Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe
Resource
win10v2004-20220812-en
General
-
Target
cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe
-
Size
198KB
-
MD5
18e545f212778610e8677aef46d6ad16
-
SHA1
6eb4d05f25e7f14974765c1a1ee8deacca064d94
-
SHA256
cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19
-
SHA512
59d99d1f22ff2379a43a2784f265f0741b4bd88bc1343a0fddda3a13a2825a22b163a22e4a88bc6a93349458e4aec3c96166debec2523ad2177873ecf8ec25aa
-
SSDEEP
3072:obpDCw1p3vmLvsZIaVwiwDcIbDHDCm/DER4eQF+9gqi:gDCwfG1bnxLERRy/
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" hosts.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" avscan.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avscan.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hosts.exe -
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\TMKNGOMU = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\TMKNGOMU = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\TMKNGOMU = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe -
Executes dropped EXE 6 IoCs
pid Process 5056 avscan.exe 5000 avscan.exe 2256 hosts.exe 2484 hosts.exe 1320 avscan.exe 4048 hosts.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run hosts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" hosts.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run avscan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" avscan.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\windows\W_X_C.vbs cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe File created \??\c:\windows\W_X_C.bat cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe File opened for modification C:\Windows\hosts.exe cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe File opened for modification C:\Windows\hosts.exe avscan.exe File opened for modification C:\Windows\hosts.exe hosts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cmd.exe -
Modifies registry key 1 TTPs 9 IoCs
pid Process 3340 REG.exe 4960 REG.exe 588 REG.exe 3504 REG.exe 4088 REG.exe 2120 REG.exe 2244 REG.exe 4468 REG.exe 5076 REG.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5056 avscan.exe 2256 hosts.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 636 cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe 5056 avscan.exe 5000 avscan.exe 2256 hosts.exe 2484 hosts.exe 1320 avscan.exe 4048 hosts.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 636 wrote to memory of 2120 636 cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe 80 PID 636 wrote to memory of 2120 636 cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe 80 PID 636 wrote to memory of 2120 636 cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe 80 PID 636 wrote to memory of 5056 636 cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe 82 PID 636 wrote to memory of 5056 636 cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe 82 PID 636 wrote to memory of 5056 636 cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe 82 PID 5056 wrote to memory of 5000 5056 avscan.exe 83 PID 5056 wrote to memory of 5000 5056 avscan.exe 83 PID 5056 wrote to memory of 5000 5056 avscan.exe 83 PID 5056 wrote to memory of 2088 5056 avscan.exe 84 PID 5056 wrote to memory of 2088 5056 avscan.exe 84 PID 5056 wrote to memory of 2088 5056 avscan.exe 84 PID 636 wrote to memory of 2676 636 cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe 85 PID 636 wrote to memory of 2676 636 cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe 85 PID 636 wrote to memory of 2676 636 cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe 85 PID 2088 wrote to memory of 2256 2088 cmd.exe 89 PID 2088 wrote to memory of 2256 