Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
eff8612cdca5d44379526dc7516585270fe29c50c98b499a51bb12fca1f0b1f4.exe
Resource
win7-20231215-en
General
-
Target
eff8612cdca5d44379526dc7516585270fe29c50c98b499a51bb12fca1f0b1f4.exe
-
Size
224KB
-
MD5
d7f791f67fb593cf46c41bc7a87cc1fc
-
SHA1
349315a72963954fcd91a9d3e5ef479935d32aea
-
SHA256
eff8612cdca5d44379526dc7516585270fe29c50c98b499a51bb12fca1f0b1f4
-
SHA512
d0079b7eec9dd5fe773f1347764d5e4eab433421411fa80cc8e7d7644afebe116c0a902722162b56476a5da718a03212291eab212aaeffb29f4a6740ceed97df
-
SSDEEP
3072:vBcLODkfawj5E3qCOc6WBQf8bDcAJg3vXMMA5mWTW:MfalqRc6Az0FvvW
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://sjyey.com/tmp/index.php
http://babonwo.ru/tmp/index.php
http://mth.com.ua/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Extracted
amadey
4.14
http://anfesq.com
http://cbinr.com
http://rimakc.ru
-
install_dir
68fd3d7ade
-
install_file
Utsysc.exe
-
strings_key
27ec7fd6f50f63b8af0c1d3deefcc8fe
-
url_paths
/forum/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 11 IoCs
resource yara_rule behavioral1/files/0x0008000000016d05-68.dat INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/files/0x0008000000016d05-94.dat INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/files/0x0008000000016d05-93.dat INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/files/0x0008000000016d05-92.dat INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/files/0x0008000000016d05-91.dat INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/files/0x0008000000016d05-90.dat INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/files/0x0008000000016d05-89.dat INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/files/0x0008000000016d05-88.dat INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/files/0x0008000000016d05-87.dat INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/files/0x0008000000016d05-86.dat INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/files/0x0008000000016d05-85.dat INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 1076 Process not Found -
Executes dropped EXE 4 IoCs
pid Process 2264 867E.exe 2788 Utsysc.exe 2368 Utsysc.exe 2180 Utsysc.exe -
Loads dropped DLL 44 IoCs
pid Process 2264 867E.exe 2264 867E.exe 2060 rundll32.exe 2060 rundll32.exe 2060 rundll32.exe 2060 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 784 WerFault.exe 784 WerFault.exe 1444 rundll32.exe 1444 rundll32.exe 1444 rundll32.exe 1444 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 1148 WerFault.exe 1148 WerFault.exe 716 rundll32.exe 716 rundll32.exe 716 rundll32.exe 716 rundll32.exe 2108 rundll32.exe 2108 rundll32.exe 2108 rundll32.exe 2108 rundll32.exe 1004 WerFault.exe 1004 WerFault.exe 1856 rundll32.exe 1856 rundll32.exe 1856 rundll32.exe 1856 rundll32.exe 1744 rundll32.exe 1744 rundll32.exe 1744 rundll32.exe 1744 rundll32.exe 2352 rundll32.exe 2352 rundll32.exe 2352 rundll32.exe 2352 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eff8612cdca5d44379526dc7516585270fe29c50c98b499a51bb12fca1f0b1f4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eff8612cdca5d44379526dc7516585270fe29c50c98b499a51bb12fca1f0b1f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eff8612cdca5d44379526dc7516585270fe29c50c98b499a51bb12fca1f0b1f4.