Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 08:09
Behavioral task
behavioral1
Sample
70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe
Resource
win10v2004-20241007-en
General
-
Target
70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe
-
Size
8.2MB
-
MD5
b1b4052f585c8c0bec92b83ae0f852c0
-
SHA1
1eb6e50a1436dd1eb5bb63dfb8543a904ea66f09
-
SHA256
70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824f
-
SHA512
eb8ec10d6438df4decb098b60d98ca702acfb70216f7f6d389766397f16e173864f141ac0aff595975c8b6e17f071f4dcf5c367f51c49c50e6f9175d415fb832
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecM:V8e8e8f8e8e8J
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 5 IoCs
resource yara_rule behavioral1/files/0x0009000000016d36-42.dat warzonerat behavioral1/files/0x0009000000016d13-81.dat warzonerat behavioral1/files/0x0008000000016d50-95.dat warzonerat behavioral1/files/0x0008000000016d50-201.dat warzonerat behavioral1/files/0x0008000000016d50-209.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral1/files/0x0009000000016d36-42.dat aspack_v212_v242 behavioral1/files/0x0009000000016d13-81.dat aspack_v212_v242 behavioral1/files/0x0008000000016d50-95.dat aspack_v212_v242 behavioral1/files/0x0008000000016d50-201.dat aspack_v212_v242 behavioral1/files/0x0008000000016d50-209.dat aspack_v212_v242 -
Executes dropped EXE 9 IoCs
pid Process 2644 explorer.exe 264 explorer.exe 2360 spoolsv.exe 2212 spoolsv.exe 1608 spoolsv.exe 1304 spoolsv.exe 3024 spoolsv.exe 2452 spoolsv.exe 2180 spoolsv.exe -
Loads dropped DLL 51 IoCs
pid Process 2796 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 2796 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 264 explorer.exe 264 explorer.exe 264 explorer.exe 264 explorer.exe 1092 WerFault.exe 1092 WerFault.exe 1092 WerFault.exe 1092 WerFault.exe 1092 WerFault.exe 1092 WerFault.exe 1092 WerFault.exe 264 explorer.exe 264 explorer.exe 1744 WerFault.exe 1744 WerFault.exe 1744 WerFault.exe 1744 WerFault.exe 1744 WerFault.exe 1744 WerFault.exe 1744 WerFault.exe 264 explorer.exe 264 explorer.exe 2292 WerFault.exe 2292 WerFault.exe 2292 WerFault.exe 2292 WerFault.exe 2292 WerFault.exe 2292 WerFault.exe 2292 WerFault.exe 264 explorer.exe 264 explorer.exe 3036 WerFault.exe 3036 WerFault.exe 3036 WerFault.exe 3036 WerFault.exe 3036 WerFault.exe 3036 WerFault.exe 3036 WerFault.exe 264 explorer.exe 264 explorer.exe 3020 WerFault.exe 3020 WerFault.exe 3020 WerFault.exe 3020 WerFault.exe 3020 WerFault.exe 3020 WerFault.exe 3020 WerFault.exe 264 explorer.exe 264 explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2016 set thread context of 2796 2016 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 31 PID 2016 set thread context of 2908 2016 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 32 PID 2644 set thread context of 264 2644 explorer.exe 35 PID 2644 set thread context of 1768 2644 explorer.exe 36 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 1092 2212 WerFault.exe 38 1744 1608 WerFault.exe 40 2292 1304 WerFault.exe 42 3036 3024 WerFault.exe 3020 2452 WerFault.exe 46 2508 2180 WerFault.exe 48 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2796 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 264 explorer.exe 264 explorer.exe 264 explorer.exe 264 explorer.exe 264 explorer.exe 264 explorer.exe 264 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2796 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 2796 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 264 explorer.exe 264 explorer.exe 264 explorer.exe 264 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2796 2016 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 31 PID 2016 wrote to memory of 2796 2016 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 31 PID 2016 wrote to memory of 2796 2016 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 31 PID 2016 wrote to memory of 2796 2016 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 31 PID 2016 wrote to memory of 2796 2016 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 31 PID 2016 wrote to memory of 2796 2016 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 31 PID 2016 wrote to memory of 2796 2016 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 31 PID 2016 wrote to memory of 2796 2016 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 31 PID 2016 wrote to memory of 2796 2016 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 31 PID 2016 wrote to memory of 2908 2016 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 32 PID 2016 wrote to memory of 2908 2016 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 32 PID 2016 wrote to memory of 2908 2016 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 32 PID 2016 wrote to memory of 2908 2016 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 32 PID 2016 wrote to memory of 2908 2016 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 32 PID 2016 wrote to memory of 2908 2016 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 32 PID 2796 wrote to memory of 2644 2796 