Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2022, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
CheatHack.exe
Resource
win10v2004-20220812-en
General
-
Target
CheatHack.exe
-
Size
3.2MB
-
MD5
0663c64e9f7f0709d8c41e12470078d9
-
SHA1
edcf414fd1e4ef3019138be0300c59c7fea63d11
-
SHA256
4b54315d1ba8c2ff782c0e2606ef2df30ee080162285b4db3831838eac617b35
-
SHA512
81f5f398c43847e14683858544758f16339acf96b70927c281cd65fe2aaf3057a4b7395f32fa05a977872dc2d942d4ee4de0f44882d1a0b28cc1cf22e96bdaf8
-
SSDEEP
49152:nG5UfgJF6rmQhlHWqyz6F3bkgHDmDkjBqTvw1BN1V3RsoihuafksZhvHi6lwhNii:nG5QgJRwlgzSbH2TTvw1bmuBUCYwbii
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
pid Process 5092 GenericSetup.exe 900 kodi-19.1-Matrix-x64.exe 4928 Hola-Setup-H2OUS-Installer-Agreed.exe 1820 Hola-Setup-H2OUS-Installer-Agreed.exe 4024 Hola-Setup-x64-1.202.120.exe 4472 net_updater64.exe 3728 net_updater64.exe -
resource yara_rule behavioral1/files/0x0007000000022f3a-158.dat upx behavioral1/memory/4024-159-0x00007FF6B8F20000-0x00007FF6BB70E000-memory.dmp upx behavioral1/files/0x0007000000022f3a-160.dat upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Hola-Setup-H2OUS-Installer-Agreed.exe -
Loads dropped DLL 3 IoCs
pid Process 5092 GenericSetup.exe 900 kodi-19.1-Matrix-x64.exe 900 kodi-19.1-Matrix-x64.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hola = "C:\\Program Files\\Hola\\app\\hola.exe --silent" Hola-Setup-x64-1.202.120.exe -
Checks for any installed AV software in registry 1 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast\Version GenericSetup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast GenericSetup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV\Dir GenericSetup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVG\AV\Dir GenericSetup.exe Key opened \REGISTRY\MACHINE\Software\Avast Software\Avast GenericSetup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast GenericSetup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV GenericSetup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVG\AV GenericSetup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast\Version GenericSetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 22 IoCs
description ioc Process File created C:\Program Files\Hola\app\net_updater64.exe.sdk Hola-Setup-x64-1.202.120.exe File created C:\Program Files\Hola\log\ui.log Hola-Setup-x64-1.202.120.exe File opened for modification C:\Program Files\Hola\app\lum_sdk64.dll.sdk Hola-Setup-x64-1.202.120.exe File opened for modification C:\Program Files\Hola\app\net_updater64.exe.sdk Hola-Setup-x64-1.202.120.exe File created C:\Program Files\Hola\app\hola_split_tunnel.sys Hola-Setup-x64-1.202.120.exe File opened for modification C:\Program Files\Hola\app\hola_svc.exe Hola-Setup-x64-1.202.120.exe File created C:\Program Files\Hola\app\net_updater64.exe Hola-Setup-x64-1.202.120.exe File opened for modification C:\Program Files\Hola\log\install.log Hola-Setup-x64-1.202.120.exe File created C:\Program Files\Hola\db\setup.conf Hola-Setup-x64-1.202.120.exe File opened for modification C:\Program Files\Hola\app\7za.exe Hola-Setup-x64-1.202.120.exe File created C:\Program Files\Hola\app\image\Hola-Setup-x64-1.202.120.exe Hola-Setup-x64-1.202.120.exe File created C:\Program Files\Hola\app\hola_setup.exe Hola-Setup-x64-1.202.120.exe File created