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2984 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2376 eff8612cdca5d44379526dc7516585270fe29c50c98b499a51bb12fca1f0b1f4.exe 2376 eff8612cdca5d44379526dc7516585270fe29c50c98b499a51bb12fca1f0b1f4.exe 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2376 eff8612cdca5d44379526dc7516585270fe29c50c98b499a51bb12fca1f0b1f4.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeShutdownPrivilege 1076 Process not Found Token: SeShutdownPrivilege 1076 Process not Found Token: SeShutdownPrivilege 1076 Process not Found Token: SeShutdownPrivilege 1076 Process not Found Token: SeShutdownPrivilege 1076 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 867E.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1076 wrote to memory of 2264 1076 Process not Found 28 PID 1076 wrote to memory of 2264 1076 Process not Found 28 PID 1076 wrote to memory of 2264 1076 Process not Found 28 PID 1076 wrote to memory of 2264 1076 Process not Found 28 PID 2264 wrote to memory of 2788 2264 867E.exe 29 PID 2264 wrote to memory of 2788 2264 867E.exe 29 PID 2264 wrote to memory of 2788 2264 867E.exe 29 PID 2264 wrote to memory of 2788 2264 867E.exe 29 PID 2788 wrote to memory of 2984 2788 Utsysc.exe 31 PID 2788 wrote to memory of 2984 2788 Utsysc.exe 31 PID 2788 wrote to memory of 2984 2788 Utsysc.exe 31 PID 2788 wrote to memory of 2984 2788 Utsysc.exe 31 PID 332 wrote to memory of 2368 332 taskeng.exe 37 PID 332 wrote to memory of 2368 332 taskeng.exe 37 PID 332 wrote to memory of 2368 332 taskeng.exe 37 PID 332 wrote to memory of 2368 332 taskeng.exe 37 PID 2788 wrote to memory of 2060 2788 Utsysc.exe 38 PID 2788 wrote to memory of 2060 2788 Utsysc.exe 38 PID 2788 wrote to memory of 2060 2788 Utsysc.exe 38 PID 2788 wrote to memory of 2060 2788 Utsysc.exe 38 PID 2788 wrote to memory of 2060 2788 Utsysc.exe 38 PID 2788 wrote to memory of 2060 2788 Utsysc.exe 38 PID 2788 wrote to memory of 2060 2788 Utsysc.exe 38 PID 2060 wrote to memory of 324 2060 rundll32.exe 39 PID 2060 wrote to memory of 324 2060 rundll32.exe 39 PID 2060 wrote to memory of 324 2060 rundll32.exe 39 PID 2060 wrote to memory of 324 2060 rundll32.exe 39 PID 324 wrote to memory of 784 324 rundll32.exe 40 PID 324 wrote to memory of 784 324 rundll32.exe 40 PID 324 wrote to memory of 784 324 rundll32.exe 40 PID 2788 wrote to memory of 1444 2788 Utsysc.exe 43 PID 2788 wrote to memory of 1444 2788 Utsysc.exe 43 PID 2788 wrote to memory of 1444 2788 Utsysc.exe 43 PID 2788 wrote to memory of 1444 2788 Utsysc.exe 43 PID 2788 wrote to memory of 1444 2788 Utsysc.exe 43 PID 2788 wrote to memory of 1444 2788 Utsysc.exe 43 PID 2788 wrote to memory of 1444 2788 Utsysc.exe 43 PID 1444 wrote to memory of 2188 1444 rundll32.exe 42 PID 1444 wrote to memory of 2188 1444 rundll32.exe 42 PID 1444 wrote to memory of 2188 1444 rundll32.exe 42 PID 1444 wrote to memory of 2188 1444 rundll32.exe 42 PID 2188 wrote to