Analysis
-
max time kernel
82s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 19:32
Static task
static1
Behavioral task
behavioral1
Sample
a30bcd45a008e2f4172f0de62d3a03c0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a30bcd45a008e2f4172f0de62d3a03c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
a30bcd45a008e2f4172f0de62d3a03c0N.exe
-
Size
92KB
-
MD5
a30bcd45a008e2f4172f0de62d3a03c0
-
SHA1
d24987344d0d892522903aa9263726a602276d71
-
SHA256
e02e0e813b6e6d24b6fd5a58ddd5537e2475e79900363618652c736180b80050
-
SHA512
5c154e33627796eb6ecdb69f47744e564900e971ff85c46b6b407e255accd5e537964565f2e182032861b23a3c15ef7b39e4c04eb57a528eaa6f553865b40f0f
-
SSDEEP
1536:2ML58k78N3oKufLPFnwObQrOp3V36016W5d6IuvmviqOEQnKQrUoR24HsUs:vykQN3oKSLPtwObQSB56016W5d6Iuvm9
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Niilmi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmpkal32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad a30bcd45a008e2f4172f0de62d3a03c0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" a30bcd45a008e2f4172f0de62d3a03c0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nmpkal32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olgehh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mhgpgjoj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfcfob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Olgehh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhgpgjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Niilmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nfcfob32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnakjaoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mnakjaoc.exe -
Executes dropped EXE 7 IoCs
pid Process 2236 Mnakjaoc.exe 2172 Mhgpgjoj.exe 2820 Niilmi32.exe 2304 Nfcfob32.exe 2032 Nmpkal32.exe 2636 Olgehh32.exe 1236 Ohnemidj.exe -
Loads dropped DLL 18 IoCs
pid Process 2368 a30bcd45a008e2f4172f0de62d3a03c0N.exe 2368 a30bcd45a008e2f4172f0de62d3a03c0N.exe 2236 Mnakjaoc.exe 2236 Mnakjaoc.exe 2172 Mhgpgjoj.exe 2172 Mhgpgjoj.exe 2820 Niilmi32.exe 2820 Niilmi32.exe 2304 Nfcfob32.exe 2304 Nfcfob32.exe 2032 Nmpkal32.exe 2032 Nmpkal32.exe 2636 Olgehh32.exe 2636 Olgehh32.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File created C:\Windows\SysWOW64\Cjqigm32.dll Niilmi32.exe File created C:\Windows\SysWOW64\Idomll32.dll Nfcfob32.exe File created C:\Windows\SysWOW64\Iinnfbbo.dll Nmpkal32.exe File created C:\Windows\SysWOW64\Fifjgemj.dll Olgehh32.exe File created C:\Windows\SysWOW64\Mnakjaoc.exe a30bcd45a008e2f4172f0de62d3a03c0N.exe File created C:\Windows\SysWOW64\Dgcdjk32.dll a30bcd45a008e2f4172f0de62d3a03c0N.exe File opened for modification C:\Windows\SysWOW64\Mhgpgjoj.exe Mnakjaoc.exe File created C:\Windows\SysWOW64\Nfcfob32.exe Niilmi32.exe File opened for modification C:\Windows\SysWOW64\Nfcfob32.exe Niilmi32.exe File opened for modification C:\Windows\SysWOW64\Nmpkal32.exe Nfcfob32.exe File created C:\Windows\SysWOW64\Olgehh32.exe Nmpkal32.exe File opened for modification C:\Windows\SysWOW64\Olgehh32.exe Nmpkal32.exe File opened for modification C:\Windows\SysWOW64\Mnakjaoc.exe a30bcd45a008e2f4172f0de62d3a03c0N.exe File created C:\Windows\SysWOW64\Iiicgkof.dll Mnakjaoc.exe File created C:\Windows\SysWOW64\Niilmi32.exe Mhgpgjoj.exe File created C:\Windows\SysWOW64\Mhgpgjoj.exe Mnakjaoc.exe File created C:\Windows\SysWOW64\Nmpkal32.exe Nfcfob32.exe File opened for modification C:\Windows\SysWOW64\Ohnemidj.exe Olgehh32.exe File opened for modification C:\Windows\SysWOW64\Niilmi32.exe Mhgpgjoj.exe File created C:\Windows\SysWOW64\Dcgpig32.dll Mhgpgjoj.exe File created C:\Windows\SysWOW64\Ohnemidj.exe Olgehh32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2604 1236 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nfcfob32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nmpkal32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Olgehh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ohnemidj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a30bcd45a008e2f4172f0de62d3a03c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mnakjaoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mhgpgjoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Niilmi32.exe -
