Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 16:59
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
General
-
Target
file.exe
-
Size
1.2MB
-
MD5
1402b0376a89b9dc6cbe4f1c34185317
-
SHA1
d3baf0ca3c3af8eca94afa7559d3371726421df5
-
SHA256
563f71f6eabcc076a566cdde5791e6944d6b1945d340bbc42a753399b120284b
-
SHA512
38523dc6f08c34fb1f72c2d8626ed3298fddac86c10ea7eaba3675be8bdbc118ac1013b04fd43e1a646b91866efd00f1dbd912d9fd6f34496d13914c410814d1
-
SSDEEP
24576:WyR+O/A+lQ1A4Wbbj/CYVARu8/X+SrMY/dt/3NFy8UxxwazEkLybz:lRTlKKq8AR/OSrMY/z3kxoj
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1GT92VO8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1GT92VO8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1GT92VO8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1GT92VO8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1GT92VO8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1GT92VO8.exe -
Executes dropped EXE 5 IoCs
pid Process 2616 Lc0zl42.exe 2776 XW4yr43.exe 2628 qy9SP36.exe 2720 1GT92VO8.exe 2340 2Bv9758.exe -
Loads dropped DLL 14 IoCs
pid Process 2384 file.exe 2616 Lc0zl42.exe 2616 Lc0zl42.exe 2776 XW4yr43.exe 2776 XW4yr43.exe 2628 qy9SP36.exe 2628 qy9SP36.exe 2720 1GT92VO8.exe 2628 qy9SP36.exe 2340 2Bv9758.exe 2988 WerFault.exe 2988 WerFault.exe 2988 WerFault.exe 2988 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 1GT92VO8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1GT92VO8.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Lc0zl42.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" XW4yr43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" qy9SP36.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2340 set thread context of 2044 2340 2Bv9758.exe 34 -
Program crash 2 IoCs
pid pid_target Process procid_target 2988 2340 WerFault.exe 33 1228 2044 WerFault.exe 34 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2720 1GT92VO8.exe 2720 1GT92VO8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2720 1GT92VO8.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2616 2384 file.exe 29 PID 2384 wrote to memory of 2616 2384 file.exe 29 PID 2384 wrote to memory of 2616 2384 file.exe 29 PID 2384 wrote to memory of 2616 2384 file.exe 29 PID 2384 wrote to memory of 2616 2384 file.exe 29 PID 2384 wrote to memory of 2616 2384 file.exe 29 PID 2384 wrote to memory of 2616 2384 file.exe 29 PID 2616 wrote to memory of 2776 2616 Lc0zl42.exe 30 PID 2616 wrote to memory of 2776 2616 Lc0zl42.exe 30 PID 2616 wrote to memory of 2776 2616 Lc0zl42.exe 30 PID 2616 wrote to memory of 2776 2616 Lc0zl42.exe 30 PID 2616 wrote to memory of 2776 2616 Lc0zl42.exe 30 PID 2616 wrote to memory of 2776 2616 Lc0zl42.exe 30 PID 2616 wrote to memory of 2776 2616 Lc0zl42.exe 30 PID 2776 wrote to memory of 2628 2776 XW4yr43.exe 31 PID 2776 wrote to memory of 2628 2776 XW4yr43.exe 31 PID 2776 wrote to memory of 2628 2776 XW4yr43.exe 31 PID 2776 wrote to memory of 2628 2776 XW4yr43.exe 31 PID 2776 wrote to memory of 2628 2776 XW4yr43.exe 31 PID 2776 wrote to memory of 2628 2776 XW4yr43.exe 31 PID 2776 wrote to