Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 00:41
Behavioral task
behavioral1
Sample
8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe
Resource
win10v2004-20241007-en
General
-
Target
8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe
-
Size
1.5MB
-
MD5
03ad9709cc48d654f4bbe073a8b95c1e
-
SHA1
aa7d3838e35ee7ee71543d40c9b20e5497df6a6e
-
SHA256
8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea
-
SHA512
a0d63f9ccdbf6f9e1504ebd47d756c6b1c6924249f17a39037e51c4e052bbbdbc6985d14599810a2cb3693480ca66d449fb2a49b83fc4179731a055542a82706
-
SSDEEP
12288:Y+Qf9NxkERr1JzrDTzz7wHxhW88KH6Yn77TCNp8jToZGrhR0ZooS/:Ox0j8KaYnfTYp8/oZMGZY
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 8 IoCs
resource yara_rule behavioral1/memory/2164-57-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2164-64-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2164-71-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2164-73-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2164-75-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2164-77-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2164-82-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2164-103-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe = "C:\\Users\\Admin\\AppData\\Roaming\\darkeye-nosttingspersistent2.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\winlogon.exe = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Executes dropped EXE 3 IoCs
pid Process 2976 winlogon.exe 2164 winlogon.exe 2916 winlogon.exe -
Loads dropped DLL 5 IoCs
pid Process 2076 8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe 2076 8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe 2076 8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe 2076 8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe 2076 8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2976 set thread context of 2164 2976 winlogon.exe 34 PID 2976 set thread context of 2916 2976 winlogon.exe 35 -
resource yara_rule behavioral1/memory/2076-0-0x0000000000400000-0x000000000058F000-memory.dmp upx behavioral1/files/0x0009000000016ccc-27.dat upx behavioral1/memory/2076-44-0x0000000000400000-0x000000000058F000-memory.dmp upx behavioral1/memory/2164-49-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2976-48-0x0000000000400000-0x000000000058F000-memory.dmp upx behavioral1/memory/2916-59-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2916-58-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2164-57-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2916-53-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2164-52-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2916-62-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2164-64-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2976-63-0x0000000000400000-0x000000000058F000-memory.dmp upx behavioral1/memory/2164-71-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2916-72-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2164-73-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2164-75-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2164-77-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2164-82-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2164-103-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 1420 reg.exe 1424 reg.exe 1576 reg.exe 1444 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2164 winlogon.exe Token: SeCreateTokenPrivilege 2164 winlogon.exe Token: SeAssignPrimaryTokenPrivilege 2164 winlogon.exe Token: SeLockMemoryPrivilege 2164 winlogon.exe Token: SeIncreaseQuotaPrivilege 2164 winlogon.exe Token: SeMachineAccountPrivilege 2164 winlogon.exe Token: SeTcbPrivilege 2164 winlogon.exe Token: SeSecurityPrivilege 2164 winlogon.exe Token: SeTakeOwnershipPrivilege 2164 winlogon.exe Token: SeLoadDriverPrivilege 2164 winlogon.exe Token: SeSystemProfilePrivilege 2164 winlogon.exe Token: SeSystemtimePrivilege 2164 winlogon.exe Token: SeProfSingleProcessPrivilege 2164 winlogon.exe Token: SeIncBasePriorityPrivilege 2164 winlogon.exe Token: SeCreatePagefilePrivilege 2164 winlogon.exe Token: SeCreatePermanentPrivilege 2164 winlogon.exe Token: SeBackupPrivilege 2164 winlogon.exe Token: SeRestorePrivilege 2164 winlogon.exe Token: SeShutdownPrivilege 2164 winlogon.exe Token: SeDebugPrivilege 2164 winlogon.exe Token: SeAuditPrivilege 2164 winlogon.exe Token: SeSystemEnvironmentPrivilege 2164 winlogon.exe Token: SeChangeNotifyPrivilege 2164 winlogon.exe Token: SeRemoteShutdownPrivilege 2164 winlogon.exe Token: SeUndockPrivilege 2164 winlogon.exe Token: SeSyncAgentPrivilege 2164 winlogon.exe Token: SeEnableDelegationPrivilege 2164 winlogon.exe Token: SeManageVolumePrivilege 2164 winlogon.exe Token: SeImpersonatePrivilege 2164 winlogon.exe Token: SeCreateGlobalPrivilege 2164 winlogon.exe Token: 31 2164 winlogon.exe Token: 32 2164 winlogon.exe Token: 33 2164 winlogon.exe Token: 34 2164 winlogon.exe Token: 35 2164 winlogon.exe Token: SeDebugPrivilege 2916 winlogon.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe 2976 winlogon.exe 2916 winlogon.exe 2164 winlogon.exe 2164 winlogon.exe 2164 winlogon.