Analysis
-
max time kernel
131s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2023 14:42
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe
-
Size
95KB
-
MD5
ce1f6ab3a18386d9903d2abb6d50493b
-
SHA1
a55b1857348952d9a3e42dc6e5fe9e8ae3ac5a99
-
SHA256
9df4188f51437b7e1d18796f22d21a8b05bc911be05d365acfad847ce7d21f6d
-
SHA512
985905ae5ef14d4d4f32de1646ef16a089eb38536ded7c3e35f4eea8a2784ae478deb2a9f66fbaba77ebf6bba1cbbcd1e4fdceab18d3e316da21981528ac73f8
-
SSDEEP
1536:VUIiCg2g1Dl+alQ+0aLzHeGIxhcRQr1rRVRoRch1dROrwpOudRirVtFsrTpMGQYO:OX3fQa0l3xhceFTWM1dQrTOwZtFKnO
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qelcamcj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amfhgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Abcppq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qckfid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qkfkng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Amfhgj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abcppq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qkfkng32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aflpkpjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aflpkpjm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qckfid32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qelcamcj.exe -
Executes dropped EXE 7 IoCs
pid Process 1196 Qckfid32.exe 1580 Qelcamcj.exe 4428 Qkfkng32.exe 4684 Aflpkpjm.exe 5096 Amfhgj32.exe 408 Abcppq32.exe 704 Amhdmi32.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File created C:\Windows\SysWOW64\Cdkdne32.dll Qckfid32.exe File created C:\Windows\SysWOW64\Qkfkng32.exe Qelcamcj.exe File created C:\Windows\SysWOW64\Aflpkpjm.exe Qkfkng32.exe File created C:\Windows\SysWOW64\Gckjdhni.dll Aflpkpjm.exe File created C:\Windows\SysWOW64\Abcppq32.exe Amfhgj32.exe File created C:\Windows\SysWOW64\Amhdmi32.exe Abcppq32.exe File opened for modification C:\Windows\SysWOW64\Qelcamcj.exe Qckfid32.exe File opened for modification C:\Windows\SysWOW64\Qkfkng32.exe Qelcamcj.exe File opened for modification C:\Windows\SysWOW64\Aflpkpjm.exe Qkfkng32.exe File created C:\Windows\SysWOW64\Opepqban.dll Qkfkng32.exe File opened for modification C:\Windows\SysWOW64\Abcppq32.exe Amfhgj32.exe File opened for modification C:\Windows\SysWOW64\Qckfid32.exe NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe File created C:\Windows\SysWOW64\Qelcamcj.exe Qckfid32.exe File created C:\Windows\SysWOW64\Amfhgj32.exe Aflpkpjm.exe File opened for modification C:\Windows\SysWOW64\Amhdmi32.exe Abcppq32.exe File created C:\Windows\SysWOW64\Qckfid32.exe NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe File created C:\Windows\SysWOW64\Cojaijla.dll NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe File created C:\Windows\SysWOW64\Iilpao32.dll Qelcamcj.exe File opened for modification C:\Windows\SysWOW64\Amfhgj32.exe Aflpkpjm.exe File created C:\Windows\SysWOW64\Ebcgjl32.dll Amfhgj32.exe File created C:\Windows\SysWOW64\Ejcdfahd.dll Abcppq32.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qkfkng32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Amfhgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejcdfahd.dll" Abcppq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Abcppq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Qckfid32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qelcamcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opepqban.dll" Qkfkng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aflpkpjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Qkfkng32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aflpkpjