Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 22:35
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
General
-
Target
file.exe
-
Size
1.2MB
-
MD5
f3245e6c5a00d40ca605a093e89057a9
-
SHA1
88275a21e75785e66c1def1c9b6e22b0b75964ca
-
SHA256
87b3109dda617d9459cfb758766910a68f46076050f274821dc3ffebb54642f1
-
SHA512
ce1956a8052746a5732954b91a4932fd4a3662d6221f6a67f97180d99445d5c374ec8909c88d8c030b5b46b945455442438846073fcc5ba372e7514cf7c9887f
-
SSDEEP
24576:VykKgBpdG9DXAcORNFHFHbQIbEyuuxTUo5FOle9Qx0nOjQZsqLJTgnod:whgB/G9qNR5VUmFOlqn2Q0
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1mV08SP1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1mV08SP1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1mV08SP1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1mV08SP1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1mV08SP1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1mV08SP1.exe -
Executes dropped EXE 5 IoCs
pid Process 2584 LB2qB17.exe 2924 El4rr47.exe 2936 YL5st92.exe 2652 1mV08SP1.exe 2836 2Wc7828.exe -
Loads dropped DLL 14 IoCs
pid Process 3028 file.exe 2584 LB2qB17.exe 2584 LB2qB17.exe 2924 El4rr47.exe 2924 El4rr47.exe 2936 YL5st92.exe 2936 YL5st92.exe 2652 1mV08SP1.exe 2936 YL5st92.exe 2836 2Wc7828.exe 3020 WerFault.exe 3020 WerFault.exe 3020 WerFault.exe 3020 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 1mV08SP1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1mV08SP1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" LB2qB17.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" El4rr47.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" YL5st92.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2836 set thread context of 2900 2836 2Wc7828.exe 35 -
Program crash 2 IoCs
pid pid_target Process procid_target 3020 2836 WerFault.exe 34 2976 2900 WerFault.exe 35 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2652 1mV08SP1.exe 2652 1mV08SP1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2652 1mV08SP1.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2584 3028 file.exe 28 PID 3028 wrote to memory of 2584 3028 file.exe 28 PID 3028 wrote to memory of 2584 3028 file.exe 28 PID 3028 wrote to memory of 2584 3028 file.exe 28 PID 3028 wrote to memory of 2584 3028 file.exe 28 PID 3028 wrote to memory of 2584 3028 file.exe 28 PID 3028 wrote to memory of 2584 3028 file.exe 28 PID 2584 wrote to memory of 2924 2584 LB2qB17.exe 29 PID 2584 wrote to memory of 2924 2584 LB2qB17.exe 29 PID 2584 wrote to memory of 2924 2584 LB2qB17.exe 29 PID 2584 wrote to memory of 2924 2584 LB2qB17.exe 29 PID 2584 wrote to memory of 2924 2584 LB2qB17.exe 29 PID 2584 wrote to memory of 2924 2584 LB2qB17.exe 29 PID 2584 wrote to memory of 2924 2584 LB2qB17.exe 29 PID 2924 wrote to memory of 2936 2924 El4rr47.exe 30 PID 2924 wrote to memory of 2936 2924 El4rr47.exe 30 PID 2924 wrote to memory of 2936 2924 El4rr47.exe 30 PID 2924 wrote to memory of 2936 2924 El4rr47.exe 30 PID 2924 wrote to memory of 2936 2924 El4rr47.exe 30 PID 2924 wrote to memory of 2936 2924 El4rr47.exe 30 PID 2924 wrote to