Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 12:22
Static task
static1
Behavioral task
behavioral1
Sample
VoucherQSvc.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VoucherQSvc.html
Resource
win10v2004-20240426-en
General
-
Target
VoucherQSvc.html
-
Size
4KB
-
MD5
ea4e11ec4b4746b48f5689c6f21f8015
-
SHA1
b7f23b546d78c6bfd30b7d4cf57472c12ee07f41
-
SHA256
5a053d0932402a495bd206b4614f1015a533e3aa046f48bc820feac2789e2816
-
SHA512
aa60f2e2848418a6b5747bbce668c439bd63dba662532f0ee06122c12414622af6cf4887988ac59be82aac6b42e50c0f26848d43252fc5f12b6036e12f22ff78
-
SSDEEP
96:oSTJBHBJDJgJLJpcJhCJz+aCJzkvJd1JzUJcJzLJgLSJiRCFREyRUswkL:oSFNVM9OAOUdDs4JASMAnh
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7A368C31-1A91-11EF-B1D1-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b332d3aa9e0d904581602b4924d6d8b100000000020000000000106600000001000020000000ea0eb212ce177a633bf352e20a8ae2a81162fe0b5a7743ce90b41022e78467d9000000000e8000000002000020000000869c57131c9e5f149866fb7ff570f4c3fe3f1e6ab71bd7ef3b60fd36db54c7f120000000fba7a948c89db2928ca9731fda8be4a0bb3b3684e26f0a2374e33da9474898de4000000040f6e4e18465df870605c6e13eb20d00f0cf76f5f3e970beb7bbfdf4acfacf47f9c828e56e56d8201c8cf07b2f5f2fdef36f35a5ecae00104861771a06b71ba4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a051c34e9eaeda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b332d3aa9e0d904581602b4924d6d8b100000000020000000000106600000001000020000000ce11c230de23287fb6587f1449b39b8f3491ff71a1c9ea70e972e2417a46fb74000000000e800000000200002000000022ed1499f5b17a97715fc08d97b181a10f806f0e2076eba81683f2889c79ba6b90000000596d78c62dc1e09b8315a9bf85c29e1e26eeead77964f79091a473c0863d5b0e68fb4454adae46cb328f7a8bdd85436dd9d6c22c274f66a4faddefd3aea8bf5192e5f7257c046034a3d4741f3debcd58c53e1ccec676dbbc73c8974c2a46d8cab1c2321452b234ff34db3c2f5f8467e86bef29f301016ce1bfedf25fe1e18114f066b5f8a70a9d5155a18f3b03b15bf14000000029cf8da366bd8c1d475cf1080806226371e3b8cc5dc4debb0ab6d4ec2cc475303c5d9eda2f8876a8a77a298a576598e7d381750b5cc60d625b66223cd00788e0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422801627" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 3024 1628 iexplore.exe 28 PID 1628 wrote to memory of 3024 1628 iexplore.exe 28 PID 1628 wrote to memory of 3024 1628 iexplore.exe 28 PID 1628 wrote to memory of 3024 1628 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\VoucherQSvc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5102fa88fd077ca3ee217ccdcca333e86
SHA1f0c8bb378790ed270905db1b504aaef0e9544462
SHA2561cb554117af7ba2ca29539ae65901b04b98ed83b261b9706ce77f4dcd6542416
SHA512900edadf8bbbfc7f37d24cac38e9930654ba907facfee394929c2dd4ad3344dc2ff55f954288ce3f90d1d4bbf64bc3ce8a3f06cac075266be647ba01fe7c63c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ed8a3403fd32977afd73583affad05d
SHA170bc1c713f79c7520d907753745579a9cd3f3851
SHA256082bcdb1a97214cb9f4f345976c69eecc0953c110f9f6d1569c471f899b0d910