memory of 1148 2188 rundll32.exe 41 PID 2188 wrote to memory of 1148 2188 rundll32.exe 41 PID 2188 wrote to memory of 1148 2188 rundll32.exe 41 PID 2788 wrote to memory of 716 2788 Utsysc.exe 44 PID 2788 wrote to memory of 716 2788 Utsysc.exe 44 PID 2788 wrote to memory of 716 2788 Utsysc.exe 44 PID 2788 wrote to memory of 716 2788 Utsysc.exe 44 PID 2788 wrote to memory of 716 2788 Utsysc.exe 44 PID 2788 wrote to memory of 716 2788 Utsysc.exe 44 PID 2788 wrote to memory of 716 2788 Utsysc.exe 44 PID 716 wrote to memory of 2108 716 rundll32.exe 45 PID 716 wrote to memory of 2108 716 rundll32.exe 45 PID 716 wrote to memory of 2108 716 rundll32.exe 45 PID 716 wrote to memory of 2108 716 rundll32.exe 45 PID 2108 wrote to memory of 1004 2108 rundll32.exe 46 PID 2108 wrote to memory of 1004 2108 rundll32.exe 46 PID 2108 wrote to memory of 1004 2108 rundll32.exe 46 PID 2788 wrote to memory of 1856 2788 Utsysc.exe 47 PID 2788 wrote to memory of 1856 2788 Utsysc.exe 47 PID 2788 wrote to memory of 1856 2788 Utsysc.exe 47 PID 2788 wrote to memory of 1856 2788 Utsysc.exe 47 PID 2788 wrote to memory of 1856 2788 Utsysc.exe 47 PID 2788 wrote to memory of 1856 2788 Utsysc.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\eff8612cdca5d44379526dc7516585270fe29c50c98b499a51bb12fca1f0b1f4.exe"C:\Users\Admin\AppData\Local\Temp\eff8612cdca5d44379526dc7516585270fe29c50c98b499a51bb12fca1f0b1f4.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2376
-
C:\Users\Admin\AppData\Local\Temp\867E.exeC:\Users\Admin\AppData\Local\Temp\867E.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2984
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 324 -s 3085⤵
- Loads dropped DLL
PID:784
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1444
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2108 -s 3085⤵
- Loads dropped DLL
PID:1004
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Loads dropped DLL
PID:1856
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Loads dropped DLL
PID:1744
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Loads dropped DLL
PID:2352
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3033784D-60E4-431D-9098-3FA42E8634EA} S-1-5-21-3818056530-936619650-3554021955-1000:SFVRQGEO\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe2⤵
- Executes dropped EXE
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe2⤵
- Executes dropped EXE
PID:2180
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2188 -s 3081⤵
- Loads dropped DLL
PID:1148
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5a31dad11e0cc975aeb33c67e52c31b16
SHA1cc4904320df820c1046a58628f1515529588a575
SHA256ed01a8dfcbb3c5bbfedcfe00b05337928c68d102997c2b499b87cf9de9b11c22
SHA5125089b64b94fe5e65dd8b60dfe6961c795de7775ae9d1616810daee4d3933a6d84d7ce6ae4de8c2ff714e7d6f5275fe88003468f55461dda019012902156e9fb5
-
Filesize
379KB
MD588676481d286872c8b4fa3c3b05cb876
SHA15d6229066aaa8fb0326ee31587a0ad5c8236d948
SHA2568fac8e2bc0c4fe8d7c49a2123e8e2235d0d0f64f8ad646968e28141b68d07325
SHA51263bf326abedc73cf3fa3a6d3bbda5f3303b226f51717dfc1272e278a681cbef03eda269dfc4fa22b6b1959221f1b341abcb9c9a444c662f2ed727fed20367362
