Overview
overview
6Static
static
3docsis_cfg...54.exe
windows7-x64
3docsis_cfg...54.exe
windows10-2004-x64
3Tality54.exe
windows7-x64
3Tality54.exe
windows10-2004-x64
3docsis_cfg...bs.url
windows7-x64
6docsis_cfg...bs.url
windows10-2004-x64
3docsis_cfg....7.dll
windows7-x64
3docsis_cfg....7.dll
windows10-2004-x64
3docsis_cfg...n1.dll
windows7-x64
3docsis_cfg...n1.dll
windows10-2004-x64
3docsis_cfg...t.html
windows7-x64
3docsis_cfg...t.html
windows10-2004-x64
3docsis_cfg...s.html
windows7-x64
3docsis_cfg...s.html
windows10-2004-x64
3docsis_cfg...x.html
windows7-x64
3docsis_cfg...x.html
windows10-2004-x64
3docsis_cfg...is.bat
windows7-x64
1docsis_cfg...is.bat
windows10-2004-x64
3docsis_cfg...is.exe
windows7-x64
1docsis_cfg...is.exe
windows10-2004-x64
3docsis_cfg...is.url
windows7-x64
6docsis_cfg...is.url
windows10-2004-x64
3docsis_cfg...fg.exe
windows7-x64
3docsis_cfg...fg.exe
windows10-2004-x64
3snmp/mibs/...mt.vbs
windows7-x64
1snmp/mibs/...mt.vbs
windows10-2004-x64
1snmp/mibs/cap.vbs
windows7-x64
1snmp/mibs/cap.vbs
windows10-2004-x64
1snmp/mibs/...IB.vbs
windows7-x64
1snmp/mibs/...IB.vbs
windows10-2004-x64
1snmp/mibs/...IB.vbs
windows7-x64
1snmp/mibs/...IB.vbs
windows10-2004-x64
1Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
docsis_cfg2.0.7/Tality54.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
docsis_cfg2.0.7/Tality54.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral3
Sample
Tality54.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Tality54.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
docsis_cfg2.0.7/cablelabs.url
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
docsis_cfg2.0.7/cablelabs.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
docsis_cfg2.0.7/cygcrypto-0.9.7.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
docsis_cfg2.0.7/cygcrypto-0.9.7.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
docsis_cfg2.0.7/cygwin1.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
docsis_cfg2.0.7/cygwin1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
docsis_cfg2.0.7/doc/config-format.html
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
docsis_cfg2.0.7/doc/config-format.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
docsis_cfg2.0.7/doc/config-settings.html
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
docsis_cfg2.0.7/doc/config-settings.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
docsis_cfg2.0.7/doc/index.html
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
docsis_cfg2.0.7/doc/index.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
docsis_cfg2.0.7/docsis.bat
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
docsis_cfg2.0.7/docsis.bat
Resource
win10v2004-20240910-en
Behavioral task
behavioral19
Sample
docsis_cfg2.0.7/docsis.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
docsis_cfg2.0.7/docsis.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
docsis_cfg2.0.7/docsis.url
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
docsis_cfg2.0.7/docsis.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
docsis_cfg2.0.7/docsis_cfg.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
docsis_cfg2.0.7/docsis_cfg.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
snmp/mibs/brcm-80211-mgmt.vbs
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
snmp/mibs/brcm-80211-mgmt.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
snmp/mibs/cap.vbs
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
snmp/mibs/cap.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
snmp/mibs/ietf/AGGREGATE-MIB.vbs
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
snmp/mibs/ietf/AGGREGATE-MIB.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
snmp/mibs/ietf/DISMAN-EVENT-MIB.vbs
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
snmp/mibs/ietf/DISMAN-EVENT-MIB.vbs
Resource
win10v2004-20240802-en
General
-
Target
docsis_cfg2.0.7/doc/config-format.html
-
Size
41KB
-
MD5
75a87fa29a9d909f34e95c0ba9d58a4a
-
SHA1
ec6ca9d0fe21e43e671cf8a01f60a20c51b0c92e
-
SHA256
33166c43cdd2906be9ddfb171cccf5f03153983141b2993b0f35c81a23243749
-
SHA512
ebdef27874becc95a37bc3b1dbdc63c447370b00868d1e3c9478568e972295aaf22bdc097026d79bc1fd14b3a3c7c88bfec78efa307a34964737750d625eb9c2
-
SSDEEP
