Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 23:54
Static task
static1
Behavioral task
behavioral1
Sample
69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe
Resource
win7-20240903-en
General
-
Target
69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe
-
Size
295KB
-
MD5
52df9cab71705d8d32c8ca7a96512048
-
SHA1
db1d09febfdc83b7596a69662a7fb399a0c1a09e
-
SHA256
69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97
-
SHA512
ba111aec77fc17e531601edd86c1f3fd889fb7fa83a8015c289380c59c2b7f156f9cc83f97070f3862a64e2ecd4a202dd9cfc909135194a0aeae0d9c3f863a3b
-
SSDEEP
6144:XpLqdufVUEAkC5sqDgJqBV+UdvrEFp7hKXc:5FUEAf2qBjvrEH7uc
Malware Config
Signatures
-
Floxif family
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Detects Floxif payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000012102-2.dat floxif -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0008000000012102-2.dat acprotect -
Executes dropped EXE 6 IoCs
pid Process 2700 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2820 icsys.icn.exe 2892 explorer.exe 2580 spoolsv.exe 2280 svchost.exe 692 spoolsv.exe -
Loads dropped DLL 7 IoCs
pid Process 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2820 icsys.icn.exe 2892 explorer.exe 2580 spoolsv.exe 2280 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
resource yara_rule behavioral1/memory/2148-4-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/files/0x0008000000012102-2.dat upx behavioral1/memory/2148-61-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2148-70-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1672 schtasks.exe 2308 schtasks.exe 2512 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2820 icsys.icn.exe 2820 icsys.icn.exe 2820 icsys.icn.exe 2820 icsys.icn.exe 2820 icsys.icn.exe 2820 icsys.icn.exe 2820 icsys.icn.exe 2820 icsys.icn.exe 2820 icsys.icn.exe 2820 icsys.icn.exe 2820 icsys.icn.exe 2820 icsys.icn.exe 2820 icsys.icn.exe 2820 icsys.icn.exe 2820 icsys.icn.exe 2820 icsys.icn.exe 2820 icsys.icn.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2280 svchost.exe 2280 svchost.exe 2280 svchost.exe 2280 svchost.exe 2280 svchost.exe 2280 svchost.exe 2280 svchost.exe 2280 svchost.exe 2280 svchost.exe 2280 svchost.exe 2280 svchost.exe 2280 svchost.exe 2280 svchost.exe 2280 svchost.exe 2280 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2892 explorer.exe 2280 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2820 icsys.icn.exe 2820 icsys.icn.exe 2892 explorer.exe 2892 explorer.exe 2580 spoolsv.exe 2580 spoolsv.exe 2280 svchost.exe 2280 svchost.exe 692 spoolsv.exe 692 spoolsv.exe 2700 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 2700 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2700 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 31 PID 2148 wrote to memory of 2700 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 31 PID 2148 wrote to memory of 2700 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 31 PID 2148 wrote to memory of 2700 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 31 PID 2148 wrote to memory of 2820 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 32 PID 2148 wrote to memory of 2820 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 32 PID 2148 wrote to memory of 2820 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 32 PID 2148 wrote to memory of 2820 2148 69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe 32 PID 2820 wrote to memory of 2892 2820 icsys.icn.exe 33 PID 2820 wrote to memory of 2892 2820 icsys.icn.exe 33 PID 2820 wrote to memory of 2892 2820 icsys.icn.exe 33 PID 2820 wrote to memory of 2892 2820 icsys.icn.exe 33 PID 2892 wrote to memory of 2580 2892 explorer.exe 34 PID 2892 wrote to memory of 2580 2892 explorer.exe 34 PID 2892 wrote to memory of 2580 2892 explorer.exe 34 PID 2892 