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
1.1MB
MD5fc7c7259c6ed737dedcf257fa4385e47
SHA1d16bb7c7c91e7464acb96e11532d2ca4efdd6123
SHA256cba06873f75c01e73e6069856087b0a05e0e85087ab71402795fb399298c6633
SHA512d8c2cbb224a5c27188863dc9cfcaa533dbcc4640fff76ee2f8812c1bd7de908db03184dc974c094e7d0b7a5ee81e4bb60db27d2c1e12ab71ec72a5dedbab6a55
-
Filesize
1.0MB
MD52306a862c690be4beb6f7dbd78611704
SHA1eca69ef78a0053ab59abba320651a64463ff7a0e
SHA25692841b35da1189763d3b8f375ecf75ae0170c7a6ad693b73030acba8624ad7ec
SHA51211db0274973ca467e5762a66d11e9b5b68991081c82805750e041d7ce4374c060df25ca8517b92c45c1e6f3d14c3477ff5c1f3911a75780f869d7ae171c13cba
-
Filesize
796KB
MD5ecaf2921c2eb40333332b137273a6a36
SHA1721385590e622f6d9cbe7e189b0bf806a448d849
SHA256e0b52352861c91b077439cc8727308b0e81a610eafce597bd19895e0e0788603
SHA5126c59c071f7d781ac198074b0ff465eac6f3fb4353629ef94e3559f09f64dd5c3dba5ff1f2f7011f2ec24e7c19946db7e5f1293602c653a1ad00a4e44ea14d87b
-
Filesize
728KB
MD56d8cb8c4f57ae5d142a53f77c96e35fd
SHA16b08571eb332bfaaf17ae1602cce6c4aef21ebfa
SHA2564dcba91ad0c2a1730b2ded259c3448c8a3ccedc21b23f8a8c8ecbf858bd4ee21
SHA512d482ab7ac455b5f1938aae60ddae5f36b382719ba366813c7062e2208fc5025cdd8ad5cd02796acc75f83b54f09a98e44a3adff8794f39330364700e472600d4
-
Filesize
581KB
MD50e90c0c8fadf7a369fa189d56f338489
SHA181ea948ac50b40d7d707af01c4ef4b527c0d801b
SHA256fb74c5cbb1f43b1e7497a7478fe0ee9fab664d813e1cf415016d858053927753
SHA512f1c543d4bb3aed5841f6cdf15a848168ed8f32b6776ba51f93af36bf30486ffde6274c5d9a0bc10bc19b726b23e74b42a5eb1b40c508a5a99048e15b80349ed8
-
Filesize
748KB
MD50efae59f5e74e9b14a4c52c953e98309
SHA139b69a0c69261c1541fcb03e3cd0a35288b14724
SHA2564a102279ed73088ad298666eaae653d700fab10089f48e4d24e344098af06ae9
SHA512bb0a18249aea9daf87b713be4269b81f46cb79e077b880fe54555c91f23e77487fc3af84acf9553ae6ade0995a043cc800c6403f31a225d3f57e083d20e399f7
-
Filesize
827KB
MD51faf8b0e819e3f2fe5d01e63697e88fa
SHA1387151f633de290b7b5b957a8a798656fff9e2ed
SHA256eede13fa6523b7d8f32aa2bc24b17c485eeb47ee2def27f1f6febd23a122ad17
SHA51239dba2fe50ddc002bdb6e916dd25cf8650f47133b2bfc68a6ba6162774137b8b39a22cdfeb5c1e99f21d4450adb8f44e0491d75dd175ff5359822243dd130bd8
-
Filesize
545KB
MD5488bfc67d9c25486cf168636e602c67c
SHA15e1e2946ba446221defd8a08764cb34233e22c40
SHA25671a9899b6643012f1784c111d40871c572f0a20ac4c00ae3abcb0fc144c068d8
SHA5125a583d131c57ca1b6aaf21411ee89b3eeb7f4818404c2280b8ea2a9357478b1926d8b95909c1fdaf631c20ef98d317b978ddcb40956d081c80a97a20e3f5f4af
-
Filesize
737KB
MD58d7bb958219b67f372bea875f9ccd8e3
SHA1b19860530c9f7e7c88692e9f1c4f5bccd39843f0
SHA256a8d9883efcd3e01313beac0e16c4dba7e869d9b8c742d7eb789233a93e0346bf
SHA5122b0e7e5e167bfa662fc1624f0438919863e0fe728a1137efad018c9bfd046cca5a6388208461416f1383aae15a91b1117014e2a9382a4ab3a6e1cbcdeaa72d4e
-
Filesize
1.0MB
MD55b30196a90dc1526cbd5a3bbfe1e8f02
SHA171d47ddf2c06ed07133649d09176891ad1f51295
SHA2568fb4980f6caf76a62336302a0b064a2c4e2159fa575b4fc0ef13f9b4a50151d1
SHA51219bb3c29c36b849d582a665e0e6772faaf2044ab588dafee999e8a97ba3e9ca60aab2cbd2bb3c6708e69fa3c3b5a857a37d632a59cb545bbbd9a9d473ca9bc8e