Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.be3aeb925855edbcf000def2e24656e0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.be3aeb925855edbcf000def2e24656e0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.be3aeb925855edbcf000def2e24656e0.exe
-
Size
744KB
-
MD5
be3aeb925855edbcf000def2e24656e0
-
SHA1
dcc0b768d1cabb65e5ba72b667595f97e99c64d6
-
SHA256
1c71044e74dbdd2ad3ea1b774cc43ac30778e232156b8b60c502059d70d79b71
-
SHA512
7c8e4ce92ae1b201dfb3046bd96b28fb6b5a6650b889180577fd08d6e8175572546f1d0fa14ae8de12d3793fda424965d3e2221e411d4f3c0c0d6c7682b17fbc
-
SSDEEP
12288:wwKfOVRo9yRYlCAFHTHe4bfDKn2SjjxShnO7Zm9x90vaYF/q3OEo:wxWVeyRYl/BzZAhjjxqnO7ZmPe03to
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 288 operatingwindows.exe 2956 systemmsader15.exe 2944 adobeadobe.exe 2708 windowssidebar1.0.7600.16385.exe -
Loads dropped DLL 4 IoCs
pid Process 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EngineOffice = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.be3aeb925855edbcf000def2e24656e0.exe" NEAS.be3aeb925855edbcf000def2e24656e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\SignatureSpelling = "c:\\program files (x86)\\adobe\\reader 9.0\\reader\\plug_ins\\adobeadobe.exe" NEAS.be3aeb925855edbcf000def2e24656e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\msader15Operating6.1.7600.163857.0907131255 = "c:\\program files (x86)\\common files\\system\\ado\\fr-fr\\systemmsader15.exe" NEAS.be3aeb925855edbcf000def2e24656e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BCSSync = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\BCSSync.exe\" /DelayServices" NEAS.be3aeb925855edbcf000def2e24656e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sidebarSistema = "c:\\program files (x86)\\windows sidebar\\es-es\\windowssidebar1.0.7600.16385.exe" NEAS.be3aeb925855edbcf000def2e24656e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\msader15Microsoft = "c:\\program files (x86)\\common files\\system\\ado\\ja-jp\\windowssystem.exe" NEAS.be3aeb925855edbcf000def2e24656e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\EngineSource = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.be3aeb925855edbcf000def2e24656e0.exe" NEAS.be3aeb925855edbcf000def2e24656e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\OperatingMicrosoft = "c:\\program files (x86)\\common files\\system\\ado\\en-us\\operatingwindows.exe" NEAS.be3aeb925855edbcf000def2e24656e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\msdaremrmsadcfr = "c:\\program files (x86)\\common files\\system\\msadc\\de-de\\systemmsadcfr.exe" NEAS.be3aeb925855edbcf000def2e24656e0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\ntdll.dll.dll NEAS.be3aeb925855edbcf000def2e24656e0.exe File created C:\Windows\SysWOW64\ntdll.dll.dll operatingwindows.exe File created C:\Windows\SysWOW64\ntdll.dll.dll systemmsader15.exe File created C:\Windows\SysWOW64\ntdll.dll.dll adobeadobe.exe File created C:\Windows\SysWOW64\ntdll.dll.dll windowssidebar1.0.7600.16385.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\System\msadc\de-DE\Systemmsadcfr.exe NEAS.be3aeb925855edbcf000def2e24656e0.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\es-ES\RCX8191.tmp NEAS.be3aeb925855edbcf000def2e24656e0.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\fr-FR\RCX9928.tmp NEAS.be3aeb925855edbcf000def2e24656e0.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AdobeAdobe.exe NEAS.be3aeb925855edbcf000def2e24656e0.exe File created C:\Program Files (x86)\Common Files\System\ado\en-US\OperatingWindows.exe NEAS.be3aeb925855edbcf000def2e24656e0.exe File created C:\Program Files (x86)\Common Files\System\ado\fr-FR\Systemmsader15.exe NEAS.be3aeb925855edbcf000def2e24656e0.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\RCX99D4.tmp NEAS.be3aeb925855edbcf000def2e24656e0.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\en-US\RCX8170.tmp NEAS.be3aeb925855edbcf000def2e24656e0.exe File created C:\Program Files (x86)\Windows Sidebar\es-ES\Windowssidebar1.0.7600.16385.exe NEAS.be3aeb925855edbcf000def2e24656e0.