Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 15:50
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20231020-en
General
-
Target
sample.exe
-
Size
146KB
-
MD5
1784d03173fd273f9810be0a48f1f383
-
SHA1
b4354665152723b9fa6e31f07d155265a1d6e2f6
-
SHA256
03097f75904007de33f69ec77e02146fe2a0b3d3b2a923640677bb1f46815b07
-
SHA512
35dad75e13ab4363ee1495e304e58ec11f731da1f8e21ce9690cfd0cff7d77c50f8b9b5584208e315c8cbb71345401e6ffd771427690b2cffcb40b3ec78b7edb
-
SSDEEP
3072:nyPZHpVIYbQf91G3im/2Ef07Jysgk8vRFHoCj1advu07rr/b/V53SgvB+qMDDpvy:n2HpV+8vnvEu0Xrjt5igvy6Qijx3P
Malware Config
Extracted
C:\ProgramData\Merlin_Recover.txt
https://getsession.org/download
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7055) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation sample.exe -
Executes dropped EXE 1 IoCs
pid Process 1564 Temp3.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: sample.exe File opened (read-only) \??\A: sample.exe File opened (read-only) \??\O: sample.exe File opened (read-only) \??\U: sample.exe File opened (read-only) \??\E: sample.exe File opened (read-only) \??\K: sample.exe File opened (read-only) \??\G: sample.exe File opened (read-only) \??\I: sample.exe File opened (read-only) \??\M: sample.exe File opened (read-only) \??\S: sample.exe File opened (read-only) \??\V: sample.exe File opened (read-only) \??\D: sample.exe File opened (read-only) \??\R: sample.exe File opened (read-only) \??\T: sample.exe File opened (read-only) \??\H: sample.exe File opened (read-only) \??\J: sample.exe File opened (read-only) \??\L: sample.exe File opened (read-only) \??\Q: sample.exe File opened (read-only) \??\W: sample.exe File opened (read-only) \??\Y: sample.exe File opened (read-only) \??\B: sample.exe File opened (read-only) \??\N: sample.exe File opened (read-only) \??\P: sample.exe File opened (read-only) \??\X: sample.exe File opened (read-only) \??\F: sample.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\ACADEMIC.ONE sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_comment_18.svg.Merlin sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\rhp_world_icon_hover_2x.png.Merlin sample.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Merlin_Recover.txt sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Retail-ul-phn.xrm-ms sample.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\tabskb.dll.mui sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\EXCEL_K_COL.HXK.Merlin sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\progress_spinner.gif.Merlin sample.exe File opened for modification C:\Program Files\Windows Photo Viewer\it-IT\PhotoAcq.dll.mui.Merlin sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordR_Retail-ul-oob.xrm-ms.Merlin sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Orange.xml.Merlin sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\nl-nl\ui-strings.js sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Retail-ul-oob.xrm-ms sample.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-GB\tipresx.dll.mui sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\css\main.css sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\gl\msipc.dll.mui sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\dark\example_icons2x.png.Merlin sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ui-strings.js.Merlin sample.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\Merlin_Recover.txt sample.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ro-ro\Merlin_Recover.txt sample.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\mpvis.dll.mui.Merlin sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\tr-tr\ui-strings.js sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\es-es\ui-strings.js sample.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Merlin_Recover.txt sample.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\home-view\Merlin_Recover.txt sample.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\es-ES\mshwLatin.dll.mui.Merlin sample.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\QUAD\PREVIEW.GIF sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\root\ui-strings.js.Merlin sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\de-de\AppStore_icon.svg.Merlin sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\fi-fi\ui-strings.js sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\zh-tw\PlayStore_icon.svg.Merlin sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\EXPTOOWS.XLA.Merlin sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\delete.svg sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ja-jp\ui-strings.js sample.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\ieinstal.exe.mui sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.shared.Office.x-none.msi.16.x-none.xml sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fi-fi\ui-strings.js sample.exe File created C:\Program Files\Java\jre-1.8\lib\management\Merlin_Recover.txt sample.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\css\Merlin_Recover.txt sample.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sl-si\Merlin_Recover.txt sample.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\PIXEL\PIXEL.INF sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\core_icons.png sample.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\sqloledb.rll.Merlin sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_OEM_Perp-ul-phn.xrm-ms sample.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\javafx\directshow.md sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\COPYING.LGPLv2.1.txt.Merlin sample.