memory of 2936 2924 El4rr47.exe 30 PID 2936 wrote to memory of 2652 2936 YL5st92.exe 31 PID 2936 wrote to memory of 2652 2936 YL5st92.exe 31 PID 2936 wrote to memory of 2652 2936 YL5st92.exe 31 PID 2936 wrote to memory of 2652 2936 YL5st92.exe 31 PID 2936 wrote to memory of 2652 2936 YL5st92.exe 31 PID 2936 wrote to memory of 2652 2936 YL5st92.exe 31 PID 2936 wrote to memory of 2652 2936 YL5st92.exe 31 PID 2936 wrote to memory of 2836 2936 YL5st92.exe 34 PID 2936 wrote to memory of 2836 2936 YL5st92.exe 34 PID 2936 wrote to memory of 2836 2936 YL5st92.exe 34 PID 2936 wrote to memory of 2836 2936 YL5st92.exe 34 PID 2936 wrote to memory of 2836 2936 YL5st92.exe 34 PID 2936 wrote to memory of 2836 2936 YL5st92.exe 34 PID 2936 wrote to memory of 2836 2936 YL5st92.exe 34 PID 2836 wrote to memory of 2900 2836 2Wc7828.exe 35 PID 2836 wrote to memory of 2900 2836 2Wc7828.exe 35 PID 2836 wrote to memory of 2900 2836 2Wc7828.exe 35 PID 2836 wrote to memory of 2900 2836 2Wc7828.exe 35 PID 2836 wrote to memory of 2900 2836 2Wc7828.exe 35 PID 2836 wrote to memory of 2900 2836 2Wc7828.exe 35 PID 2836 wrote to memory of 2900 2836 2Wc7828.exe 35 PID 2836 wrote to memory of 2900 2836 2Wc7828.exe 35 PID 2836 wrote to memory of 2900 2836 2Wc7828.exe 35 PID 2836 wrote to memory of 2900 2836 2Wc7828.exe 35 PID 2836 wrote to memory of 2900 2836 2Wc7828.exe 35 PID 2836 wrote to memory of 2900 2836 2Wc7828.exe 35 PID 2836 wrote to memory of 2900 2836 2Wc7828.exe 35 PID 2836 wrote to memory of 2900 2836 2Wc7828.exe 35 PID 2836 wrote to memory of 3020 2836 2Wc7828.exe 36 PID 2836 wrote to memory of 3020 2836 2Wc7828.exe 36 PID 2836 wrote to memory of 3020 2836 2Wc7828.exe 36 PID 2836 wrote to memory of 3020 2836 2Wc7828.exe 36 PID 2836 wrote to memory of 3020 2836 2Wc7828.exe 36 PID 2836 wrote to memory of 3020 2836 2Wc7828.exe 36 PID 2836 wrote to memory of 3020 2836 2Wc7828.exe 36 PID 2900 wrote to memory of 2976 2900 AppLaunch.exe 37 PID 2900 wrote to memory of 2976 2900 AppLaunch.exe 37 PID 2900 wrote to memory of 2976 2900 AppLaunch.exe 37 PID 2900 wrote to memory of 2976 2900 AppLaunch.exe 37 PID 2900 wrote to memory of 2976 2900 AppLaunch.exe 37 PID 2900 wrote to memory of 2976 2900 AppLaunch.exe 37 PID 2900 wrote to memory of 2976 2900 AppLaunch.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LB2qB17.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LB2qB17.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\El4rr47.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\El4rr47.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\YL5st92.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\YL5st92.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1mV08SP1.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1mV08SP1.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Wc7828.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Wc7828.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 2687⤵
- Program crash
PID:2976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:3020
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5b820053e0b116dcab686f6c154a9f51d
