Analysis
-
max time kernel
125s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:59
Static task
static1
Behavioral task
behavioral1
Sample
1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe
Resource
win10v2004-20220901-en
General
-
Target
1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe
-
Size
446KB
-
MD5
64ff0af94b9f3e894b169534f24aa78b
-
SHA1
7f34b44e545d32e684570a7d2ff8e422d1d2d956
-
SHA256
1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70
-
SHA512
6eb8ee3a42b898704eb8990c8397884f3209bc3fdf3a600c24dda2ed063f848edde1e7c837ed79ff4d17451487b9e046b3d7dbd865380f1eac7e917985480695
-
SSDEEP
12288:N6lppKsBraiAGxJkdj3Zqa3m6IpI99wMz1HQs:N6E8rlFxJkp3Z7tIu99xdQs
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 3984 installd.exe 1988 nethtsrv.exe 2916 netupdsrv.exe 1828 nethtsrv.exe 4328 netupdsrv.exe -
Loads dropped DLL 14 IoCs
Processes:
1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exeinstalld.exenethtsrv.exenethtsrv.exepid process 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe 3984 installd.exe 1988 nethtsrv.exe 1988 nethtsrv.exe 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe 1828 nethtsrv.exe 1828 nethtsrv.exe 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exedescription ioc process File created C:\Windows\SysWOW64\netupdsrv.exe 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe File created C:\Windows\SysWOW64\hfnapi.dll 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe File created C:\Windows\SysWOW64\hfpapi.dll 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe File created C:\Windows\SysWOW64\installd.exe 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe File created C:\Windows\SysWOW64\nethtsrv.exe 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe -
Drops file in Program Files directory 3 IoCs
Processes:
1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\ver.xml 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe File created C:\Program Files (x86)\Common Files\Config\data.xml 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
Processes:
nethtsrv.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 672 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 1828 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exenet.exenet.exenet.exenet.exedescription pid process target process PID 2532 wrote to memory of 2436 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe net.exe PID 2532 wrote to memory of 2436 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe net.exe PID 2532 wrote to memory of 2436 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe net.exe PID 2436 wrote to memory of 496 2436 net.exe net1.exe PID 2436 wrote to memory of 496 2436 net.exe net1.exe PID 2436 wrote to memory of 496 2436 net.exe net1.exe PID 2532 wrote to memory of 3392 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe net.exe PID 2532 wrote to memory of 3392 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe net.exe PID 2532 wrote to memory of 3392 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe net.exe PID 3392 wrote to memory of 1404 3392 net.exe net1.exe PID 3392 wrote to memory of 1404 3392 net.exe net1.exe PID 3392 wrote to memory of 1404 3392 net.exe net1.exe PID 2532 wrote to memory of 3984 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe installd.exe PID 2532 wrote to memory of 3984 