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\ja-JP\RCX9917.tmp NEAS.be3aeb925855edbcf000def2e24656e0.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\de-DE\Systemmsadcfr.exe NEAS.be3aeb925855edbcf000def2e24656e0.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\de-DE\RCX80B4.tmp NEAS.be3aeb925855edbcf000def2e24656e0.exe File created C:\Program Files (x86)\Common Files\System\ado\ja-JP\WindowsSystem.exe NEAS.be3aeb925855edbcf000def2e24656e0.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString NEAS.be3aeb925855edbcf000def2e24656e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier systemmsader15.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier NEAS.be3aeb925855edbcf000def2e24656e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString operatingwindows.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString systemmsader15.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString adobeadobe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier adobeadobe.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 NEAS.be3aeb925855edbcf000def2e24656e0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 operatingwindows.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier operatingwindows.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString windowssidebar1.0.7600.16385.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier windowssidebar1.0.7600.16385.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 systemmsader15.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 adobeadobe.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 windowssidebar1.0.7600.16385.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 288 operatingwindows.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 2956 systemmsader15.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 2944 adobeadobe.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 2708 windowssidebar1.0.7600.16385.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3060 wrote to memory of 288 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 30 PID 3060 wrote to memory of 288 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 30 PID 3060 wrote to memory of 288 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 30 PID 3060 wrote to memory of 288 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 30 PID 3060 wrote to memory of 2956 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 32 PID 3060 wrote to memory of 2956 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 32 PID 3060 wrote to memory of 2956 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 32 PID 3060 wrote to memory of 2956 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 32 PID 3060 wrote to memory of 2944 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 34 PID 3060 wrote to memory of 2944 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 34 PID 3060 wrote to memory of 2944 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 34 PID 3060 wrote to memory of 2944 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 34 PID 3060 wrote to memory of 2708 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 37 PID 3060 wrote to memory of 2708 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 37 PID 3060 wrote to memory of 2708 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 37 PID 3060 wrote to memory of 2708 3060 NEAS.be3aeb925855edbcf000def2e24656e0.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.be3aeb925855edbcf000def2e24656e0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.be3aeb925855edbcf000def2e24656e0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\program files (x86)\common files\system\ado\en-us\operatingwindows.exe"c:\program files (x86)\common files\system\ado\en-us\operatingwindows.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:288
-
-
