Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:30
Static task
static1
Behavioral task
behavioral1
Sample
7518f196c0a30ca7202bf1d353236f00.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7518f196c0a30ca7202bf1d353236f00.exe
Resource
win10v2004-20231222-en
General
-
Target
7518f196c0a30ca7202bf1d353236f00.exe
-
Size
44KB
-
MD5
7518f196c0a30ca7202bf1d353236f00
-
SHA1
acf912b642638db249d4576746851cab2e763f64
-
SHA256
dc8f630031cc2f319050a819f97ded6361fda04eeb43cff56729a0e7fba421eb
-
SHA512
7ec2e35eab20d0d8c124a2cba340cc7d8c85d6c6c9bba7baa141924c666edf9829b48086c8422e1eab9c85673e162f12ccb6c84b2973d67ea3471266cdb128be
-
SSDEEP
768:YC6NHpHUhtUaFuGusosVYUSb8GXc3rt82CqI:YC6NBUhKXdjsh3GXKtt
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\order_bddg.exe" 7518f196c0a30ca7202bf1d353236f00.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\order_opt1.bin 7518f196c0a30ca7202bf1d353236f00.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412365680" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{651D36D1-BBA7-11EE-9CB1-72CCAFC2F3F6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2384 7518f196c0a30ca7202bf1d353236f00.exe 2384 7518f196c0a30ca7202bf1d353236f00.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2208 2192 iexplore.exe 29 PID 2192 wrote to memory of 2208 2192 iexplore.exe 29 PID 2192 wrote to memory of 2208 2192 iexplore.exe 29 PID 2192 wrote to memory of 2208 2192 iexplore.exe 29 PID 2384 wrote to memory of 1100 2384 7518f196c0a30ca7202bf1d353236f00.exe 9 PID 2384 wrote to memory of 1100 2384 7518f196c0a30ca7202bf1d353236f00.exe 9 PID 2384 wrote to memory of 1100 2384 7518f196c0a30ca7202bf1d353236f00.exe 9 PID 2384 wrote to memory of 1100 2384 7518f196c0a30ca7202bf1d353236f00.exe 9 PID 2384 wrote to memory of 1100 2384 7518f196c0a30ca7202bf1d353236f00.exe 9 PID 2384 wrote to memory of 1100 2384 7518f196c0a30ca7202bf1d353236f00.exe 9 PID 2384 wrote to memory of 1100 2384 7518f196c0a30ca7202bf1d353236f00.exe 9 PID 2384 wrote to memory of 1100 2384 7518f196c0a30ca7202bf1d353236f00.exe 9 PID 2384 wrote to memory of 1100 2384 7518f196c0a30ca7202bf1d353236f00.exe 9 PID 2384 wrote to memory of 1100 2384 7518f196c0a30ca7202bf1d353236f00.exe 9 PID 2384 wrote to memory of 1100 2384 7518f196c0a30ca7202bf1d353236f00.exe 9 PID 2384 wrote to memory of 1208 2384 7518f196c0a30ca7202bf1d353236f00.exe 8 PID 2384 wrote to memory of 1208 2384 7518f196c0a30ca7202bf1d353236f00.exe 8 PID 2384 wrote to memory of 1208 2384 7518f196c0a30ca7202bf1d353236f00.exe 8 PID 2384 wrote to memory of 1208 2384 7518f196c0a30ca7202bf1d353236f00.exe 8 PID 2384 wrote to memory of 1208 2384 7518f196c0a30ca7202bf1d353236f00.exe 8 PID 2384 wrote to memory of 1208 2384 7518f196c0a30ca7202bf1d353236f00.exe 8 PID 2384 wrote to memory of 1208 2384 7518f196c0a30ca7202bf1d353236f00.exe 8 PID 2384 wrote to memory of 1208 2384 7518f196c0a30ca7202bf1d353236f00.exe 8 PID 2384 wrote to memory of 1208 2384 7518f196c0a30ca7202bf1d353236f00.exe 8 PID 2384 wrote to memory of 1208 2384 7518f196c0a30ca7202bf1d353236f00.exe 8 PID 2384 wrote to memory of 1208 2384 7518f196c0a30ca7202bf1d353236f00.exe 8 PID 2384 wrote to memory of 1248 2384 7518f196c0a30ca7202bf1d353236f00.exe 7 PID 2384 wrote to memory of 1248 2384 7518f196c0a30ca7202bf1d353236f00.exe 7 PID 2384 wrote to memory of 1248 2384 7518f196c0a30ca7202bf1d353236f00.exe 7 PID 2384 wrote to memory of 1248 2384 7518f196c0a30ca7202bf1d353236f00.exe 7 PID 