memory of 2628 2776 XW4yr43.exe 31 PID 2628 wrote to memory of 2720 2628 qy9SP36.exe 32 PID 2628 wrote to memory of 2720 2628 qy9SP36.exe 32 PID 2628 wrote to memory of 2720 2628 qy9SP36.exe 32 PID 2628 wrote to memory of 2720 2628 qy9SP36.exe 32 PID 2628 wrote to memory of 2720 2628 qy9SP36.exe 32 PID 2628 wrote to memory of 2720 2628 qy9SP36.exe 32 PID 2628 wrote to memory of 2720 2628 qy9SP36.exe 32 PID 2628 wrote to memory of 2340 2628 qy9SP36.exe 33 PID 2628 wrote to memory of 2340 2628 qy9SP36.exe 33 PID 2628 wrote to memory of 2340 2628 qy9SP36.exe 33 PID 2628 wrote to memory of 2340 2628 qy9SP36.exe 33 PID 2628 wrote to memory of 2340 2628 qy9SP36.exe 33 PID 2628 wrote to memory of 2340 2628 qy9SP36.exe 33 PID 2628 wrote to memory of 2340 2628 qy9SP36.exe 33 PID 2340 wrote to memory of 2044 2340 2Bv9758.exe 34 PID 2340 wrote to memory of 2044 2340 2Bv9758.exe 34 PID 2340 wrote to memory of 2044 2340 2Bv9758.exe 34 PID 2340 wrote to memory of 2044 2340 2Bv9758.exe 34 PID 2340 wrote to memory of 2044 2340 2Bv9758.exe 34 PID 2340 wrote to memory of 2044 2340 2Bv9758.exe 34 PID 2340 wrote to memory of 2044 2340 2Bv9758.exe 34 PID 2340 wrote to memory of 2044 2340 2Bv9758.exe 34 PID 2340 wrote to memory of 2044 2340 2Bv9758.exe 34 PID 2340 wrote to memory of 2044 2340 2Bv9758.exe 34 PID 2340 wrote to memory of 2044 2340 2Bv9758.exe 34 PID 2340 wrote to memory of 2044 2340 2Bv9758.exe 34 PID 2340 wrote to memory of 2044 2340 2Bv9758.exe 34 PID 2340 wrote to memory of 2044 2340 2Bv9758.exe 34 PID 2340 wrote to memory of 2988 2340 2Bv9758.exe 35 PID 2340 wrote to memory of 2988 2340 2Bv9758.exe 35 PID 2340 wrote to memory of 2988 2340 2Bv9758.exe 35 PID 2340 wrote to memory of 2988 2340 2Bv9758.exe 35 PID 2340 wrote to memory of 2988 2340 2Bv9758.exe 35 PID 2340 wrote to memory of 2988 2340 2Bv9758.exe 35 PID 2340 wrote to memory of 2988 2340 2Bv9758.exe 35 PID 2044 wrote to memory of 1228 2044 AppLaunch.exe 36 PID 2044 wrote to memory of 1228 2044 AppLaunch.exe 36 PID 2044 wrote to memory of 1228 2044 AppLaunch.exe 36 PID 2044 wrote to memory of 1228 2044 AppLaunch.exe 36 PID 2044 wrote to memory of 1228 2044 AppLaunch.exe 36 PID 2044 wrote to memory of 1228 2044 AppLaunch.exe 36 PID 2044 wrote to memory of 1228 2044 AppLaunch.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lc0zl42.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lc0zl42.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\XW4yr43.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\XW4yr43.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qy9SP36.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qy9SP36.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1GT92VO8.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1GT92VO8.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Bv9758.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Bv9758.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 2687⤵
- Program crash
PID:1228
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:2988
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5f572aa58cd832692b111a73dc677cb66
