Analysis
-
max time kernel
102s -
max time network
107s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25-01-2021 14:35
Static task
static1
Behavioral task
behavioral1
Sample
RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe
Resource
win10v20201028
General
-
Target
RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe
-
Size
2.2MB
-
MD5
5ff5bbb9fd1f1d3a586ad9bea10a9773
-
SHA1
1426737ae0a2039a85e9683aad4e1fc6b2d5a27b
-
SHA256
a12c65ad23f195521f525ed905373f22fe0853c1e1fcfb317056d81051e6e532
-
SHA512
aa21b5424ff194d35552e25a64a96d29c50229bc2281964a62c82069f38e956592d4099e99e682c859d9ab36165c80bf63b26dac11e9c7d1ca1ec63c84a547fe
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.newviking.com.my - Port:
587 - Username:
[email protected] - Password:
{&SgX:^(7m
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
RFQ for the supply of materialsservices for P.O. No. - 4700001838.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe\"" RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4620-75-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/4620-76-0x000000000043763E-mapping.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
RFQ for the supply of materialsservices for P.O. No. - 4700001838.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe -
Drops startup file 2 IoCs
Processes:
RFQ for the supply of materialsservices for P.O. No. - 4700001838.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
RFQ for the supply of materialsservices for P.O. No. - 4700001838.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe = "0" RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe = "0" RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
RFQ for the supply of materialsservices for P.O. No. - 4700001838.exeRFQ for the supply of materialsservices for P.O. No. - 4700001838.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe" RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\Administrator Rights = "C:\\Users\\Admin\\AppData\\Roaming\\Administrator Rights\\Administrator Rights.exe" RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
RFQ for the supply of materialsservices for P.O. No. - 4700001838.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
Processes:
RFQ for the supply of materialsservices for P.O. No. - 4700001838.exepid process 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
RFQ for the supply of materialsservices for P.O. No. - 4700001838.exeRFQ for the supply of materialsservices for P.O. No. - 4700001838.exedescription pid process target process PID 4768 set thread context of 3808 4768 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe PID 3808 set thread context of 4620 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 212 3808 WerFault.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4548 timeout.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeRFQ for the supply of materialsservices for P.O. No. - 4700001838.exeRFQ for the supply of materialsservices for P.O. No. - 4700001838.exepid process 856 powershell.exe 1076 powershell.exe 4352 powershell.exe 508 powershell.exe 508 powershell.exe 4352 powershell.exe 1076 powershell.exe 856 powershell.exe 1076 powershell.exe 4352 powershell.exe 508 powershell.exe 856 powershell.exe 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe 4620 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe 4620 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
RFQ for the supply of materialsservices for P.O. No. - 4700001838.exepid process 4620 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
RFQ for the supply of materialsservices for P.O. No. - 4700001838.exepowershell.exepowershell.exepowershell.exepowershell.exeRFQ for the supply of materialsservices for P.O. No. - 4700001838.exedescription pid process Token: SeDebugPrivilege 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe Token: SeDebugPrivilege 4352 powershell.exe Token: SeDebugPrivilege 856 powershell.exe Token: SeDebugPrivilege 1076 powershell.exe Token: SeDebugPrivilege 508 powershell.exe Token: SeDebugPrivilege 4620 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
RFQ for the supply of materialsservices for P.O. No. - 4700001838.exeRFQ for the supply of materialsservices for P.O. No. - 4700001838.execmd.exedescription pid process target process PID 4768 wrote to memory of 3808 4768 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe PID 4768 wrote to memory of 3808 4768 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe PID 4768 wrote to memory of 3808 4768 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe PID 4768 wrote to memory of 3808 4768 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe PID 4768 wrote to memory of 3808 4768 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe PID 4768 wrote to memory of 3808 4768 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe PID 4768 wrote to memory of 3808 4768 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe PID 4768 wrote to memory of 3808 4768 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe PID 3808 wrote to memory of 4352 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe powershell.exe PID 3808 wrote to memory of 4352 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe powershell.exe PID 3808 wrote to memory of 4352 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe powershell.exe PID 3808 wrote to memory of 508 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe powershell.exe PID 3808 wrote to memory of 508 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe powershell.exe PID 3808 wrote to memory of 508 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe powershell.exe PID 3808 wrote to memory of 856 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe powershell.exe PID 3808 wrote to memory of 856 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe powershell.exe PID 3808 wrote to memory of 856 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe powershell.exe PID 3808 wrote to memory of 1076 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe powershell.exe PID 3808 wrote to memory of 1076 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe powershell.exe PID 3808 wrote to memory of 1076 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe powershell.exe PID 3808 wrote to memory of 4080 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe cmd.exe PID 3808 wrote to memory of 4080 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe cmd.exe PID 3808 wrote to memory of 4080 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe cmd.exe PID 4080 wrote to memory of 4548 4080 cmd.exe timeout.exe PID 4080 wrote to memory of 4548 4080 cmd.exe timeout.exe PID 4080 wrote to memory of 4548 4080 cmd.exe timeout.exe PID 3808 wrote to memory of 4620 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe PID 3808 wrote to memory of 4620 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe PID 3808 wrote to memory of 4620 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe PID 3808 wrote to memory of 4620 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe PID 3808 wrote to memory of 4620 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe PID 3808 wrote to memory of 4620 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe PID 3808 wrote to memory of 4620 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe PID 3808 wrote to memory of 4620 3808 RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe"C:\Users\Admin\AppData\Local\Temp\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe"C:\Users\Admin\AppData\Local\Temp\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe"2⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4352 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:508 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:856 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 13⤵
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe"C:\Users\Admin\AppData\Local\Temp\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:4620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 23323⤵
- Program crash
PID:212
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe.log
MD54d710ca9c563bbb76bb29b87d5d64282
SHA12b1271f68a5d18e1c1bb08800a9cc9464e8a81ad
SHA2566c7ac5cff014a13315b8813524bbd14471f1ab7aac691be94d4d4f28e4cd2de4
SHA512873c9ee04e4f8d23f8cf90ffea89a362e8eda43c0cfc6bb47442f93e0add8794c004081350cfbd7cfaed6d101582287b26a00951d4019dfb466f21514e5d90d6
-
MD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
MD5
97a7ef630686f0aa0b27bf7ce355ba75
SHA12dbe466244cef00831dbc17b05c4e2c6160c9e67
SHA25624c9cddc2b959691e19b72cb1e03b74c2931c2323f493b6d4c236867a8960a19
SHA5127f2bf0d4b26a2b592a62e5fd18748498b828b64086bf35be0d600f19ac744e9c595d270bbf8a892fd3be71a06ea86889e805d9db876f16156c3d718179c10d9c
-
MD5
5df252c52b3ee9298dc4fb3a3d74b30b
SHA12e4bb12b266612e12449d1136933ebdfdc1f3d5f
SHA256eb606362694eee9d3c7f006bfbb33be4657293cf988bba541a13ad4f24ba8c87
SHA512b2dd0eb87a322f9af5b54ac9368c77ac2512de2744d12b2836e3277fce1a60f687c120934c744c8e32c17052e7acba7ca2bb72df1fb7c8a9385a80d9ed013f87
-
MD5
ae93db7d91c28fecedd04baf419f801e
SHA1df86c2dd27715839c1a2d4772588198056ae007e
SHA25638327a7ea851149bdadeb46ce5fbf6e98726f9e8247030c6e76a3eb2249ecbd4
SHA5127138904e941dd0024539e287c38d98f4cf437c4393508d64c37886b5604f2709f2ea37b5772a2f7a61afed1be1f3f05d540ed05395f1aa043e96c43be513b341