2384 wrote to memory of 1248 2384 7518f196c0a30ca7202bf1d353236f00.exe 7 PID 2384 wrote to memory of 1248 2384 7518f196c0a30ca7202bf1d353236f00.exe 7 PID 2384 wrote to memory of 1248 2384 7518f196c0a30ca7202bf1d353236f00.exe 7 PID 2384 wrote to memory of 1248 2384 7518f196c0a30ca7202bf1d353236f00.exe 7 PID 2384 wrote to memory of 1248 2384 7518f196c0a30ca7202bf1d353236f00.exe 7 PID 2384 wrote to memory of 1248 2384 7518f196c0a30ca7202bf1d353236f00.exe 7 PID 2384 wrote to memory of 1248 2384 7518f196c0a30ca7202bf1d353236f00.exe 7 PID 2384 wrote to memory of 2176 2384 7518f196c0a30ca7202bf1d353236f00.exe 5 PID 2384 wrote to memory of 2176 2384 7518f196c0a30ca7202bf1d353236f00.exe 5 PID 2384 wrote to memory of 2176 2384 7518f196c0a30ca7202bf1d353236f00.exe 5 PID 2384 wrote to memory of 2176 2384 7518f196c0a30ca7202bf1d353236f00.exe 5 PID 2384 wrote to memory of 2176 2384 7518f196c0a30ca7202bf1d353236f00.exe 5 PID 2384 wrote to memory of 2176 2384 7518f196c0a30ca7202bf1d353236f00.exe 5 PID 2384 wrote to memory of 2176 2384 7518f196c0a30ca7202bf1d353236f00.exe 5 PID 2384 wrote to memory of 2176 2384 7518f196c0a30ca7202bf1d353236f00.exe 5 PID 2384 wrote to memory of 2176 2384 7518f196c0a30ca7202bf1d353236f00.exe 5 PID 2384 wrote to memory of 2176 2384 7518f196c0a30ca7202bf1d353236f00.exe 5 PID 2384 wrote to memory of 2176 2384 7518f196c0a30ca7202bf1d353236f00.exe 5 PID 2384 wrote to memory of 2192 2384 7518f196c0a30ca7202bf1d353236f00.exe 28 PID 2384 wrote to memory of 2192 2384 7518f196c0a30ca7202bf1d353236f00.exe 28 PID 2384 wrote to memory of 2192 2384 7518f196c0a30ca7202bf1d353236f00.exe 28 PID 2384 wrote to memory of 2192 2384 7518f196c0a30ca7202bf1d353236f00.exe 28 PID 2384 wrote to memory of 2192 2384 7518f196c0a30ca7202bf1d353236f00.exe 28 PID 2384 wrote to memory of 2192 2384 7518f196c0a30ca7202bf1d353236f00.exe 28 PID 2384 wrote to memory of 2192 2384 7518f196c0a30ca7202bf1d353236f00.exe 28 PID 2384 wrote to memory of 2192 2384 7518f196c0a30ca7202bf1d353236f00.exe 28 PID 2384 wrote to memory of 2192 2384 7518f196c0a30ca7202bf1d353236f00.exe 28 PID 2384 wrote to memory of 2192 2384 7518f196c0a30ca7202bf1d353236f00.exe 28 PID 2384 wrote to memory of 2192 2384 7518f196c0a30ca7202bf1d353236f00.exe 28 PID 2384 wrote to memory of 2208 2384 7518f196c0a30ca7202bf1d353236f00.exe 29 PID 2384 wrote to memory of 2208 2384 7518f196c0a30ca7202bf1d353236f00.exe 29 PID 2384 wrote to memory of 2208 2384 7518f196c0a30ca7202bf1d353236f00.exe 29 PID 2384 wrote to memory of 2208 2384 7518f196c0a30ca7202bf1d353236f00.exe 29 PID 2384 wrote to memory of 2208 2384 7518f196c0a30ca7202bf1d353236f00.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7518f196c0a30ca7202bf1d353236f00.exe"C:\Users\Admin\AppData\Local\Temp\7518f196c0a30ca7202bf1d353236f00.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1208
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD58dfdb780956517a3f54167670f5bb212
SHA1364c69cfc6d920ef4f8a1bdcf8caa458203d4ee1
SHA2561697ce149ac18af2aacac0dff5a72639ce0d7678a930b047c2aef9eeb1c6de34
SHA5129634f6ba5da77cf2a9fd224575a5b6bc983ec3433eada298881e6f5264693bb1c14723c9c15cc95d89214ecc0bac72f9d9c165b2520af1f0c8d668f40eeaacfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5083f3cd1d9888cb235744d68049babf4
SHA1694dd72af645497b5f049716964cf83911603881
SHA256e8d06fe7508e022de01f70940ff268f61b39be8fe648ba92801d50a528516a6d
