Analysis
-
max time kernel
139s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 22:20
Static task
static1
Behavioral task
behavioral1
Sample
CK_19617_9585862810069.vbs
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
CK_19617_9585862810069.vbs
Resource
win10v2004-20240730-en
General
-
Target
CK_19617_9585862810069.vbs
-
Size
2.5MB
-
MD5
8d658117310b8089242c9e9c572dde73
-
SHA1
6403b791f6d07b13900fdc2a921feb19fe3daf29
-
SHA256
5b0e3944fec83a8d868a84247ed664764ba213a1c22bf7618240a4c995fc6c74
-
SHA512
2e62354b9259629b94978cca95ffd8c3d1e4fe5fea79a7efe5c14fa378e8f7ae8c630d9805611d9bb71aa40433768a88b018a13040fbdd289c395fd59d3fd77f
-
SSDEEP
24576:NC4YmLjKcMR0sjeZavuZ+Ijp6rc6/zo1gcHpXZtJ1f/IiF5dvldb6gyCUrN7YFc+:F5Q/bfdhJFC
Malware Config
Extracted
qakbot
323.91
spx16
1569917382
71.93.60.90:443
113.77.242.83:443
203.192.232.72:443
98.186.90.192:995
172.78.47.99:443
72.213.98.233:443
76.184.141.236:443
12.5.37.3:443
96.20.238.2:2087
68.225.250.136:443
75.110.90.155:443
96.20.238.2:2078
96.22.239.27:2222
123.252.128.47:443
70.167.72.28:443
2.50.170.151:443
2.177.115.198:443
96.28.229.218:443
67.10.18.112:995
70.183.155.118:80
70.169.2.228:443
72.16.212.107:995
181.90.124.162:443
100.4.185.8:443
199.126.92.231:995
67.77.162.13:443
173.247.186.90:443
96.20.238.2:2083
47.23.101.26:465
207.179.194.91:443
70.183.177.71:443
173.247.186.90:995
5.89.115.73:2222
47.146.173.204:443
76.116.128.81:443
75.131.72.82:443
200.104.249.67:443
47.153.115.154:443
104.34.122.18:443
108.160.123.244:443
24.31.249.123:443
107.12.140.181:443
104.3.91.20:995
74.194.4.181:443
181.126.80.118:443
67.214.8.102:443
72.29.181.77:2083
207.162.184.228:443
72.142.106.198:465
76.80.66.226:443
67.246.16.250:995
68.83.59.107:443
96.20.238.2:61201
47.144.93.71:443
96.20.238.2:2222
81.149.189.61:8443
47.23.101.26:993
72.240.155.78:443
99.241.22.53:443
206.51.202.106:50002
116.58.100.130:995
66.214.75.176:443
108.184.57.213:8443
67.10.18.112:993
173.178.129.3:443
217.162.149.212:443
71.84.5.114:995
67.87.38.242:2222
77.30.11.142:443
75.165.181.122:443
186.47.208.238:50000
185.219.83.73:443
203.161.179.114:2222
75.131.239.76:443
110.12.60.117:443
71.30.56.170:443
181.197.195.138:995
173.161.148.169:995
80.14.209.42:2222
100.38.177.146:995
190.144.81.158:995
98.236.87.243:995
137.119.216.25:443
75.110.250.89:443
47.153.115.154:995
70.166.97.7:465
162.244.224.166:443
70.163.224.7:443
76.6.64.52:995
24.32.119.146:443
24.30.69.9:443
173.172.205.216:443
173.247.186.90:2083
24.184.6.58:2222
168.245.228.71:443
73.202.121.222:443
108.45.183.59:443
64.19.74.29:995
71.84.5.114:443
96.59.11.86:443
173.247.186.90:993
73.37.61.237:443
197.89.140.185:995
184.180.157.203:2222
50.46.139.209:443
68.174.15.223:443
50.247.230.33:443
73.179.178.78:443
192.24.181.185:443
76.181.237.223:443
71.105.197.98:443
206.255.212.179:443
96.228.21.246:443
184.191.62.78:443
73.226.220.56:443
65.116.179.83:443
104.32.185.213:2222
23.240.185.215:443
68.238.56.27:443
166.62.180.194:2078
111.125.70.30:2222
173.247.186.90:6883
75.69.3.12:443
190.120.196.18:443
12.176.32.146:443
173.247.186.90:8443
174.16.255.191:993
65.30.12.240:995
173.22.120.11:2222
71.77.231.251:443
162.244.225.30:443
75.70.218.193:443
137.25.72.175:443
99.228.242.183:995
174.48.72.160:443
50.246.229.50:443
24.44.253.222:443
5.150.100.252:443
73.60.156.223:443
187.206.118.246:995
24.180.7.155:443
47.180.66.10:995
174.60.88.130:995
108.26.201.34:443
74.134.4.236:443
71.197.126.250:443
173.233.182.249:443
173.172.56.79:443
98.181.182.13:2078
Signatures
-
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Pcabxeits = "0" reg.exe -
Executes dropped EXE 7 IoCs
Processes:
aNkxbUo.exeaNkxbUo.exepuogldjs.exepuogldjs.exeaNkxbUo.exepuogldjs.exepuogldjs.exepid process 3012 aNkxbUo.exe 2736 aNkxbUo.exe 2628 puogldjs.exe 560 puogldjs.exe 2812 aNkxbUo.exe 496 puogldjs.exe 656 puogldjs.exe -
Loads dropped DLL 4 IoCs
Processes:
aNkxbUo.exeaNkxbUo.exepid process 3012 aNkxbUo.exe 3012 aNkxbUo.exe 3012 aNkxbUo.exe 2812 aNkxbUo.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lbgya = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Pcabxeits\\puogldjs.exe\"" explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
