Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11-04-2024 17:49
Static task
static1
Behavioral task
behavioral1
Sample
American Medical Encyclopedia v1.0/MedEncyclopedia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
American Medical Encyclopedia v1.0/MedEncyclopedia.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
American Medical Encyclopedia v1.0/_Readme.html
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
American Medical Encyclopedia v1.0/_Readme.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
American Medical Encyclopedia v1.0/crack/MedEncyclopedia.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
American Medical Encyclopedia v1.0/crack/MedEncyclopedia.exe
Resource
win10v2004-20240226-en
General
-
Target
American Medical Encyclopedia v1.0/_Readme.html
-
Size
271B
-
MD5
3797085f374cdf93ef0d0439f4447c28
-
SHA1
c673ab7f5ef5f74050d4a465de6ebd6130e34ea5
-
SHA256
d39f860f7a8c857d36f0694a1bccd6feba915e553a64e00de57ce81f5b2bc0f5
-
SHA512
61bc79901ad9a45a2167f403585aa985c095853ca7dab3bdb7be5964ea886d0dbedf324c07f1f621e567bd7984a64b22e8a2bf9435c50161d7522e5968e893b7
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF9210F1-F82B-11EE-BF93-66356D7B1278} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000ad2bbc0d4d9a44e4cb55d53258f21656d45913f8bd0f8a2caeb47f533e194176000000000e8000000002000020000000b276c1098a357c7f69ee969bd8e82e6d82cfab6ff451b96348957323214269cd20000000528d0639c7b3566bf9819dd3561d03ea5cc72f2fc84e9ba1955e2c22217447c440000000e2b85dae4ba43ce40f2649fe18e5e76913345b0f6eec1fa6a2920ba923973c8c8918af1424385572c0300cf96d79fda4b7182705895339a1892e4782cc952d4b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000ea7d7bb8f7fba3cc5cb118136d727dcad360d6a513e0e8a0624ffc2030f90798000000000e800000000200002000000026057acb860c0837483e350ea4707440df1c213fb80e5de63ee5211468dc76d590000000a6f85a1f527d4599568307356479b34706dc69ae0dcb6f102daabccb943e25777f2a9d262889d79c3d899d0410e3628ed56ca3a7bd00b69705a07cc7d0e0d5f053528a7d9252c7b5157de334b8ec6deba47a33c4634a66b0af50378d749ea7a86eb8bb6427a2161085b6225610e2055ba601040488cdc7014882c466def35d3bbf4c16c6f165914ca33cee93f14daee440000000037d8ccd86a4637e07247b1636d7818a13934f942e86244517214c2e5f696cbb8b58809a738f5d6f224ee16237b14066514d297f19ced715df5fd70be71caf8b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419019649" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07e1db4388cda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2040 iexplore.exe 2040 iexplore.exe 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2040 wrote to memory of 1332 2040 iexplore.exe IEXPLORE.EXE PID 2040 wrote to memory of 1332 2040 iexplore.exe IEXPLORE.EXE PID 2040 wrote to memory of 1332 2040 iexplore.exe IEXPLORE.EXE PID 2040 wrote to memory of 1332 2040 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\American Medical Encyclopedia v1.0\_Readme.html"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6d291823b64e789e2580aceeb3e0ef0
SHA19f22157f4116a9d5e53968a582e9f58d2e0bed43