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gckjdhni.dll" Aflpkpjm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdkdne32.dll" Qckfid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iilpao32.dll" Qelcamcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebcgjl32.dll" Amfhgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Amfhgj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cojaijla.dll" NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qckfid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Qelcamcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Abcppq32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4888 wrote to memory of 1196 4888 NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe 86 PID 4888 wrote to memory of 1196 4888 NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe 86 PID 4888 wrote to memory of 1196 4888 NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe 86 PID 1196 wrote to memory of 1580 1196 Qckfid32.exe 87 PID 1196 wrote to memory of 1580 1196 Qckfid32.exe 87 PID 1196 wrote to memory of 1580 1196 Qckfid32.exe 87 PID 1580 wrote to memory of 4428 1580 Qelcamcj.exe 88 PID 1580 wrote to memory of 4428 1580 Qelcamcj.exe 88 PID 1580 wrote to memory of 4428 1580 Qelcamcj.exe 88 PID 4428 wrote to memory of 4684 4428 Qkfkng32.exe 89 PID 4428 wrote to memory of 4684 4428 Qkfkng32.exe 89 PID 4428 wrote to memory of 4684 4428 Qkfkng32.exe 89 PID 4684 wrote to memory of 5096 4684 Aflpkpjm.exe 90 PID 4684 wrote to memory of 5096 4684 Aflpkpjm.exe 90 PID 4684 wrote to memory of 5096 4684 Aflpkpjm.exe 90 PID 5096 wrote to memory of 408 5096 Amfhgj32.exe 91 PID 5096 wrote to memory of 408 5096 Amfhgj32.exe 91 PID 5096 wrote to memory of 408 5096 Amfhgj32.exe 91 PID 408 wrote to memory of 704 408 Abcppq32.exe 92 PID 408 wrote to memory of 704 408 Abcppq32.exe 92 PID 408 wrote to memory of 704 408 Abcppq32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ce1f6ab3a18386d9903d2abb6d50493b_JC.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\Qckfid32.exeC:\Windows\system32\Qckfid32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\Qelcamcj.exeC:\Windows\system32\Qelcamcj.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\Qkfkng32.exeC:\Windows\system32\Qkfkng32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\Aflpkpjm.exeC:\Windows\system32\Aflpkpjm.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\Amfhgj32.exeC:\Windows\system32\Amfhgj32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\Abcppq32.exeC:\Windows\system32\Abcppq32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\Amhdmi32.exeC:\Windows\system32\Amhdmi32.exe8⤵
- Executes dropped EXE
PID:704
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5f906f204f0f88ac5cfdc032325702777
SHA10a08ab4388c36f374d79ca763d603ea04d003320
SHA2566f0d5a1a44928482ed5d5e50de4f8f518c2f790bfc2ba7876735f6602da0b8ca
SHA512651109a0855ce97dec21b2bbb3c16a2ebe760b449283c4ef886888f78107c4b9f7ef5b2b0dbdf70ee2c4d48b45d3645f8a45087448327a0e266e2279d63dc610
-
Filesize
95KB
MD5f906f204f0f88ac5cfdc032325702777
SHA10a08ab4388c36f374d79ca763d603ea04d003320
SHA2566f0d5a1a44928482ed5d5e50de4f8f518c2f790bfc2ba7876735f6602da0b8ca
SHA512651109a0855ce97dec21b2bbb3c16a2ebe760b449283c4ef886888f78107c4b9f7ef5b2b0dbdf70ee2c4d48b45d3645f8a45087448327a0e266e2279d63dc610
-
Filesize
95KB
MD5abe0c693e486270f3d130a1347608a44
SHA18911c70a82ce5eb25df2253fbeb16c686a154986
SHA25640a74a4f3a34fb80b8a52947e87179828187203f992054e5a8c28d4dbcdf31e8
SHA512a250e3083d863509ef2db34d976f994de2f532955826bcace10466e1d495efa3d373fad5ba4d103b1a58cb180395b4ae45776dd55362738634fdaf1cf4b46162
-
Filesize
