Analysis
-
max time kernel
160s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1d527945cc5cd79bb3edff54a124e0e0.dll
Resource
win7-20230831-en
General
-
Target
NEAS.1d527945cc5cd79bb3edff54a124e0e0.dll
-
Size
120KB
-
MD5
1d527945cc5cd79bb3edff54a124e0e0
-
SHA1
6205308da437e416e4968741f1cbfe012767388a
-
SHA256
318259afcc8f6d0c1406b29658365fc098e4cb04d2a8035b343f717dcd262abd
-
SHA512
3219be707c820520649714eb1a1c2b28989560def9bdfebeb871b1f2e8add10fb3f7379174737c515193f294c9dbda53f9f6745cfc4486318ce77285a5e6ecd6
-
SSDEEP
3072:nh7S+PTH6c4l6+gPGdHQGoU37LSoVjqjw1:Fbb2l6hqhtwk
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e58369b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e58369b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e58369b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e58369b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e58369b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e58369b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e58369b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e58369b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e58369b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e58369b.exe -
Executes dropped EXE 3 IoCs
pid Process 3316 e58369b.exe 440 e584ab0.exe 4228 e584f15.exe -
resource yara_rule behavioral2/memory/3316-7-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-9-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-10-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-11-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-12-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-18-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-25-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-26-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-27-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-28-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-29-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-30-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-31-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-39-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-40-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-51-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-52-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-53-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-55-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-66-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-68-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-70-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-73-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-75-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-77-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/3316-85-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/4228-115-0x0000000000B40000-0x0000000001BFA000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e58369b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e58369b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e58369b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e58369b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e58369b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e58369b.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e58369b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e58369b.exe -
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: e58369b.exe File opened (read-only) \??\I: e58369b.exe File opened (read-only) \??\K: e58369b.exe File opened (read-only) \??\L: e58369b.exe File opened (read-only) \??\M: e58369b.exe File opened (read-only) \??\N: e58369b.exe File opened (read-only) \??\E: e58369b.exe File opened (read-only) \??\G: e58369b.exe File opened (read-only) \??\H: e58369b.exe File opened (read-only) \??\J: e58369b.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\e583ac2 e58369b.exe File opened for modification C:\Windows\SYSTEM.INI e58369b.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3316 e58369b.exe 3316 e58369b.exe 3316 e58369b.exe 3316 e58369b.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe Token: SeDebugPrivilege 3316 e58369b.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1572 wrote to memory of 3236 1572 rundll32.exe 85 PID 1572 wrote to memory of 3236 1572 rundll32.exe 85 PID 1572 wrote to memory of 3236 1572 rundll32.exe 85 PID 3236 wrote to memory of 3316 3236 rundll32.exe 90 PID 3236 wrote to memory of 3316 3236 rundll32.exe 90 PID 3236 wrote to memory of 3316 3236 rundll32.exe 90 PID 3316 wrote to memory of 800 3316 e58369b.exe 3 PID 3316 wrote to memory of 808 3316 e58369b.exe 77 PID 3316 wrote to memory of 316 3316 e58369b.exe 4 PID 3316 wrote to memory of 2400 3316 e58369b.exe 19 PID 3316 wrote to memory of 2476 3316 e58369b.exe 21 PID 3316 wrote to memory of 2580 3316 e58369b.exe 25 PID 3316 wrote to memory of 1916 3316 e58369b.exe 60 PID 3316 wrote to memory of 3288 3316 e58369b.exe 59 PID 3316 wrote to memory of 3488 3316 e58369b.exe 58 PID 3316 wrote to memory of 3676 3316 e58369b.exe 32 PID 3316 wrote to memory of 3796 3316 e58369b.exe 31 PID 3316 wrote to memory of 3896 3316 e58369b.exe 57 PID 3316 wrote to memory of 4092 3316 e58369b.exe 56 PID 3316 wrote to memory of 4744 3316 e58369b.exe 54 PID 3316 wrote to memory of 1748 3316 e58369b.exe 44 PID 3316 wrote to memory of 2340 3316 e58369b.exe 39 PID 3316 wrote to memory of 4464 3316 e58369b.exe 38 PID 3316 wrote to memory of 4140 3316 