Analysis
-
max time kernel
94s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20-07-2023 12:46
Behavioral task
behavioral1
Sample
USD_Invoice_765765_Payment_Advice.pdf
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
USD_Invoice_765765_Payment_Advice.pdf
Resource
win10v2004-20230703-en
General
-
Target
USD_Invoice_765765_Payment_Advice.pdf
-
Size
133KB
-
MD5
ebc4b42372af7f507404ade01706e894
-
SHA1
66a91171e7ff40aabc6d7402270a597a3deefa7a
-
SHA256
e0fb9a79ce8322e0ed1664a2faec68eb29759aa558cfcc3bb147613dbc83d024
-
SHA512
4bb6e80b19374a8035e9bb3c42bfc6b91beb1269784561772291f7666756969a167f1e1a7f3f66437ebfef4ee5fcbb298d3f5ea5bbbc7a99cf8c83de25d5dfb7
-
SSDEEP
3072:c8Rh3Afi+h4P/gsNzvXxjstNlr+7KX7XjwMRb:cYqfiUTOXxjstjrwKX7XjwMRb
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e8664bdb653864eb3b20ffc0ad3b02100000000020000000000106600000001000020000000648fb3d3cf1874e3d52cc775f0ed8d43baeccd5f7cfe894ec6361e8000739f1e000000000e800000000200002000000064530f5cfbc30706b4e0a21be4323a617eee54c48f96392505bb17e9eda826ba20000000646d8dae97fc4ee401f229f4dce60c6df73ee58ac2d2f6d719ce3329066040a5400000006bf310a779b3f0ff64d7b88fd3fb8f80e651357411e75076b3d2c97a7d19e563eb98e97bc68ab2e4480e95eef5eba7e7dafbe4293d7734bc09043979c5d13e7c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f026403c08bbd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e8664bdb653864eb3b20ffc0ad3b02100000000020000000000106600000001000020000000a85766883f509c1f609e28d43ee825d7d464ef18f521066f9659c0df024f2a72000000000e80000000020000200000005b1db4627d4ca7ff38b275fed8fb0c034ceb1b4bd3f9a2dfee6325c55021d1c6900000008792374393a4894bdd73f68807acf93c7b6dabc75bbc5cb55815e222734475b166b4076aab3858d05a446583e60099b73d326ba7b4d81cf5c8bcbc4194f95110e8f4fb872d9ae41630c29ee3915ab2e531ffe9abcea83148ee819e75e76292d8b5865033976bdd8db45e7c81240ce83424772169813906572cb5ff69404ae1fcd2a22d96e7a7715641e6808a867528a740000000b8033d64c4ebc288a33f677b8cb56138192f0140a73f5ccc694423d8ee87fe19576204014364b8be7f22fcd15ac407fb16c70a036f3d4579e3cf9058d433aad9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76C52B41-26FB-11EE-84C9-D63E05CE97E8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1688 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2896 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1688 AcroRd32.exe 1688 AcroRd32.exe 1688 AcroRd32.exe 1688 AcroRd32.exe 2896 iexplore.exe 2896 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2896 iexplore.exe 1688 AcroRd32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2896 1688 AcroRd32.exe 28 PID 1688 wrote to memory of 2896 1688 AcroRd32.exe 28 PID 1688 wrote to memory of 2896 1688 AcroRd32.exe 28 PID 1688 wrote to memory of 2896 1688 AcroRd32.exe 28 PID 2896 wrote to memory of 2940 2896 iexplore.exe 30 PID 2896 wrote to memory of 2940 2896 iexplore.exe 30 PID 2896 wrote to memory of 2940 2896 iexplore.exe 30 PID 2896 wrote to memory of 2940 2896 iexplore.exe 30
