Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 20:23
Static task
static1
Behavioral task
behavioral1
Sample
4daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
4daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39.exe
Resource
win10v2004-20220718-en
General
-
Target
4daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39.exe
-
Size
383KB
-
MD5
7a34c314dcb730e9d7b1fb74db78050f
-
SHA1
af3ab8350547fba0a14bc2d6b8a315a2ec9d2986
-
SHA256
4daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39
-
SHA512
c08a4b74673a93841b328eb5aee31cf0ff1f786457a47cc5f00ea323ffd0b8e95be8e6ef0670c1ac5cc84b61ec7b48674a76b6b3fc865675893b5d513ffc8196
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\_RECOVERY_+knsof.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/1B3EF3AC377E5BF8
http://tes543berda73i48fsdfsd.keratadze.at/1B3EF3AC377E5BF8
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/1B3EF3AC377E5BF8
http://xlowfznrg4wf7dli.ONION/1B3EF3AC377E5BF8
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 2004 wqgglbbiexkx.exe -
Deletes itself 1 IoCs
pid Process 944 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run wqgglbbiexkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\euumhaioesfq = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\wqgglbbiexkx.exe\"" wqgglbbiexkx.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\720x480icongraphic.png wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\_RECOVERY_+knsof.png wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\_RECOVERY_+knsof.txt wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\_RECOVERY_+knsof.txt wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationRight_ButtonGraphic.png wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Trans_Scene_PAL.wmv wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\GoldRing.png wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_RECOVERY_+knsof.html wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\btn-back-static.png wqgglbbiexkx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\Xusage.txt wqgglbbiexkx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_RECOVERY_+knsof.png wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\_RECOVERY_+knsof.png wqgglbbiexkx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\README.txt wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\_RECOVERY_+knsof.txt wqgglbbiexkx.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\_RECOVERY_+knsof.html wqgglbbiexkx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\_RECOVERY_+knsof.png wqgglbbiexkx.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-imageMask.png wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationRight_ButtonGraphic.png wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Postage_SelectionSubpicture.png wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground.wmv wqgglbbiexkx.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\bn.pak wqgglbbiexkx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\_RECOVERY_+knsof.png wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\_RECOVERY_+knsof.txt wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\System\en-US\_RECOVERY_+knsof.png wqgglbbiexkx.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\_RECOVERY_+knsof.png wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Page.wmv wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToNotesBackground.wmv wqgglbbiexkx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_RECOVERY_+knsof.html wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\_RECOVERY_+knsof.html wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\_RECOVERY_+knsof.png wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\_RECOVERY_+knsof.html wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\System\it-IT\_RECOVERY_+knsof.png wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\layers.png wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\_RECOVERY_+knsof.png wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationRight_SelectionSubpicture.png wqgglbbiexkx.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\1047x576black.png wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationLeft_ButtonGraphic.png wqgglbbiexkx.exe File opened for modification C:\Program Files\Internet Explorer\en-US\eula.rtf wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_rightarrow.png wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Small_News.jpg wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\Bear_Formatted_MATTE2_PAL.wmv wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\Panel_Mask.wmv wqgglbbiexkx.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\cs.pak wqgglbbiexkx.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\da.pak wqgglbbiexkx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\_RECOVERY_+knsof.png wqgglbbiexkx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\North_Dakota\_RECOVERY_+knsof.html wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\_RECOVERY_+knsof.html wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\PreviousMenuButtonIcon.png wqgglbbiexkx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\applet\_RECOVERY_+knsof.png wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\_RECOVERY_+knsof.txt wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\_RECOVERY_+knsof.html wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\btn-next-static.png wqgglbbiexkx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_RECOVERY_+knsof.txt wqgglbbiexkx.