95KB
MD5abe0c693e486270f3d130a1347608a44
SHA18911c70a82ce5eb25df2253fbeb16c686a154986
SHA25640a74a4f3a34fb80b8a52947e87179828187203f992054e5a8c28d4dbcdf31e8
SHA512a250e3083d863509ef2db34d976f994de2f532955826bcace10466e1d495efa3d373fad5ba4d103b1a58cb180395b4ae45776dd55362738634fdaf1cf4b46162
-
Filesize
95KB
MD579bd34a8be1d7fe1d53e73208efeecc3
SHA1f0828de0f82608734c2bc4be54dd81b2cdf5eabc
SHA25638b45773a7dde354f500251a0ade8a58e5e29d448d3e519e4c0206ece508e4d0
SHA512c59f3abdebf68aebf62eb2559210c538e8e5569c607776eedd45e39d7cb8c7e981959efa9e7d6322d9a9ab4dd5aa7581a67ad118a625bcf97efe500ceda432ef
-
Filesize
95KB
MD579bd34a8be1d7fe1d53e73208efeecc3
SHA1f0828de0f82608734c2bc4be54dd81b2cdf5eabc
SHA25638b45773a7dde354f500251a0ade8a58e5e29d448d3e519e4c0206ece508e4d0
SHA512c59f3abdebf68aebf62eb2559210c538e8e5569c607776eedd45e39d7cb8c7e981959efa9e7d6322d9a9ab4dd5aa7581a67ad118a625bcf97efe500ceda432ef
-
Filesize
95KB
MD505addd7f7e9f43b978177b22b7f5b086
SHA10008981e95b97bc2579d8be0e3c6dab816a8e86d
SHA2563852c80981f9328b2fcc98eeddbf2f57ecd045104713c6993bf36d68f2e08a65
SHA5127971c832e6eabc3ed226bd72cf564f5c6818f13e0e297e52c15fb29dede5aee6eb59ded5e5b0a5b1a8a7ce9197f9b0e5e6f934cb0feb3a6693f646a5c64b681b
-
Filesize
95KB
MD505addd7f7e9f43b978177b22b7f5b086
SHA10008981e95b97bc2579d8be0e3c6dab816a8e86d
SHA2563852c80981f9328b2fcc98eeddbf2f57ecd045104713c6993bf36d68f2e08a65
SHA5127971c832e6eabc3ed226bd72cf564f5c6818f13e0e297e52c15fb29dede5aee6eb59ded5e5b0a5b1a8a7ce9197f9b0e5e6f934cb0feb3a6693f646a5c64b681b
-
Filesize
7KB
MD5ea79cbd1bec0ef0a010b89c77ad5d66b
SHA1636bae2a3dd3ca851cf5b686ca2348e063e9c770
SHA256ecf31f9af67ebd1a4800239993710e62069133d56c688ef589e90008b8acf290
SHA5129a1563790594b8f99384e17c9768a57b68b1039346f3d061cbf02fec234d5262246aa949e12f2e31cf374c1f0aaf56da0e36517cb5dc80faee20183b1012fe5a
-
Filesize
95KB
MD522635d4bf82438050844a7080a9bde62
SHA13347824e08bc434d1bf73767a322a93d27bc0d2b
SHA256f49d342aedf211050d73b0898024075eed28eba71488ff2f3d7f3d18584a0e44
SHA512ab94fd4152eebe723f5f86009515d9b6a0446638803c9eb1ef8034ed3f6d9d85ed2912a6c5da352a0248c6404dcc85a72e785847ab4511fdfe6bdb074e70e8b2
-
Filesize
95KB
MD522635d4bf82438050844a7080a9bde62
SHA13347824e08bc434d1bf73767a322a93d27bc0d2b
SHA256f49d342aedf211050d73b0898024075eed28eba71488ff2f3d7f3d18584a0e44
SHA512ab94fd4152eebe723f5f86009515d9b6a0446638803c9eb1ef8034ed3f6d9d85ed2912a6c5da352a0248c6404dcc85a72e785847ab4511fdfe6bdb074e70e8b2
-
Filesize
95KB
MD53f7fcfe9902af9bf6e214bbc236e84d1
SHA1d819dceb0ec9273dadc2a32f43780509ff0f911f
SHA256700178e0b5dc4bc2c588d6805c1b64fc849cc5cfbcec519c81d06e3106842b13
SHA512099f30eef49c995f89941e6d95f8b75c8a76fc1ebe5c5b1dccbbf56363d5c179cab0e55fca06a2ed77094952598587526f5121c5f40cf8564615e41240e5e472
-
Filesize
95KB
MD53f7fcfe9902af9bf6e214bbc236e84d1
SHA1d819dceb0ec9273dadc2a32f43780509ff0f911f
SHA256700178e0b5dc4bc2c588d6805c1b64fc849cc5cfbcec519c81d06e3106842b13
SHA512099f30eef49c995f89941e6d95f8b75c8a76fc1ebe5c5b1dccbbf56363d5c179cab0e55fca06a2ed77094952598587526f5121c5f40cf8564615e41240e5e472
-
Filesize
95KB
MD557d2c5ca81a8dd750f3dcb52daa03713
SHA1f01d232da2eb6a1b04861b5e62f600dd5c183beb
SHA256ac5b057dc8420da19ba46538af711d45e6053d2777032dab590c53e7330fea2b
SHA5121d289761e212b032ec850528c2f68c623345730d2f085faeef0ee672e6f3eb13646eb97c00ffd036094bb812f899c92a4481f8a2ae40e3d599dca73f9dbc89ac
-
Filesize
95KB
MD557d2c5ca81a8dd750f3dcb52daa03713
SHA1f01d232da2eb6a1b04861b5e62f600dd5c183beb
SHA256ac5b057dc8420da19ba46538af711d45e6053d2777032dab590c53e7330fea2b
SHA5121d289761e212b032ec850528c2f68c623345730d2f085faeef0ee672e6f3eb13646eb97c00ffd036094bb812f899c92a4481f8a2ae40e3d599dca73f9dbc89ac