e58369b.exe 37 PID 3316 wrote to memory of 3684 3316 e58369b.exe PID 3316 wrote to memory of 1572 3316 e58369b.exe 84 PID 3316 wrote to memory of 3236 3316 e58369b.exe 85 PID 3316 wrote to memory of 3236 3316 e58369b.exe 85 PID 3236 wrote to memory of 440 3236 rundll32.exe 91 PID 3236 wrote to memory of 440 3236 rundll32.exe 91 PID 3236 wrote to memory of 440 3236 rundll32.exe 91 PID 3236 wrote to memory of 4228 3236 rundll32.exe 92 PID 3236 wrote to memory of 4228 3236 rundll32.exe 92 PID 3236 wrote to memory of 4228 3236 rundll32.exe 92 PID 3316 wrote to memory of 800 3316 e58369b.exe 3 PID 3316 wrote to memory of 808 3316 e58369b.exe 77 PID 3316 wrote to memory of 316 3316 e58369b.exe 4 PID 3316 wrote to memory of 2400 3316 e58369b.exe 19 PID 3316 wrote to memory of 2476 3316 e58369b.exe 21 PID 3316 wrote to memory of 2580 3316 e58369b.exe 25 PID 3316 wrote to memory of 1916 3316 e58369b.exe 60 PID 3316 wrote to memory of 3288 3316 e58369b.exe 59 PID 3316 wrote to memory of 3488 3316 e58369b.exe 58 PID 3316 wrote to memory of 3676 3316 e58369b.exe 32 PID 3316 wrote to memory of 3796 3316 e58369b.exe 31 PID 3316 wrote to memory of 3896 3316 e58369b.exe 57 PID 3316 wrote to memory of 4092 3316 e58369b.exe 56 PID 3316 wrote to memory of 4744 3316 e58369b.exe 54 PID 3316 wrote to memory of 1748 3316 e58369b.exe 44 PID 3316 wrote to memory of 2340 3316 e58369b.exe 39 PID 3316 wrote to memory of 4464 3316 e58369b.exe 38 PID 3316 wrote to memory of 3684 3316 e58369b.exe PID 3316 wrote to memory of 440 3316 e58369b.exe 91 PID 3316 wrote to memory of 440 3316 e58369b.exe 91 PID 3316 wrote to memory of 4228 3316 e58369b.exe 92 PID 3316 wrote to memory of 4228 3316 e58369b.exe 92 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e58369b.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:800
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:316
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2476
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2580
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3796
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3676
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4140
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4464
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:2340
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:1748
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4744
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4092
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3896
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3288
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1916
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.1d527945cc5cd79bb3edff54a124e0e0.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.1d527945cc5cd79bb3edff54a124e0e0.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\e58369b.exeC:\Users\Admin\AppData\Local\Temp\e58369b.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3316
-
-
C:\Users\Admin\AppData\Local\Temp\e584ab0.exeC:\Users\Admin\AppData\Local\Temp\e584ab0.exe4⤵
- Executes dropped EXE
PID:440
-
-
C:\Users\Admin\AppData\Local\Temp\e584f15.exeC:\Users\Admin\AppData\Local\Temp\e584f15.exe4⤵
- Executes dropped EXE
PID:4228
-
-
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:808
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD54f4bd7819f506fc8d5e8822131834dc5
SHA10856f210489eb80137e0df1dfc5d673fad9694f0
SHA256e493e920b9f6fd4599deb745844cf21d84f4137a5f9512153c73c98077a0d9fa
SHA512bf7069288c9571590ae50b8db12929269f8cd844f61a4fab324da81bb4296c61111a66e889e72c06e83b20c3124d853150b747770a7c25e36461b4487a0e2896
-
Filesize
97KB
MD54f4bd7819f506fc8d5e8822131834dc5
SHA10856f210489eb80137e0df1dfc5d673fad9694f0
SHA256e493e920b9f6fd4599deb745844cf21d84f4137a5f9512153c73c98077a0d9fa
SHA512bf7069288c9571590ae50b8db12929269f8cd844f61a4fab324da81bb4296c61111a66e889e72c06e83b20c3124d853150b747770a7c25e36461b4487a0e2896
-
Filesize
97KB
MD54f4bd7819f506fc8d5e8822131834dc5
SHA10856f210489eb80137e0df1dfc5d673fad9694f0
SHA256e493e920b9f6fd4599deb745844cf21d84f4137a5f9512153c73c98077a0d9fa
SHA512bf7069288c9571590ae50b8db12929269f8cd844f61a4fab324da81bb4296c61111a66e889e72c06e83b20c3124d853150b747770a7c25e36461b4487a0e2896
-
Filesize
97KB
MD54f4bd7819f506fc8d5e8822131834dc5
SHA10856f210489eb80137e0df1dfc5d673fad9694f0
SHA256e493e920b9f6fd4599deb745844cf21d84f4137a5f9512153c73c98077a0d9fa
SHA512bf7069288c9571590ae50b8db12929269f8cd844f61a4fab324da81bb4296c61111a66e889e72c06e83b20c3124d853150b747770a7c25e36461b4487a0e2896
-
Filesize
97KB
MD54f4bd7819f506fc8d5e8822131834dc5
SHA10856f210489eb80137e0df1dfc5d673fad9694f0
SHA256e493e920b9f6fd4599deb745844cf21d84f4137a5f9512153c73c98077a0d9fa
SHA512bf7069288c9571590ae50b8db12929269f8cd844f61a4fab324da81bb4296c61111a66e889e72c06e83b20c3124d853150b747770a7c25e36461b4487a0e2896
-
Filesize
97KB
MD54f4bd7819f506fc8d5e8822131834dc5
SHA10856f210489eb80137e0df1dfc5d673fad9694f0
SHA256e493e920b9f6fd4599deb745844cf21d84f4137a5f9512153c73c98077a0d9fa
SHA512bf7069288c9571590ae50b8db12929269f8cd844f61a4fab324da81bb4296c61111a66e889e72c06e83b20c3124d853150b747770a7c25e36461b4487a0e2896
-
Filesize
97KB
MD54f4bd7819f506fc8d5e8822131834dc5
SHA10856f210489eb80137e0df1dfc5d673fad9694f0
SHA256e493e920b9f6fd4599deb745844cf21d84f4137a5f9512153c73c98077a0d9fa
SHA512bf7069288c9571590ae50b8db12929269f8cd844f61a4fab324da81bb4296c61111a66e889e72c06e83b20c3124d853150b747770a7c25e36461b4487a0e2896