SHA1c8b91a82ab7bdd558a7e48609ae7803a2d3434ce
SHA256ed1ff3521a7c2d608db1d811967720d7d2ba2c46a54a4fd9c51fa46888d81fb3
SHA512ef084df943e6a93845a1beb0ba2179ce949b6ac6afc9a2bc0db81e65c4146e97cdcdc1316e8320d7a5ccc7c197bfbbcf833ec53616f61036520eeac69b318ace
-
Filesize
1.0MB
MD5b820053e0b116dcab686f6c154a9f51d
SHA1c8b91a82ab7bdd558a7e48609ae7803a2d3434ce
SHA256ed1ff3521a7c2d608db1d811967720d7d2ba2c46a54a4fd9c51fa46888d81fb3
SHA512ef084df943e6a93845a1beb0ba2179ce949b6ac6afc9a2bc0db81e65c4146e97cdcdc1316e8320d7a5ccc7c197bfbbcf833ec53616f61036520eeac69b318ace
-
Filesize
747KB
MD519c8abfb159254382df8b23bb5cc004d
SHA18e6d50c6aae7876650fcedbbb4540db9da731715
SHA256cbe785159c83adfdd2d876ddb63d10c484153745570bad63d6d3b51f6c7850d0
SHA512f6f47d446748a86b71feab31f179f82438e6a9e987de2f3028f46d3595530546eefbdd0bb3911497c2b1fe75c51bdfa2b225564897dbde0bac5a9bf3dddfa732
-
Filesize
747KB
MD519c8abfb159254382df8b23bb5cc004d
SHA18e6d50c6aae7876650fcedbbb4540db9da731715
SHA256cbe785159c83adfdd2d876ddb63d10c484153745570bad63d6d3b51f6c7850d0
SHA512f6f47d446748a86b71feab31f179f82438e6a9e987de2f3028f46d3595530546eefbdd0bb3911497c2b1fe75c51bdfa2b225564897dbde0bac5a9bf3dddfa732
-
Filesize
493KB
MD56f2d8bd86981c79b175e4f03f9c7ab17
SHA11b81e55f022e1d3f5beaeb5dcd32ec837c986337
SHA25697762242d30c83e4db2e58b3ebd368f0d1231cc918d418a6be1a2f41a9e481a0
SHA512a135aedd8aca49782d6ddc157e9da6a21a865d73cf5e282c6f5f00af747443e9250d9e7f3f0c33bce9ec203493a835c2f5721fb54cd2e3671d538ba0eb86aa09
-
Filesize
493KB
MD56f2d8bd86981c79b175e4f03f9c7ab17
SHA11b81e55f022e1d3f5beaeb5dcd32ec837c986337
SHA25697762242d30c83e4db2e58b3ebd368f0d1231cc918d418a6be1a2f41a9e481a0
SHA512a135aedd8aca49782d6ddc157e9da6a21a865d73cf5e282c6f5f00af747443e9250d9e7f3f0c33bce9ec203493a835c2f5721fb54cd2e3671d538ba0eb86aa09
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
448KB
MD5d6a4b4e599ca88a2798115b2f57a4a50
SHA1881756996242273334e4e03642ed6be2917b7cab
SHA2568113df47b2fed3770126a9c6193ee358d48fc2ed9b5d32e5551c08aa778f1dce
SHA5125f71d58eb0b8de6393122e9b4a3608b54b919ce7bfb52f7f8207524adbf37b5e57c06f1d5539898471339097c48b647119a3a952cb712221d5a6b6b5f2b72676
-
Filesize
448KB
MD5d6a4b4e599ca88a2798115b2f57a4a50
SHA1881756996242273334e4e03642ed6be2917b7cab
SHA2568113df47b2fed3770126a9c6193ee358d48fc2ed9b5d32e5551c08aa778f1dce
SHA5125f71d58eb0b8de6393122e9b4a3608b54b919ce7bfb52f7f8207524adbf37b5e57c06f1d5539898471339097c48b647119a3a952cb712221d5a6b6b5f2b72676
-
Filesize
1.0MB
MD5b820053e0b116dcab686f6c154a9f51d
SHA1c8b91a82ab7bdd558a7e48609ae7803a2d3434ce
SHA256ed1ff3521a7c2d608db1d811967720d7d2ba2c46a54a4fd9c51fa46888d81fb3
SHA512ef084df943e6a93845a1beb0ba2179ce949b6ac6afc9a2bc0db81e65c4146e97cdcdc1316e8320d7a5ccc7c197bfbbcf833ec53616f61036520eeac69b318ace
-
Filesize
1.0MB
MD5b820053e0b116dcab686f6c154a9f51d
SHA1c8b91a82ab7bdd558a7e48609ae7803a2d3434ce
SHA256ed1ff3521a7c2d608db1d811967720d7d2ba2c46a54a4fd9c51fa46888d81fb3
SHA512ef084df943e6a93845a1beb0ba2179ce949b6ac6afc9a2bc0db81e65c4146e97cdcdc1316e8320d7a5ccc7c197bfbbcf833ec53616f61036520eeac69b318ace
-
Filesize