SHA512860918e36214ef82b9c8dfc39c00afc8de6868f55e138b1095bc4823401af626d6e57a259dce6dbfc277b6a8a016a154639b93d8be81a09b542ecb694c9a6ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579964a142e1a59e3394264effa12a1e1
SHA13e4f5c9f8bb5393ae624c659dd6c3cffa354ef8e
SHA256d4e0d8b93cb1cceeb74c27dfc078eaaea6644865d4e7ba1a0b1b3505f419fc6a
SHA512e28c616ba33e284eb5a77c793fb0421ae2dae2c0edf2ca3870bcca687e4e4485427681313d96595f35af136fa6ad8dd32d9548451d6fdbb3aeec26b187c1de6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ada1ee4373fb4454826f500bca708744
SHA1e8ac4bb77ad854ba213322fbdfa8b9da813170c8
SHA256cdcf7eefa967ecaf49ecdceffe950412681099b79c02c6c1ea46a8e7d5766d04
SHA512db426104b26d995e222cf05490d6f10af80ad2cbed8e9c3b36dcac22fc1a30583cd836031bb2f98adaddad2d917bc88d55604fc1f533b06ce6fce28be7c9fd29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9689ab19e04a28955ab802048ec6f66
SHA14138935c33be1aaeb58ed8bce50442040b84d51c
SHA256ce35ef59c470ce4fca495eadf23e988ce672500ba8bc1e1a7d09f6612db8ae24
SHA5123a19e15bfb8fd65d614b543eea2c53b8f65bf1fa960b9ff0cc97c84ae4209f0c0e0aa00aa63b2cf7d158d827684e1ce645052475a79cdadb98b89fa231b6626b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa5bda8793ae119be332a279398c6c3c
SHA1ba4c20d38f1a91f4a7c107e98c0fff99531eee0a
SHA256c76aab55145d28d200b4928efc4c25c03e6210e551202d415327d5e653873773
SHA512d3ae07e82af4c34cedf209f03e76294b56d029f79020da52817e3f47579d368657cdf343bf92f39bf0a5799d8059c3ef35278c1b3a83a15dc438ff53b2957f09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b49e553cee10e1ec43c93c67f45bd9f
SHA15325cfb02fc3c2c7e4106ca728d2b7b29dc70546
SHA256567581ecfc147b70cd162529c629b89726b952b385e88c6e13f4b8e041998775
SHA512868f25c1b29cefd2a6a60173f3226d77fb8def632af87c7fc932ca7e36a0da7f3eba965474ae4f5d3a95d7469d3d18bb0a6fdf0781bffea7005ed9985de124ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bffd998460e6c9124181c0dd3f0e6d0
SHA1f2a7089fdb80c84b2cf5017327fd8210c233b36c
SHA256b5e6ee10200841e0432f4fce710c4a6e20c70034b05daf8643cd4ea4ea139d31
SHA51226991abb69c3bca80dbf3577b9646c11602de1001ab6b36cbf852fdb16af340242fc278c3bcafdb2bb920d531c0d000e0e9fddae2943ffa6826cfca34c4a3c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bff36a9b8c283beec8350a0bab72e05
SHA1b95748a3a886f6878537f1ea1123e5c874240e65
SHA2565c3f121be021dab2e4d316b69a095f7947b33e1ae2d308d41e99fd838fadbca3
SHA512f13eca170064584e4d9ebab1db106f933be12888ae16b0876cb05dd21824361aa3af291e8251e8bbe58ed2b2a8a14cd0fed2ec99f934a258ff76c8e3895ac44f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532cfdb9d70e83f2d136fc5d38a2bedd5
SHA1007427562d086a69792e54c622c44d9970fbd199
SHA256bb8c77a0f8219474432706bb219c5495ef209f0d5e05dd18b197e75c7d6dab07
SHA5128ddf93a216c5251ee2e8e077ae9a42b91b28eec5a9437c50c5756fad654795dc3fbb1686a22d312d222757146e24e0be31b7f025586ff29656da97bc468fdfe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58208a15cbb29a8597297668c41d75606
SHA138deb29b7fa83829e58f853728968d5c68ca9890
