Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
libplaylist_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libplaylist_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
Resource
win10v2004-20240412-en
General
-
Target
libplaylist_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
-
Size
628KB
-
MD5
b313a1d19cd84cfb7cbe5b0603f5cdad
-
SHA1
56da6b286ca6fb92af48419565aa0bc27d1dca89
-
SHA256
3ca4041897b144a3c03c9a56b97c5cb184d7c739a210d89b3e29938a3381826d
-
SHA512
123443351a993f60390d079c37dabc18dde0e73dbb82296391ddae629bf2adf6b802d53382548d527f6e2fbc14c58378995161c9c18c4139756ae59496b49ffe
-
SSDEEP
6144:aMBNUxSKa60Nk6Xrup7wMaOVTg60a012/Vp:aM6Kw6Xrup7wOs60a0s/Vp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e07210f74592da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21F753C1-FE39-11EE-ACCC-D20227E6D795} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000000b51a95a6b485531776714e51e6d3e19e6db0275e39f3c5492726b0efc751ce6000000000e80000000020000200000003af854a38a1f71c79272764573e37b22e9a33d6f1aa30561fde4099d96f9aa922000000079175448b1bd99590d980cf2b85113a0b101efc915b0400599cf2e33e48531c54000000083154da53850f0935b77d03815f2105914c5c5dd9615f448541ca7a7b1e96e083032a744501ed3e0fc1eee9ebca2e23218899612bbd87edca77f9db828517369 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000007fea85d9ee5513b60e0493a9405a30c9977a8dde1b8027338559230cb7e1c75d000000000e8000000002000020000000c21babfa431e9c29ac640af08fea5ad771f40a08939525c23e2974003f43b55090000000135b8d18907351f8f23bebbc0926446e721a8f49d3f89dc262e2d0695897fa69c96b470f3a80eddf7c673ea2244b8c70a6ba7306f648cfc973c23aec16f0945b0833ad65e27b39640593a19a612745fb599c359467911579d50ec9d2e1f4aa671eaf85306372684f553188b2ec83210fff9e7df9830580926b509af2e2a7708abdbc7ad3654f231fe446a705cef58bf340000000c3bd3c5f05852d1a98b26882e4a98eb1b14e7ae8053b4a5c778908a3892885bede04f7746933638291ae95d3a7fc52a7aab4af2bba3de7a8989ff7d76e279957 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419685052" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2580 2020 iexplore.exe 28 PID 2020 wrote to memory of 2580 2020 iexplore.exe 28 PID 2020 wrote to memory of 2580 2020 iexplore.exe 28 PID 2020 wrote to memory of 2580 2020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libplaylist_plugin.dll.svn-base_id=e3b43bd36fd50840467669364014ee53553872c1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596ff8d20bc6887fdc94a4665299bf4fe
SHA1a89294f28e975e8c83cc18ff3a111c179b5a9ccc
SHA256c7115d34c00a3515eb2c248ba68691fd824e66c3a21a6cc10f6323cddb41e6ea
SHA512966dda48561b6707920702d4f369197a7a8761396ed6602c428f0ac6811cf3987ba3074a4aa818a545109db6f8afea7e6d384eeca83838c91ea8915bea694a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539e54d98f10f5add905c3b1b850ce91d
SHA17e141c67953ee6cf4ed061a42c0999bc811bdba9
SHA256df6bffd795baafb7a418cb0764149d94e1b2f80a1862f6cee4e618d3a4d7d769
