Analysis
-
max time kernel
157s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 01:52
Behavioral task
behavioral1
Sample
4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe
Resource
win7-20231129-en
General
-
Target
4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe
-
Size
11.0MB
-
MD5
4aaa4f1ec20c3d7b0abb7770d7b15f7b
-
SHA1
a488b929607d51e1e62619680f57c2effebced45
-
SHA256
2629c8f5953ed65f76de83c515926456888aa93821b60dd86846cd9194ffdec8
-
SHA512
45b696ea6a0fffc35fa54e85db4ef59c7faec2cce6148e1d51deec6fecee346ebc730a0321bbc06df31537ad8757a797dc645be4f8da3f8585650c62d32dd06d
-
SSDEEP
196608:GWX2kfc9aoCsXDjDyf0wKP5W3I6sKpC48RmU/3ZlsPv7yOd6ZTvN8CSH0voYUpQn:P2qc9DCEDWKRW3I1KpCtN3ZW9mTDfnS
Malware Config
Signatures
-
Loads dropped DLL 28 IoCs
pid Process 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 45 api.ipify.org 46 api.ipify.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1144 tasklist.exe 2960 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2004 wmic.exe Token: SeSecurityPrivilege 2004 wmic.exe Token: SeTakeOwnershipPrivilege 2004 wmic.exe Token: SeLoadDriverPrivilege 2004 wmic.exe Token: SeSystemProfilePrivilege 2004 wmic.exe Token: SeSystemtimePrivilege 2004 wmic.exe Token: SeProfSingleProcessPrivilege 2004 wmic.exe Token: SeIncBasePriorityPrivilege 2004 wmic.exe Token: SeCreatePagefilePrivilege 2004 wmic.exe Token: SeBackupPrivilege 2004 wmic.exe Token: SeRestorePrivilege 2004 wmic.exe Token: SeShutdownPrivilege 2004 wmic.exe Token: SeDebugPrivilege 2004 wmic.exe Token: SeSystemEnvironmentPrivilege 2004 wmic.exe Token: SeRemoteShutdownPrivilege 2004 wmic.exe Token: SeUndockPrivilege 2004 wmic.exe Token: SeManageVolumePrivilege 2004 wmic.exe Token: 33 2004 wmic.exe Token: 34 2004 wmic.exe Token: 35 2004 wmic.exe Token: 36 2004 wmic.exe Token: SeIncreaseQuotaPrivilege 2004 wmic.exe Token: SeSecurityPrivilege 2004 wmic.exe Token: SeTakeOwnershipPrivilege 2004 wmic.exe Token: SeLoadDriverPrivilege 2004 wmic.exe Token: SeSystemProfilePrivilege 2004 wmic.exe Token: SeSystemtimePrivilege 2004 wmic.exe Token: SeProfSingleProcessPrivilege 2004 wmic.exe Token: SeIncBasePriorityPrivilege 2004 wmic.exe Token: SeCreatePagefilePrivilege 2004 wmic.exe Token: SeBackupPrivilege 2004 wmic.exe Token: SeRestorePrivilege 2004 wmic.exe Token: SeShutdownPrivilege 2004 wmic.exe Token: SeDebugPrivilege 2004 wmic.exe Token: SeSystemEnvironmentPrivilege 2004 wmic.exe Token: SeRemoteShutdownPrivilege 2004 wmic.exe Token: SeUndockPrivilege 2004 wmic.exe Token: SeManageVolumePrivilege 2004 wmic.exe Token: 33 2004 wmic.exe Token: 34 2004 wmic.exe Token: 35 2004 wmic.exe Token: 36 2004 wmic.exe Token: SeDebugPrivilege 2960 tasklist.exe Token: SeDebugPrivilege 1144 tasklist.