Analysis
-
max time kernel
148s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 23:09
Static task
static1
Behavioral task
behavioral1
Sample
9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe
Resource
win10v2004-20220414-en
General
-
Target
9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe
-
Size
2.8MB
-
MD5
b644cc5effa3145014406503c54f9229
-
SHA1
a99c5f9f855832c10214832a56dac7c6d0b60bbc
-
SHA256
9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e
-
SHA512
4a63060db979374089054f42ccad888d1f3ab8b277909ec921e701532934c2d9a67d72a166f226200fffd11e57dce9ee45837550e5bb0e8d658056ebe4870f40
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4208-130-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-131-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-140-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-158-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-172-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-170-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-173-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-168-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-166-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-164-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-162-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-160-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-156-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-154-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-152-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-150-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-148-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-146-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-144-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-142-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-138-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-136-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-134-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4208-132-0x0000000010000000-0x000000001003F000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exedescription ioc process File opened for modification \??\PhysicalDrive0 9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe -
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0fca9d20670d801 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\goodgq.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30961670" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.goodgq.com\ = "29" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3471286849" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3478246658" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3471286849" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30961670" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30961670" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30961670" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\DOMStorage\goodgq.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\goodgq.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "29" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.goodgq.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000de0a1e983134cf4e883f258c38579ff000000000020000000000106600000001000020000000d519b6a068e373c3e09a21e95e6eb8f606e25ff570fdcd6207ecab3b1c112368000000000e80000000020000200000004e37c110309c5cecd8e2a89cec19b6a3db2ac1f4841b0baf4c491689d7e972cb2000000094f69852eb7e2f5b77b39b6bc8f875c5e0dce719a4c6f1614381ab177c2bf91b400000000b7ae5b98bba6c54fa2ea69b3da821899cb988e0320715178bc7105d192d0fb891b201af9d3e28e3e0d8caad4a496eea2454edc69b27ad70a8a1f786077d7ec0 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3478246658" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\goodgq.com\Total = "29" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 704ed7d20670d801 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F3DAF12E-DBF9-11EC-B274-6A1EA45F0745} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "360227689" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000de0a1e983134cf4e883f258c38579ff0000000000200000000001066000000010000200000004bb8ceeaf138b24190b0b3cd8a01b2013592bcbe75d3df235c198d0204f570c5000000000e800000000200002000000056f460186b925296f267af60202c31e0e74bb0bb7ce45903a4289832c2f67a6d200000001fec419b230c138053610955511cde7641fb9ef192082a25bcb561f4b1f824434000000098138f1aee5cf3056e46d0acb9ad0e7dbdb63253214f63f6edd89a5774321b545208e97362f1e11b00af5fcdefdd81b0ce282491d6d26ea4bb289908fffcb914 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exepid process 4208 9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe 4208 9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exedescription pid process Token: SeSystemtimePrivilege 4208 9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exeIEXPLORE.EXEpid process 4208 9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe 800 IEXPLORE.EXE -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exepid process 4208 9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exeIEXPLORE.EXEIEXPLORE.EXEpid process 4208 9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe 4208 9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe 4208 9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe 800 IEXPLORE.EXE 800 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exeIEXPLORE.EXEdescription pid process target process PID 4208 wrote to memory of 800 4208 9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe IEXPLORE.EXE PID 4208 wrote to memory of 800 4208 9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe IEXPLORE.EXE PID 800 wrote to memory of 2532 800 IEXPLORE.EXE IEXPLORE.EXE PID 800 wrote to memory of 2532 800 IEXPLORE.EXE IEXPLORE.EXE PID 800 wrote to memory of 2532 800 IEXPLORE.EXE IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe"C:\Users\Admin\AppData\Local\Temp\9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.goodgq.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:800 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD53c94b790a4d3d3813b9804b360811c02
SHA19b42bca99be723330c45b22abb0698f77ef8077a
SHA2567bc88a561babff736195edc916e12556d4a870e9dc94e649adff7d6859468d93
SHA512594410b019fde2552e456bf87934eab332c73d5a1c73c3fac27886bb2c8f2b2c174acb0fa5f67b40a4b41339cff713b239eab680c6dd7aab00aacaf8e38538b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_28699ABAC9273C08DCF1E93A8F6BFD1D
Filesize471B
MD5196a1094edb471f6766e58ac768c5288
SHA194d71160cbd87ebe1330411bb9ef13b10216ef1d
SHA256f7d32ba7422f9863e177686f7e4082aead6d612ad70ad680a9f496c4c80a14b7
SHA51230352f4710a01ff3ed8b567b68f1cf44f8ed01aa5eee013af758a904a6eb809b461a76e251073d0197e6fd6aa5f732947afa444c355a58c52054eb98679862b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD597c502637ee1eae66fb77116fe7fe84f
SHA1c6ea106c641b7c335d3d4298d7350363d6fea6ad
SHA256e08b5e80e9d6bc2230dc3f1e3df2edc9675befdca908e89f778dddb2300e7941
SHA51293220680e0c7d53a7f721fa7ca67674d6caaede4d65ae4d5271072d9c0aa4612cec1df72112e085350eefec2ff7566dbbf01edfb061c79dd87da28b9d4d772eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD597c502637ee1eae66fb77116fe7fe84f
SHA1c6ea106c641b7c335d3d4298d7350363d6fea6ad
SHA256e08b5e80e9d6bc2230dc3f1e3df2edc9675befdca908e89f778dddb2300e7941
SHA51293220680e0c7d53a7f721fa7ca67674d6caaede4d65ae4d5271072d9c0aa4612cec1df72112e085350eefec2ff7566dbbf01edfb061c79dd87da28b9d4d772eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_28699ABAC9273C08DCF1E93A8F6BFD1D
Filesize430B
MD50b0b5146ee3a42c8493cf83bf3c78cc8
SHA1f084567b0cadc8a38bf5fcefcf4f473e2c72337d
SHA256a980483f341ab98c411236646ad92fdba3680a69a0c8c4d51391319c936dfd68
SHA512d125c4d894a85d7168a83e32facd6269b97c645339e1897bd9bd97082b66f7dd036a240c6a9d9c994964e9bd0973445633b1d3608ce76de0f0c7ce63652c0de7
-
Filesize
4KB
MD5c3f207292a805a1d9bcd47ba260e31f0
SHA1654386e22666e65260cdcc8254a4dccb11702455
SHA256fa20c1f6ed252255ab72e26a015c88b85f516c1404cb0963cfb3e68d1097040f
SHA51282811aba04d9cccfea3af2c154d456fa4bfac94cce3860c6a4468b71528b89281fadeebee36ce42dc8a634e6d5815b16388df36696b64ff82798b799c51c7285