Analysis
-
max time kernel
239s -
max time network
252s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 17:39
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe
-
Size
364KB
-
MD5
5f0a7d1c2a396f2aa7effc6c9d438450
-
SHA1
dbcec39889c9c0fc46ff19b3e388896905189719
-
SHA256
a2f0563bd718ba2dd2cb630a5f20ade092f42cd6df4bdcd83abaeee3b3ac5cb6
-
SHA512
c0e308c4b39e1342d278815580cc19aad3b08b0cd527f407b9ef7454c36c485acfbd3c019e3d8e90b6c81e9c4488f77fb11e2ab7945971d71e3ef2cf0f44d24f
-
SSDEEP
6144:XrhEcXQNuq1Tx0mZud/nK9l1n1Tx0mZuwJPICe1Tx0mZud/nK9l1n1Tx0mZu:BWTE/KvTfJiTE/KvT
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdmpck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pdmpck32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dekobaki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kigoeagd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkihedld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkihedld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpccgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbknqeha.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpccgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hbknqeha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dekobaki.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kigoeagd.exe -
Executes dropped EXE 7 IoCs
pid Process 3540 Dekobaki.exe 1800 Kigoeagd.exe 1496 Kpccgk32.exe 3728 Kkihedld.exe 2176 Hbknqeha.exe 4756 Pdmpck32.exe 4812 Qfolkcpb.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Kigoeagd.exe Dekobaki.exe File created C:\Windows\SysWOW64\Qhlejo32.dll Dekobaki.exe File created C:\Windows\SysWOW64\Egbefc32.dll Kigoeagd.exe File created C:\Windows\SysWOW64\Hbknqeha.exe Kkihedld.exe File created C:\Windows\SysWOW64\Jqlmne32.dll NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe File created C:\Windows\SysWOW64\Kigoeagd.exe Dekobaki.exe File opened for modification C:\Windows\SysWOW64\Kkihedld.exe Kpccgk32.exe File created C:\Windows\SysWOW64\Cbfokcae.dll Hbknqeha.exe File created C:\Windows\SysWOW64\Qfolkcpb.exe Pdmpck32.exe File opened for modification C:\Windows\SysWOW64\Qfolkcpb.exe Pdmpck32.exe File created C:\Windows\SysWOW64\Nocebkkf.dll Pdmpck32.exe File created C:\Windows\SysWOW64\Dekobaki.exe NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe File created C:\Windows\SysWOW64\Kkihedld.exe Kpccgk32.exe File created C:\Windows\SysWOW64\Ocmhbj32.dll Kkihedld.exe File created C:\Windows\SysWOW64\Pdmpck32.exe Hbknqeha.exe File opened for modification C:\Windows\SysWOW64\Pdmpck32.exe Hbknqeha.exe File created C:\Windows\SysWOW64\Kpccgk32.exe Kigoeagd.exe File opened for modification C:\Windows\SysWOW64\Kpccgk32.exe Kigoeagd.exe File created C:\Windows\SysWOW64\Ciipme32.dll Kpccgk32.exe File opened for modification C:\Windows\SysWOW64\Hbknqeha.exe Kkihedld.exe File opened for modification C:\Windows\SysWOW64\Dekobaki.exe NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4976 4812 WerFault.exe 96 -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dekobaki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ciipme32.dll" Kpccgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpccgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pdmpck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jqlmne32.dll" NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kigoeagd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkihedld.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pdmpck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nocebkkf.dll" Pdmpck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ocmhbj32.dll" Kkihedld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hbknqeha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qhlejo32.dll" Dekobaki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dekobaki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egbefc32.dll" Kigoeagd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kigoeagd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kpccgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkihedld.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hbknqeha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbfokcae.dll" Hbknqeha.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4472 wrote to memory of 3540 4472 NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe 89 PID 4472 wrote to memory of 3540 4472 NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe 89 PID 4472 wrote to memory of 3540 4472 NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe 89 PID 3540 wrote to memory of 1800 3540 Dekobaki.exe 91 PID 3540 wrote to memory of 1800 3540 Dekobaki.exe 91 PID 3540 wrote to memory of 1800 3540 Dekobaki.exe 91 PID 1800 wrote to memory of 1496 1800 Kigoeagd.exe 92 PID 1800 wrote to memory of 1496 1800 Kigoeagd.exe 92 PID 1800 wrote to memory of 1496 1800 Kigoeagd.exe 92 PID 1496 wrote to memory of 3728 1496 Kpccgk32.exe 94 PID 1496 wrote to memory of 3728 1496 Kpccgk32.exe 94 PID 1496 wrote to memory of 3728 1496 Kpccgk32.exe 94 PID 3728 wrote to memory of 2176 3728 Kkihedld.exe 95 PID 3728 wrote to memory of 2176 3728 Kkihedld.exe 95 PID 3728 wrote to memory of 2176 3728 Kkihedld.exe 95 PID 2176 wrote to memory of 4756 2176 Hbknqeha.exe 98 PID 2176 wrote to memory of 4756 2176 Hbknqeha.exe 98 PID 2176 wrote to memory of 4756 2176 Hbknqeha.exe 98 PID 4756 wrote to memory of 4812 4756 Pdmpck32.exe 96 PID 4756 wrote to memory of 4812 4756 Pdmpck32.exe 96 PID 4756 wrote to memory of 4812 4756 Pdmpck32.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5f0a7d1c2a396f2aa7effc6c9d438450.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\Dekobaki.exeC:\Windows\system32\Dekobaki.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\Kigoeagd.exeC:\Windows\system32\Kigoeagd.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\Kpccgk32.exeC:\Windows\system32\Kpccgk32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\Kkihedld.exeC:\Windows\system32\Kkihedld.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\Hbknqeha.exeC:\Windows\system32\Hbknqeha.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\Pdmpck32.exeC:\Windows\system32\Pdmpck32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4756
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Qfolkcpb.exeC:\Windows\system32\Qfolkcpb.exe1⤵
- Executes dropped EXE
PID:4812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 4002⤵
- Program crash
PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4812 -ip 48121⤵PID:5104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD571bc5e8ebbcddc316b5429cb43e2046e
SHA13e5c967738071585ccd1aeee7914e3ceb681de60
SHA256fe6ea341c2f9f867423931df373e9e656e10ab3127a5fe4123bacd1bcfb72280
SHA512a0774b6b50b6c5f45ca4cfc0e18ea37839d535af9e70efb22c06abf48859f8215eb8b21b8533c6234225d0dab03cee8ebc66a792ee675c31ae20f622b7e6357a
-
Filesize
364KB
MD571bc5e8ebbcddc316b5429cb43e2046e
SHA13e5c967738071585ccd1aeee7914e3ceb681de60
SHA256fe6ea341c2f9f867423931df373e9e656e10ab3127a5fe4123bacd1bcfb72280
SHA512a0774b6b50b6c5f45ca4cfc0e18ea37839d535af9e70efb22c06abf48859f8215eb8b21b8533c6234225d0dab03cee8ebc66a792ee675c31ae20f622b7e6357a
-
Filesize
364KB
MD50a854e625fca5716cf944f66cd6814e7