96:jgN7SfddxddGexnTdddddDSIddddd8dddddTSadddddZdddddddddddddZdddddF:jgBS+iv6KhBx+kYZ67wRP9Jkpyv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FBFFA371-7E21-11EF-B2CD-FE6EB537C9A6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000d4a37c7c519377e756b2145e780c9d9657df1703fc57b9e83568d97f6da626c3000000000e80000000020000200000002a5f46ba1dbea58a2e2435eb17e0f7f3f5bcba25fb7597dae9229ec24e02aaba20000000bf18c2bf9a902d7df3d0acb24c15d7d6cc002efa0d67fcf5e85340ba6cc20b88400000005f7014b27d9f70190ebf42373348c5c5a91ae9f784090feeb58e2b9a248f4e210cda705d20876017edc155ce9a985e0c196a62fbef81a7b14126d9e2c8b065b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433748857" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00dc71d02e12db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2548 2132 iexplore.exe 30 PID 2132 wrote to memory of 2548 2132 iexplore.exe 30 PID 2132 wrote to memory of 2548 2132 iexplore.exe 30 PID 2132 wrote to memory of 2548 2132 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\docsis_cfg2.0.7\doc\config-format.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5922e8c36d63ca600ce11ba2e6ea3f931
SHA10debdf6cc63d91c8e76a7d52f90ef660e262fbc9
SHA256fddda583c36241432cc577d741e5e7f9d2ffbf5dbf3ed4d526bfc3e8adc52eee
SHA5128cce5189e994205fb017d65004a5d4398785314f553793d01e95cf437734ac0e1564996f211676d63656735d89f7267673630c443c09e2d14a625f38947e38e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507d19d25bcfcaedb9eaca6a70b2df6dd
SHA141feb197ce3b820c5ec1558f28d71496a83aaf1b
SHA2563b30baf1b0c594b5602b6f67037a12b0b249e5745cb60ecb48b727c74da554fe
SHA5122f98c2312bc12ef105ba93c5bbfdc1247f1304d90c0f1a9ea5671f6942222cb5ae718f7d9721593242f7493cbf07011296d9b0e5b9fd7c61326637afb1933793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546d99be89022f213f6f1b57200df8899
SHA14371d792b92b91a55923adb1d0701f82c077aa54
SHA25632bd9c56742f241971a9cea09eea509e22f274a683d049dbb2711a2ed59f1b40
SHA5124fbc63c00573d7012368cc94882dad6f29d20ef8704860ef2fa9387070da27b4c4156c4c5c8cd6cc647ade9d220d6c4fe02cb83613a20d6db593cd6eed3cb235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598d69f034a7cee846b27a823916ab9f5
SHA10edc0fb88ff4280f0fb42580d3ef02c31222ec4f
SHA256102b98a0177fc32bc88ee10dfd8c0b3f357c4df4453e6c675f3697ff2b44adae
SHA51293151a21f2c24d0191214e6db36c094991960355166577df5ad6b23d7243548dfe1eb0a95d6ae0aade9c0e0f642ec0f47f39dba27570c7f97721af2b394d462e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5602ecc3ab612b7688ce8cb5bcda13ffd
SHA100f60ce0477a9ebf39730588e744e56af9db9507
SHA256ab546408db49baee6dd5cb2d842906da8ef64b73cd6cdae3d7420a0fb30f54dc
SHA5126434cfb00ee55a8b1e50963c4f3376e4976f81e513cc57aeedd6da71a40f44a302663b40a00b77130b0c3bac72b57c19eb8866f36f2ba7b980246e4691c0a89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506f973480fc1affb967e515f2cb27494
SHA1c7eedcdc2b465b371affc4d42ce23423aee1fa60
SHA256db6d4e2d11960f9c06839b07420146df135184ddd8c5c75513ce9bf1abbd7a63
SHA5123dd83be13b59ff058f42fa89dae62980aa64ebabb11ac323630c73c20a692417fb94339aa12561b1871a60aa68a01e96518fb7abf0385a5404ed4cd4a727531f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5230c6bbc8d97ee09b39ff8973cc27889
SHA1358242668bf82aef1e831b5823d75f62b700943d
SHA256e1ea52285ef32212ff15bbfdca6696cf41782f1c5601b72d6255e76a1f10aa5a
SHA5123a0133dcb953e47f8606fd44f7309e4726872b5851665cd7dab3d923889e8b8dca1283e93591f693e3264c7707553d270923034a351c2d7c18278bffb8bc5abf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb70e7cf51cbb3033dfaa9a09cec8577
SHA1d0e651fd094ea0387fd04602a3f9dea3d3a27cea
SHA256a7d4c50a3b1e9f41feacdec9f2c9f24d7ddd28c6886b52bf7ba78c400dff64f5
SHA5121982c2098fd623bd1467c23ad932a7046f7cd3486f4a6a276e61abf5fc7ccf48f90e186487ee93d3a985d7a4c0c62d2077b749291480a93e74c4b811fa0723ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56309b4b06a62e2cc64b73dde12e69fef
SHA1bebd17c2f479ac624a854245309d221d28e3be12
SHA25631b6138f7b6722526e21d482212f70a4fbf073673eb5268c9aa6e92e2fb2bef8
SHA512d140bba6876d1c4007e072d7145f54ea7f1a0dc051e1a762680e4a7054c0cc5f60b621fde3b7b66ac37c8c34bf7ea68218fcbf75798146ec94093ffa9fd084b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508f0374dd715ba7d2a35e43ad594bb66
SHA1c38ead740831555513a5eb0e1ef251a902e0c59b
SHA2567f7c1a32e467cbbfc685e22ec02c997e27a921e47b2a631189cf28d17d93d1a6
SHA51274af6f8b60d750dfc29c755a314fb0f925fe9f181a2758ef84a7460d08a3aaf776b60a7823d32333c6af133f5c32e8f3f0d71cd26cba08c63437cd634cafa086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdf85c735238db06a38f1945135e0c5b
SHA13a69e0aa3ecb768d2a54a70e960a1a176057ddd5
SHA256d41920be0d80398df0d4711908d777374e1e143613092a85ad4558489164f90b
SHA512e87d3ad99fff4cce46591964179d717c690bfe37f4bb1797317bf3084086ef013d5c6928c140406bbe583c3d2661ffe232738ee2ffd892c0b582134b25a69297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b56c3a3e08a8dc507747561b104aac6e
SHA1537813746ea108ae34ef23242228ad93db5a2eac
SHA2564640ee018e7f6eecf06a6858a6ac697aec93ba08b57bfe76dc4aa24ea926519c
SHA51230f78f5cfb732d5960d7e19f9aa05c3129cefd38758d3a5ef5224eb2540401d1e903552120fa5e9b17ed2cb62e7a28099f280b8020cefed3dc8ff3528b6a65fb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b