Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
373e269d2b2c9446bcc0db0ab20fd420N.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
373e269d2b2c9446bcc0db0ab20fd420N.html
Resource
win10v2004-20240802-en
General
-
Target
373e269d2b2c9446bcc0db0ab20fd420N.html
-
Size
42KB
-
MD5
373e269d2b2c9446bcc0db0ab20fd420
-
SHA1
9c7bf6ec2e77d7046c3907c939c19e8fa983f28d
-
SHA256
b1c1dc6d847fa98757ba706601f2a969d7e6d43b6d74478ce3c57a3b6420d3b6
-
SHA512
4fde05230a1e0075e019bb297584c6b033f6f0d81cec00eb9d5b286b367efe65c718fd92c2b496ba00ab2a267600bc608fa27b3cb1056166c2c821029344948b
-
SSDEEP
768:AvKZdapSGpkRwtzjUg51m1pj49fBxa9qBVHS:AvyapFp8wBUg51m1y9Pa9KVHS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000d47f1077478bbaca6bca04c6e761500b7081c48fb4d00837d3acfba82c0a4ab4000000000e8000000002000020000000cb4569e3de9f9bb32bd75003be9eb7bc2793bd2904a765be311b6b812b3b69ea90000000e6065f11dd29ae49e7527e35a5f73e38fd3ec679f4d7db64315fee3be79c113fa3714c1a6f5314cac97f9b97c6a0296bb58f4427553806d0429edab80674ae6529fd4f2adf1d54a5f07411d592bdee96f5900ae8b78f2c0b471534bf2f29d9a0be5e11ffbe48f217dde3ad3ab044a1d05981f3279cd2670133e5d5eaea2c385e98e5884e772bc23ed17beeb1371f655b40000000947fa445f0f988bdcad2e832e00486f1c3aaf43255b092496d62a7f06001fcf465ad13bb10509217dcf6c1e3b29658e4aaa9a8f22217963a95331f48fbaf1533 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C972BEA1-6BF3-11EF-AAD0-E29800E22076} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431749895" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000a7a2077005f0473badfcf1e0c9dc640a4075ee9a6fb5b5fd72debdf1e2b272d2000000000e8000000002000020000000182b6ff583eb587852eafa61d29e2eb52e66b8faf8dfe4a661bf70a3a696c4a520000000eee728fb76ec3a8e23936f9dbae05b36cefd060c349f4de5d7a46193c0dd5b774000000010b40146baa01ecbba7b894dd7abe48eb6180db482503a9ac4a919f6cbdf57fa066cbbf36d0c322b152d8cae59cfd5d77a95097e5f091b00f6c2148b9f2c8f50 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90eec89e0000db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2544 2688 iexplore.exe 30 PID 2688 wrote to memory of 2544 2688 iexplore.exe 30 PID 2688 wrote to memory of 2544 2688 iexplore.exe 30 PID 2688 wrote to memory of 2544 2688 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\373e269d2b2c9446bcc0db0ab20fd420N.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb2107b3303f3f4b64f6acecff35652e
SHA1251208e75529e20e1da9b71339d7909bb2af6c28
SHA256acae5e48214b5fa5cd46f7b597abf14050867846ffadc0538c09799b7d1309fd
SHA512812e44e59b77dc07f5990f6462dde4a4920a07ca0cf9d4a2c46672f29ed22218275657bc74ee58e69ccb398f17a3b7729486245ff1409fa15f6e184772de4fb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acb41b7c6697f8c06d4e273a68e8dbc4
SHA10e2223267ffa9bd720ad5ac09de2d8cc286063d9
SHA256113c1d67e13ef1fdef6acd39685d7c11760bf4cf3167941322b215f53f537727