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4928 wrote to memory of 3764 4928 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 92 PID 4928 wrote to memory of 3764 4928 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 92 PID 3764 wrote to memory of 2004 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 96 PID 3764 wrote to memory of 2004 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 96 PID 3764 wrote to memory of 5008 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 97 PID 3764 wrote to memory of 5008 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 97 PID 3764 wrote to memory of 2960 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 98 PID 3764 wrote to memory of 2960 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 98 PID 3764 wrote to memory of 1144 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 99 PID 3764 wrote to memory of 1144 3764 4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe"C:\Users\Admin\AppData\Local\Temp\4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe"C:\Users\Admin\AppData\Local\Temp\4aaa4f1ec20c3d7b0abb7770d7b15f7b.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:5008
-
-
C:\Windows\SYSTEM32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\SYSTEM32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5ade7aac069131f54e4294f722c17a412
SHA1fede04724bdd280dae2c3ce04db0fe5f6e54988d
SHA25692d50f7c4055718812cd3d823aa2821d6718eb55d2ab2bac55c2e47260c25a76
SHA51276a810a41eb739fba2b4c437ed72eda400e71e3089f24c79bdabcb8aab0148d80bd6823849e5392140f423addb7613f0fc83895b9c01e85888d774e0596fc048
-
Filesize
63KB
MD5ddec3abd77e1aa7a5cbe83d1d75640c8
SHA15087cfae4079b1a29f1fc89919c5ebcb6715fa70
SHA2563b046f8af9be391823a8c962e3fd2145a0d31ac46f39caafb799ac931c5f0e70
SHA51263ec80fdfdc53419a94e83553926294a5bce9ad0c04d33156135bbd1b41d284a0aa02935eaa3fcd5dfb50bcf34b2b4c534803c5bf6d2c87af69987aec9c3564f
-
Filesize
85KB
MD50083b7118baca26c44df117a40b8e974
SHA1218176d616a57fd2057a34c98f510ac8b7d0f550
SHA256e1f791a3f5e277880d56f21006cec8e0b93ca50cd4464b2b4c6e88ab3ca5234d
SHA512e093937e4f1c8e3c321e2059a3dda703f0d3df88deba2b15656bca87a258a9cd4dc677859cb1879157d4e60e10efb4d35c402135960ef2afddfef9c388077b85
-
Filesize
123KB
MD59755d3747e407ca70a4855bc9e98cfb9
SHA15a1871716715ba7f898afaae8c182bd8199ed60a
SHA256213937a90b1b91a31d3d4b240129e30f36108f46589ba68cd07920ce18c572c2
SHA512fb2d709b4a8f718c1ab33a1b65ac990052e3a5a0d8dd57f415b4b12bce95189397bfddb5fb3a7fc1776c191eb92fd28e3aaebbebdf1024ecd99e412376ca4467