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe installd.exe PID 2532 wrote to memory of 3984 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe installd.exe PID 2532 wrote to memory of 1988 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe nethtsrv.exe PID 2532 wrote to memory of 1988 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe nethtsrv.exe PID 2532 wrote to memory of 1988 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe nethtsrv.exe PID 2532 wrote to memory of 2916 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe netupdsrv.exe PID 2532 wrote to memory of 2916 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe netupdsrv.exe PID 2532 wrote to memory of 2916 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe netupdsrv.exe PID 2532 wrote to memory of 3160 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe net.exe PID 2532 wrote to memory of 3160 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe net.exe PID 2532 wrote to memory of 3160 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe net.exe PID 3160 wrote to memory of 1112 3160 net.exe net1.exe PID 3160 wrote to memory of 1112 3160 net.exe net1.exe PID 3160 wrote to memory of 1112 3160 net.exe net1.exe PID 2532 wrote to memory of 3908 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe net.exe PID 2532 wrote to memory of 3908 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe net.exe PID 2532 wrote to memory of 3908 2532 1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe net.exe PID 3908 wrote to memory of 732 3908 net.exe net1.exe PID 3908 wrote to memory of 732 3908 net.exe net1.exe PID 3908 wrote to memory of 732 3908 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe"C:\Users\Admin\AppData\Local\Temp\1d9670e37d2143efdd9881a5d13d2a6587cd16a0171ad4e4db68560d72745b70.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:496
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1404
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3984 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1112
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:732
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:4328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD578610c4b1ba9d473d7a506cb1585be98
SHA12eb8bd5be145e298248d86240a5574040b9bcb18
SHA2560da84e7dcb67eef78d3fcd4dfa6b0962ce96b1abe50ee035605d8746646912e6
SHA5124ca61568eef5551256a209f57f9e4c60858cdda651b882d899067772cfe4626d978be507556cf64859cb698c84651dfa21714933172265dca9486bb99c1da880
-
Filesize
106KB
MD578610c4b1ba9d473d7a506cb1585be98
SHA12eb8bd5be145e298248d86240a5574040b9bcb18
SHA2560da84e7dcb67eef78d3fcd4dfa6b0962ce96b1abe50ee035605d8746646912e6
SHA5124ca61568eef5551256a209f57f9e4c60858cdda651b882d899067772cfe4626d978be507556cf64859cb698c84651dfa21714933172265dca9486bb99c1da880
-
Filesize
106KB
MD578610c4b1ba9d473d7a506cb1585be98
SHA12eb8bd5be145e298248d86240a5574040b9bcb18
SHA2560da84e7dcb67eef78d3fcd4dfa6b0962ce96b1abe50ee035605d8746646912e6
SHA5124ca61568eef5551256a209f57f9e4c60858cdda651b882d899067772cfe4626d978be507556cf64859cb698c84651dfa21714933172265dca9486bb99c1da880
-
Filesize
106KB
MD578610c4b1ba9d473d7a506cb1585be98
SHA12eb8bd5be145e298248d86240a5574040b9bcb18
SHA2560da84e7dcb67eef78d3fcd4dfa6b0962ce96b1abe50ee035605d8746646912e6
SHA5124ca61568eef5551256a209f57f9e4c60858cdda651b882d899067772cfe4626d978be507556cf64859cb698c84651dfa21714933172265dca9486bb99c1da880