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 33 PID 2796 wrote to memory of 2644 2796 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 33 PID 2796 wrote to memory of 2644 2796 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 33 PID 2796 wrote to memory of 2644 2796 70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe 33 PID 2644 wrote to memory of 264 2644 explorer.exe 35 PID 2644 wrote to memory of 264 2644 explorer.exe 35 PID 2644 wrote to memory of 264 2644 explorer.exe 35 PID 2644 wrote to memory of 264 2644 explorer.exe 35 PID 2644 wrote to memory of 264 2644 explorer.exe 35 PID 2644 wrote to memory of 264 2644 explorer.exe 35 PID 2644 wrote to memory of 264 2644 explorer.exe 35 PID 2644 wrote to memory of 264 2644 explorer.exe 35 PID 2644 wrote to memory of 264 2644 explorer.exe 35 PID 2644 wrote to memory of 1768 2644 explorer.exe 36 PID 2644 wrote to memory of 1768 2644 explorer.exe 36 PID 2644 wrote to memory of 1768 2644 explorer.exe 36 PID 2644 wrote to memory of 1768 2644 explorer.exe 36 PID 2644 wrote to memory of 1768 2644 explorer.exe 36 PID 2644 wrote to memory of 1768 2644 explorer.exe 36 PID 264 wrote to memory of 2360 264 explorer.exe 37 PID 264 wrote to memory of 2360 264 explorer.exe 37 PID 264 wrote to memory of 2360 264 explorer.exe 37 PID 264 wrote to memory of 2360 264 explorer.exe 37 PID 264 wrote to memory of 2212 264 explorer.exe 38 PID 264 wrote to memory of 2212 264 explorer.exe 38 PID 264 wrote to memory of 2212 264 explorer.exe 38 PID 264 wrote to memory of 2212 264 explorer.exe 38 PID 2212 wrote to memory of 1092 2212 spoolsv.exe 39 PID 2212 wrote to memory of 1092 2212 spoolsv.exe 39 PID 2212 wrote to memory of 1092 2212 spoolsv.exe 39 PID 2212 wrote to memory of 1092 2212 spoolsv.exe 39 PID 264 wrote to memory of 1608 264 explorer.exe 40 PID 264 wrote to memory of 1608 264 explorer.exe 40 PID 264 wrote to memory of 1608 264 explorer.exe 40 PID 264 wrote to memory of 1608 264 explorer.exe 40 PID 1608 wrote to memory of 1744 1608 spoolsv.exe 41 PID 1608 wrote to memory of 1744 1608 spoolsv.exe 41 PID 1608 wrote to memory of 1744 1608 spoolsv.exe 41 PID 1608 wrote to memory of 1744 1608 spoolsv.exe 41 PID 264 wrote to memory of 1304 264 explorer.exe 42 PID 264 wrote to memory of 1304 264 explorer.exe 42 PID 264 wrote to memory of 1304 264 explorer.exe 42 PID 264 wrote to memory of 1304 264 explorer.exe 42 PID 1304 wrote to memory of 2292 1304 spoolsv.exe 43 PID 1304 wrote to memory of 2292 1304 spoolsv.exe 43 PID 1304 wrote to memory of 2292 1304 spoolsv.exe 43 PID 1304 wrote to memory of 2292 1304 spoolsv.exe 43 PID 264 wrote to memory of 3024 264 explorer.exe 44 PID 264 wrote to memory of 3024 264 explorer.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe"C:\Users\Admin\AppData\Local\Temp\70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe"C:\Users\Admin\AppData\Local\Temp\70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:264 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2360
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1092
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1744
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2292
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 366⤵
- Loads dropped DLL
- Program crash
PID:3036
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 366⤵
- Loads dropped DLL
- Program crash
PID:3020
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 366⤵
- Program crash
PID:2508
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:1768
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD5b1b4052f585c8c0bec92b83ae0f852c0
SHA11eb6e50a1436dd1eb5bb63dfb8543a904ea66f09
SHA25670ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824f
SHA512eb8ec10d6438df4decb098b60d98ca702acfb70216f7f6d389766397f16e173864f141ac0aff595975c8b6e17f071f4dcf5c367f51c49c50e6f9175d415fb832
-
Filesize
8.2MB
MD5ae8f5a0b884fcf17a73dd31f4c1a1fff
SHA13e85c4a212949c47540398a53c7b37857d93a15b
SHA2560917d57177e3f6e479aca67e64730d8f9e9b65f325e6c7770156f985878e6977
SHA5120ae3df75cb8fd45d233d13fd2262ea19e1dfabc4e0f4e3de448d09f3e1ae64bb729f35fcb4607790017a2cc3804f05482bff98db4a9be867d906ad8598ec1b6b
-
Filesize
8.0MB
MD5abc208622b8b0d31cb2c9c41375ef81f
SHA1135ad9e63326546d8601f755eb166de1f716c206
SHA2569066e2528cea30e7622d5b771599763cedbb9cef3da38a9f9af10ab6fd474bef
SHA51236ee3a1b4bf8130455ef2ac62b513fc58e638deeeeba018ae9f6097686a96cfd439cdcd5c69d61caac68ef37af290c6c0203ff03be4cd572f4cb6ded5db98184
-
Filesize
7.4MB
MD5c8ab4fb11e9131dc08ffd4e8cf4d8fec
SHA1ac0d939e1cbaab85d015f54cee89c8d44ac6da7e
SHA256705e07311df623f93aa1efc18d9a31bbc9e7227a8ec29494460bec6798f51f22
SHA512770d7b8a4e66e69e367fd346fbdcc32f31c37474e94be4368937733c7cdd6fd5aca4f09655e2399aa1409647b257322831cf4d3544e69c4289fb136c953c4cdc
-
Filesize
8.2MB
MD56e8bc8f5a1ac23627d1a0e71db15730c
SHA162726f13db3ac9a923e8fe8f58814721f6af0745
SHA2567554b5a58d3cfe6f402013757f80d3e5c195512737e067673b94df7fbf9f423b
SHA5126a341538dc04dcd5e02507f96eeb6bb705564442a92575e36605890a303673071773afb5dd9f9f6bcbf1af97f0d3d8a38690955acc25c5282c7bf8deba7bfcdf