-
Filesize
46KB
MD5f6f10f79867e33929e8c3263beaee423
SHA191ed04e12da5e5bed607f1957ede5057d78c275f
SHA256c66d0a524a9d6c7f110273ffb14fb0ead440bf42f7a3957554f8b053331a7c3c
SHA51230004621f7ee267e18987922b3e4243da6080cc7fcff8caa9cc8fdf795ba156ffba8c163a621959c2696cea6835398b046ff3175c0d02154532a93395391124b
-
Filesize
159KB
MD5e63bf80e04ae950ef22d8fc100d6495f
SHA1f2340ecaa46cb1737abcb19dbab6de9e3cbc51d7
SHA256f4016a1a8eb34aaf4f20d6c2fdbb02992cc5125f5c32f0335c6dfbeedb9add5c
SHA512cd70c7c99e5fb131567aa2213abd5f811e2a271ac12a2210be6a04728c696c407814e4535e7ca19ca86a2d3311d822cc6985864a2e178e1b36faf6bc828e621f
-
Filesize
45KB
MD59f0c3fee89ac85b6579161290f75507b
SHA1b823351886cf45f4af7ca11edface14386d1f017
SHA2565cc0376cd4cd17f6816103d24804076fc67b9c4b9108424af163872d2de2b018
SHA5127ce032483dd1a97e18cd7caa907ecf4794284bb2cfcbfdb56d8b4853387641df33cfe0d040cd339c7fc86a82e0dcb993ec19d5a2d5a24a102cbe70cafd01bc87
-
Filesize
1.1MB
MD544658f4a35401d36fc766074e57a8d06
SHA13b0fea537547e64637aef997301e7fcee69f0f03
SHA2564030ee5ae615e38c2fa818bcfcf720d39bca2d3208149177c4f089925578f3fd
SHA5120da1194992c1affbc18f52986ceb73d8a08d42c278cb3be49457169d9a03814f3d46667a8673da83a33002721ca1ea772530472caea5b4a4398b2e745532b35d
-
Filesize
28KB
MD525e90e7317853c3807893591d72c1c11
SHA1d6df3b4dd8c6235f263b637ec4646b56c9c977b2
SHA25672584c4be4e56b0c26023a30385e90a1b5ac3a8d559007d90da11e5262ec7b76
SHA5126130e9631465ec7b5bc65e29dd23ea99846baf34b55c69b86774e586c193eea2b4c0557f0d3980b317fece7eb1b9a2f612eb48697b5c61850baf16dbcc3f5a87
-
Filesize
77KB
MD5ee5c9250e766a02aa745a0d1493a387c
SHA10e6e86b7cda5f99e719dab8bdcae21558e7def10
SHA25628b23ef979ff75b3cc44fce358b7ed087488105e3186249163504cd719567ccf
SHA512ba4ad7d081b307f220212a9fbf982f925ac742eec64b3c9ed2bdbf3d06a589b1acc992d9585dec077de3b7f9e814a7115470a89307123491a3aff0ac3d795419
-
Filesize
151KB
MD5ce0ef7db1b5ec4211c901ef0ccc4c168
SHA1da92022e89b5c6e4d7b0ce704cfba1ba0f50d20e
SHA256bbcc8078d2624506bd33ed25a64230f9be74e7ff87faef517ab28e2f63f5e77a
SHA5120c50bb2d47b0252419a1f7d58512cf2bdfc024b3f9dbbd44cd989d6e9e5d493631404b251afe0ce888ff61ed45c29c378b94801660d0429368df902f2eebb481
-
Filesize
64KB
MD5e41f9d0a6ac1d465f38d6692034ea21a
SHA1cf01baaf9149346d35765465f90459acda723340
SHA256507110e20d60cc830fb82fa352a6546c3332e205456dcc051ff3dc4c97dfa131
SHA5128a8c28beb9d7ed0e0870c6b69f183ce8435ebd39a0cece19c991fb82aba49a6db7cac79fec4799662691b013f7565ceb22ca28b44791b999b241b60a6b71b75b
-
Filesize
62KB
MD5fc8a220585322021416cfc4bce9a9697
SHA176c9ab2cc8ae23e091baf4ae52a5ff1d0668a683
SHA2565440e7d58e44d2cca5764b6e282da61c63990b5ef116d3c728909d55104a09a7