wrote to memory of 2580 2892 explorer.exe 34 PID 2580 wrote to memory of 2280 2580 spoolsv.exe 35 PID 2580 wrote to memory of 2280 2580 spoolsv.exe 35 PID 2580 wrote to memory of 2280 2580 spoolsv.exe 35 PID 2580 wrote to memory of 2280 2580 spoolsv.exe 35 PID 2280 wrote to memory of 692 2280 svchost.exe 36 PID 2280 wrote to memory of 692 2280 svchost.exe 36 PID 2280 wrote to memory of 692 2280 svchost.exe 36 PID 2280 wrote to memory of 692 2280 svchost.exe 36 PID 2892 wrote to memory of 2376 2892 explorer.exe 37 PID 2892 wrote to memory of 2376 2892 explorer.exe 37 PID 2892 wrote to memory of 2376 2892 explorer.exe 37 PID 2892 wrote to memory of 2376 2892 explorer.exe 37 PID 2280 wrote to memory of 2308 2280 svchost.exe 38 PID 2280 wrote to memory of 2308 2280 svchost.exe 38 PID 2280 wrote to memory of 2308 2280 svchost.exe 38 PID 2280 wrote to memory of 2308 2280 svchost.exe 38 PID 2280 wrote to memory of 2512 2280 svchost.exe 42 PID 2280 wrote to memory of 2512 2280 svchost.exe 42 PID 2280 wrote to memory of 2512 2280 svchost.exe 42 PID 2280 wrote to memory of 2512 2280 svchost.exe 42 PID 2280 wrote to memory of 1672 2280 svchost.exe 45 PID 2280 wrote to memory of 1672 2280 svchost.exe 45 PID 2280 wrote to memory of 1672 2280 svchost.exe 45 PID 2280 wrote to memory of 1672 2280 svchost.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe"C:\Users\Admin\AppData\Local\Temp\69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\users\admin\appdata\local\temp\69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exec:\users\admin\appdata\local\temp\69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:2700
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:692
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:56 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2308
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:57 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2512
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:58 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1672
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵PID:2376
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5fd7f07ce3782f1174ed287d8c64cae2a
SHA1aa50287c550d501d10166652355d8c7353c1bc39
SHA256a0850d54d9c7ae00f91b82f8ede3a7b868640ccb8013fa7f9ddee3ac97811adf
SHA51241012bf68924e588fbc69ad740578e35cdaf1b0c520ae2fac00ee069cfd054765d856b766b768d1c961f4a3f4f743ede0dbb698b946996f2eb537cc0d8d8c654
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
\Users\Admin\AppData\Local\Temp\69f5f142de756ad4c292fb7d2006806c1482a7571c0402861d7485d7b1bedc97.exe
Filesize84KB
MD5db88cea04959ef0e922c90b53738f37a
SHA1cdc9e0c6ed27bfc798221cfc7a5316bf45e44493
SHA2566031b6caa61889583058cfb76401cb7b26c8c739e013835cee9747c0634e9bd8
SHA51261b69861844e45a671f156f7c391f749a414bd1726e3ab9b80644bc09c4d88941b7cade1b3ccd1a4eb6adf8fa34d9dc20fb0ad34981c5ccc00479d2fb259dd91
-
Filesize
135KB
MD520c6cdaaa75e3ae6103deb773039a294
SHA17221186edb0ea6af2899d7aa64911fdb365086ec
SHA256f3fb85b839cca8dccc72b586d83549adf37c76a45de7fefa5d6ba3db74d49bd1
SHA512ac3a8226a4d78f6b33c0806fdf159b7e17c92c20b95a9283f6f9245ba94cec5a1d36dc3ab074d364bec30f3d26ff5207236749a5af215342c417ed5497773a7b
-
Filesize
135KB
MD595ecd900b8286bff527dd1e268278c0c
SHA180a4cf1ad265fa407d448e5635c497576cfe28d1
SHA256a4343f3d18576f168ef84d11f9d2c3cbe313142b858074dd08c022951f7aa20e
SHA51281bb33817d26049ca3cf8a89efa6e04d7fc4520a2e803c315f92d357b9a2f00aec162ebf81a0c8e34d809af734a3764f5ec028a56144e48df20786cdf3397402
-
Filesize
135KB
MD51dc307c9a9afa9c079c7357bbf69db85
SHA1790f982973d187a20af9f2dc28de02352c47f633
SHA2569067303692e784b0d42fccb5fed275f7e64253386a0ebb138cb5935ccc315b81
SHA512bb9f7c6fde25520ed561dd2eead9a3db27b841fef04bdbafcd367b1fac13d4ae926274044e5c08d5c29413713e8f744f924c7bf452aba1b05f6d44ec7d28bb2d