SHA512a0becd5864c4be2385e2e8bb6a1e6b0f4b941b6263de5828159d205a2e1a01c0c7f4be37aa20c754d875b87ef22cdaa0a6cbce97194db44d77f6652e68b3e5f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f335e85f611663cdc8b2b07cf0d1eca1
SHA1caeff5c3182b842c0a0a40a6d3c8e904b99eb326
SHA256275882654502e6a4276600932cd893aec0bc599476a77f42f9da3ffd92933e84
SHA512044fad03069e8194e682d6f7ef5315aa8aa1a9eba0821831673310dc02b0db9d7eaffc8e0e285c4a2aced3f8716debadb01670cf857112c442778b55e3c5cbd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50363446cdf65feb481b2a634513e5fa7
SHA14b48da70fe5ea4524792005a6b3933cb40409b59
SHA2569151143ed5a06f6038769d28af013836cce132f81bd62fadd5e026665e9a6eae
SHA5129e232910a509e057eb2a9c4e92cc28ee66e9409dcc97505846362ea579ce2b1aa448a82df07f24409fa1cc3127463ee6c8b260c2c9c4bbc9f58b7190b7ab484a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588bef80ca6ca085afb73697831939362
SHA1555f1d0e9ff045b5571fe24d4113b322150bd65c
SHA256c93fec22d1a29cc3bc703fc899cb2e6a24040a2a79867fb00161c13afc7d0d7e
SHA512f86f5633cc88fd286ffe88310f520de759b32374f80d2910c4676041e8627d587f30fe185d657fa2cb1d4dee9f5fabc68f1147671499c404df0127b0d490fe9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed873ff8db037d6353a467a330aa3b49
SHA10c348ba59c6d1b10f6e6398ed4c28bd18d689bce
SHA256fa095eddc171621b1afc580fa7aea929406972144b2c40418d0408fce7930343
SHA512444ee01e2ffe6777b09ec7983c47ac334eb6ff1f39d89e1f4c28fc211c4ee666edf5c1ebd4e8a5dae1e45a025dd56ec49507ce0274cf822e80b528b13d27143f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54691c27a0bf0741d35dc834b907acc5d
SHA1ceeda5e4892e12cf7d85b6768a7ad9724e63a997
SHA256d7138c24aaa50cc42c87b092a1438e79c108dd64fe3f6c8b49bd42e0a5aa8de9
SHA512449c7a8e70204feb73450b6ce7ca6b30600bb21770a3aa8bef2f264c6c9f06be05e804bf207892692e75ca954a84e0d02f857a056e00746e4865148cdfce6f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e849c411c180b84227a02793fa1ef51
SHA14948f0dd613f187add7da12378c112caaa509c70
SHA25648ef1ce21b962af1a606ab5822caf18d81bc0bee5aa22a6267df251d35c96ccb
SHA512bbe3f8bfad11f75748f27c3a0e0b015dde66cc9a0bcb3255ad80ee7ccd10259957b26241bb39a7e0262c3ff5638f3ed2629a2aea61a425eb2ec1eff072204b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f1d6e417f6b65afd41c10b3e4f08f20
SHA1084603f1253d82f108cf10c299ff6b0e046e1745
SHA256ec58e4b07ce995d1972ee92628640919783038e5496c275b6d860f5a452c337e
SHA51203c7e523fffa368320d43344d0007f28f46d287a0c72635ac1e488bfd8306aebaf33f441decb27a4c8acc4595c8524cc63450cfe4dc2b8af11b160c1a4005731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557b61db5bfac5bcb0f2688f99c1ec4a4
SHA1a4ee5ec5e0b73fd3132152fe2c9912304b711858
SHA256adc17c2929f75b34ca62a0d370f3146ba1b52d6cc310d4e417110399d0eed345
SHA51294262bd4872208270befa61578f182e77e0237dc2b55d0e1c1298ac07729661d8bf7574af76bc602c4985ce8903fa3b3fce107aa4af0f498c28b8b4f34977e99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5844325165a5ef3f2976ee83d4b8de047
SHA1de8bdf3541e2933f248ce1bbecb008714cd36b57
SHA2568e15384ea6f9327560dc198f6e8f6c153ffbd865646da348a089009ef24fdf30
SHA5127727d4320716a867c17e572efb42cde13f5951935b2c3f56a4fe01d5278dba67fbde5a0ccfa62cc2fd19d4abebfd17a9357b49fe07fb9db94c35082cefc969f7
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
4KB
MD55b5eccda32fe8ac871c404afd5d8e528
SHA108eab5d313ff212e3754021f42663f7ff6449161
SHA2568b747a9cddb6ebec66572228e581a01ea6e9a4997af51df0467af171da8b65e7
SHA512f6e72340c41fa5d1b0bd7381ae07cb60081893e433a8c3e16dce768b127781764ba5515caefb99e780c8cdf126d61e575bf9dc976caa5e89555c0d20d38ad8e6