SHA512de4551b590e6776c28ebc55e9c7e715bd4521e4a69b70a1c814d3d0f3d1c2f2d6764fd4e7ca8519a255585b5b8d1484a37ec4db182a6e616d4f2cade9ecb7a0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aebf50ac5ee99a1f00b9d73c1659a894
SHA1c073067fe183cdf5d5ffa39c71a0b662f53bb995
SHA2567e3310e880ac0a2a0d86fc15ce300e4d371efc9cea3a148f608433e5c2434250
SHA51289309f0173d12f886e90bd5cc4c85cf7b00d00d32caa2b5294738c268123d194fb6717f3cc2541d5018a3464f8d9f9f3d63e402ed15433c0cfe83b753868b411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564a15caa0acfc4fd6f1cae24bdb5a3d7
SHA1a9e0a5a830f03d281a92eb5ce2797955fcb958ea
SHA2567b71fe0df0b35ae59ecbdac9af618502396462faeb103c99f4e4d004ab6cf2fd
SHA51251c29cbf9bb126fdfa396973eda54057230c4f4cabd78acc915fe220e7c859578ea3348047684d6e750bced190af12bc2901f1a86a13b6385928dc3bad592d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5892eda4ac35ccbce64121ecd7cb2852f
SHA1a536bb40596c7f4e454fb7c9dd1720f39f0bb1bd
SHA2569b6f10bdbd6573e02959e3a8de3b88e3c70f962dba2967eab09f490dcafb92ae
SHA51295ae0ea9d8d4d9cd5fa09f96d8eecfe7938c3f7a312744b3662b57e8f60cd489de0b9014a033bb743c864070dd0f0a4962e67069f962bd5faf83969e0ec4df45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a41c1c13fd1ac941a6d8b53439454b97
SHA17b5063134dd10936fbb41981bd9b823cd95e56fe
SHA2569ee92602b1012b775d711dc646aec451b9375160f428b6fe5f8c366aefb27323
SHA5129eb68f8d7b9c1ee84d4e4019253dc39f5e1ae629ff64362424e9fbd85b43c640b1d91d404a24d331e98d5a5d9ded5275032375f9e54b739f0c70e3c345176c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cce7c46e2fb4de0cbb3fe4160526f14
SHA1dccaabe6825aa4966b22c2eb18535461bccef3ce
SHA256807b4d18606533de4c2a3a184e4a410e3eaf52da31b47dd9e3c1fe56977511ee
SHA5120ada8b2da7ea4c8c335d712e77e0f71cfd6189151015f470f97eff311fc7c76e93e8345d78de47ec0c8be51c85c7fbd95e7db5bb64a9e94cef8be25f04feff99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5751dcd812ed7b8d6c8ac310cecb8a611
SHA1c4c31e0db230c39b1ce03b595fb61f67acb5bd20
SHA256c929a8a0c5e40f5a33f8245ce5f39f87ffadd91eb03e296e8b7ec5ee77bd4c27
SHA512f6aad57bef308c7e25a8dde72943b2f56a3e27f5cc1564daf1f775a083688a63aa10c7f241b85afbea98e100217d784314102ddee7e69b1539e9fb48f5c54d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5330854e74c12d352be5125da1ff8a619
SHA14ecdbd747260a6141d8e93662ea94354da992650
SHA256e07ed4a980a23e97a5bc15163e1890497e9783f0030264a86edb9650cf436082
SHA51202eea592faa90db38bd1869c0c3c7571c27a2e5de482c964d9f01b1baa13783ca02a1748c1fb2c253d8581a8006a900c0a8363b905508e13edd7635d27973c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd838da7c08ade52ac1a12c1da684aa6
SHA15354369a5cfe4cb1318608e87461a1b732557c2e
SHA256c9fa203e7869865ace96094f102ceecb5c069dddea114b94b788cd4ce12fd96a
SHA51222dd71a615f8558632a66e1b71c7a7754d964b4169968f3fc5e379c2f4cffb6bb36a656fe0d8fd6cdbc8a5b935fc9d4f250190b5b09bc622f64eb09b711b5935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f58abd1a2eed387d35be9fb915bbd2c
SHA12619ed934bfb50cc835685f0e0245938801824b5
SHA25636a1066afd4c38cda2c8b00b3b237d5b1531fb4cd45934d66ba50f91941a168e
