Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 06:01
Static task
static1
Behavioral task
behavioral1
Sample
97c36534979c3e3841b555dfe36cd2ba94682eed86b0c8c6853d11c24d25d239.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
97c36534979c3e3841b555dfe36cd2ba94682eed86b0c8c6853d11c24d25d239.exe
Resource
win10v2004-20220901-en
General
-
Target
97c36534979c3e3841b555dfe36cd2ba94682eed86b0c8c6853d11c24d25d239.exe
-
Size
143KB
-
MD5
a7a7d120f72be53b6dd2c389823a39e9
-
SHA1
d9bd2171a4171a4f0efb4dc4ff02c099f1332bc8
-
SHA256
97c36534979c3e3841b555dfe36cd2ba94682eed86b0c8c6853d11c24d25d239
-
SHA512
4bdc79010e1c976d76ca39e7198a04b6c22779aa9044f872942d397adbab65b2ec2f7c59dbb5078ffc3e4b76d9b9b5931e47237a3d93a3fe75db6efdecd62908
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45DaY:pe9IB83ID5uY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 97c36534979c3e3841b555dfe36cd2ba94682eed86b0c8c6853d11c24d25d239.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\d4ce5c2c-8170-4dfc-9fcb-d4cc96fa619a.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221128012753.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 380 msedge.exe 380 msedge.exe 1280 identity_helper.exe 1280 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2012 97c36534979c3e3841b555dfe36cd2ba94682eed86b0c8c6853d11c24d25d239.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2012 97c36534979c3e3841b555dfe36cd2ba94682eed86b0c8c6853d11c24d25d239.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 4564 2012 97c36534979c3e3841b555dfe36cd2ba94682eed86b0c8c6853d11c24d25d239.exe 88 PID 2012 wrote to memory of 4564 2012 97c36534979c3e3841b555dfe36cd2ba94682eed86b0c8c6853d11c24d25d239.exe 88 PID 2012 wrote to memory of 4564 2012 97c36534979c3e3841b555dfe36cd2ba94682eed86b0c8c6853d11c24d25d239.exe 88 PID 4564 wrote to memory of 380 4564 cmd.exe 90 PID 4564 wrote to memory of 380 4564 cmd.exe 90 PID 380 wrote to memory of 4612 380 msedge.exe 92 PID 380 wrote to memory of 4612 380 msedge.exe 92 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 2780 380 msedge.exe 94 PID 380 wrote to memory of 4152 380 msedge.exe 95 PID 380 wrote to memory of 4152 380 msedge.exe 95 PID 380 wrote to memory of 1476 380 msedge.exe 96 PID 380 wrote to memory of 1476 380 msedge.exe 96 PID 380 wrote to memory of 1476 380 msedge.exe 96 PID 380 wrote to memory of 1476 380 msedge.exe 96 PID 380 wrote to memory of 1476 380 msedge.exe 96 PID 380 wrote to memory of 1476 380 msedge.exe 96 PID 380 wrote to memory of 1476 380 msedge.exe 96 PID 380 wrote to memory of 1476 380 msedge.exe 96 PID 380 wrote to memory of 1476 380 msedge.exe 96 PID 380 wrote to memory of 1476 380 msedge.exe 96 PID 380 wrote to memory of 1476 380 msedge.exe 96 PID 380 wrote to memory of 1476 380 msedge.exe 96 PID 380 wrote to memory of 1476 380 msedge.exe 96 PID 380 wrote to memory of 1476 380 msedge.exe 96 PID 380 wrote to memory of 1476 380 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\97c36534979c3e3841b555dfe36cd2ba94682eed86b0c8c6853d11c24d25d239.exe"C:\Users\Admin\AppData\Local\Temp\97c36534979c3e3841b555dfe36cd2ba94682eed86b0c8c6853d11c24d25d239.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5301121^&rsn=plde^&details=^|v6.2.9200x64sp0.0ws^|tt31^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://securedfileinfo.com/404.jsp?chid=5301121&rsn=plde&details=|v6.2.9200x64sp0.0ws|tt31|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xd8,0x110,0x7ffa073c46f8,0x7ffa073c4708,0x7ffa073c47184⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,216279754226380065,16283074381440763553,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:24⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,216279754226380065,16283074381440763553,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,216279754226380065,16283074381440763553,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:84⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,216279754226380065,16283074381440763553,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:14⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,216279754226380065,16283074381440763553,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:14⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,216279754226380065,16283074381440763553,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4712 /prefetch:84⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,216279754226380065,16283074381440763553,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:14⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,216279754226380065,16283074381440763553,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5784 /prefetch:84⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,216279754226380065,16283074381440763553,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:14⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,216279754226380065,16283074381440763553,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:14⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,216279754226380065,16283074381440763553,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6348 /prefetch:84⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:5072 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0x7ff604195460,0x7ff604195470,0x7ff6041954805⤵PID:4564
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,216279754226380065,16283074381440763553,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6348 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,216279754226380065,16283074381440763553,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3916 /prefetch:84⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,216279754226380065,16283074381440763553,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5420 /prefetch:84⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,216279754226380065,16283074381440763553,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1044 /prefetch:84⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2136,216279754226380065,16283074381440763553,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1880 /prefetch:84⤵PID:2156
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5f2080851a6780703a0f3764645202ce1
SHA16e16ec7fe0404b0fe43ebd271ca47ffba9fc9588
SHA256d3969401d4fc819669b9ce997251cc41d4883a31c4f43271b088944fadce3a83
SHA51250e5661d1b5c66073c34d164b49733d7c1c1d7b2782611596646b60dae81321c5c92f9e64dce980cea8306b29db6136e582dcc07f1a951580c1f9f4d69643121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD59f6cc8d3fe9092a6d3901e873a87fd87
SHA12e0aac117a4cc57596efb3d6f6624c269f94b031
SHA256e73982e62b92abac3d15b161f4525448cc2bc8b9bacefdcbfc6f87b74ec372e4
SHA5129736a099967d7ad595439768e45c633ff7d34de92f7cb0c19cd3d4590c4a6dd4fedfcd1b5617c81652e61f4ffe919057507f622f4c6d8d626cfc40234ad2c757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD51a2473990b0d2307d7082a97f34ae3e7
SHA1e31562d7b6f3e094693a040432b90f8fc5806a8e
SHA25671f00fe3f237b439c0f4fd9ce330c6d35a66c78d8d14ae4cb2c215175f90102e
SHA5125317392755094e69a9117bc9f632efc9657e21ad06c7c68f075ad15b9ebe4b17acc75b1f1403e162bad26fd6391b05a5edae24f37debc7a137e2feb9e5fd0760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD5c4b54b335a3818cba67ed8a62145190a
SHA1df93ca2e39c763223253c30c86b7aaaabb0c6ecf
SHA2560e86cd77b28f356dc7786f9111f77b5156fb97cd32e3731e7a854b08d22f15e3
SHA512d56434fcf2cf565290b9e4b92f9959bde7963460b135bbeb7d302514151e17cdefe105d697caf85ff38330b398e37c7a159c6e498d39bb6390bd4696e7d7c82b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD584d6e68e9e8c783be504f4e858d45017
SHA10a09e18b02b84f7a900d01c6f620015968ad0bf1
SHA2564905e0d8e0229d3f272a7e7daff01a05cf6b193dd336e4feccb0fdb33e3e2009
SHA512444895f9b976e28ab6ad23ccda307d572e1b16740bacf17b94404507142529b84129a58b8fe24b2b8579be431914552d15759ca35ce320f6a657750fb6c1f371