SHA512c83eb5700f285fd3b79921fbbb3336c248fc7064b5bf2978f138e219eca0e858d89f8bb9e512a2492f91f2c1c02b3e2301ed758a543e6b543ccfbd0bb1b721ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb72d29879e87572cd7f500ed03fe2b3
SHA1c7dbb8d8abe7ab6fa131e94a73268259e2718860
SHA2563bfcf83df9a269de69562cf47e973c7ef775465a35485a594cdb43ca7c38b2f0
SHA51212cbd1f68cef5fe13da8ee0a9c3f76f8a5bc8dffcfe215f4caa1e45b3966801cf6ddce53d770de7dd442ee8ea77455e76b9500d5aa09b3e7ae0432b17eb174a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ba27c88ab860226a6330a224707ae48
SHA13b8d2e1c04858dcc710b549f6d3a3dcd1413d7aa
SHA256a9c3aaa27e103d2e684f79f82e1b7f61da87c3072e7638409cb5646b56f885d4
SHA512b55a82bda736d8e5552218b30b144e36db044f16b0565c774a663fc91716c618a99888bceb19276a3b090690363527c30be0833dc4513420257ca19df359876d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566d4aa9ad17c5881610c17d644d926ac
SHA1e8ed67aed3b50a7243b335a95e00227ffe2525fb
SHA2562c3ec4c2f717ed128ddea79e4d67ef56421eb611eece630d103bbbe1aebdd6bc
SHA51256279576ca1edadc5c38adf950a51353aed57ade1851fc27f4218f78c55b907907b12343684680bb4853eb3190877ae4803217f5f5e1b90e2a57f134a0bca044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cee2c24560afcc9ca0089600b9d16e6d
SHA1c71b04b6deefb5db59251aa3f2a38290517f70f4
SHA256b318d67e2ea747e07803bf15309f433dad6cffb6503f347d078873b1f0bc7f3f
SHA5128a2da3c690e57b58caed507f8eb67f8973cd1847b5be0a7427bb4fb647e62b91875a24360c8e0fb3b181d346d60d111ee361a126ef5e6f62033a2619f6f17040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53136d84ebe34ed6299f8f52296c85ce9
SHA17c7f1b42642d62360336d01e2056fade96eebec5
SHA256fff80dc17f36d342c5a1c71382db92548d134583ae9b29b9a4ff5dbff6279814
SHA5120e29f171507878e6945c0c5ea039bf9e0594ff73ccbb9bbe609e519226d3687b2832ee1d63f1c4dca9b905fdb585d9cc29a5cccdb4627a85d682e3c5234e3a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55980806514bb8c1b7ca498e3bbdc8e76
SHA13003e509c3f44d4f39032618d5829f271718ca95
SHA256311c1eb197efe18130a931e28fc0b35c251999b8857dd6fd377c18d75b601083
SHA5121b05825a345056df2ae02e491e90bc538a62e2215c9c0570dde2b0f0e34e1fb5bf665236ca3bb16cbc8d2c1bd3a03edffc3ab27cad95db1d79468a5322110959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d71014e1e37d3a6a00f5d0f7c7a2f4b
SHA1c83ebfe042d0f1f1df8ec5bb1bd096d3fc524407
SHA2563009d04b6bf94e9b439e5177f8c5189b297ac6fde1e2523404f3af75a1b900d1
SHA512ec51e42b080309be0fe3ef1012a66047d0ebce6eaddd0d6defff3cde71ae017fd5162afefb4c3d049b7002c411feeff56adf557930043ab7a4972e1cd1918fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a204a56352be3060fdb142daa6938654
SHA1d5d637bd0c0c3f33cc3ea144196fdee1759a294c
SHA256721f047536f7249c21c37a863ee9e02e555fa73d8e17355cc3c185348b0eee92
SHA5126fd5e6375277c84faa4d1bdf9e434fa832821380c013c17f0848928bfd7a35ece9a766f2b43d8db284d210c33553a9789acbf54c8619a1e76dd3ea7367e4453b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e9dcbfc8036251132e0e5ee4dd54127
SHA18af1716e6812d898dc272b88f694b37a38239c44
