Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
21/10/2022, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe
Resource
win10v2004-20220812-en
General
-
Target
9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe
-
Size
361KB
-
MD5
4d3e89284dc72d2daacd0a30bc4b4b90
-
SHA1
4205620a018a1986794ccd956a85689c9640268d
-
SHA256
9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8
-
SHA512
2f3b82c49645b27c0608aed8354c5aebb8d64a22f12b7c932ab82be388fec8c168fe5563767f2f28b18127f30720bba73f7638cff76c3e8f915c09b9ed5a55f4
-
SSDEEP
6144:wflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:wflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1996 rqomljzxwusrhfec.exe 1664 CreateProcess.exe 964 nnjfcqqmif.exe 1776 CreateProcess.exe -
Loads dropped DLL 4 IoCs
pid Process 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 1996 rqomljzxwusrhfec.exe 1996 rqomljzxwusrhfec.exe 964 nnjfcqqmif.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1276 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373105415" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FC4CDC1-5119-11ED-B243-5AF036119C64} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a06f871e26e5d801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a00000000020000000000106600000001000020000000b2e4932334a7effbdc82c24b5f84d124ce9039f981f9856e6feeb5ab076ca121000000000e800000000200002000000042b91ace9f1311d2621fd4569dc68797fc2e83296da334a4979de01fad26882090000000bc21e24575c7c1c948caf3b7bf0b2c5847594224003fb315796cdcda34cafc039134928dc584eec03ac51c95af2e38db0a920e49f5272578da94ddce20d00456d31fe0aa807178ec23ba4d9cc62e696130655bf8f1a6a6f8113eab1f4d71c417bd17a36d3eb459a66099f0fc05ef5c5a1efee86f740cccd83fc39b0098099fd87c3a16d710d970a95f04442cc64ebf1040000000cc106957b28aacca326c0f24e7401930541bda14b5fd9943e207af44ced9113a365fd780abe5d865c80961d35bfec5081fe73924ab044e529487ce72c39ab32d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a0000000002000000000010660000000100002000000051494c41236999bc4cd3f7939345e7d535107d7686c7ac0e698fea7674ddf160000000000e8000000002000020000000ccbf8f6822f1433d99b7516d3df47766f54b13bc8814c4c490a32e44ff1a7dca20000000706205078a5541447a431c7d30452958e9085d42a3ee0829e78212530e9f33b040000000a344f13bd9835b8d33318d27f65b2931febef27f8757dd3dca365046e263cb2a2299f3a2f1cf49abdc65622629660d9f17a5f6c5d89768ef8f6459fb8fda20d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 1996 rqomljzxwusrhfec.exe 1996 rqomljzxwusrhfec.exe 1996 rqomljzxwusrhfec.exe 1996 rqomljzxwusrhfec.exe 1996 rqomljzxwusrhfec.exe 1996 rqomljzxwusrhfec.exe 1996 rqomljzxwusrhfec.exe 964 nnjfcqqmif.exe 964 nnjfcqqmif.exe 964 nnjfcqqmif.exe 964 nnjfcqqmif.exe 964 nnjfcqqmif.exe 964 nnjfcqqmif.exe 964 nnjfcqqmif.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 472 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 668 iexplore.exe 668 iexplore.exe 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1996 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 27 PID 2012 wrote to memory of 1996 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 27 PID 2012 wrote to memory of 1996 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 27 PID 2012 wrote to memory of 1996 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 27 PID 2012 wrote to memory of 668 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 28 PID 2012 wrote to memory of 668 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 28 PID 2012 wrote to memory of 668 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 28 PID 2012 wrote to memory of 668 2012 9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe 28 PID 668 wrote to memory of 1188 668 iexplore.exe 30 PID 668 wrote to memory of 1188 668 iexplore.exe 30 PID 668 wrote to memory of 1188 668 iexplore.exe 30 PID 668 wrote to memory of 1188 668 iexplore.exe 30 PID 1996 wrote to memory of 1664 1996 rqomljzxwusrhfec.exe 32 PID 1996 wrote to memory of 1664 1996 rqomljzxwusrhfec.exe 32 PID 1996 wrote to memory of 1664 1996 rqomljzxwusrhfec.exe 32 PID 1996 wrote to memory of 1664 1996 rqomljzxwusrhfec.exe 32 PID 964 wrote to memory of 1776 964 nnjfcqqmif.exe 34 PID 964 wrote to memory of 1776 964 nnjfcqqmif.exe 34 PID 964 wrote to memory of 1776 964 nnjfcqqmif.exe 34 PID 964 wrote to memory of 1776 964 nnjfcqqmif.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe"C:\Users\Admin\AppData\Local\Temp\9973d39084db4d0f5b6ff447cc7ad9fa7534bab913c68e40de1a79e04d6bcea8.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Temp\rqomljzxwusrhfec.exeC:\Temp\rqomljzxwusrhfec.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\nnjfcqqmif.exe ups_run3⤵