SHA51292700c9cebbfacf88e38173ec3572c7e93fd42a65b56179f2b8bb7a2f4b30d9d8fdf807c0a00ab8295d77281e5ac892567c5ac66250439cab46babdf1a8450f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc3fc32795e3a3d5ac9cb6826c4368ff
SHA13ed4306eddac1371f22dcb2ce981f95b8eaa655a
SHA256ff3785f0d36c32c677bb6f487aaf193978abb6b22e97c7ab9d40811babd6e769
SHA512d95f7f7176d79ce1ddafcafdf34e850e8c1529c8d4289b90da73ea3a0ddf200e35b0d99ac572c869233e67d01e9cf316f6fa21571e5fd3b2fc5cdd1fd5b113f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528038aa0681074bfe2e62e2c3dd9df06
SHA1479159a68741241663174397e63f7cc2fd68885d
SHA256569023ff72c768d3a67e31c65bd7552c47f036d83da13d317e62eb9a6a1e2a82
SHA5120bf8b08476d29bfc54fde3fc894871d293e4bf9999466351c74740bf308175bba47ff4ac43e8ea2bf3c3201de474acb7b9bcc87ce952ad51e0706221dea9dcfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc6ee7aecb7e0cd6cf495448f0d7931
SHA14aa8b34d27d62d1260cb5f99e57af642b6042d73
SHA256fd69c2b60b0f15ff9b1bd62c424e4a17531f0d0ab5c9aa9a643dac89cb7aed0e
SHA512bc0eddb2f4427538eafd228a7d17aa961d2965190b5a22e56fd359ebbd16c64ba155a4b15ea1a920124108c48aad7796de9f1c1418534177f39664e5f74f5018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4e8ba065c18c3ad1e6fc65fc7e80835
SHA1dca8629d8de7951323998672c02f938ee60a8f6d
SHA256e0077ea7507c0506cae09f8685a31c56d988b0dcdb304e5a79c61efc4b1b1b7f
SHA512f52f9b45fc3264630665881ee6059857f42b86f61864aca5e562872150873a35778186fe6168dc0727b3449db4ee2b211a03dcad3937413a568a32403ebd4bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e24345109d8247c8e590035ac3ff748
SHA1520fc30230219d35d66aa2a44e036c151a0cccb2
SHA256041b1a826821aad14433a290e115e1d11ee0469a565d2b27637937a0b2d14951
SHA512185745e904e48a3652266fcb78876b198251c90fe7417e9e4d996563382ea193881114f343c1f8845e248621bb151dd9ee0978875c891e53dd6d6ddf47f783a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4d7ab72f21d278a54602f8fcde16852
SHA1589e916622db9c3309f6b59df25605b71fae4df2
SHA25662bd96b359e2c63f21711fbe4039afdd2afd4f14e0a5670e8d26c32ddf628c85
SHA512d26d91aa6c58f8eb2365269cc330030e607d14e6306dbc7360812760117934034e282971ad389601e59f7aef514258082afab21242a94ace07e11dc327bb0404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5659d2f062fd74a9aec5cfbc2f59cf6f9
SHA112739ed12feb1dc12a553518c845e85cf1d91ecf
SHA2564b50cbed4909110c36fe0ba5e219b8809e9fe5b79e1f4301017da5fb25080241
SHA512e9f5acb347b28bf06ff8b23d0dbc5ca7ca6f884fe130b5c98e9b0465952398fcd99ba815550999eeed1a9661ab34a4bf171a76ed462ae5f5d7d4f597c9d8790a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a68591a0bbb6c50644b0670dfec79fd6
SHA1ec7d70f341a172b5eab904c36103b4d98772c1bd
SHA2567e267a89d36692ec91aa67cf805fea558c4ad8d254990f602a66279bd0fc8c2e
SHA512615a4dffb6ca48a3a45fdba61a052cea942eb99133b259867b730467e2ba9ac3f108ebdfbeb536fa30faaa55c937348ad2632d00f026a8ef0dd8cea1ff683c4c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b