2088 cmd.exe 89 PID 2088 wrote to memory of 2256 2088 cmd.exe 89 PID 2676 wrote to memory of 2484 2676 cmd.exe 88 PID 2676 wrote to memory of 2484 2676 cmd.exe 88 PID 2676 wrote to memory of 2484 2676 cmd.exe 88 PID 2256 wrote to memory of 1320 2256 hosts.exe 90 PID 2256 wrote to memory of 1320 2256 hosts.exe 90 PID 2256 wrote to memory of 1320 2256 hosts.exe 90 PID 2256 wrote to memory of 3436 2256 hosts.exe 92 PID 2256 wrote to memory of 3436 2256 hosts.exe 92 PID 2256 wrote to memory of 3436 2256 hosts.exe 92 PID 3436 wrote to memory of 4048 3436 cmd.exe 94 PID 3436 wrote to memory of 4048 3436 cmd.exe 94 PID 3436 wrote to memory of 4048 3436 cmd.exe 94 PID 2088 wrote to memory of 4584 2088 cmd.exe 95 PID 2088 wrote to memory of 4584 2088 cmd.exe 95 PID 2088 wrote to memory of 4584 2088 cmd.exe 95 PID 2676 wrote to memory of 488 2676 cmd.exe 96 PID 2676 wrote to memory of 488 2676 cmd.exe 96 PID 2676 wrote to memory of 488 2676 cmd.exe 96 PID 3436 wrote to memory of 1520 3436 cmd.exe 97 PID 3436 wrote to memory of 1520 3436 cmd.exe 97 PID 3436 wrote to memory of 1520 3436 cmd.exe 97 PID 5056 wrote to memory of 3340 5056 avscan.exe 99 PID 5056 wrote to memory of 3340 5056 avscan.exe 99 PID 5056 wrote to memory of 3340 5056 avscan.exe 99 PID 2256 wrote to memory of 5076 2256 hosts.exe 101 PID 2256 wrote to memory of 5076 2256 hosts.exe 101 PID 2256 wrote to memory of 5076 2256 hosts.exe 101 PID 5056 wrote to memory of 4960 5056 avscan.exe 103 PID 5056 wrote to memory of 4960 5056 avscan.exe 103 PID 5056 wrote to memory of 4960 5056 avscan.exe 103 PID 2256 wrote to memory of 588 2256 hosts.exe 105 PID 2256 wrote to memory of 588 2256 hosts.exe 105 PID 2256 wrote to memory of 588 2256 hosts.exe 105 PID 5056 wrote to memory of 2244 5056 avscan.exe 107 PID 5056 wrote to memory of 2244 5056 avscan.exe 107 PID 5056 wrote to memory of 2244 5056 avscan.exe 107 PID 2256 wrote to memory of 4468 2256 hosts.exe 109 PID 2256 wrote to memory of 4468 2256 hosts.exe 109 PID 2256 wrote to memory of 4468 2256 hosts.exe 109 PID 5056 wrote to memory of 3504 5056 avscan.exe 117 PID 5056 wrote to memory of 3504 5056 avscan.exe 117 PID 5056 wrote to memory of 3504 5056 avscan.exe 117 PID 2256 wrote to memory of 4088 2256 hosts.exe 119 PID 2256 wrote to memory of 4088 2256 hosts.exe 119 PID 2256 wrote to memory of 4088 2256 hosts.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe"C:\Users\Admin\AppData\Local\Temp\cf1781aea79426ccb9a8c62cded32bfe90be988059ee0822ff92389ff84e4c19.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f2⤵
- Modifies registry key
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\windows\hosts.exeC:\windows\hosts.exe4⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1320
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat5⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\windows\hosts.exeC:\windows\hosts.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4048
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"6⤵
- Adds policy Run key to start application
PID:1520
-
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:5076
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:588
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:4468
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:4088
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"4⤵
- Adds policy Run key to start application
PID:4584
-
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:3340
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:4960
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:2244
