Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2023 09:22
Static task
static1
Behavioral task
behavioral1
Sample
8X/Code_Of_Conduct_-_2023(EN-US).exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8X/Code_Of_Conduct_-_2023(EN-US).exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
8X/MEXCGBL_COC_JAN23(JP).pdf.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
8X/MEXCGBL_COC_JAN23(JP).pdf.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
8X/MEXCGBL_COC_JAN23(ZH-CN).pdf.exe
Resource
win7-20221111-en
General
-
Target
8X/MEXCGBL_COC_JAN23(ZH-CN).pdf.exe
-
Size
3.2MB
-
MD5
7cb20a78a093bc41d110dbaf57fcd296
-
SHA1
a0894924c96a58f6a1e187d4df68a47716fdf94f
-
SHA256
31430b192bffe611f9c0699ea7b637fbbc0cc1fb58349aab32fa0e1d9b33bc46
-
SHA512
36b805d9eadfb4730dadecf18685f7e1b0c2ee9b990f44f1d16b9367ff76e3475a67595f32cf7848b361dbc2c1527959318d8462e7aed31b92154ef518a24dcc
-
SSDEEP
24576:rcqJge1JYGhCP3dbTb2XShCFVshuhBcomEl+11spLYx9pYH5SoqhkE2:0yXALoh+QYQH5Soqhk
Malware Config
Signatures
-
ParallaxRat payload 2 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral6/memory/1992-136-0x0000000000400000-0x0000000000739000-memory.dmp parallax_rat behavioral6/memory/1992-156-0x0000000000400000-0x0000000000739000-memory.dmp parallax_rat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation MEXCGBL_COC_JAN23(ZH-CN).pdf.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Search.exe.exe DllHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Search.exe.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings MEXCGBL_COC_JAN23(ZH-CN).pdf.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2932 Explorer.EXE Token: SeCreatePagefilePrivilege 2932 Explorer.EXE Token: SeShutdownPrivilege 2932 Explorer.EXE Token: SeCreatePagefilePrivilege 2932 Explorer.EXE Token: SeShutdownPrivilege 2932 Explorer.EXE Token: SeCreatePagefilePrivilege 2932 Explorer.EXE Token: SeShutdownPrivilege 2932 Explorer.EXE Token: SeCreatePagefilePrivilege 2932 Explorer.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe 3676 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 3676 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 82 PID 1992 wrote to memory of 3676 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 82 PID 1992 wrote to memory of 3676 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 82 PID 1992 wrote to memory of 2932 1992 MEXCGBL_COC_JAN23(ZH-CN).pdf.exe 31 PID 3676 wrote to memory of 4792 3676 AcroRd32.exe 83 PID 3676 wrote to memory of 4792 3676 AcroRd32.exe 83 PID 3676 wrote to memory of 4792 3676 AcroRd32.exe 83 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 3360 4792 RdrCEF.exe 85 PID 4792 wrote to memory of 892 4792 RdrCEF.exe 86 PID 4792 wrote to memory of 892 4792 RdrCEF.exe 86 PID 4792 wrote to memory of 892 4792 RdrCEF.exe 86 PID 4792 wrote to memory of 892 4792 RdrCEF.exe 86 PID 4792 wrote to memory of 892 4792 RdrCEF.exe 86 PID 4792 wrote to memory of 892 4792 RdrCEF.exe 86 PID 4792 wrote to memory of 892 4792 RdrCEF.exe 86 PID 4792 wrote to memory of 892 4792 RdrCEF.exe 86 PID 4792 wrote to memory of 892 4792 RdrCEF.exe 86 PID 4792 wrote to memory of 892 4792 RdrCEF.exe 86 PID 4792 wrote to memory of 892 4792 RdrCEF.exe 86 PID 4792 wrote to memory of 892 4792 RdrCEF.exe 86 PID 4792 wrote to memory of 892 4792 RdrCEF.exe 86 PID 4792 wrote to memory of 892 4792 RdrCEF.exe 86 PID 4792 wrote to memory of 892 4792 RdrCEF.exe 86 PID 4792 wrote to memory of 892 4792 RdrCEF.exe 86
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\8X\MEXCGBL_COC_JAN23(ZH-CN).pdf.exe"C:\Users\Admin\AppData\Local\Temp\8X\MEXCGBL_COC_JAN23(ZH-CN).pdf.exe"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\jHBHF.pdf"3⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=35E0233165D7426FD79D1C8102C86A77 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:3360
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=EF3AA4D16EB83F0EBFA48D96F36213FB --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=EF3AA4D16EB83F0EBFA48D96F36213FB --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:15⤵PID:892
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=739BB94A99FE8AD40548B692B578362F --mojo-platform-channel-handle=2156 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:5072
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9A11B4E5EBB426CB49A0B40FB3EB73CF --mojo-platform-channel-handle=1892 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:4600
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=587961553DD765E2321C0B9DED795B5C --mojo-platform-channel-handle=1920 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:4736
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:3560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3548
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD56bd88fa6432b67bd6cd4edfdbe39e677
SHA1f047426ffbfcb49df3f8c25bebbf48e4f4e2c97f
SHA256889e55a3dadee201302c568cbaf0f93f5d78fe89f9a532d36c5c3797da66e667
SHA5124c89e5c54f79133de9dee00331f439b430653ed6c9bfb11786097d4881fca82781800545171f26ea9e12a1863535293b7d4b59d3352a9f25f3ae2942ec534238