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mhgpgjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cjqigm32.dll" Niilmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idomll32.dll" Nfcfob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nfcfob32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node a30bcd45a008e2f4172f0de62d3a03c0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" a30bcd45a008e2f4172f0de62d3a03c0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mnakjaoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iiicgkof.dll" Mnakjaoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mnakjaoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nmpkal32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 a30bcd45a008e2f4172f0de62d3a03c0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} a30bcd45a008e2f4172f0de62d3a03c0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgcdjk32.dll" a30bcd45a008e2f4172f0de62d3a03c0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nfcfob32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nmpkal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iinnfbbo.dll" Nmpkal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fifjgemj.dll" Olgehh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID a30bcd45a008e2f4172f0de62d3a03c0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mhgpgjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcgpig32.dll" Mhgpgjoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Niilmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Niilmi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Olgehh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Olgehh32.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2236 2368 a30bcd45a008e2f4172f0de62d3a03c0N.exe 29 PID 2368 wrote to memory of 2236 2368 a30bcd45a008e2f4172f0de62d3a03c0N.exe 29 PID 2368 wrote to memory of 2236 2368 a30bcd45a008e2f4172f0de62d3a03c0N.exe 29 PID 2368 wrote to memory of 2236 2368 a30bcd45a008e2f4172f0de62d3a03c0N.exe 29 PID 2236 wrote to memory of 2172 2236 Mnakjaoc.exe 30 PID 2236 wrote to memory of 2172 2236 Mnakjaoc.exe 30 PID 2236 wrote to memory of 2172 2236 Mnakjaoc.exe 30 PID 2236 wrote to memory of 2172 2236 Mnakjaoc.exe 30 PID 2172 wrote to memory of 2820 2172 Mhgpgjoj.exe 31 PID 2172 wrote to memory of 2820 2172 Mhgpgjoj.exe 31 PID 2172 wrote to memory of 2820 2172 Mhgpgjoj.exe 31 PID 2172 wrote to memory of 2820 2172 Mhgpgjoj.exe 31 PID 2820 wrote to memory of 2304 2820 Niilmi32.exe 32 PID 2820 wrote to memory of 2304 2820 Niilmi32.exe 32 PID 2820 wrote to memory of 2304 2820 Niilmi32.exe 32 PID 2820 wrote to memory of 2304 2820 Niilmi32.exe 32 PID 2304 wrote to memory of 2032 2304 Nfcfob32.exe 33 PID 2304 wrote to memory of 2032 2304 Nfcfob32.exe 33 PID 2304 wrote to memory of 2032 2304 Nfcfob32.exe 33 PID 2304 wrote to memory of 2032 2304 Nfcfob32.exe 33 PID 2032 wrote to memory of 2636 2032 Nmpkal32.exe 34 PID 2032 wrote to memory of 2636 2032 Nmpkal32.exe 34 PID 2032 wrote to memory of 2636 2032 Nmpkal32.exe 34 PID 2032 wrote to memory of 2636 2032 Nmpkal32.exe 34 PID 2636 wrote to memory of 1236 2636 Olgehh32.exe 35 PID 2636 wrote to memory of 1236 2636 Olgehh32.exe 35 PID 2636 wrote to memory of 1236 2636 Olgehh32.exe 35 PID 2636 wrote to memory of 1236 2636 Olgehh32.exe 35 PID 1236 wrote to memory of 2604 1236 Ohnemidj.exe 36 PID 1236 wrote to memory of 2604 1236 Ohnemidj.exe 36 PID 1236 wrote to memory of 2604 1236 Ohnemidj.exe 36 PID 1236 wrote to memory of 2604 1236 Ohnemidj.