C:\Program Files\Hola\app\lum_sdk64.dll Hola-Setup-x64-1.202.120.exe File opened for modification C:\Program Files\Hola\app\lum_sdk64.dll Hola-Setup-x64-1.202.120.exe File created C:\Program Files\Hola\app\hola.exe Hola-Setup-x64-1.202.120.exe File created C:\Program Files\Hola\app\7za.exe Hola-Setup-x64-1.202.120.exe File opened for modification C:\Program Files\Hola\app\hola_split_tunnel.sys Hola-Setup-x64-1.202.120.exe File created C:\Program Files\Hola\app\hola_svc.exe Hola-Setup-x64-1.202.120.exe File opened for modification C:\Program Files\Hola\app\image\Hola-Setup-x64-1.202.120.exe Hola-Setup-x64-1.202.120.exe File opened for modification C:\Program Files\Hola\app\net_updater64.exe Hola-Setup-x64-1.202.120.exe File opened for modification C:\Program Files\Hola\app\hola.exe Hola-Setup-x64-1.202.120.exe File created C:\Program Files\Hola\app\lum_sdk64.dll.sdk Hola-Setup-x64-1.202.120.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x0008000000022f5b-143.dat nsis_installer_1 behavioral1/files/0x0008000000022f5b-143.dat nsis_installer_2 behavioral1/files/0x0008000000022f5b-144.dat nsis_installer_1 behavioral1/files/0x0008000000022f5b-144.dat nsis_installer_2 -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing net_updater64.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 GenericSetup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 GenericSetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 GenericSetup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 GenericSetup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 GenericSetup.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 5092 GenericSetup.exe 5092 GenericSetup.exe 5092 GenericSetup.exe 5092 GenericSetup.exe 5092 GenericSetup.exe 5092 GenericSetup.exe 5092 GenericSetup.exe 5092 GenericSetup.exe 5092 GenericSetup.exe 5092 GenericSetup.exe 5092 GenericSetup.exe 4928 Hola-Setup-H2OUS-Installer-Agreed.exe 1820 Hola-Setup-H2OUS-Installer-Agreed.exe 4928 Hola-Setup-H2OUS-Installer-Agreed.exe 4024 Hola-Setup-x64-1.202.120.exe 4024 Hola-Setup-x64-1.202.120.exe 4024 Hola-Setup-x64-1.202.120.exe 4024 Hola-Setup-x64-1.202.120.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5092 GenericSetup.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5092 GenericSetup.exe Token: SeDebugPrivilege 4928 Hola-Setup-H2OUS-Installer-Agreed.exe Token: SeDebugPrivilege 1820 Hola-Setup-H2OUS-Installer-Agreed.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4024 Hola-Setup-x64-1.202.120.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5092 GenericSetup.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2288 wrote to memory of 5092 2288 CheatHack.exe 83 PID 2288 wrote to memory of 5092 2288 CheatHack.exe 83 PID 2288 wrote to memory of 5092 2288 CheatHack.exe 83 PID 5092 wrote to memory of 3168 5092 GenericSetup.exe 94 PID 5092 wrote to memory of 3168 5092 GenericSetup.exe 94 PID 5092 wrote to memory of 3168 5092 GenericSetup.exe 94 PID 3168 wrote to memory of 900 3168 cmd.exe 96 PID 3168 wrote to memory of 900 3168 cmd.exe 96 PID 3168 wrote to memory of 900 3168 cmd.exe 96 PID 5092 wrote to memory of 1172 5092 GenericSetup.exe 97 PID 5092 wrote to memory of 1172 5092 GenericSetup.exe 97 PID 5092 wrote to memory of 1172 5092 GenericSetup.exe 97 PID 1172 wrote to memory of 4928 1172 cmd.exe 99 PID 1172 wrote