- Executes dropped EXE
PID:1664 -
C:\Temp\nnjfcqqmif.exeC:\Temp\nnjfcqqmif.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:964 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:1776 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:1276
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:668 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1188
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fe8377295a8c79bf83e60f39ad28f343
SHA1ccfffaa06a27528f4bfda8bce3c40b53ca3c9e67
SHA256ea7846f3aeb08b69ebb874d7992eab1c6a0bfcdefe6453395bdf940d44cc34dd
SHA512464e13bd1569dd3803c016adbb0e46c2445ba44f27ea41a16a9a16070047751a684c19dff39753159f2c18da0e833f3d4687b4b8b7ca8fdd73297cdc0400f26a
-
Filesize
3KB
MD5fe8377295a8c79bf83e60f39ad28f343
SHA1ccfffaa06a27528f4bfda8bce3c40b53ca3c9e67
SHA256ea7846f3aeb08b69ebb874d7992eab1c6a0bfcdefe6453395bdf940d44cc34dd
SHA512464e13bd1569dd3803c016adbb0e46c2445ba44f27ea41a16a9a16070047751a684c19dff39753159f2c18da0e833f3d4687b4b8b7ca8fdd73297cdc0400f26a
-
Filesize
361KB
MD5da3f26a21a1908cfc84a74d90f452442
SHA10b2f2de996430ed0767ceebd6d9f4ed3d7ca34a0
SHA25604063cae95e723693a87fd1342c97840c47bb27841a94aa6f396d3cc72791494
SHA5129f98aa781cf42420dbcf529e96e6439fcda892b24bdebd153f93cc986667d6643bd4ce1df93f2869bfb143457096df6fd08297319da8918fa3d9d4bd51c7779d
-
Filesize
361KB
MD56f83257c5e51989028eef3d75bdd7eea
SHA1e535f5f623824994d926188b68eed18c75543a6f
SHA256e4155ac70cdbc32c820cd025fff61f6b3d0cd022b0165d184b3545e3c288099c
SHA512bad311dd1d900b9befcf09b7a1a8116897edd33436dab319d1572751c8e4d425d697c1fbffa22d760b735912f0dc6f1e694da268b2071e30b45d9013bcb896fe
-
Filesize
361KB
MD56f83257c5e51989028eef3d75bdd7eea
SHA1e535f5f623824994d926188b68eed18c75543a6f
SHA256e4155ac70cdbc32c820cd025fff61f6b3d0cd022b0165d184b3545e3c288099c
SHA512bad311dd1d900b9befcf09b7a1a8116897edd33436dab319d1572751c8e4d425d697c1fbffa22d760b735912f0dc6f1e694da268b2071e30b45d9013bcb896fe
-
Filesize
603B
MD5d56fa21bcaa3c21b134835802d663771
SHA182c97287e9a1f18f3540859699aef08f8adb7b1f
SHA25698a9e15fd7d163f1c38f730b3fe6910167f914191f400e6b39053c6824b44c58
SHA512ffba9ca1fb2716773981fddfee2c0ce170dcd8bd014c12f9fabc243c346fd49fbe2bd42d8d1c64bb69ae1e34aac530eec84a99b7d6d3e39f1bdd9a7d6ae48e40
-
Filesize
3KB
MD5fe8377295a8c79bf83e60f39ad28f343
SHA1ccfffaa06a27528f4bfda8bce3c40b53ca3c9e67
SHA256ea7846f3aeb08b69ebb874d7992eab1c6a0bfcdefe6453395bdf940d44cc34dd
SHA512464e13bd1569dd3803c016adbb0e46c2445ba44f27ea41a16a9a16070047751a684c19dff39753159f2c18da0e833f3d4687b4b8b7ca8fdd73297cdc0400f26a
-
Filesize
3KB
MD5fe8377295a8c79bf83e60f39ad28f343
SHA1ccfffaa06a27528f4bfda8bce3c40b53ca3c9e67
SHA256ea7846f3aeb08b69ebb874d7992eab1c6a0bfcdefe6453395bdf940d44cc34dd
SHA512464e13bd1569dd3803c016adbb0e46c2445ba44f27ea41a16a9a16070047751a684c19dff39753159f2c18da0e833f3d4687b4b8b7ca8fdd73297cdc0400f26a
-
Filesize
3KB
MD5fe8377295a8c79bf83e60f39ad28f343
SHA1ccfffaa06a27528f4bfda8bce3c40b53ca3c9e67
SHA256ea7846f3aeb08b69ebb874d7992eab1c6a0bfcdefe6453395bdf940d44cc34dd
SHA512464e13bd1569dd3803c016adbb0e46c2445ba44f27ea41a16a9a16070047751a684c19dff39753159f2c18da0e833f3d4687b4b8b7ca8fdd73297cdc0400f26a
-
Filesize
3KB
MD5fe8377295a8c79bf83e60f39ad28f343
SHA1ccfffaa06a27528f4bfda8bce3c40b53ca3c9e67
SHA256ea7846f3aeb08b69ebb874d7992eab1c6a0bfcdefe6453395bdf940d44cc34dd
SHA512464e13bd1569dd3803c016adbb0e46c2445ba44f27ea41a16a9a16070047751a684c19dff39753159f2c18da0e833f3d4687b4b8b7ca8fdd73297cdc0400f26a
-
Filesize
361KB
MD56f83257c5e51989028eef3d75bdd7eea
SHA1e535f5f623824994d926188b68eed18c75543a6f
SHA256e4155ac70cdbc32c820cd025fff61f6b3d0cd022b0165d184b3545e3c288099c
SHA512bad311dd1d900b9befcf09b7a1a8116897edd33436dab319d1572751c8e4d425d697c1fbffa22d760b735912f0dc6f1e694da268b2071e30b45d9013bcb896fe