SHA1ea419308620d994a6b53eca917123bd9d2f4ccbf
SHA256b88fb0dc95af243a5f4fff3a29a7ae96f3cb6b21aea14dc4522b5718e7b91a51
SHA5122179978b796bb13321925f86afce3fb964bbd474d5d462bcc093974995ae958a269de8da4679c0d0103e7f06647a323ba4db69bf7266498836b1b540fab05018
-
Filesize
1.0MB
MD5f572aa58cd832692b111a73dc677cb66
SHA1ea419308620d994a6b53eca917123bd9d2f4ccbf
SHA256b88fb0dc95af243a5f4fff3a29a7ae96f3cb6b21aea14dc4522b5718e7b91a51
SHA5122179978b796bb13321925f86afce3fb964bbd474d5d462bcc093974995ae958a269de8da4679c0d0103e7f06647a323ba4db69bf7266498836b1b540fab05018
-
Filesize
746KB
MD592d42d8db27c7c1451e951702d7875d8
SHA18864d4d5f43dc16ed6db6b0f17dc7f29f1ef91fe
SHA256de071c64dee24478984f28203395f616aa632fbde9c74c47bf7bb4d87e0f53ef
SHA512f3e79e48eb0f1ed31e346a108988dea478d79e8dfac13c905b502ec8b1f644b76825b12ac5e1c626cd5c5b1bf3ab6cfe32d1bef7c46cbe33412a87ce7c3f4f71
-
Filesize
746KB
MD592d42d8db27c7c1451e951702d7875d8
SHA18864d4d5f43dc16ed6db6b0f17dc7f29f1ef91fe
SHA256de071c64dee24478984f28203395f616aa632fbde9c74c47bf7bb4d87e0f53ef
SHA512f3e79e48eb0f1ed31e346a108988dea478d79e8dfac13c905b502ec8b1f644b76825b12ac5e1c626cd5c5b1bf3ab6cfe32d1bef7c46cbe33412a87ce7c3f4f71
-
Filesize
494KB
MD52fe45a93c6d8420ac532a17049a3c3e4
SHA1967d8936c6bd4a154723bffdcd6cc6abdbe5f5f6
SHA2563a1e88fedc773033a3ce7208eb9189381c73698a69ab30e1c8cdc52a5cce8ce2
SHA51225e86e31a892031b358c49bb706574a8a37404aef7f34d2ac244fc264369ed1533886d026b0ecb0b4c4fdf340784f25044c5b05b961a227f8835c5ab01333305
-
Filesize
494KB
MD52fe45a93c6d8420ac532a17049a3c3e4
SHA1967d8936c6bd4a154723bffdcd6cc6abdbe5f5f6
SHA2563a1e88fedc773033a3ce7208eb9189381c73698a69ab30e1c8cdc52a5cce8ce2
SHA51225e86e31a892031b358c49bb706574a8a37404aef7f34d2ac244fc264369ed1533886d026b0ecb0b4c4fdf340784f25044c5b05b961a227f8835c5ab01333305
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
449KB
MD5b3bc83834eed49645a0de130ac263390
SHA1949fad2b7b9c830be6dc98e1e19cce53841be065
SHA256f0aee048aef7adecdd41d0aa2ad700beb81584e9629465d34985ef6fc6a3c35a
SHA5125cd406b56bab278a3d1185b389e682f874868aec285d3da95f1dedbc88966f6ef1fb66e412643460e3415792b1ed50635f4bf2b99c46c5c04d86ec53d9d165eb
-
Filesize
449KB
MD5b3bc83834eed49645a0de130ac263390
SHA1949fad2b7b9c830be6dc98e1e19cce53841be065
SHA256f0aee048aef7adecdd41d0aa2ad700beb81584e9629465d34985ef6fc6a3c35a
SHA5125cd406b56bab278a3d1185b389e682f874868aec285d3da95f1dedbc88966f6ef1fb66e412643460e3415792b1ed50635f4bf2b99c46c5c04d86ec53d9d165eb
-
Filesize
1.0MB
MD5f572aa58cd832692b111a73dc677cb66
SHA1ea419308620d994a6b53eca917123bd9d2f4ccbf
SHA256b88fb0dc95af243a5f4fff3a29a7ae96f3cb6b21aea14dc4522b5718e7b91a51
SHA5122179978b796bb13321925f86afce3fb964bbd474d5d462bcc093974995ae958a269de8da4679c0d0103e7f06647a323ba4db69bf7266498836b1b540fab05018
-
Filesize
1.0MB
MD5f572aa58cd832692b111a73dc677cb66
SHA1ea419308620d994a6b53eca917123bd9d2f4ccbf
SHA256b88fb0dc95af243a5f4fff3a29a7ae96f3cb6b21aea14dc4522b5718e7b91a51
SHA5122179978b796bb13321925f86afce3fb964bbd474d5d462bcc093974995ae958a269de8da4679c0d0103e7f06647a323ba4db69bf7266498836b1b540fab05018
-
Filesize