SHA512c11785ac0b34492d69b45da3d3e489d819be28ff0f34f00bb6825934b74f94cdbe2f548eddd9c5d54dbba5f2664835b56323dc2d8159f04beb1552c072e96e4d
-
Filesize
47KB
MD55bf893cde770aa22603f7d2ac1371c0d
SHA141f75dfa82550c84acc0e0efec53a921140842d3
SHA2567ca04ff9661acf7bffcb3e557b0d82f12574c499d2c5b213d92b77afc43e17be
SHA512c79d41b568ef52bcfe2555f1a6dd74ae8251dd984ecb03b9ecc35a8e2c8f84f2cd994d156b1df81a823c8f7fb1446989cc60182fb2b382ee217be258d52d9c16
-
Filesize
232KB
MD5ac91ecd48574ce412e8e4d485df4ec77
SHA1676a9bcf343e13e925f86cc6ae3dcb37e12885e8
SHA256886115744bbd68d7d1406f8ce3bd8a6c51d86bd6c7ed760a8540baad9112ea4b
SHA5128b11b6b403d0ebc9736dd2927a6318261cc626509a8b1ef946b89a81d0e9e8b1c9f05444a8d2ed6076c5cec9c38e9f03bb3d0e7ead7c871252c77b951dcb8498
-
Filesize
41KB
MD5cdd7e78befd976319921ad58e871b026
SHA128b56d22e52cd2842504ea999a17c96e075313c9
SHA256ad13169f77b799492f4051158997bdf9bca5a52eb1c834e9b385c60cc5619dcb
SHA5121ba3ee6f535cfb67c9ea618db2841c1afa99a2893f93a240e28f57a5f225a868653bcb929077ff9eb42e7733c1320663d009e6bca70883ee857ab721943f0e19
-
Filesize
28KB
MD59a6c957ffd7186ad86bdf823a416975e
SHA1b269925b19f7c4b87bc2f2eecbc17d981c7ef98d
SHA2569723dd25eff1cbf3d5d2da25604a2bebacd2476b38c2872aeaf3b6a3403a584e
SHA5126e35dbed54a68f33999a20e18715d44420c3a21f05f85b0f465f3275729047335759467e16f9d757b1ea166e4736df98bea56cb58b7721d36f70e7d7f9872466
-
Filesize
760KB
MD5877f89f4a141da5810ae8df658dae577
SHA1df17d4bf2fa8bc3ce9a85f635ee8cfe640cdd3d2
SHA256f009edc33aea2ee2dc1e9ed32e27ddda6204c45c87a6f722b883c76eb394555f
SHA512988a3daf5df93fe509886c4af86039493667ba83957d41a48615101d3bbcd8b2c319ae59e59cc83a6765f33558e396294f8e9e349f8c21131c0f10a2bad6f212
-
Filesize
253KB
MD53dcd08b803fbb28231e18b5d1eef4258
SHA1b81ea40b943cd8a0c341f3a13e5bc05090b5a72a
SHA256de2fa17c4d8ae68dc204a1b6b58b7a7a12569367cfeb8a3a4e1f377c73e83e9e
SHA5129cc7106e921fbcf8c56745b38051a5a56154c600e3c553f2e64d93ec988c88b17f6d49698bdc18e3aa57ae96a79ee2c08c584c7c4c91cc6ea72db3dca6ccc2f5
-
Filesize
62KB
MD50a9d91bd48ca90c545aa2b4d36fe9b1c
SHA1180a111b2639304ea3f26d1c12aa5d686a0d62c2
SHA2561e53b2de4c4dc341fc15e3460194174084a1a9ef696fc498c31f7cc09a0649ea
SHA5122590c215c58873cc7fe0ccdd42430bb679092e4331a84177172f9dda86fcd2dadec75e951caab210dd77cdcc405fb3fdc1df183b9018d95caba142e3b5d7204d
-
Filesize
3.2MB
MD589511df61678befa2f62f5025c8c8448
SHA1df3961f833b4964f70fcf1c002d9fd7309f53ef8
SHA256296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf
SHA5129af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
674KB
MD550bcfb04328fec1a22c31c0e39286470
SHA13a1b78faf34125c7b8d684419fa715c367db3daa