SHA256c38081e1fd7f0d3ff37b568b24faf98a3991d367ff9718d6d3f7ba378b0cb8da
SHA5128f11a086299f999c107b608d37cc89ba9104b097159d1de40bbca27b0439f5236b7ccd771e87c26bb0ff8b84808a7786cd2218a3c814a2ea44c85b301d69bb84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eda55923caea0503f87d7afeafc6c278
SHA126af45b2f8edd8a16bf02637767c2d4af46fb62d
SHA2563d8420719c973caa3df4d99656653853ddb77cf804e2d08cb21d1fd91d3ceb1f
SHA512ad201ea5eb9742b607fe978a0dbdcb6f6d3f437fc71c0df1225326093fa5810f69c1f37c5380cbb2b7949583146ea31be8f736739922a9444d949b3911008cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de7f5c0a0992f1bb35980a5d6fcc5698
SHA121ff2dbc1879ccc6e32f93f3cab87f4d9415bcf0
SHA256af01e3309dca6a85be0d8415c24a93f7529f1f01caa1d168c99edd007457c389
SHA512e1a656bff047b4c465c3b38606d3e8e2e463a16a6f019e5b166d594b1d5ca1c1a11eabfb46c489d393dde634bf59da3e61e1c69f3308ac5307e3df953b7dc947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5161ea4bff221b018a9a8be500b473c16
SHA1899a495be2f8dccd388becb87ca68961d2a0c98a
SHA256eee48ba9975c35427b33d64bf708334e540a83eda60195d058f2f6b4a22cb505
SHA51294f4294d7e3091c229d72de862873d0809b0d5bea907c4a28b3eb780d326ce67ead3b3a0c6a909b5153c4e3555cace700db23229d317368604b5b78bb029521b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ecc48e3717009af85f388851e7d5ce9
SHA139d7007ae09a75bf4e3b54537f6cabcf3cad1e55
SHA256468bc3c479cb1f423dfcefb8e52866b5c6ec5c9fd76d34345c173515a0addce1
SHA512c8d547b49db24dfff1dd5a26fdefc2d6da233d47af88005363e6e9fbbdf09baeb2a45685ee51033b71b5ed32b46c92504d8e2fdf6938eaf98928fbe0b3874991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dde419d79a74b67d0b61547571e56af
SHA13e81694a0e4433ba49b9e94f4222b0b831111920
SHA25616fa3fdb25b28b1e18d7e4dbd6f851e81a788024387bdf31da1f5051b76466b6
SHA5120d2288656bfbbd964c1b80915496878ebd0566e0efab18bc0955ff1eda06eba23fe1f446dfa7a243eaa1da6948cb326396691a10ed4e09bd1a55ebdf568dd7da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d025b4185fce93fc542b5d0bb15762a8
SHA158ec398927acf5c4559ce6daadb242327793a854
SHA256a15a856c971025e8bd9f45b964b0490ca6a3d22b899e3c0426afb02ca19a68a6
SHA51208c91e35080fa2f4b755f3b7ddfe16fae3273bc716065bb804b8e3befd7d5b33462e5b50cba47afdf555f92a20c0497cf28dfd8f08b6b3294b5f1fbda4e0f52c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed33d427c4426c4d9604c6949ae1acf4
SHA13e55328351ca76eb3ce420c581c5d18f9a9c856d
SHA25614dc61f5bc320173d3d399981c4b3f1860ae00ab965c85fbd2a3bd5a4cad25ec
SHA5126be98284c980e9ccb9d2d40c9dc4928609a5294f05491fcccc353cf276f56ecafe9e8c1f4a5b8e632411fbe30506f3ad0c24e5a0b192dad532a10b1bf3057686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa9053ab6189c4caedb87547b54e7a29
SHA15a20ceb6824a838bcdcb04e9909af4ebddfb3320
SHA256455f28866fc2c44f1d771184b61f2259360d9ae32e6888033ef3b7eba821cd04
SHA5126297c8278b241b51db9241938dcccd4272db3fdc34aadc3d13b05648ebd1692d1d4f2b0fc44f5fa600c549a084f935e6d5d2f02c901ae15b8d9b765a59349499
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a