explorer.exeaNkxbUo.exepuogldjs.exepuogldjs.exeaNkxbUo.exepuogldjs.exeschtasks.exepuogldjs.exeaNkxbUo.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aNkxbUo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puogldjs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puogldjs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aNkxbUo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puogldjs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puogldjs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aNkxbUo.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 2432 cmd.exe 1248 PING.EXE -
Modifies data under HKEY_USERS 3 IoCs
Processes:
aNkxbUo.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" aNkxbUo.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" aNkxbUo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ aNkxbUo.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
aNkxbUo.exeaNkxbUo.exepuogldjs.exepuogldjs.exeexplorer.exeaNkxbUo.exepuogldjs.exepuogldjs.exepid process 3012 aNkxbUo.exe 2736 aNkxbUo.exe 2736 aNkxbUo.exe 2628 puogldjs.exe 560 puogldjs.exe 560 puogldjs.exe 1968 explorer.exe 1968 explorer.exe 2812 aNkxbUo.exe 496 puogldjs.exe 656 puogldjs.exe 656 puogldjs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
puogldjs.exepid process 2628 puogldjs.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WScript.exepid process 1604 WScript.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
aNkxbUo.exepuogldjs.exetaskeng.exeaNkxbUo.exedescription pid process target process PID 3012 wrote to memory of 2736 3012 aNkxbUo.exe aNkxbUo.exe PID 3012 wrote to memory of 2736 3012 aNkxbUo.exe aNkxbUo.exe PID 3012 wrote to memory of 2736 3012 aNkxbUo.exe aNkxbUo.exe PID 3012 wrote to memory of 2736 3012 aNkxbUo.exe aNkxbUo.exe PID 3012 wrote to memory of 2628 3012 aNkxbUo.exe puogldjs.exe PID 3012 wrote to memory of 2628 3012 aNkxbUo.exe puogldjs.exe PID 3012 wrote to memory of 2628 3012 aNkxbUo.exe puogldjs.exe PID 3012 wrote to memory of 2628 3012 aNkxbUo.exe puogldjs.exe PID 3012 wrote to memory of 2788 3012 aNkxbUo.exe schtasks.exe PID 3012 wrote to memory of 2788 3012 aNkxbUo.exe schtasks.exe PID 3012 wrote to memory of 2788 3012 aNkxbUo.exe schtasks.exe PID 3012 wrote to memory of 2788 3012 aNkxbUo.exe schtasks.exe PID 2628 wrote to memory of 560 2628 puogldjs.exe puogldjs.exe PID 2628 wrote to memory of 560 2628 puogldjs.exe puogldjs.exe PID 2628 wrote to memory of 560 2628 puogldjs.exe puogldjs.exe PID 2628 wrote to memory of 560 2628 puogldjs.exe puogldjs.exe PID 2628 wrote to memory of 1968 2628 puogldjs.exe explorer.exe PID 2628 wrote to memory of 1968 2628 puogldjs.exe explorer.exe PID 2628 wrote to memory of 1968 2628 puogldjs.exe explorer.exe PID 2628 wrote to memory of 1968 2628 puogldjs.exe explorer.exe PID 2628 wrote to memory of 1968 2628 puogldjs.exe explorer.exe PID 1680 wrote to memory of 2812 1680 taskeng.exe aNkxbUo.exe PID 1680 wrote to memory of 2812 1680 taskeng.exe aNkxbUo.exe PID 1680 wrote to memory of 2812 1680 taskeng.exe aNkxbUo.exe PID 1680 wrote to memory of 2812 1680 taskeng.exe aNkxbUo.exe PID 2812 wrote to memory of 1144 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1144 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1144 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1144 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1964 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1964 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1964 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1964 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1448 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1448 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1448 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1448 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1228 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1228 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1228 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1228 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1748 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1748 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1748 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1748 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 2596 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 2596 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 2596 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 