Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
通用多开器(互斥体多开).exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
通用多开器(互斥体多开).exe
Resource
win10v2004-20240508-en
General
-
Target
通用多开器(互斥体多开).exe
-
Size
852KB
-
MD5
7e601af7168d9faa8946e803c3762e53
-
SHA1
4843454669be401e3db178006de90c7a29ef4b35
-
SHA256
ca04be9c25291f7868827bffc885029c861393d0b0b3d07977ec966b56894c68
-
SHA512
d6e4b4a96e2a6cdff1ac2927fab6e7089e35142e9a44ab03e63010e9e506d7107d6fab5fa6757407ba4d701dfc0663898ad8a0941d01416ebea47b7dbf9f9dc1
-
SSDEEP
12288:GGtJ3ORzqq9A2iVnrMn8fd7v7y2R5nWFpPoSvISwb:GGXORzB9xiVnru4d7v7ytbAb
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2108-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2108-520-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7BBBE31-19F5-11EF-B7A6-525094B41941} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422734782" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?k26530024" 通用多开器(互斥体多开).exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2108 通用多开器(互斥体多开).exe 2108 通用多开器(互斥体多开).exe 2108 通用多开器(互斥体多开).exe 2680 iexplore.exe 2680 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2680 2108 通用多开器(互斥体多开).exe 28 PID 2108 wrote to memory of 2680 2108 通用多开器(互斥体多开).exe 28 PID 2108 wrote to memory of 2680 2108 通用多开器(互斥体多开).exe 28 PID 2108 wrote to memory of 2680 2108 通用多开器(互斥体多开).exe 28 PID 2680 wrote to memory of 2916 2680 iexplore.exe 29 PID 2680 wrote to memory of 2916 2680 iexplore.exe 29 PID 2680 wrote to memory of 2916 2680 iexplore.exe 29 PID 2680 wrote to memory of 2916 2680 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\通用多开器(互斥体多开).exe"C:\Users\Admin\AppData\Local\Temp\通用多开器(互斥体多开).exe"1⤵
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57659838c4d8b81340c0ed419f0fef319
SHA1ab8dac89b0bfa6d6ee40a331a86e68e9a0b85adf
SHA25647036a5dc45ef8dbf44934b1f9db1f4fc1819595e4eb52d1105993621ba6f2d0
SHA5125fb15d77a2ab0ba9d8b6f851271c0e4895db12d23f11902d31e5d7d944426e93eb4744f2ec0a6eff68daf789410e59a4327099a7aeaaa37dc18c80202cd26bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579b9d7ed5c8e990c1404e229b073de13
SHA11edb55588f96809a95132b485bc7494414de8bca
SHA2569553948b80361d20f6d6c56e1420d28402963660fd264ffb1bcfaef71e507407
SHA5129919ce72be394b4e30989265f7809dc5960d0079bdebe8ddeb40b8fc4f9952434128fd85782567babdca39170529d3c46c73f8565aa0a89ac44ba94f525b09c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d66a9ae0afd7cdab096570fd31030cce
SHA183951ef6c5fd8be4524c1df831d0de841a37da62
SHA25696baa022f319c1af981294368c143aa858f2f39a1f01965c64c47d77ca4ac8e7
SHA5122366262d3102447a9cc64701d179c07b5ef44164682c782fc3771f5bb53c94294ad9934eb18a6de05777b2eba97b0296f0eb6b9220fb32fc0866fe18ad592c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505f5b1f60e0031e84a3266a2013b5ddb
SHA13595486f877e18b0b27524aaecfc38ee4dd17236
SHA2563b8b90eecd655b65526c57dc84ed38f2000db27507132cdce1dd4ad0e12b46e7
SHA51284effab61b9519ed3ce08324fca4dd7a0045f4eb0eb62b9d4b14c0a13c9b95f2bbdd612af95bc3231b86a38041387a3ded260f15fe842cbbf12861f3576eabef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fb68b81156dfda8cfe31393ea113151
SHA17f8f0e590049081347dc22347fd17a719b350d97
SHA256eb18bebafd9806ca470cca45bb8c9f0fc5d05f651cd61a5937102b7d12c804e0
SHA512ad7034e08f8aead1ca8dbbbb03432350d047d0c6dac6800b88e05dd07f22108c5abc9c0dfa7d1b2717fbc0bc29ab95b9b055a346a8a8dd7316d5f90b0d56e10a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5537610e039a17e320a5e0d33a7160cc1
SHA1765fca1691ac6b67fca5a750bc50866908d16c6c
SHA256389bf44869ed58ec9bf9972288b939e0f036f919c1ce07c9991f11a2391a87a7
SHA512cb232ff627c0068d2854cb3cdc685f2d86de0f227f127dd7648ef090b92f362ee85e3bfd9481230fd09a0eb749b32b6b6b7be86ea52be9c8d562d9884aae4d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5442db596299c00ddb2e949e1fe005a93
SHA1a31856d25a0fbdc9ac518375110212a0984dcf07
SHA25638cc32bd5747157127bd2ea8d313e7c4665ac8719199b1a9507bdd6665ebbbd0
SHA512b716fff0cc6ebc20e2eb507e16a332ca234eebfbb6b4e70c11ac1e24f2608fb5474e1adcac93511cfc21d5d8962266f17b8f14381bac2223ed216ce7468d22da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f3835c77d6cdbc03e5398cbe427502d