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\_RECOVERY_+knsof.html wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\_RECOVERY_+knsof.txt wqgglbbiexkx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Heart_ButtonGraphic.png wqgglbbiexkx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\_RECOVERY_+knsof.html wqgglbbiexkx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\_RECOVERY_+knsof.txt wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\_RECOVERY_+knsof.html wqgglbbiexkx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\_RECOVERY_+knsof.png wqgglbbiexkx.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\wqgglbbiexkx.exe 4daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39.exe File created C:\Windows\wqgglbbiexkx.exe 4daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 wqgglbbiexkx.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 wqgglbbiexkx.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 wqgglbbiexkx.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 wqgglbbiexkx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 wqgglbbiexkx.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 wqgglbbiexkx.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe 2004 wqgglbbiexkx.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 1360 4daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39.exe Token: SeDebugPrivilege 2004 wqgglbbiexkx.exe Token: SeIncreaseQuotaPrivilege 288 WMIC.exe Token: SeSecurityPrivilege 288 WMIC.exe Token: SeTakeOwnershipPrivilege 288 WMIC.exe Token: SeLoadDriverPrivilege 288 WMIC.exe Token: SeSystemProfilePrivilege 288 WMIC.exe Token: SeSystemtimePrivilege 288 WMIC.exe Token: SeProfSingleProcessPrivilege 288 WMIC.exe Token: SeIncBasePriorityPrivilege 288 WMIC.exe Token: SeCreatePagefilePrivilege 288 WMIC.exe Token: SeBackupPrivilege 288 WMIC.exe Token: SeRestorePrivilege 288 WMIC.exe Token: SeShutdownPrivilege 288 WMIC.exe Token: SeDebugPrivilege 288 WMIC.exe Token: SeSystemEnvironmentPrivilege 288 WMIC.exe Token: SeRemoteShutdownPrivilege 288 WMIC.exe Token: SeUndockPrivilege 288 WMIC.exe Token: SeManageVolumePrivilege 288 WMIC.exe Token: 33 288 WMIC.exe Token: 34 288 WMIC.exe Token: 35 288 WMIC.exe Token: SeIncreaseQuotaPrivilege 288 WMIC.exe Token: SeSecurityPrivilege 288 WMIC.exe Token: SeTakeOwnershipPrivilege 288 WMIC.exe Token: SeLoadDriverPrivilege 288 WMIC.exe Token: SeSystemProfilePrivilege 288 WMIC.exe Token: SeSystemtimePrivilege 288 WMIC.exe Token: SeProfSingleProcessPrivilege 288 WMIC.exe Token: SeIncBasePriorityPrivilege 288 WMIC.exe Token: SeCreatePagefilePrivilege 288 WMIC.exe Token: SeBackupPrivilege 288 WMIC.exe Token: SeRestorePrivilege 288 WMIC.exe Token: SeShutdownPrivilege 288 WMIC.exe Token: SeDebugPrivilege 288 WMIC.exe Token: SeSystemEnvironmentPrivilege 288 WMIC.exe Token: SeRemoteShutdownPrivilege 288 WMIC.exe Token: SeUndockPrivilege 288 WMIC.exe Token: SeManageVolumePrivilege 288 WMIC.exe Token: 33 288 WMIC.exe Token: 34 288 WMIC.exe Token: 35 288 WMIC.exe Token: SeBackupPrivilege 1152 vssvc.exe Token: SeRestorePrivilege 1152 vssvc.exe Token: SeAuditPrivilege 1152 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1360 wrote to memory of 2004 1360 4daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39.exe 27 PID 1360 wrote to memory of 2004 1360 4daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39.exe 27 PID 1360 wrote to memory of 2004 1360 4daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39.exe 27 PID 1360 wrote to memory of 2004 1360 4daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39.exe 27 PID 1360 wrote to memory of 944 1360 4daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39.exe 28 PID 1360 wrote to memory of 944 1360 4daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39.exe 28 PID 1360 wrote to memory of 944 1360 4daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39.exe 28 PID 1360 wrote to memory of 944 1360 4daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39.exe 28 PID 2004 wrote to memory of 288 2004 wqgglbbiexkx.exe 30 PID 2004 wrote to memory of 288 2004 wqgglbbiexkx.exe 30 PID 2004 wrote to memory of 288 2004 wqgglbbiexkx.exe 30 PID 2004 wrote to memory of 288 2004 wqgglbbiexkx.exe 30 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" wqgglbbiexkx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System wqgglbbiexkx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39.exe"C:\Users\Admin\AppData\Local\Temp\4daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\wqgglbbiexkx.exeC:\Windows\wqgglbbiexkx.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2004 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:288
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\4DAA27~1.EXE2⤵
- Deletes itself
PID:944
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD57a34c314dcb730e9d7b1fb74db78050f
SHA1af3ab8350547fba0a14bc2d6b8a315a2ec9d2986
SHA2564daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39
SHA512c08a4b74673a93841b328eb5aee31cf0ff1f786457a47cc5f00ea323ffd0b8e95be8e6ef0670c1ac5cc84b61ec7b48674a76b6b3fc865675893b5d513ffc8196
-
Filesize
383KB
MD57a34c314dcb730e9d7b1fb74db78050f
SHA1af3ab8350547fba0a14bc2d6b8a315a2ec9d2986
SHA2564daa27ed35b8f69d102fb1df910c9c30a890bb15e6fc8281ba8b348ed2a8ba39
SHA512c08a4b74673a93841b328eb5aee31cf0ff1f786457a47cc5f00ea323ffd0b8e95be8e6ef0670c1ac5cc84b61ec7b48674a76b6b3fc865675893b5d513ffc8196