2596 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 628 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 628 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 628 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 628 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1532 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1532 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1532 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 1532 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 2328 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 2328 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 2328 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 2328 2812 aNkxbUo.exe reg.exe PID 2812 wrote to memory of 496 2812 aNkxbUo.exe puogldjs.exe PID 2812 wrote to memory of 496 2812 aNkxbUo.exe puogldjs.exe PID 2812 wrote to memory of 496 2812 aNkxbUo.exe puogldjs.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\CK_19617_9585862810069.vbs"1⤵
- Suspicious use of FindShellTrayWindow
PID:1604
-
C:\Users\Admin\AppData\Local\Temp\aNkxbUo.exeC:\Users\Admin\AppData\Local\Temp\aNkxbUo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\aNkxbUo.exeC:\Users\Admin\AppData\Local\Temp\aNkxbUo.exe /C2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Pcabxeits\puogldjs.exeC:\Users\Admin\AppData\Roaming\Microsoft\Pcabxeits\puogldjs.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Roaming\Microsoft\Pcabxeits\puogldjs.exeC:\Users\Admin\AppData\Roaming\Microsoft\Pcabxeits\puogldjs.exe /C3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:560
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn wucjflrhts /tr "\"C:\Users\Admin\AppData\Local\Temp\aNkxbUo.exe\" /I wucjflrhts" /SC ONCE /Z /ST 22:22 /ET 22:342⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2788
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {66810BBA-C151-4FF6-84D9-B337710B5B24} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\aNkxbUo.exeC:\Users\Admin\AppData\Local\Temp\aNkxbUo.exe /I wucjflrhts2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵PID:1144
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"3⤵PID:1964
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵PID:1448
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"3⤵PID:1228
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵PID:1748
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"3⤵PID:2596
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵PID:628
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"3⤵PID:1532
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Pcabxeits" /d "0"3⤵
- Windows security bypass
PID:2328
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Pcabxeits\puogldjs.exeC:\Users\Admin\AppData\Roaming\Microsoft\Pcabxeits\puogldjs.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:496 -
C:\Users\Admin\AppData\Roaming\Microsoft\Pcabxeits\puogldjs.exeC:\Users\Admin\AppData\Roaming\Microsoft\Pcabxeits\puogldjs.exe /C4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:656
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\aNkxbUo.exe"3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2432 -
C:\Windows\system32\PING.EXEping.exe -n 6 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1248
-
-
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /DELETE /F /TN wucjflrhts3⤵PID:2096
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
644KB
MD5d606993aecc1b93d7fb400f80ac12880
SHA1f9deb22a5a3c03b3561c731ae1e018cd3c70d0bc
SHA256dfa1e62cee279a508fa4debc9c7584198e208b35b2dfe9adf3fc4bda0cde5c9e
SHA512b913a4f3afc50d68429316e4c057689166d9c9faca91b1b6f0d8445df42751b31677fd7ea5bdc960c3f2b95da6527e5f620f3e74d3e93024a22edacc7d0aea5c
-
Filesize
821KB
MD571e0d18f5500800ac0688a2544a8279e
SHA106ba73131638e8a03654124dbc16906d15232a56
SHA25670b395ccd4414a8c9a0d413cd3339035e970f90c04af92605deed72f35f8fdab
SHA512794bc01ec4dfd53c3a59681748165b3ce7e34b27aa2bb5c2592ebf696aba486de90093e3315c78f87b11ea6f97241d7ab04757ebe360f7f917eaa415b7604307
-
Filesize
63B
MD588a0731944779e78d3499dc8fb7b4ddd
SHA15f11e5c4d8dae72ce5caf47d7289197f2488290c
SHA2565df92f8663b1c32cab431c6ac5e6d173d2ef722247d1a263ba54695044eee50e
SHA5129ed454caa3efb147654d2319a81018fcd7a50420742f931c0e8c24d347373d7908e8ee3e8e1b5387d5417b573429ec7888539ae782b854f4114348ebf6319d4e