SHA1fd336f51b1baef7352d73b6deb1897d759979e79
SHA256d4d05f0120840de1a88c3ea93332641ad3b727ac4a2c3b373ecea7c5d403afdb
SHA5121906594754843d732961c1b28872968495a275bfde5e50f5c127ffd25f39c9296e71fe48bf194c67b2a1e4e5cf0eddda1aba29cf04bcf830e4517081cce9a4e3
-
Filesize
364KB
MD50a854e625fca5716cf944f66cd6814e7
SHA1fd336f51b1baef7352d73b6deb1897d759979e79
SHA256d4d05f0120840de1a88c3ea93332641ad3b727ac4a2c3b373ecea7c5d403afdb
SHA5121906594754843d732961c1b28872968495a275bfde5e50f5c127ffd25f39c9296e71fe48bf194c67b2a1e4e5cf0eddda1aba29cf04bcf830e4517081cce9a4e3
-
Filesize
364KB
MD52dc572492fe7d7b7d708d81fed8e0dba
SHA1bb96de3804fb48e8cb62411f6cdbc2fecf5a6322
SHA256b1b35e5dc640df2b75a07d910d70a2a91e3877c246cd189c761b47461a2247ef
SHA512c5534487da888f1e9dea555779c14f7e8ca5f3c473e3a8b8dca1b3bae020ef91bb1ad85d874c1a159abf85fd2acb8ca65c2503a472e36938f090f8acd319b0d4
-
Filesize
364KB
MD52dc572492fe7d7b7d708d81fed8e0dba
SHA1bb96de3804fb48e8cb62411f6cdbc2fecf5a6322
SHA256b1b35e5dc640df2b75a07d910d70a2a91e3877c246cd189c761b47461a2247ef
SHA512c5534487da888f1e9dea555779c14f7e8ca5f3c473e3a8b8dca1b3bae020ef91bb1ad85d874c1a159abf85fd2acb8ca65c2503a472e36938f090f8acd319b0d4
-
Filesize
364KB
MD597f00447c57bba8622c9e9cee8cf3ca9
SHA19e0fb9372e63c195091edebd73ebc7214acbccd8
SHA25664f00c6e2d35109284a88d4f984a590ce0763e0b93e0e34a06d55548aaf9d8ea
SHA512700332032eb51c14589e4a68e093cdea87da44e161be06be8728243dce23da81f69cd1cb5ceb13c03e911335f560ec40264d22f2277196f1cf671d9f2db5ec11
-
Filesize
364KB
MD597f00447c57bba8622c9e9cee8cf3ca9
SHA19e0fb9372e63c195091edebd73ebc7214acbccd8
SHA25664f00c6e2d35109284a88d4f984a590ce0763e0b93e0e34a06d55548aaf9d8ea
SHA512700332032eb51c14589e4a68e093cdea87da44e161be06be8728243dce23da81f69cd1cb5ceb13c03e911335f560ec40264d22f2277196f1cf671d9f2db5ec11
-
Filesize
364KB
MD5f79a47f0977a143568da8d9057a16a2d
SHA1ebfa970efb5908a58f70a3bad2ae49358a160489
SHA2567dd8d2c563b7b2b45dc388705995f355e3fe5de3c9a2bffa3d8617a4b1a9d7d2
SHA5127d6b9fc1c8c36e2a8d9707ff81a08648920796d5694ade2c43363838046fe18749366b96df00f3d7a4e6eeb58ee80e42b2d0813c675308c4cc43b1da302923f0
-
Filesize
364KB
MD5f79a47f0977a143568da8d9057a16a2d
SHA1ebfa970efb5908a58f70a3bad2ae49358a160489
SHA2567dd8d2c563b7b2b45dc388705995f355e3fe5de3c9a2bffa3d8617a4b1a9d7d2
SHA5127d6b9fc1c8c36e2a8d9707ff81a08648920796d5694ade2c43363838046fe18749366b96df00f3d7a4e6eeb58ee80e42b2d0813c675308c4cc43b1da302923f0
-
Filesize
364KB
MD569017b406b703a9557f33484b3df92cc
SHA16e0ff54bfc20f195435dae92cd44d1ee1c4841e1
SHA256a9e30d0c6129e5b1709319d1b971c4613e0ce98a9c2944eb45b1bf180e45bc2b
SHA512f5055501e20192ef3774408866624999fe6fb97f7f29df38d9113239155472b34a8f5def394a3ab8b6b6e2777c94c2e9cd773457ec7d2b99f7ebbb728a086154
-
Filesize
364KB
MD569017b406b703a9557f33484b3df92cc
SHA16e0ff54bfc20f195435dae92cd44d1ee1c4841e1
SHA256a9e30d0c6129e5b1709319d1b971c4613e0ce98a9c2944eb45b1bf180e45bc2b
SHA512f5055501e20192ef3774408866624999fe6fb97f7f29df38d9113239155472b34a8f5def394a3ab8b6b6e2777c94c2e9cd773457ec7d2b99f7ebbb728a086154
-
Filesize
364KB
MD50780c28221bd16e19e8f2523422aaf00
SHA1251e03b739e1f2c45394351fa88fee05c6aeac3a
SHA256efc2b2cd89913ba2eb9297f52bc427520426418a49fbcbefad5ca30212021890
SHA5124a79bec4ece45cf2f40f2b5edbf430b35dfa6b38227cea7b9df968c4d73b6316fd7072f431b7fa19dba7f0c9ce1c4d4d10b484227366b5da9d7f53dd14e16c40
-
Filesize
364KB
MD50780c28221bd16e19e8f2523422aaf00
SHA1251e03b739e1f2c45394351fa88fee05c6aeac3a
SHA256efc2b2cd89913ba2eb9297f52bc427520426418a49fbcbefad5ca30212021890
SHA5124a79bec4ece45cf2f40f2b5edbf430b35dfa6b38227cea7b9df968c4d73b6316fd7072f431b7fa19dba7f0c9ce1c4d4d10b484227366b5da9d7f53dd14e16c40