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\a30bcd45a008e2f4172f0de62d3a03c0N.exe"C:\Users\Admin\AppData\Local\Temp\a30bcd45a008e2f4172f0de62d3a03c0N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\Mnakjaoc.exeC:\Windows\system32\Mnakjaoc.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\Mhgpgjoj.exeC:\Windows\system32\Mhgpgjoj.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\Niilmi32.exeC:\Windows\system32\Niilmi32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\Nfcfob32.exeC:\Windows\system32\Nfcfob32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\Nmpkal32.exeC:\Windows\system32\Nmpkal32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\Olgehh32.exeC:\Windows\system32\Olgehh32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\Ohnemidj.exeC:\Windows\system32\Ohnemidj.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 1409⤵
- Loads dropped DLL
- Program crash
PID:2604
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD52d83245f173ab90007060e8bb863dcb4
SHA1914046deaf85540bc084fcd6fa552b064151245f
SHA2566e4e8ea154826e7024d1a6de31f893ce719a43c9b72386fa682dd3921446c48b
SHA5124bd7169ddf738e6c275a1ff5723847ee2c786b538a8922cf1722b401bef502be7d7d74a08e7eb3dced631ab6da92ca0146a8f319479557200d3c8e77ab95a67c
-
Filesize
92KB
MD51f0d52d23a202fe523c6e76a363c2d05
SHA1a284b252e436eea4bbec0f8122f76ab36a3808c7
SHA256ecb249be805f8ad4d3bd96c4adc006c5b8de99f1628e09eb4f5bd05e61a5edab
SHA512738a8c48d2b9c3398b1ed75f917d65f1ecb03a97859de9ce4b115fa3b26c8bb6bba6542ff4514c94d6c004d3b00af942feb185a919f9da71766ea35ea2e77f28
-
Filesize
92KB
MD567c6ac750e55711ea33c3cf13fd40964
SHA1bc21e70c02828be3138332aeba00f6ae71c4807f
SHA2569133fcc6796b36d153eb29268426be167fa3304c210f6b95eb3e5a5a52ae34d5
SHA51272bb15180a92c619aa7822f8cb7706409d9e1c4c0cd232879b3293412e818cd36c808d65df03243668e31f83093872498070604a1b7eb0b44e2718e140413fbc
-
Filesize
92KB
MD5c646f0e6e34c8ad87debbcad0bb64488
SHA1719de4090a218e3481e6ef98a69cd2a9f463dccd
SHA25699975d61d9e3d615480cc00501193ef5e2f7c610fdc1a958714648e47eed79d9
SHA512d72850910826d7ba9547ef36d2c8b5791c69ad4c0756c8d755c31ded4a3808987157002b45c28bb884dfe264d2e80152b3fd44916e26cdd4d07ad379d6cab6f4
-
Filesize
92KB
MD5d238ed9655cb8f874c6dc9c19fee5df1
SHA1414430275307be340069264520e998675c89ce10
SHA25692a8f96555526bd9821332c335396d65a6ffde7a0f7c923e7f0d7ecd582be71c
SHA512df1e2bfdb1dceca9e61f61504f6463358be6bb032461c927cd7a170dd54a163450a204de64430940abbb8bb9822ce1cb66552f3340b98cc7f91e91fd4c79c5eb
-
Filesize
92KB
MD573a517a9079b56faf36075a231781720
SHA17f16bfb47f5f9fcb8278ae55bed0979092d59e88
SHA256b05df998dbf70d3ce790ddaa446de8e9215b80d2e9a3e3d8d7ce973a9642ad0b
SHA512e1f48aebbe0e6e309835aebb14e60faf74ba3fe5e31990a39a1becc922164e62ec980ec53f690632909382b776295ac55b2aa06db09e8748a1fdbe1c9e2688d5
-
Filesize
92KB
MD56662ada0c906647ef0bbea7d6dbc6d99
SHA1ba6de788ce369e4f1fa12bc86ff4ead4e0129539
SHA256d94ed4ba4587ee6f3fee49581deab7f4263e036ceaae61440b814655c9701e51
SHA5122e896f36328e19b620abb6d6d225bcda9c49b9dcd00f8674f2613c458909e774784a23374ec33a5ffa79186ee929bb946a6e7516d56ca30647ae88e9fbd955c8
-
Filesize
92KB
MD5ca1aa9e3fbafe2ae1e7873c2678deb43
SHA134325142418f6c7ad2d0bd42831218c52b67561e
SHA2560ecf1af308415d35e1e8affa95ccd9e8f128a5dc32f76f8e24ad5817e6bb9945
SHA51297f87c9198e8e6c136b0fe239723277a20f93ab9d3df99c2cf9040eae056d0c396753d7635251845601769d76ea804e47c1f6dde0c192c7b01442591e9c188ad