747KB
MD519c8abfb159254382df8b23bb5cc004d
SHA18e6d50c6aae7876650fcedbbb4540db9da731715
SHA256cbe785159c83adfdd2d876ddb63d10c484153745570bad63d6d3b51f6c7850d0
SHA512f6f47d446748a86b71feab31f179f82438e6a9e987de2f3028f46d3595530546eefbdd0bb3911497c2b1fe75c51bdfa2b225564897dbde0bac5a9bf3dddfa732
-
Filesize
747KB
MD519c8abfb159254382df8b23bb5cc004d
SHA18e6d50c6aae7876650fcedbbb4540db9da731715
SHA256cbe785159c83adfdd2d876ddb63d10c484153745570bad63d6d3b51f6c7850d0
SHA512f6f47d446748a86b71feab31f179f82438e6a9e987de2f3028f46d3595530546eefbdd0bb3911497c2b1fe75c51bdfa2b225564897dbde0bac5a9bf3dddfa732
-
Filesize
493KB
MD56f2d8bd86981c79b175e4f03f9c7ab17
SHA11b81e55f022e1d3f5beaeb5dcd32ec837c986337
SHA25697762242d30c83e4db2e58b3ebd368f0d1231cc918d418a6be1a2f41a9e481a0
SHA512a135aedd8aca49782d6ddc157e9da6a21a865d73cf5e282c6f5f00af747443e9250d9e7f3f0c33bce9ec203493a835c2f5721fb54cd2e3671d538ba0eb86aa09
-
Filesize
493KB
MD56f2d8bd86981c79b175e4f03f9c7ab17
SHA11b81e55f022e1d3f5beaeb5dcd32ec837c986337
SHA25697762242d30c83e4db2e58b3ebd368f0d1231cc918d418a6be1a2f41a9e481a0
SHA512a135aedd8aca49782d6ddc157e9da6a21a865d73cf5e282c6f5f00af747443e9250d9e7f3f0c33bce9ec203493a835c2f5721fb54cd2e3671d538ba0eb86aa09
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
448KB
MD5d6a4b4e599ca88a2798115b2f57a4a50
SHA1881756996242273334e4e03642ed6be2917b7cab
SHA2568113df47b2fed3770126a9c6193ee358d48fc2ed9b5d32e5551c08aa778f1dce
SHA5125f71d58eb0b8de6393122e9b4a3608b54b919ce7bfb52f7f8207524adbf37b5e57c06f1d5539898471339097c48b647119a3a952cb712221d5a6b6b5f2b72676
-
Filesize
448KB
MD5d6a4b4e599ca88a2798115b2f57a4a50
SHA1881756996242273334e4e03642ed6be2917b7cab
SHA2568113df47b2fed3770126a9c6193ee358d48fc2ed9b5d32e5551c08aa778f1dce
SHA5125f71d58eb0b8de6393122e9b4a3608b54b919ce7bfb52f7f8207524adbf37b5e57c06f1d5539898471339097c48b647119a3a952cb712221d5a6b6b5f2b72676
-
Filesize
448KB
MD5d6a4b4e599ca88a2798115b2f57a4a50
SHA1881756996242273334e4e03642ed6be2917b7cab
SHA2568113df47b2fed3770126a9c6193ee358d48fc2ed9b5d32e5551c08aa778f1dce
SHA5125f71d58eb0b8de6393122e9b4a3608b54b919ce7bfb52f7f8207524adbf37b5e57c06f1d5539898471339097c48b647119a3a952cb712221d5a6b6b5f2b72676
-
Filesize
448KB
MD5d6a4b4e599ca88a2798115b2f57a4a50
SHA1881756996242273334e4e03642ed6be2917b7cab
SHA2568113df47b2fed3770126a9c6193ee358d48fc2ed9b5d32e5551c08aa778f1dce
SHA5125f71d58eb0b8de6393122e9b4a3608b54b919ce7bfb52f7f8207524adbf37b5e57c06f1d5539898471339097c48b647119a3a952cb712221d5a6b6b5f2b72676
-
Filesize
448KB
MD5d6a4b4e599ca88a2798115b2f57a4a50
SHA1881756996242273334e4e03642ed6be2917b7cab
SHA2568113df47b2fed3770126a9c6193ee358d48fc2ed9b5d32e5551c08aa778f1dce
SHA5125f71d58eb0b8de6393122e9b4a3608b54b919ce7bfb52f7f8207524adbf37b5e57c06f1d5539898471339097c48b647119a3a952cb712221d5a6b6b5f2b72676
-
Filesize
448KB
MD5d6a4b4e599ca88a2798115b2f57a4a50
SHA1881756996242273334e4e03642ed6be2917b7cab
SHA2568113df47b2fed3770126a9c6193ee358d48fc2ed9b5d32e5551c08aa778f1dce
SHA5125f71d58eb0b8de6393122e9b4a3608b54b919ce7bfb52f7f8207524adbf37b5e57c06f1d5539898471339097c48b647119a3a952cb712221d5a6b6b5f2b72676