SHA256594931a16b4a70f3dae14495eb81a0d20449d1a03f27bcd7651adf2b64d647f9
SHA51289218c72b4811b6a01de53c9e199298c8cbb537db76f46718a434848ffda402bff010d3b64389843eef0ffbd68cd73e02cd2d71686c5a9b90268fc7e151fc9f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d230a75ebfec2f491d58c35be9118012
SHA19d896c87fe6355e622eb2b8ec9f64d9e4354eda6
SHA2569945b75888ec54ac1490d40b7210f0f8b7f157d810fc52243b5119c5b4f4c361
SHA512e476cd98e0683aca09e98bd96a7111e5e5ab008285423260d73f51ea522638f08e7923c6cfffaebc642f95e811e95804c01341a1226284988b1750f10357848b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5268b1238b00b8ba2a5ad3b771ecdb317
SHA1fc9d0f54d5119e4d416340dfe1dbf751941ee7f7
SHA256ad31243c61f0e3e2a684b310c68c157155b8fd29e1095e1ed7f78518197c9994
SHA51270e69132feb59b23e93ee0fd829c2a5f7f07f50ea235cbe14ff6f179a71697620254b53ef0f03191b511e8a0f1d1f5d7c372bdfa179d4ac7bcaf4560aa3398c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cd26861b8d511643b3d6f5f36e57e79
SHA1926be852f8055fa82320d30e9eb47884c4e88c81
SHA256c21383523578420f29fe2c6cf3413d8221e5fa79cc75789f085285537b5a8c15
SHA512d507c2922a0f84513c23744ca51a09c2ac9cc299860fc3751fb2c8139f2f1ae19ca701b320a48ab2ce9ff6f1fd2cae5c1091cd1d3e940aa1d1bec0001244a3f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508f0e2ba94efc3b11be363a10243da84
SHA17d2160c289bf27b34e41dc0ae8179e6ea3c812b7
SHA256acbb7236b6e60433e187506ac093f39014b8c4680f7ed475d8047b227054e11f
SHA5122f2c9717e119bf8775e24deed4d55a5ef5f6f51d09c40208a146015762a5e670e70a88a27922923ffb8143c13ebf5262335968a5c73f1b5c327e44c1c9f536f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfe19c933e043cac9dbfe863a88bd498
SHA11c36ae27ee06925254ef88c19839a9e73c08c714
SHA256eb40cb7b47279aee238676ca636be26ecb484b94f31d620b557f20544f1b9f83
SHA512b106053fae2cdc505b13ae02ee75236a4f181183c91568ad110554a50fb20d9421ad31edcddddb4ec7cba5f1470bd55668c5d3c7426f56f742e0a9a0836de1d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577abeca37d0e99d230e2ca3e332a5ac1
SHA1343aa5be57f621b242bed0f23156758eb63176b0
SHA256fb41009af1a27b2626807c6fd01dd07b3063628e43f4a1a9bc4a11a48eea35c7
SHA512194f014a8c03a3fbe1daa0c616ba41e320a57092d0a337ff7297afbf0525b3c5cb5d5da6d2be6591cf79bac0ba8259f89b39e76a49be7a5046f0624c9cb79d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590d6f2c908e9b69cd70b6271c640a0f0
SHA1673a6b6c827e7ffe106afb01a3d1db961ab7c2e5
SHA256a317bc63cf65783a0206ffbda16561fe62d2fe65a9f075f341a75abd0b771e72
SHA5128451b05e25bde927496df88ddbcd18b6cea0b32ef901c16ce544dd92b141c693c12b10c3484c578b485590cd907381369ccbf4f2102dbc8c0f8b405ba31f277f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521f894dd8421ce8e88e5a092802ce4d6
SHA1cb1c230f31b70599c52ad6436ea3c05cf0f3ea9a
SHA256555339ad74365da6efd9ab781aa94af6b1b79af5abf6464713b3fb1ec39f18b4
SHA512fcb67fa59f1ab68e0ee1f55400950003cdfd7e46724af1cf322eefc733f0c66755338a1a5e611cbd45f8fd68d526af495ce5fd5524fbf8a0f1687fb458325aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59750f044a7053674717f6a1e6bc9d84d