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2212 2076 8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe 30 PID 2076 wrote to memory of 2212 2076 8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe 30 PID 2076 wrote to memory of 2212 2076 8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe 30 PID 2076 wrote to memory of 2212 2076 8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe 30 PID 2212 wrote to memory of 3016 2212 cmd.exe 32 PID 2212 wrote to memory of 3016 2212 cmd.exe 32 PID 2212 wrote to memory of 3016 2212 cmd.exe 32 PID 2212 wrote to memory of 3016 2212 cmd.exe 32 PID 2076 wrote to memory of 2976 2076 8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe 33 PID 2076 wrote to memory of 2976 2076 8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe 33 PID 2076 wrote to memory of 2976 2076 8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe 33 PID 2076 wrote to memory of 2976 2076 8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe 33 PID 2976 wrote to memory of 2164 2976 winlogon.exe 34 PID 2976 wrote to memory of 2164 2976 winlogon.exe 34 PID 2976 wrote to memory of 2164 2976 winlogon.exe 34 PID 2976 wrote to memory of 2164 2976 winlogon.exe 34 PID 2976 wrote to memory of 2164 2976 winlogon.exe 34 PID 2976 wrote to memory of 2164 2976 winlogon.exe 34 PID 2976 wrote to memory of 2164 2976 winlogon.exe 34 PID 2976 wrote to memory of 2164 2976 winlogon.exe 34 PID 2976 wrote to memory of 2164 2976 winlogon.exe 34 PID 2976 wrote to memory of 2916 2976 winlogon.exe 35 PID 2976 wrote to memory of 2916 2976 winlogon.exe 35 PID 2976 wrote to memory of 2916 2976 winlogon.exe 35 PID 2976 wrote to memory of 2916 2976 winlogon.exe 35 PID 2976 wrote to memory of 2916 2976 winlogon.exe 35 PID 2976 wrote to memory of 2916 2976 winlogon.exe 35 PID 2976 wrote to memory of 2916 2976 winlogon.exe 35 PID 2976 wrote to memory of 2916 2976 winlogon.exe 35 PID 2976 wrote to memory of 2916 2976 winlogon.exe 35 PID 2164 wrote to memory of 2900 2164 winlogon.exe 36 PID 2164 wrote to memory of 2900 2164 winlogon.exe 36 PID 2164 wrote to memory of 2900 2164 winlogon.exe 36 PID 2164 wrote to memory of 2900 2164 winlogon.exe 36 PID 2164 wrote to memory of 2616 2164 winlogon.exe 37 PID 2164 wrote to memory of 2616 2164 winlogon.exe 37 PID 2164 wrote to memory of 2616 2164 winlogon.exe 37 PID 2164 wrote to memory of 2616 2164 winlogon.exe 37 PID 2164 wrote to memory of 2612 2164 winlogon.exe 38 PID 2164 wrote to memory of 2612 2164 winlogon.exe 38 PID 2164 wrote to memory of 2612 2164 winlogon.exe 38 PID 2164 wrote to memory of 2612 2164 winlogon.exe 38 PID 2164 wrote to memory of 2204 2164 winlogon.exe 40 PID 2164 wrote to memory of 2204 2164 winlogon.exe 40 PID 2164 wrote to memory of 2204 2164 winlogon.exe 40 PID 2164 wrote to memory of 2204 2164 winlogon.exe 40 PID 2616 wrote to memory of 1420 2616 cmd.exe 41 PID 2616 wrote to memory of 1420 2616 cmd.exe 41 PID 2616 wrote to memory of 1420 2616 cmd.exe 41 PID 2616 wrote to memory of 1420 2616 cmd.exe 41 PID 2612 wrote to memory of 1576 2612 cmd.exe 45 PID 2612 wrote to memory of 1576 2612 cmd.exe 45 PID 2612 wrote to memory of 1576 2612 cmd.exe 45 PID 2612 wrote to memory of 1576 2612 cmd.exe 45 PID 2204 wrote to memory of 1424 2204 cmd.exe 46 PID 2204 wrote to memory of 1424 2204 cmd.exe 46 PID 2204 wrote to memory of 1424 2204 cmd.exe 46 PID 2204 wrote to memory of 1424 2204 cmd.exe 46 PID 2900 wrote to memory of 1444 2900 cmd.exe 47 PID 2900 wrote to memory of 1444 2900 cmd.exe 47 PID 2900 wrote to memory of 1444 2900 cmd.exe 47 PID 2900 wrote to memory of 1444 2900 cmd.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe"C:\Users\Admin\AppData\Local\Temp\8c04e31fcaf5b026d4306550a6d27dc861c01b89f8ef921b7393da02777ed2ea.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\BLKFa.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Winlogon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogon.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3016
-
-
-
C:\Users\Admin\AppData\Roaming\winlogon.exe"C:\Users\Admin\AppData\Roaming\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Roaming\winlogon.exeC:\Users\Admin\AppData\Roaming\winlogon.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1444
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\winlogon.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogon.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\winlogon.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogon.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1420
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1576
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1424
-
-
-
-
C:\Users\Admin\AppData\Roaming\winlogon.exeC:\Users\Admin\AppData\Roaming\winlogon.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138B
MD54da6717f2c70f4bd32ad33a227a2ff47
SHA13d7f7159e1f695bd469287d1ad4ffa0841b407a8
SHA256a12bb2e5d2fb0b3c400ce311fae72995a00b57a97d23e4b9effec47cff189d07
SHA5126765314054ad9bf2164058248f3d3a17775176925abbe4376aec030dca3a5e59be8b9e96139941fec2b2e1a9bff38f87abdb29ea09a299d8ab7e23ecec4083df
-
Filesize
1.5MB
MD5593026ff5101b03fb631a700260d617e
SHA1adbdd72d612472586cbabc3feb93f0cc52685ab3
SHA2563a23f34d78173fc98e26c1768865d8e2ecb8314f116986df94e95df752ca970c
SHA5120bb6b24511c408956c25ebca4e0a1fa4f4012ec9b4fe2d4419e457f8353933272370639be60e43548b6e35cb04c321efb00d408b4a651b043be71a2dcfa03538