Analysis
-
max time kernel
137s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe
Resource
win10v2004-20220901-en
General
-
Target
9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe
-
Size
1.7MB
-
MD5
49e4da6c8df0140e55d868e3589449da
-
SHA1
36b887189105f1975fe5d03a906f6bd6eba19e43
-
SHA256
9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9
-
SHA512
942598433b78f54a7fac5ec351389ab5b2f68c557175febdaa7552a9f9e66014223fc587faba1e80a75e8976db5948897907016506e3f4b027d36bc69bca3f8c
-
SSDEEP
24576:ja/pczg/t9cxnrAwNwHwLgJFExKRJe2hSlY9f1Q5ch:OpaKAnrAwNwHwLgJlHhSlYt1Q5+
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 4 IoCs
pid Process 692 svchost.exe 4108 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe 4340 svchost.exe 1316 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MIA062~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdb.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstat.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe svchost.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MI391D~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~3.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~2.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jinfo.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe File opened for modification C:\Windows\svchost.com 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1316 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe 1316 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe 1316 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe 1316 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4596 wrote to memory of 692 4596 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe 82 PID 4596 wrote to memory of 692 4596 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe 82 PID 4596 wrote to memory of 692 4596 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe 82 PID 692 wrote to memory of 4108 692 svchost.exe 83 PID 692 wrote to memory of 4108 692 svchost.exe 83 PID 692 wrote to memory of 4108 692 svchost.exe 83 PID 4108 wrote to memory of 1316 4108 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe 85 PID 4108 wrote to memory of 1316 4108 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe 85 PID 4108 wrote to memory of 1316 4108 9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe"C:\Users\Admin\AppData\Local\Temp\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe"C:\Users\Admin\AppData\Local\Temp\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe"3⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1316
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe
Filesize1.6MB
MD542ec148a2a78724c2c32a1f0813e86a7
SHA1a9a92d9dd40f8197b42213cf774ab6f860000d82
SHA256bd38206d7d1acfac3573c45dbdb54de2f92d31334cf7cbe57a4509564834c41b
SHA5123b6840b363330ac1202271bf8dd93b8e3216fe89de739553916a49d3c01142af1993cf3b84026d2ed0e24bb60b7bde73d5d01c207331f5dee0e2d858874c56d1
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe
Filesize1.6MB
MD542ec148a2a78724c2c32a1f0813e86a7
SHA1a9a92d9dd40f8197b42213cf774ab6f860000d82
SHA256bd38206d7d1acfac3573c45dbdb54de2f92d31334cf7cbe57a4509564834c41b
SHA5123b6840b363330ac1202271bf8dd93b8e3216fe89de739553916a49d3c01142af1993cf3b84026d2ed0e24bb60b7bde73d5d01c207331f5dee0e2d858874c56d1
-
C:\Users\Admin\AppData\Local\Temp\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe
Filesize1.6MB
MD56228ee0b8cc1b64f0e1bd2e3b63c2ba0
SHA17b7f84527f15c093f04614e250dc680f0a17af6b
SHA256215cbd8fe5f42c1a4655072f9ca17c875500f77d9c473cf8b08dc6cae388d1f2
SHA512e9568be47dea58d9b3f48410df4e32d687bea076ec7b19fb79f4a3653b527a29718a3b4a43f975c89075b76e946a8fab68162a6b98d5f3df7d3d2a5b70bdda96
-
C:\Users\Admin\AppData\Local\Temp\9cbbb72f2c96701ef8ae93f0cf540e97a14b96ea6fcbdb6c13f0eacc3a1f39a9.exe
Filesize1.6MB
MD56228ee0b8cc1b64f0e1bd2e3b63c2ba0
SHA17b7f84527f15c093f04614e250dc680f0a17af6b
SHA256215cbd8fe5f42c1a4655072f9ca17c875500f77d9c473cf8b08dc6cae388d1f2
SHA512e9568be47dea58d9b3f48410df4e32d687bea076ec7b19fb79f4a3653b527a29718a3b4a43f975c89075b76e946a8fab68162a6b98d5f3df7d3d2a5b70bdda96
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b