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\USD_Invoice_765765_Payment_Advice.pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.bing.com/ck/a?!&&p=8c31ba1436b79d3cJmltdHM9MTY4OTIwNjQwMCZpZ3VpZD0zNzNhMjQxNC0zNmFlLTYyNGMtMzE2Ni0zNzU5MzcyMTYzYzImaW5zaWQ9NTE0NQ&ptn=3&hsh=3&fclid=373a2414-36ae-624c-3166-3759372163c2&psq=site%3amoargxzoo.com&u=a1aHR0cHM6Ly9tb2FyZ3h6b28uY29tLw&ntb=12⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d0c93077288b2694b8ee3b2e17455c7
SHA10bd371aea247972e8aa7ee2a6148de8c170d0d1e
SHA2560048c6c0c292a656179c814514578b47943f627bb6ee587867482518accc9f67
SHA5128f3e9f23aeb84388f71857a433188d88cc9e5090bde3b797adc0728644f1c2c4cd7f7768df8ea6d3bc648e6f52ea32ea3cea7e5c8ec76ee479e37c37edd220e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566b38a9f8f124f4ae042ea057beca1cb
SHA17c0005e516daa8bdb656be9e2665a021be1e5d38
SHA2569e01b18c1734b9b94057e05594c31f00cd2c29a5ecc4c5c4b9ecb076ef8fa26a
SHA512bcaca031ab03dd0c6cf95829220a47c3ca0f9436440628509f2091b7dbfacd55d918f8c86d5b8e30fd28d764032cd52d3283ac6d4b0d10520a0f39b3a6416b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3ebd5d18576e02ef16896fb3fb53543
SHA1fd62210207bf1a4c3059c14f1d19f8fe266792dd
SHA256a99045cbd2e405a0698679f02cab591612290ea021ce46247a07c91c2104e39c
SHA512ac69308fcb52272ba787585275cb8c504b3b97fb43ec6ae6f6849ac5432f07247b94efd6e7a9c2546765cc1752e56004ad69f12c87740b353eeff6fc24c9331b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52357ff8c1c13f2a3e0da73df0a05680b
SHA12b72b49c26a00d06eb2bd4d9a952e59b509bd1dc
SHA25632d42f6e27cf9bae4c0dad0d7d0b7726990a24794773d9a224bedfca1768e581
SHA512186375d5bb4ae01d3f6e7ee36f976ca16e60542d78a29a6ae4f53ee5e0c243eade7df48b27934b3c002e7037e7413b75db652c57a807eb276bbbcb3847a7daca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5258050fcd0f4873670208c6d10615817
SHA156d2f428948f926c8d9a9bae3a27c52a9d5ffd3b
SHA256dcec8037293388f1ee3f168bdbeb41c9ae54e6cdab9eb30c1a603595cb0823a2
SHA5126291f6f2c58393499ae4c2fd93f633c7cbe5d93b1b0088d0622a3a487284613eb4954a82d491dade43e175116d5df8332a636b7b0fe3688690328e860dc06bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e18ec7f75af691fcb91ea76a01e18859
SHA180be43d7000cdcf0842b342dca110f8a5b76b5fc
SHA25629a273a2700d13954f8fa416c7c8c6ff1d6c2832cf8deb2b796da11eb92ac790
SHA512b28087f6b371130076dccbfeb8d737ed711d02bebcf08aa9e31b9089dee4c2549c75c36de77b50f73d034a3be5952602ca62a6c728404eb73295069a753c7aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587aeb8d741bac7fb9ee27089929a7dff
SHA10ce2550f38efbf1a61d57509d3b064d5f2c99712
SHA256a63a0ea7753136ab6ce2e90d9a44bdc941412ccafad55d0b1b6268bd0e1cf3d5
SHA512d36dd8f03460fd64312a610c9444b792b15928f9915b4a3b82d7a120116da4b35c75662582e74c9624a74f82aa49cfe425b375659be5b804685d05541bbc79b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583f46d1511e8d3ef857e0d735474ddf2
SHA1ca565b92a8fac5b61452d401ed153d0e73a66c17
SHA256e3fc0b791519a80bd6311a9b6996641c5c0e30de27bef1f86f4623fc623c455c