-
Filesize
241KB
MD5d272b85cbfa56953f0fcf61280fae326
SHA1f64a9110d36a2e83c21cb3aaf72babf812e6162a
SHA256d8d6fb03c0fdee04e693ce9a31f0a6d17d5d17fee4003b94933da2bc0ab0de8b
SHA51229a51083319a972e8478460589fcaf279686b86ef0df0d2763734d7871baed03231ca67950761cd511178d4a987b8d429e6aa029566a19764c76c5a2258f41b3
-
Filesize
241KB
MD5d272b85cbfa56953f0fcf61280fae326
SHA1f64a9110d36a2e83c21cb3aaf72babf812e6162a
SHA256d8d6fb03c0fdee04e693ce9a31f0a6d17d5d17fee4003b94933da2bc0ab0de8b
SHA51229a51083319a972e8478460589fcaf279686b86ef0df0d2763734d7871baed03231ca67950761cd511178d4a987b8d429e6aa029566a19764c76c5a2258f41b3
-
Filesize
241KB
MD5d272b85cbfa56953f0fcf61280fae326
SHA1f64a9110d36a2e83c21cb3aaf72babf812e6162a
SHA256d8d6fb03c0fdee04e693ce9a31f0a6d17d5d17fee4003b94933da2bc0ab0de8b
SHA51229a51083319a972e8478460589fcaf279686b86ef0df0d2763734d7871baed03231ca67950761cd511178d4a987b8d429e6aa029566a19764c76c5a2258f41b3
-
Filesize
108KB
MD580a0d1816828b4a8d7ff5b641ed53e63
SHA1272915cfb94a2fd1993a58334841bb0d73685acf
SHA25656a9ec8cfff2743a2ca7f4a2e1048e2c66356dffd8472270e0c5d767f0f6be6c
SHA51226d6a38f426f363dfbe39abbf2ee875548c09f54de7ec2143d2e1785b40efd09dd2b0e247a8c1f0c729acfba26dd55bd990a856d37e78033470b30d1b9748973
-
Filesize
108KB
MD580a0d1816828b4a8d7ff5b641ed53e63
SHA1272915cfb94a2fd1993a58334841bb0d73685acf
SHA25656a9ec8cfff2743a2ca7f4a2e1048e2c66356dffd8472270e0c5d767f0f6be6c
SHA51226d6a38f426f363dfbe39abbf2ee875548c09f54de7ec2143d2e1785b40efd09dd2b0e247a8c1f0c729acfba26dd55bd990a856d37e78033470b30d1b9748973
-
Filesize
176KB
MD57ff40be643ba30707f90fdd99d24c009
SHA12a37325215ccac43da845156a1442a2581c62530
SHA2565ca5581d20eab2f9a3f6df5b2b8bd55a5d962c9b6db187704bd95fe838e7f648
SHA51202bd20132d25abc6e2d98b59ecccf25b32237fa0c624adc7bfc27ed7f22bdde0f80c68c2d7d8cdaa96eb2e1c96944ac46091bca3938ecece4bf5bff642b69fcb
-
Filesize
176KB
MD57ff40be643ba30707f90fdd99d24c009
SHA12a37325215ccac43da845156a1442a2581c62530
SHA2565ca5581d20eab2f9a3f6df5b2b8bd55a5d962c9b6db187704bd95fe838e7f648
SHA51202bd20132d25abc6e2d98b59ecccf25b32237fa0c624adc7bfc27ed7f22bdde0f80c68c2d7d8cdaa96eb2e1c96944ac46091bca3938ecece4bf5bff642b69fcb
-
Filesize
176KB
MD57ff40be643ba30707f90fdd99d24c009
SHA12a37325215ccac43da845156a1442a2581c62530
SHA2565ca5581d20eab2f9a3f6df5b2b8bd55a5d962c9b6db187704bd95fe838e7f648
SHA51202bd20132d25abc6e2d98b59ecccf25b32237fa0c624adc7bfc27ed7f22bdde0f80c68c2d7d8cdaa96eb2e1c96944ac46091bca3938ecece4bf5bff642b69fcb
-
Filesize
158KB
MD59c60c026f3035e68df3f0b9613433d41
SHA11fcd5ee14de1506c3b570a22ce7961bc4f2b2b64
SHA256b1434ab56d47359dde0365e78e2611562f9607d3d1fec35fb9f7dbf609dc8add
SHA5122760b87a0a21a7556d5a11a7bda142eb6ab445f397747b44319a19113a35d2666f3c2d6c6946fe06937bf43bdac855b19e51d622a687a4fe316d33dfabc4b99a
-
Filesize
158KB
MD59c60c026f3035e68df3f0b9613433d41
SHA11fcd5ee14de1506c3b570a22ce7961bc4f2b2b64
SHA256b1434ab56d47359dde0365e78e2611562f9607d3d1fec35fb9f7dbf609dc8add
SHA5122760b87a0a21a7556d5a11a7bda142eb6ab445f397747b44319a19113a35d2666f3c2d6c6946fe06937bf43bdac855b19e51d622a687a4fe316d33dfabc4b99a
-
Filesize
158KB
MD59c60c026f3035e68df3f0b9613433d41
SHA11fcd5ee14de1506c3b570a22ce7961bc4f2b2b64
SHA256b1434ab56d47359dde0365e78e2611562f9607d3d1fec35fb9f7dbf609dc8add
SHA5122760b87a0a21a7556d5a11a7bda142eb6ab445f397747b44319a19113a35d2666f3c2d6c6946fe06937bf43bdac855b19e51d622a687a4fe316d33dfabc4b99a