SHA2560e3e9c13b30ef8889044cac264b04779afc99ef3d8dffe007c56cb7304ebd7e7
SHA5121336eff698f11849ea816e9a7f71b7b2f2da815bd6367a64b2527c2c1646111c07aeb1d8dc50ec88cbb6989ce7736e19c7c5d7094ec6ac9fafcd89ce89785c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acb1d37c036dd34d57b6ef0fd28cb5e8
SHA1023f844c0826fb92d360259c41c9fe14dea0a3c5
SHA256ee544927a20a1dd31d4249177a6376c31df9612c3e445895c590f5d89f872039
SHA5129b27696ed099116b1c52006003012f420acd44898d2b670d5eb7be2070016d231d2d650b71d2ac15b7d90022311fb87bf64ee81cd0397db482056b5198a3585e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab0bfbcee84dd0524ea221ad852dff82
SHA13637c93031040814b73ad08843d7bf3c76894888
SHA2561163e22137fbff6ab3fb38c4f58bc7fe2df4a56105f79ef830584c6ef8bb6004
SHA512e9a764e1a43f0f42ae481d786dec35808a63f840db48b8a01d22078c7d1e5554cf04ce1725373bbf0882044fa5a1a4a8a9b5b6ed30fcf951b1a5b935e2fb5a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f73e392eafe998d458970cca9207d6c
SHA1b2e1d3b8412096e35917edf63bb0db9399ed4ed8
SHA256125fd1f8b3c42e0b1307f78222ce0f6cf897caf22b666f321365aa57c09f212b
SHA5122ff393cfa4f5a08bbe8e2d446a22864de6d8a3e099cf4abf681e229fe798f03899c2a597766260ab927af003d58d5e60c7749ca88e1a10c05563dedf70517907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb66ddffc9eb6a6f502527fe0607e5a9
SHA1457f7eb231e3bc69d48c10603ab7b6df0598c8e6
SHA256a8c41ae6b38e1d2b10492309eb29bc805893c9a09a6965cb224d1f78d4c0fdf9
SHA5128b7339a127d63a107f2af104d92a097b36ed6bc1bbf9f0d4951e64b8d791686940ce093fb39f76493507bb8b68ebfc8355c14ae570624ba1da0edfd86a689fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a0605c30809295b0db36affed08fd1b
SHA151660cfc652d2d713e35c924465fe8fcddf1027b
SHA256519683014ec18b7af4a4dd8a6d4e7004dce3ee819e42a49d1b8ffee5948cffd8
SHA5126f1dbec9a36520ddfaa08c29ca364de9dc6c25be0e7aef1e862dc233c3410fa482625cacf07aa7c9763689cd7006b9ba90839a9c779dc82e20dad9b6633db6a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c602217433413dc3b051b835c4cdeca6
SHA19d4fcb05efdb760056420ca84c56e19d9c4182e8
SHA256dada37fdd2e3267062e4e06600afcfe9116f5a55c57f84bd1222661153420713
SHA51246baabdf1650881b62151a966d60f96ffa1e3caa34875c02b77d138799ac34629a981753786710772583c04ec41c4a8ae4ce2a7ff738814ae3feea5007e9623a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5250faa2a7756fa6dfc6d9c409bf039bf
SHA1a6a3adf635e7448ab2334cd6e846ecdeeb5544e6
SHA2568da5430e1417a237182a15766f71fe7040a3895d905c04683e9d9e8281f849c1
SHA512b3d13ab1935f6b27f10fa9e5f59c7540697c8d3f8e5f68bf2c037e9f0ae4ace3675e466b957496f9ed92a59fb27979df06088d1d0494d1c3eadba2080c79a701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b18cb69ab95db8081799cc754aa966a9
SHA1c8700ed95e21aff08275b3077c3e9e621e78c8e6
SHA25627911f324036c301c1725d7af0cb27c59201e1eae7fe56aee5101e728bb48d25
SHA5126a26505f951d37cae2537caf3dd4f9d33d0d162c8b508af01640bca7efaae41e65211213b5ec5d7e0d23f8daa383fdfb52cd4ee2b36922add838ed6f20894c22
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a