SHA5120231f5921aab71bb1b619673b5dc226d65e0f4706e2699010dc4ccd6c3b5a06a59da1b760f679b851af1519bc93f8d60ec9a8f3672debb5b626b5f35273847cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563afdd61044034e31531a6a33dbeb9c6
SHA136a4afabf091c5d14d8d97f0e58ccc4ba0d842d5
SHA256ef10d1611e160b4b24395d2edf2238bcfa9e44f2d49b8da3b8e637b0e88c1605
SHA5129cfd07b358633a8c572de13fe14c3fc5ccb69e39bcf18ebe846800a69afb0a8ce2cb9759beaee6cfe950b5130f3550e25c7f7ce224901e0332aa8041edcad4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cec2798bfb8d21cb3e0276a44c5b5b8f
SHA15e5ea4d728d4e3435c69bd75b33f6a55efece1f1
SHA256229033a07388eafb1578e0115fa99bc3fd6a123b381316fde8c3ce6d6940e8b5
SHA512b1d462064aa60e8400fb2e3e6ca0e517a99eb9e3175389c4fd4d93e7895f5bb646c5aea392ad489c645b6a62cf04e6623af3e823551710a8a18df78a9e467e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd5ea27dc9129e88164e7173f7ae51ad
SHA1226a2ea009f1d19e7f827974f3d62ab90c274623
SHA25624f835f5858b048abebee60d85128e060d18c769b2b145a13a31fe813f984f62
SHA512eb610b99089297c84031b1a983ab1f8b96decd6035d60daa510fd9c43dfe52cd8d4c07e6df1621563a237d1d74bf9765a9721554b8040980ae5ce3b7d0f23cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545aab389f4f32aeb24322615802206be
SHA16603715035d6b5c2ac8753b3fec44dec1619c665
SHA256cb1a382a0b27f615f2da171a0cffa0c7e71b235559521dc6cb5897b279bc43ed
SHA5124eeb71ee953d96c70d14ba2f082eb5cdb841d94dfa806eb9c8297992b19d2744491c46c398febad68f1ea19d3f4da8719fd601008d85d9648b821cfa5d6675da
-
Filesize
9KB
MD5f7062dd0abcc444b82c76bd571f3b6eb
SHA1982e9015fda41be35930d2660adef4e161eaa172
SHA256d90bcb4af8dbec55b359f8ae43dc2356b8787eb70220e35cb7c64d4db2277c5b
SHA5121ee0a76436324a10a29ebf54e902bc5b5e2f53f59e50a95f2c76243d83b921e53bc54a3d561090076e49618153c3260cec610bf9bd03d09f06df9951e4e06500
-
Filesize
8KB
MD508c068510a30a53d79b47bd32a853df8
SHA17d9678c04b4e83c494a36407a6b6bb593b854cf1
SHA2561a74ffeda5a8d7fa9f682c2b0c6f09625784e055cd2caded62cf5eba9cf8920f
SHA5124d390867233a764fdaa23640ba0d9e36291ab60041dc2107d72edcd6c77c6fcba496c2be38421075fc3dad9d7e8ef79efaafb6de3196587d42634d377b20a32b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OIGQELFZ\favicon-trans-bg-blue-mg-png[1].png
Filesize308B
MD5bda49766e2e7e028ef09d0e34988ecdf
SHA173fed2c00c224aa0df89397ec41488d63975c882
SHA2565cbda906c7db6d50c7e200d73841a7bb7404bcff1b3c9121aa5bc79dbc608b9a
SHA5122292945b9f53d495b9845cde7fdddc6890edbf00262314691bdc609d81dd6521ad3bb687766a2291077a1848ef49bd04a430c96503eb3254dad6e932963c9abd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U6AGJ71Z\favicon[1].ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U6AGJ71Z\favicon[1].ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
3KB
MD5fd927aaecf11cf1fbc2bc19255aaf85d
SHA13b8e689a147449df0f6dd11187896d76d682c3be
SHA2567508106b18a2dcd58efa9c964d34e234066fa585f89c67ff97659ccfe6d284f1
SHA5129e89afdb91df2b2582996266571c149fbd1cc27f888d951de642ac053ab3fa87c0acd0704ff7a598e6bf8a33222aa1087c09627b2014858e5e69d4e7252a4f55