba13a8fa4b42c7e76fdc5de39c6741e6bf99baf05b0ef31dda6621f697eb4aaaa2241210a6ac33b96ba291e2394092a2ebc73cce