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:3504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\windows\hosts.exeC:\windows\hosts.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2484
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"3⤵
- Adds policy Run key to start application
PID:488
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4344
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5ff40ee15f9b1d5975b3abb1610c7841a
SHA1d11f7196ff43cb9c63688068502e94515c270c0b
SHA2561d9627859c885f5827383ffb0a9ab0c15418565b36483e7db946960779737d9d
SHA51276e40225bfe8c474778fd54cf2a59fbb63eaceb84957bf4e35e9a6d191d47ab19a1f85cf1c25cf7a17646f31af69b2533a38a5ab0b8b17d0ca56126e5a42b633
-
Filesize
198KB
MD5ff40ee15f9b1d5975b3abb1610c7841a
SHA1d11f7196ff43cb9c63688068502e94515c270c0b
SHA2561d9627859c885f5827383ffb0a9ab0c15418565b36483e7db946960779737d9d
SHA51276e40225bfe8c474778fd54cf2a59fbb63eaceb84957bf4e35e9a6d191d47ab19a1f85cf1c25cf7a17646f31af69b2533a38a5ab0b8b17d0ca56126e5a42b633
-
Filesize
198KB
MD5ff40ee15f9b1d5975b3abb1610c7841a
SHA1d11f7196ff43cb9c63688068502e94515c270c0b
SHA2561d9627859c885f5827383ffb0a9ab0c15418565b36483e7db946960779737d9d
SHA51276e40225bfe8c474778fd54cf2a59fbb63eaceb84957bf4e35e9a6d191d47ab19a1f85cf1c25cf7a17646f31af69b2533a38a5ab0b8b17d0ca56126e5a42b633
-
Filesize
198KB
MD5ff40ee15f9b1d5975b3abb1610c7841a
SHA1d11f7196ff43cb9c63688068502e94515c270c0b
SHA2561d9627859c885f5827383ffb0a9ab0c15418565b36483e7db946960779737d9d
SHA51276e40225bfe8c474778fd54cf2a59fbb63eaceb84957bf4e35e9a6d191d47ab19a1f85cf1c25cf7a17646f31af69b2533a38a5ab0b8b17d0ca56126e5a42b633
-
Filesize
195B
MD5c35f93e634b81f2cb003c72a1fb9d1f2
SHA19b6c533eebab7958e9e167ab93a412d5411c7a89
SHA2566afae199db9be5b7c4c5dac778ec8c45051666d11f93dd93c1700beb20e1136f
SHA5125cc512763da54bc66ffff42e02dc28ad9cda03e46a8b9181425c619815fb7c7afe3a71fc73742e151e26de7a21ade101e59d6853fe70b7d99ea93195325c010d
-
Filesize
198KB
MD59f5c67461d74033b440c3632193509aa
SHA12d41c8f2e83b9b4021b30010878823d3408c09ff
SHA25672304f002a7931007b40baa9cc3a9da2b6d14f4e3bc1cb248fa0a44cc1477ea1
SHA512d508e71dd5fed4e476bad8c8369036aefecd3161cf70ab7941f364bb4fd442e4374c26b642ab5685debca15a2161f2929e92511796564bf1f5c69aafc9149718
-
Filesize
198KB
MD59f5c67461d74033b440c3632193509aa
SHA12d41c8f2e83b9b4021b30010878823d3408c09ff
SHA25672304f002a7931007b40baa9cc3a9da2b6d14f4e3bc1cb248fa0a44cc1477ea1
SHA512d508e71dd5fed4e476bad8c8369036aefecd3161cf70ab7941f364bb4fd442e4374c26b642ab5685debca15a2161f2929e92511796564bf1f5c69aafc9149718
-
Filesize
198KB
MD59f5c67461d74033b440c3632193509aa
SHA12d41c8f2e83b9b4021b30010878823d3408c09ff
SHA25672304f002a7931007b40baa9cc3a9da2b6d14f4e3bc1cb248fa0a44cc1477ea1
SHA512d508e71dd5fed4e476bad8c8369036aefecd3161cf70ab7941f364bb4fd442e4374c26b642ab5685debca15a2161f2929e92511796564bf1f5c69aafc9149718
-
Filesize
198KB
MD59f5c67461d74033b440c3632193509aa
SHA12d41c8f2e83b9b4021b30010878823d3408c09ff
SHA25672304f002a7931007b40baa9cc3a9da2b6d14f4e3bc1cb248fa0a44cc1477ea1
SHA512d508e71dd5fed4e476bad8c8369036aefecd3161cf70ab7941f364bb4fd442e4374c26b642ab5685debca15a2161f2929e92511796564bf1f5c69aafc9149718
-
Filesize
198KB
MD59f5c67461d74033b440c3632193509aa
SHA12d41c8f2e83b9b4021b30010878823d3408c09ff
SHA25672304f002a7931007b40baa9cc3a9da2b6d14f4e3bc1cb248fa0a44cc1477ea1
SHA512d508e71dd5fed4e476bad8c8369036aefecd3161cf70ab7941f364bb4fd442e4374c26b642ab5685debca15a2161f2929e92511796564bf1f5c69aafc9149718
-
Filesize
336B
MD54db9f8b6175722b62ececeeeba1ce307
SHA13b3ba8414706e72a6fa19e884a97b87609e11e47
SHA256d2150b9e5a4ce55e140f0ca91c4e300715d42095c8fddf58c77037cdd2cfaf78
SHA5121d6dc274cf7a3dd704f840e6a5ad57ab4c4e35d5f09489aeff520bb797e1c825bac53fc335156fe41e767a46520d031855fe42fe7b175409ebe5e9e986fb9b8b