746KB
MD592d42d8db27c7c1451e951702d7875d8
SHA18864d4d5f43dc16ed6db6b0f17dc7f29f1ef91fe
SHA256de071c64dee24478984f28203395f616aa632fbde9c74c47bf7bb4d87e0f53ef
SHA512f3e79e48eb0f1ed31e346a108988dea478d79e8dfac13c905b502ec8b1f644b76825b12ac5e1c626cd5c5b1bf3ab6cfe32d1bef7c46cbe33412a87ce7c3f4f71
-
Filesize
746KB
MD592d42d8db27c7c1451e951702d7875d8
SHA18864d4d5f43dc16ed6db6b0f17dc7f29f1ef91fe
SHA256de071c64dee24478984f28203395f616aa632fbde9c74c47bf7bb4d87e0f53ef
SHA512f3e79e48eb0f1ed31e346a108988dea478d79e8dfac13c905b502ec8b1f644b76825b12ac5e1c626cd5c5b1bf3ab6cfe32d1bef7c46cbe33412a87ce7c3f4f71
-
Filesize
494KB
MD52fe45a93c6d8420ac532a17049a3c3e4
SHA1967d8936c6bd4a154723bffdcd6cc6abdbe5f5f6
SHA2563a1e88fedc773033a3ce7208eb9189381c73698a69ab30e1c8cdc52a5cce8ce2
SHA51225e86e31a892031b358c49bb706574a8a37404aef7f34d2ac244fc264369ed1533886d026b0ecb0b4c4fdf340784f25044c5b05b961a227f8835c5ab01333305
-
Filesize
494KB
MD52fe45a93c6d8420ac532a17049a3c3e4
SHA1967d8936c6bd4a154723bffdcd6cc6abdbe5f5f6
SHA2563a1e88fedc773033a3ce7208eb9189381c73698a69ab30e1c8cdc52a5cce8ce2
SHA51225e86e31a892031b358c49bb706574a8a37404aef7f34d2ac244fc264369ed1533886d026b0ecb0b4c4fdf340784f25044c5b05b961a227f8835c5ab01333305
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
449KB
MD5b3bc83834eed49645a0de130ac263390
SHA1949fad2b7b9c830be6dc98e1e19cce53841be065
SHA256f0aee048aef7adecdd41d0aa2ad700beb81584e9629465d34985ef6fc6a3c35a
SHA5125cd406b56bab278a3d1185b389e682f874868aec285d3da95f1dedbc88966f6ef1fb66e412643460e3415792b1ed50635f4bf2b99c46c5c04d86ec53d9d165eb
-
Filesize
449KB
MD5b3bc83834eed49645a0de130ac263390
SHA1949fad2b7b9c830be6dc98e1e19cce53841be065
SHA256f0aee048aef7adecdd41d0aa2ad700beb81584e9629465d34985ef6fc6a3c35a
SHA5125cd406b56bab278a3d1185b389e682f874868aec285d3da95f1dedbc88966f6ef1fb66e412643460e3415792b1ed50635f4bf2b99c46c5c04d86ec53d9d165eb
-
Filesize
449KB
MD5b3bc83834eed49645a0de130ac263390
SHA1949fad2b7b9c830be6dc98e1e19cce53841be065
SHA256f0aee048aef7adecdd41d0aa2ad700beb81584e9629465d34985ef6fc6a3c35a
SHA5125cd406b56bab278a3d1185b389e682f874868aec285d3da95f1dedbc88966f6ef1fb66e412643460e3415792b1ed50635f4bf2b99c46c5c04d86ec53d9d165eb
-
Filesize
449KB
MD5b3bc83834eed49645a0de130ac263390
SHA1949fad2b7b9c830be6dc98e1e19cce53841be065
SHA256f0aee048aef7adecdd41d0aa2ad700beb81584e9629465d34985ef6fc6a3c35a
SHA5125cd406b56bab278a3d1185b389e682f874868aec285d3da95f1dedbc88966f6ef1fb66e412643460e3415792b1ed50635f4bf2b99c46c5c04d86ec53d9d165eb
-
Filesize
449KB
MD5b3bc83834eed49645a0de130ac263390
SHA1949fad2b7b9c830be6dc98e1e19cce53841be065
SHA256f0aee048aef7adecdd41d0aa2ad700beb81584e9629465d34985ef6fc6a3c35a
SHA5125cd406b56bab278a3d1185b389e682f874868aec285d3da95f1dedbc88966f6ef1fb66e412643460e3415792b1ed50635f4bf2b99c46c5c04d86ec53d9d165eb
-
Filesize
449KB
MD5b3bc83834eed49645a0de130ac263390
SHA1949fad2b7b9c830be6dc98e1e19cce53841be065
SHA256f0aee048aef7adecdd41d0aa2ad700beb81584e9629465d34985ef6fc6a3c35a
SHA5125cd406b56bab278a3d1185b389e682f874868aec285d3da95f1dedbc88966f6ef1fb66e412643460e3415792b1ed50635f4bf2b99c46c5c04d86ec53d9d165eb