Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe
Resource
win10v2004-20220812-en
General
-
Target
415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe
-
Size
44KB
-
MD5
5b783c88b9d4fa31b543c77c22fb5dc0
-
SHA1
4073034be7f30a128874664085fd8e270a66cfff
-
SHA256
415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb
-
SHA512
cb73b41c89edff44ef2d07d50edd77cf41c3d1ea7bc90ce85949ea1e812deabf6016b5fd8baec9fc93d5079dd67388344d8100fb9d7484ba3f48ac41f0119db2
-
SSDEEP
768:u3R3H3HWkMS7zAYK8zboqOa/bSADndMYT+tM7N0/W63jUeD53yRG/wNKmGN:u3R3H3HTY8z8a/bSAGYTuzjUiy2wmN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 4996 415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe winymp32.rom,dItRun" 415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winymp32.rom 415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe File opened for modification C:\Windows\SysWOW64\winymp32.rom 415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1855204380" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30987889" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30987889" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371488511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30987889" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30987889" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1816141119" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{96BAFFAA-4264-11ED-AECB-7ED4F7B3352B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1855204380" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1816141119" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30987889" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30987889" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{96BAD89A-4264-11ED-AECB-7ED4F7B3352B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1816141119" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1816141119" iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2700 iexplore.exe 4032 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4032 iexplore.exe 2700 iexplore.exe 2700 iexplore.exe 4032 iexplore.exe 3700 IEXPLORE.EXE 3700 IEXPLORE.EXE 1284 IEXPLORE.EXE 1284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4996 wrote to memory of 2080 4996 415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe 81 PID 4996 wrote to memory of 2080 4996 415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe 81 PID 4996 wrote to memory of 2080 4996 415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe 81 PID 4996 wrote to memory of 4432 4996 415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe 83 PID 4996 wrote to memory of 4432 4996 415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe 83 PID 4996 wrote to memory of 4432 4996 415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe 83 PID 4996 wrote to memory of 3840 4996 415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe 85 PID 4996 wrote to memory of 3840 4996 415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe 85 PID 4996 wrote to memory of 3840 4996 415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe 85 PID 4996 wrote to memory of 236 4996 415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe 88 PID 4996 wrote to memory of 236 4996 415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe 88 PID 4996 wrote to memory of 236 4996 415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe 88 PID 4432 wrote to memory of 2700 4432 cmd.exe 90 PID 4432 wrote to memory of 2700 4432 cmd.exe 90 PID 2080 wrote to memory of 4032 2080 cmd.exe 89 PID 2080 wrote to memory of 4032 2080 cmd.exe 89 PID 4032 wrote to memory of 1284 4032 iexplore.exe 93 PID 4032 wrote to memory of 1284 4032 iexplore.exe 93 PID 4032 wrote to memory of 1284 4032 iexplore.exe 93 PID 2700 wrote to memory of 3700 2700 iexplore.exe 92 PID 2700 wrote to memory of 3700 2700 iexplore.exe 92 PID 2700 wrote to memory of 3700 2700 iexplore.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe"C:\Users\Admin\AppData\Local\Temp\415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4032 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1284