SHA256fddd0da02dcd41786e9aa04ba17ba391ce39dae6b1f54cfa1e2bb55bc753fce9
SHA512370e6dfd318d905b79baf1808efbf6da58590f00006513bdaaed0c313f6fa6c36f634ea3b05f916cee59f4db25a23dd9e6f64caf3c04a200e78c193027f57685
-
Filesize
43KB
MD5c43c2103add8c6c30f25b9e46e086147
SHA17a04d0dafcbe1036033c99d3e796422cba382796
SHA256d31834c5ba38b1654ccecdad6423d2c15fe58593f2dfba291ca0753e5ad2f8ce
SHA512b1d4f101543b1788c0e6137ff8c32b362082174618dc0ef888c692bde0fa54c182e4e2d8b7137e7cb20c1621336bc388aff6f88015ce4714c11254c10462e9bc
-
Filesize
4.0MB
MD5c381edf39a0c3ed74f1df4a44fbab4ba
SHA1688af6616d5f2f67ff9f49dc6790583825fb82ab
SHA256f8c622753feb3cec062a535f2a285b17f6d118fee0bf8ed5a2f3d06ca53e729d
SHA51288abc4ef225593e176050a6526b4873c08aca3b464616b502e64e7995368e82ec413cdf9e0bc8902994b2be25aa0aaf2e5135977599e57a0e8e1809f2b67eeec
-
Filesize
27KB
MD56e3e3565f98e23bee501c54a4b8833db
SHA1a4c9ecbd00c774e210eb9216e03d7945b3406c2c
SHA25671a2198c2f9c8cb117f3ea41dc96b9ae9899f64f21392778d1516986f72d434b
SHA512359aac4a443a013f06295e1a370f89d4452ea75fd2d11776f4eccf605b59caf529baffdcc3cef3eeb59e44a42beaf927bed908b507ac479cccc870768a620fed
-
Filesize
1.6MB
MD5c0b23815701dbae2a359cb8adb9ae730
SHA15be6736b645ed12e97b9462b77e5a43482673d90
SHA256f650d6bc321bcda3fc3ac3dec3ac4e473fb0b7b68b6c948581bcfc54653e6768
SHA512ed60384e95be8ea5930994db8527168f78573f8a277f8d21c089f0018cd3b9906da764ed6fcc1bd4efad009557645e206fbb4e5baef9ab4b2e3c8bb5c3b5d725
-
Filesize
1KB
MD55900f51fd8b5ff75e65594eb7dd50533
SHA12e21300e0bc8a847d0423671b08d3c65761ee172
SHA25614df3ae30e81e7620be6bbb7a9e42083af1ae04d94cf1203565f8a3c0542ace0
SHA512ea0455ff4cd5c0d4afb5e79b671565c2aede2857d534e1371f0c10c299c74cb4ad113d56025f58b8ae9e88e2862f0864a4836fed236f5730360b2223fde479dc
-
Filesize
1.4MB
MD5fdc8a5d96f9576bd70aa1cadc2f21748
SHA1bae145525a18ce7e5bc69c5f43c6044de7b6e004
SHA2561a6d0871be2fa7153de22be008a20a5257b721657e6d4b24da8b1f940345d0d5
SHA512816ada61c1fd941d10e6bb4350baa77f520e2476058249b269802be826bab294a9c18edc5d590f5ed6f8dafed502ab7ffb29db2f44292cb5bedf2f5fa609f49c
-
Filesize
1.0MB
MD50a22c143ab1dbd20e6ed6a4cb5fe1e43
SHA12eb837eb204d7467caad4a82e7b9932553cc9011
SHA256d0b8deabc7bc531c0c45f17ffc75c55b1ac9ff71347b74753096050eec6235db
SHA5128a48246bbf1dfbae63aafca8bb9ae5c14c9dbb60dcc43a1030d7ea11033cba8d6e780ab9620eeadf303f5a3a9167bddec4b2fa23dbe526b95db5c297c9f688d8
-
Filesize
78KB
MD5e96e99fc84249de9c4cd4649f3a27f7b
SHA14fcf885311d24a2ce438842bb7db269550709a00
SHA2563730432069213e61d347d65be318c32a81dfebc56397de6a900c0b71f2aea303
SHA51219aa039867085a5bba72308f514a614ba4703cc1299d6367b20d6ae7573f44a944f4ab46e3ea751e8a7bc63ebb97bf4fd32e60c480f31c4f9ff425725b690f79