SHA128dff7fa5744de1ba5b8d09ff48020af82c6b2ff
SHA256bced695cfdc30780c0ef86864a93e84e92a683ee41765508ce072ffd094a24a2
SHA512e7c97ec0a028fa06f2b109d2812c1187e320cd6ac1bec5945d61f92257ff1b09ef10e14f790644f2e74b7a6b9ba4351e2b98baf3da3d380c90c600c1fbf1038c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5297f554eb959d5322e3d70f0012e62bb
SHA15594ada5fbe961dd9ed43d0566837d2052a9d28f
SHA25607c15901438f0fa5d803dc7551be9481e33e9aa1c24734c321d9003933161e41
SHA512d01b5fef82f27440755038267a8f765c7fd1aa46f51762d50fa990f3a7516f6e887aa2da05b153c58b853acb99f6f8aaf081b43e3e553f91e9641f3168fe220e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9135ea41c09057e37ca3580b4311101
SHA1a8fd87c3188cf9bfec839fa78dbf5002fd958492
SHA2563d85525954886fa1c6f120dbfeb15f455a4ada77af8185261e2358b8c9b80e23
SHA5120dcfb6d942cae8d2afd6e1b06e872676f11d87490759f864579718ec960fee5262cb5078490aa0332b0cff83e8a55b0e1989aa31e7813a2ed4bab226ad57602a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515414c6800a7643a76c5c2d57c9f5c73
SHA1008d2fe32e224a6d79e83db89250a81a363b4fc5
SHA256c72a5b062e2a6824d46c93da0d2ac669b97e3dbd9997bf9273caccf911ecc83a
SHA51254b6b83a3cdbad220d968c391390a477d92fc33ab66d5c3652f61e8c8f47ec7036861609b4c9349416b8ffd892651fd1b39b116dad74caa147f2d98d13e08f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50413a588aa13c93d934f9677d9f079b9
SHA15b1200f116de32e2eee967b1ecab9e1c1f100a97
SHA2562ac465646be824b74d1074369af762dc968cc30c4d9936a4a65a6fb5a910cefe
SHA512391539317f6e2044d24bb121dab5551616a8d886e524678d4da67e9d9ee331ab95cdc34fbf11bd43b7ea8b41110d82ccea2577eece9abc9cf9438a090913c6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a7b9f97d608fb9bfab23ab8178909fa
SHA15297dd6d5f484f5ea5528f6303dcada3c41c10a9
SHA256f59d75404e6350057ac9a8b752947a2602150ba4c1cd8767e9cd7a1dbfd2eb66
SHA512df597c3d0b76b56ad72d7b85a1c5c6cdc4589b81de85d0e1286a605dbbdeaace626c9a53a732740013367e8d38672f41f038035d5ec5804a5620efde866b02a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cd4c0fc7e399de30f077492262ca71c
SHA10bb2346333208f914f990a2752984e777cbcfe2a
SHA2563a56ca6d72b8f11f1991a40dbe2b9455344122b1bd45dd315df92e9358b2e449
SHA5125f16727dcc47dbed0bbab42ab5950c857cdbf85c83f6965091a03600be26d0e2cd8a53bd9f230489db32421a1d17c80ffb2196bb6acb2c3e4922a9902f90cec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9b88aec433e3829952ebce511f1d2df
SHA1c84da18136b6d466dcb0358e091d54f42562bc09
SHA256aa80ada1ad0f1fefe10047ff1f952a6730658e7282181332c9c483d43377080d
SHA512922f9271ee94029bcf5a7c5d3e59166616e32a555faf63310e85adf2da29610ffb497b9e166afecaa13fb92a93bc100814b1374f7de4f8eb1bbfd5247a577a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddab0b44d3941f347e5cd309e463d222
SHA11cfabad4fe97a05638c1dcc8d16de0a58c686cbc
SHA256155545ebab9344b5bcd63988fac0ddc5e924ef698829ee21213f27b38bfb19d9
SHA512cf1f889295ee34d8af21ecdf243e01e5af28289fa8c8d47f8c3814fc7ae047dab491c8c743920d9dff233a6ca1cd8a7f0fe2ad8242a8c2b90a6104fd601445ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb42f2ac07f88aa22609ce759c720d9d
SHA13a6ec8b9a30584ef71ef9233873f4308929f27f3
SHA25649803ac07a6e1400af3260b054aa2c60adb272c7ff9ab88885ed02543066a813
SHA512d5f77e4a458ac4201f090fffae72efe31ebef1da9698bed8e3f5a7f55f33fd95e54404e1b62d6d1687614a989ba81de9f51960a43846eddde72567aa7694e38b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53061bca70e58c399065c179a44016713
SHA1dfd1b9a4afd2fec4a239c05c789c6af11c517d7a
SHA2562d646219d4497025b6dffce57929130ac7b9b96dc79528ef2b35941391c2cf41
SHA51282beae884d960a3400fcaa828cca059ed46309c7d6ddf605038ea00a35e196b562fdd455ebaa225cb71a8dfd9ba663f553dfaafd8833100f0482addeaeac6c1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542621dcdd20b5009f1daee7489b68a94
SHA1e1f1ddb4a42867f076c6229668a8ce88610d7939
SHA25650adc4649d628fa69d445bb6a94de6fa980a1c41c6df7ea7a5ddcf0637e58a1a
SHA51275b3471dd5eae738de290dca876a297bcfd38c7b7ba178e8f9f07ef2a889cdce9d45fce20c6ea9def190a58294d7d1c26994f5f5f48f37bdd31268f1da8be47d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a