\??\c:\program files (x86)\common files\system\ado\fr-fr\systemmsader15.exe"c:\program files (x86)\common files\system\ado\fr-fr\systemmsader15.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
\??\c:\program files (x86)\adobe\reader 9.0\reader\plug_ins\adobeadobe.exe"c:\program files (x86)\adobe\reader 9.0\reader\plug_ins\adobeadobe.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2944
-
-
\??\c:\program files (x86)\windows sidebar\es-es\windowssidebar1.0.7600.16385.exe"c:\program files (x86)\windows sidebar\es-es\windowssidebar1.0.7600.16385.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD5be3aeb925855edbcf000def2e24656e0
SHA1dcc0b768d1cabb65e5ba72b667595f97e99c64d6
SHA2561c71044e74dbdd2ad3ea1b774cc43ac30778e232156b8b60c502059d70d79b71
SHA5127c8e4ce92ae1b201dfb3046bd96b28fb6b5a6650b889180577fd08d6e8175572546f1d0fa14ae8de12d3793fda424965d3e2221e411d4f3c0c0d6c7682b17fbc
-
Filesize
744KB
MD5be3aeb925855edbcf000def2e24656e0
SHA1dcc0b768d1cabb65e5ba72b667595f97e99c64d6
SHA2561c71044e74dbdd2ad3ea1b774cc43ac30778e232156b8b60c502059d70d79b71
SHA5127c8e4ce92ae1b201dfb3046bd96b28fb6b5a6650b889180577fd08d6e8175572546f1d0fa14ae8de12d3793fda424965d3e2221e411d4f3c0c0d6c7682b17fbc
-
Filesize
744KB
MD5be3aeb925855edbcf000def2e24656e0
SHA1dcc0b768d1cabb65e5ba72b667595f97e99c64d6
SHA2561c71044e74dbdd2ad3ea1b774cc43ac30778e232156b8b60c502059d70d79b71
SHA5127c8e4ce92ae1b201dfb3046bd96b28fb6b5a6650b889180577fd08d6e8175572546f1d0fa14ae8de12d3793fda424965d3e2221e411d4f3c0c0d6c7682b17fbc
-
Filesize
744KB
MD5be3aeb925855edbcf000def2e24656e0
SHA1dcc0b768d1cabb65e5ba72b667595f97e99c64d6
SHA2561c71044e74dbdd2ad3ea1b774cc43ac30778e232156b8b60c502059d70d79b71
SHA5127c8e4ce92ae1b201dfb3046bd96b28fb6b5a6650b889180577fd08d6e8175572546f1d0fa14ae8de12d3793fda424965d3e2221e411d4f3c0c0d6c7682b17fbc
-
Filesize
745KB
MD50a485a003339d4b5db62a15688064ec8
SHA1b96cf2e84996d6741d388d54208d2d8f4daa15a0
SHA256a9b1a53cfc73c480b3da5fe3cd5c2f79b9b370a9aa9b58ceccd8a0aa919adcaf
SHA5122e1b2b62e13a2876e147eaa2b4655ad19d98ea62f579d04a2ecebdcf07d7ad816337f9b2367c5e5ca5a7f442ba5badfc5c3fc99fbb0fa781949d0d4cc6cecc3f
-
Filesize
745KB
MD50a485a003339d4b5db62a15688064ec8
SHA1b96cf2e84996d6741d388d54208d2d8f4daa15a0
SHA256a9b1a53cfc73c480b3da5fe3cd5c2f79b9b370a9aa9b58ceccd8a0aa919adcaf
SHA5122e1b2b62e13a2876e147eaa2b4655ad19d98ea62f579d04a2ecebdcf07d7ad816337f9b2367c5e5ca5a7f442ba5badfc5c3fc99fbb0fa781949d0d4cc6cecc3f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HYJJYCDH\getfile[2].htm
Filesize40KB
MD5c2452688e1684568901944adadaecbf2
SHA17353e671a85bdd4b0faba65814255cc5a8e7298e
SHA2561de09e57eda674c25083d14728a74cc63b6a5b81dd339c031dc60d33d4dac224
SHA51272a3ec20b0e131a29b58f0863f737c8a45f0e2a43710c46308e6e786e8e02aa8b015bb80622acc9fe629f207e02114fbb05ff0de6f3dbdf9e93457efd9569919
-
Filesize
744KB
MD5be3aeb925855edbcf000def2e24656e0
SHA1dcc0b768d1cabb65e5ba72b667595f97e99c64d6
SHA2561c71044e74dbdd2ad3ea1b774cc43ac30778e232156b8b60c502059d70d79b71
SHA5127c8e4ce92ae1b201dfb3046bd96b28fb6b5a6650b889180577fd08d6e8175572546f1d0fa14ae8de12d3793fda424965d3e2221e411d4f3c0c0d6c7682b17fbc
-
Filesize
744KB
MD5be3aeb925855edbcf000def2e24656e0
SHA1dcc0b768d1cabb65e5ba72b667595f97e99c64d6
SHA2561c71044e74dbdd2ad3ea1b774cc43ac30778e232156b8b60c502059d70d79b71
SHA5127c8e4ce92ae1b201dfb3046bd96b28fb6b5a6650b889180577fd08d6e8175572546f1d0fa14ae8de12d3793fda424965d3e2221e411d4f3c0c0d6c7682b17fbc
-
Filesize
744KB
MD5be3aeb925855edbcf000def2e24656e0
SHA1dcc0b768d1cabb65e5ba72b667595f97e99c64d6
SHA2561c71044e74dbdd2ad3ea1b774cc43ac30778e232156b8b60c502059d70d79b71
SHA5127c8e4ce92ae1b201dfb3046bd96b28fb6b5a6650b889180577fd08d6e8175572546f1d0fa14ae8de12d3793fda424965d3e2221e411d4f3c0c0d6c7682b17fbc
-
Filesize
745KB
MD50a485a003339d4b5db62a15688064ec8
SHA1b96cf2e84996d6741d388d54208d2d8f4daa15a0
SHA256a9b1a53cfc73c480b3da5fe3cd5c2f79b9b370a9aa9b58ceccd8a0aa919adcaf
SHA5122e1b2b62e13a2876e147eaa2b4655ad19d98ea62f579d04a2ecebdcf07d7ad816337f9b2367c5e5ca5a7f442ba5badfc5c3fc99fbb0fa781949d0d4cc6cecc3f