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3700
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\tweE600.bat"2⤵PID:3840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.bat"2⤵PID:236
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5fd70739fca5345a28f924f9102ae10ee
SHA16ce3f92183544f3bf52cb76364591589cb940a19
SHA256f238404cc643efddef8ff430f128cdc8ec1513969eaac24b5e5bce81248a91e7
SHA512a787d3a2bceeaed2f2a29f357df6ae17d5b9f66a3c561550d5f83c308ad26a1ddf876488151ff5e51ce93bfb9d0c7b8ca812d595e8d3ebdda7d805707ac1b278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5fd70739fca5345a28f924f9102ae10ee
SHA16ce3f92183544f3bf52cb76364591589cb940a19
SHA256f238404cc643efddef8ff430f128cdc8ec1513969eaac24b5e5bce81248a91e7
SHA512a787d3a2bceeaed2f2a29f357df6ae17d5b9f66a3c561550d5f83c308ad26a1ddf876488151ff5e51ce93bfb9d0c7b8ca812d595e8d3ebdda7d805707ac1b278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5cd78e3935a8fad72884c7af2c81e6d55
SHA1a161f9e8eabf32bbe025028a038cdcf808aff0e6
SHA256700887b48326572971789bebe4f0cd790b5a201dc0b29acdd036f1a42bb4e7e4
SHA512dd571593748c056e184fb1b3e52b6f51b7c2ab9cf33651a77fe9144c4eaa072f89c04ad6e38d50756564ad8acc93e2e40a44b7d053d753b95249494ea24e0d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5286fbb101e1a7a2f99cd7167e183eb55
SHA1013d62052907cb6d998d3ed2ec0280f46c66adf2
SHA25669f24b28fc214286d7bb7b75003683e3f2be5154843c614e9cd0caa0736b6a14
SHA512176da0ccb7404236ffbb27c240701c17a8cec2763ecd5ebf641ee9e2671f7343b18b8e8c9e0e94d0bfa39c140e843831b60d13db61d3a01067b1c2cdc78ae491
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{96BAD89A-4264-11ED-AECB-7ED4F7B3352B}.dat
Filesize5KB
MD59806128da3d35d253ccb9872656018ad
SHA1d12d8c3e6eca79a4c8f50dd4a60e41236c75a127
SHA2569348c81cf5ec6cd4993181709c09bcb62bee14c4f49cf52a5776a6b614e50701
SHA512b356f0d09a01156dcaaf450ab0ea703750c40f01b2e3282b034061e8b222322916203bb49ff5076dde00dec8fca2e28b570533cccbf59596522a66f2a32b4aea
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{96BAFFAA-4264-11ED-AECB-7ED4F7B3352B}.dat
Filesize5KB
MD5f3b7750a46a12dd58ea1229be22c8123
SHA176910804f477702e0d6523b89d267719d6ccd148
SHA256910a2575a841187617cdce0a9b05c3b80d4d86b5017ee753f1fb9fdfa5fc9e75
SHA51244f33d946d0cd0a5810d0a07f7d261b55d254ce4491a130e512282a8cd03f28b6900d9c4409d0fa9e99e78653654f766695cd91c37630c2a297898999d51e1f4
-
C:\Users\Admin\AppData\Local\Temp\415542d93576ac474c197ec101078370eb1eb156791f56de0e837a460aabaafb.bat
Filesize267B
MD5bcad07df8656b4fa048386a21353bbc6
SHA1f07915c5d96dd3a56ce1c9b6903bc0dde0b062e7
SHA256e3bb0a9dedaa6d716b0ffeb7cfd62978cde526e079fc2103c3718fecf48532c3
SHA512a539f9a0cb58ce9fa92e1144a149e9048229405eec9c03b167cb40c787b9ecafe1fde029054c8c0ce64fd61c6e07859eda3db9b777ecd3b8ae7913b2a30c82cc
-
Filesize
188B
MD59926bca4a9df25504e3cb8e891e10e09
SHA1a7e365b7900ba6dec6e6d25e017f29254b0554a8
SHA25692643ecdf017ac8b210413ce49075e9732d8ec1aa6d0d1ebc69f0bf817672351
SHA5123853ec9f1cc85ca99bd318088d70acdaa6e9067d8dae8189f04c0fba7fa2fb30c0d97912a606a1648b7f75f8d5408443b9cfd136d074d9b486dcb59bfa74d9f1
-
Filesize
31KB
MD5b27dfec949a8490bb82901d4f4223ee6
SHA1fdebf31f0d200693cd49a55b544c53de27980021
SHA2568aff375969670c7b528ddc05dc3401ada7c8d4b45c6e47c9945ffb879edf9454
SHA5121d446d2e86cea1f144153acd9fbd18b2cfa52751871dcf45dbcba060f557b9a729ed8e77ccffbb5058d5a9db4dce8c6bdbba59a33c10de4ded50e65c61f95765
-
Filesize
31KB
MD5b27dfec949a8490bb82901d4f4223ee6
SHA1fdebf31f0d200693cd49a55b544c53de27980021
SHA2568aff375969670c7b528ddc05dc3401ada7c8d4b45c6e47c9945ffb879edf9454
SHA5121d446d2e86cea1f144153acd9fbd18b2cfa52751871dcf45dbcba060f557b9a729ed8e77ccffbb5058d5a9db4dce8c6bdbba59a33c10de4ded50e65c61f95765