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\WINGDNG3.TTF sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\plugin.js sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_delete_18.svg.Merlin sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\pt-br\ui-strings.js sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Grace-ppd.xrm-ms.Merlin sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Retail-ppd.xrm-ms sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Gill Sans MT.xml sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_MAKC2R-ul-oob.xrm-ms sample.exe File created C:\Program Files\Common Files\System\Ole DB\en-US\Merlin_Recover.txt sample.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TEXTCONV\Merlin_Recover.txt sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Retail-ppd.xrm-ms.Merlin sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ja-jp\ui-strings.js.Merlin sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\root\ui-strings.js sample.exe File created C:\Program Files (x86)\Common Files\System\en-US\Merlin_Recover.txt sample.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-fr\Merlin_Recover.txt sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ExcelCtxUICellLayoutModel.bin.Merlin sample.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_ffffff_256x240.png sample.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\pl-pl\Merlin_Recover.txt sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 232 schtasks.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3240 vssadmin.exe 3164 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe 3852 sample.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3852 sample.exe Token: SeRestorePrivilege 3852 sample.exe Token: SeBackupPrivilege 3852 sample.exe Token: SeTakeOwnershipPrivilege 3852 sample.exe Token: SeAuditPrivilege 3852 sample.exe Token: SeSecurityPrivilege 3852 sample.exe Token: SeIncBasePriorityPrivilege 3852 sample.exe Token: SeBackupPrivilege 2408 vssvc.exe Token: SeRestorePrivilege 2408 vssvc.exe Token: SeAuditPrivilege 2408 vssvc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1880 StartMenuExperienceHost.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 3852 wrote to memory of 2100 3852 sample.exe 88 PID 3852 wrote to memory of 2100 3852 sample.exe 88 PID 3852 wrote to memory of 2100 3852 sample.exe 88 PID 3852 wrote to memory of 956 3852 sample.exe 90 PID 3852 wrote to memory of 956 3852 sample.exe 90 PID 2100 wrote to memory of 232 2100 cmd.exe 92 PID 2100 wrote to memory of 232 2100 cmd.exe 92 PID 2100 wrote to memory of 232 2100 cmd.exe 92 PID 956 wrote to memory of 3240 956 cmd.exe 93 PID 956 wrote to memory of 3240 956 cmd.exe 93 PID 3852 wrote to memory of 5060 3852 sample.exe 103 PID 3852 wrote to memory of 5060 3852 sample.exe 103 PID 3852 wrote to memory of 4912 3852 sample.exe 105 PID 3852 wrote to memory of 4912 3852 sample.exe 105 PID 3852 wrote to memory of 4912 3852 sample.exe 105 PID 3852 wrote to memory of 4500 3852 sample.exe 107 PID 3852 wrote to memory of 4500 3852 sample.exe 107 PID 3852 wrote to memory of 4500 3852 sample.exe 107 PID 5060 wrote to memory of 3164 5060 cmd.exe 109 PID 5060 wrote to memory of 3164 5060 cmd.exe 109 PID 4912 wrote to memory of 1564 4912 cmd.exe 110 PID 4912 wrote to memory of 1564 4912 cmd.exe 110 PID 4912 wrote to memory of 1564 4912 cmd.exe 110 PID 4500 wrote to memory of 3844 4500 cmd.exe 111 PID 4500 wrote to memory of 3844 4500 cmd.exe 111 PID 4500 wrote to memory of 3844 4500 cmd.exe 111 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update BETA" /TR "C:\Users\Admin\AppData\Local\Temp\sample.exe" /F2⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update BETA" /TR "C:\Users\Admin\AppData\Local\Temp\sample.exe" /F3⤵
- Creates scheduled task(s)
PID:232
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3240
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3164
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\Temp3.tmp"2⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\Temp3.tmpC:\Users\Admin\AppData\Local\Temp\Temp3.tmp3⤵
- Executes dropped EXE
PID:1564
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Update BETA" /F2⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Update BETA" /F3⤵PID:3844
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:976
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD564d1b77bb61544c8440363d4374c3c65
SHA12925f8f71c44185ceb93939c1dba343e1d77d6d6
SHA2569d7aee82e5e3a93c4d513ba145c72003094a9a833aeec8becffd56a8893259a1
SHA512f15e8918fda73cb45a2a81286e0c16fc754661fe07d9839e070ae0581f23ada1deff3e359f0348410c3ce6511b14d8005b36f813e770270395505d3299ff0af1
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize13KB
MD5e920143776eb0e45a1e176c28e8ac73a
SHA1ac8d819c60e3a83f0a8739285cb8779165b473dd
SHA2565d730a6b68dc4b1c83abe6045e6307c42bf36ea33d7893de92b70c443d833547
SHA51222b975d01df643b369764b4b7852f424bef669231d2b35fc70118ed599929c738e933f14896c49beff786340b51ee2e83f80d9acdf7287c76872d18fdabc53ae
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize14KB
MD50cdf944d4f8cb598a4f6a95245fcc35d
SHA1bbc33ebc42c2c7cea498d9217414dd8f62aacde7
SHA256fcbf8a23c859cacabd4c9f687ce43b434d3d7c6e9c55fe4377135dc5bbc99e09
SHA51259f0945fc850fa8b60583d01a480cd19dfdad2a093891128f1905b6dfda879ef44cf68d8032ac89a17b745da07bb0889922ce1a2a4eb3078fcac9bd60d3578c0
-
Filesize
5KB
MD5ab65af4349e7c5b0872c8b808d036980
SHA1414b2a2748b7ea6176c1d2453f89fdc8a2d349d0
SHA256a6c41f368f42a7c57c307a48ce2440a60a744226b6414fadb6517a80a5d160a2
SHA5122c61c56e8c299677bad4ce223e3187200c341aa4dd4503fac1217aa8e15687af03544a6d160bb2b1b131a56ea9df2967e00359aa622f12d1b82605c40cca6679
-
Filesize
5KB
MD5ab65af4349e7c5b0872c8b808d036980
SHA1414b2a2748b7ea6176c1d2453f89fdc8a2d349d0
SHA256a6c41f368f42a7c57c307a48ce2440a60a744226b6414fadb6517a80a5d160a2
SHA5122c61c56e8c299677bad4ce223e3187200c341aa4dd4503fac1217aa8e15687af03544a6d160bb2b1b131a56ea9df2967e00359aa622f12d1b82605c40cca6679