SHA10a4392c8f8670bfcc076741fe14300d031d1ce92
SHA256e6d23881cf70ecd73a8950f92f4c0c356ad2e220e2fd36217bc57bd21ef3dc42
SHA512984045b915daa1e6a51c2fa3bc1966627fc5f4635934e6dfd62f0d4c11bc7ee6899bc5e6c360f472eabda0250784501b371ac2bfdc7fe26f724026263f4b6f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54809c8bbe02925c447bf20dbeb161a4f
SHA1807732cde87dc4f5e2b63aff514f7b8e4ff702f6
SHA2562bec253eb8dd1800d0a2356e2df678c6a4b15fb9a1dc794799cd630f621caa6c
SHA5122b64416b3e9de7dde13f9aa38d33fceb669049e46f0f0a7d4b520f60f579de9926382024f7fb15878f96f5844b9d23fa6df20332133ce02ede8b624dd9e79a17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea5bbda07f7fdede647e9410560afb9d
SHA16d8e6769bcd64f782e6359c09997282063ca5987
SHA256dea7b8b74a29f7d448ece9fba72703e6cb11559b0fe4b7b42f4f154ef72934ba
SHA5125f5b19107733d647876d90c822b4812faf4a8e5b463e3c10127310dd1600ac0690f9fde1301b58853c6401974da0f6c8462672ca45a1fd4cca9ebf6cc6fff058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c879a07b268d5c626d8256bb89f6c37
SHA156ebff04a51bba1926d9819ffc35665cb2670f4d
SHA2563bea852575cdfa736e8f066899e795df6deb0324ca986166c88762e664e6cf36
SHA512eb55e8fd727587a4e008f7f7e877405edc635b19466b4e2a2f680732693438afff4f8d58923c7c5cfd079105efa0023c05697be39ed45f53a47007aeeeb3e1e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513a923a62619e29ada27b554a861dbd8
SHA16955515932ccca033d132630bd9c76f93ca19dcb
SHA25660e11eb12bc2c1d01caa5d8770bdbb83203ea80adf31c5edd25ee0a6b906807a
SHA512c9a411f0d6ef39b7ca7d82b5ed1d305d6c9fd6aaea0654e1d04671544da7035c03b61f31fc872af5f5972c1b02d09eca716c2f4b8c15628e158d0fae1ce57207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f36a3d2c5d27dc01fddc557a8cf60e2
SHA1d39a66324c9ea4342ef4a2f101b07acdaaf934ea
SHA25632e7cc77206390604fb0c4da68bf4a0cab2686053a9194fb2db8f42f5095cc42
SHA51289ed157d103842e32b1c8fb42363b6bd687144f37e008bdb0a89effa947bfa64fd3e9dacfa215588501485ce3f477a7a9dc8984c6c956ad9bec1b0049f6b4990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af8757f97c1e964f9e1c45088a5533a4
SHA153e6ef39ffd76fd9d4e2c12d66d4139c33274789
SHA2560ab35b57d8ce4abfe91a9aadddb2ec673b76026a4a1f72ce0fc1affcaaca6812
SHA512171b9237f7adc3a00cce96d28d5f3d691e28d05f6f2ffce9a8d354289514d4e3730efeb1293a0099d672c05099266481a2aff0ebe2fa37500e4f6285ddd6ee0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54269ef749a7c5702c0767d12714cf982
SHA151ef3bae030fb74cbfafe4f95d3b96201a061862
SHA256ae4468110f1c9507c2f872e6e0a26002f50cb5684d1a701558d1896a255fdb30
SHA51223ae525f8f089ee3d5d865f34e76ad71d32db8bfbfbe319105d2824227ce5f81373135c4614f009be83d85cc7297d9c08e2cca84ed6ec310b568ad59eba503a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adb824f7197f26ad1aa5ffaed319954d
SHA17cd13ad298c0ae82b0515ea5797279c6f29cdefb
SHA2567030befd96e9fd09fef9df89acefdd36ad6173f6678465b0f4abe748ba6ed086
SHA5129c1fa6a353125845c0e97407ecdd38516b41277eaaa4bcc612616a28b49ab53e1694d8e808a6ce5e8a7468f4e35f2c0635b6d46b349fc7aff86a410dae90992b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a