to memory of 4928 1172 cmd.exe 99 PID 1172 wrote to memory of 4928 1172 cmd.exe 99 PID 4928 wrote to memory of 1820 4928 Hola-Setup-H2OUS-Installer-Agreed.exe 100 PID 4928 wrote to memory of 1820 4928 Hola-Setup-H2OUS-Installer-Agreed.exe 100 PID 4928 wrote to memory of 1820 4928 Hola-Setup-H2OUS-Installer-Agreed.exe 100 PID 4928 wrote to memory of 4024 4928 Hola-Setup-H2OUS-Installer-Agreed.exe 101 PID 4928 wrote to memory of 4024 4928 Hola-Setup-H2OUS-Installer-Agreed.exe 101 PID 4024 wrote to memory of 4472 4024 Hola-Setup-x64-1.202.120.exe 102 PID 4024 wrote to memory of 4472 4024 Hola-Setup-x64-1.202.120.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\CheatHack.exe"C:\Users\Admin\AppData\Local\Temp\CheatHack.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\7zS0F8E7477\GenericSetup.exe.\GenericSetup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\Downloads\kodi-19.1-Matrix-x64.exe""3⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\Downloads\kodi-19.1-Matrix-x64.exe"C:\Users\Admin\Downloads\kodi-19.1-Matrix-x64.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:900
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C ""Hola-Setup-H2OUS-Installer-Agreed.exe" --silent --no-rmt-conf --run-once"3⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\GenericSetup.exe_1663655291\Hola-Setup-H2OUS-Installer-Agreed.exe"Hola-Setup-H2OUS-Installer-Agreed.exe" --silent --no-rmt-conf --run-once4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\GenericSetup.exe_1663655291\Hola-Setup-H2OUS-Installer-Agreed.exe"Hola-Setup-H2OUS-Installer-Agreed.exe" --monitor 18685⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.202.120.exe"C:\Users\Admin\AppData\Local\Temp\Hola-Setup-x64-1.202.120.exe" --silent --agree --force-appid win_hola.h2ous.hola.org --app vpn --no-run-uis --no-rmt-conf --no-updater --no-hola-cr --hola-domain holavpninstaller.com5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Program Files\Hola\app\net_updater64.exe"C:\Program Files\Hola\app\net_updater64.exe" --install win_hola.h2ous.hola.org6⤵
- Executes dropped EXE
PID:4472
-
-
-
-
-
-
C:\Program Files\Hola\app\net_updater64.exe"C:/Program Files/Hola/app/net_updater64.exe" --updater win_hola.h2ous.hola.org1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.7MB
MD55ad6e8ecfdb608529f0891eeba0f73db
SHA18e818fd49aa5cbf27bcd8e66331f3faaa0778359
SHA25681856738dc41a88b0c023b239dd3818fce4def2e0ff789879b3a9c8bc4d8fd21
SHA51282af2292b8735dc6c43e2665def76b4d4c3bb3ca08e8063152c2e7f956a3e21574540d79986ec8ba97a549efaed8f4676b54d6568b43096c93432d72176b1e41
-
Filesize
9.3MB
MD522e841e5e835fe7136437afd527ef58e
SHA1dfd79532c8e46ed7dfb74361ad39e66e4a198ea4
SHA2561e74393bf7c062d5f2b8af7c22ca30eb8dba31f655395ccd51d41fb623e0a144
SHA512177d9c6102f71eb96c73dc5890730b6397f25a2a91d136dfdaa8153c8f43cb5ac82f2c1cbe0ccd0c871b9ad6fc7a8285020d42430b39cdf64edcb2e1136fb49e
-
Filesize
9.3MB
MD522e841e5e835fe7136437afd527ef58e
SHA1dfd79532c8e46ed7dfb74361ad39e66e4a198ea4
SHA2561e74393bf7c062d5f2b8af7c22ca30eb8dba31f655395ccd51d41fb623e0a144
SHA512177d9c6102f71eb96c73dc5890730b6397f25a2a91d136dfdaa8153c8f43cb5ac82f2c1cbe0ccd0c871b9ad6fc7a8285020d42430b39cdf64edcb2e1136fb49e
-
C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\20220920_063017_01_install_1.323.197.log
Filesize1B
MD568b329da9893e34099c7d8ad5cb9c940
SHA1adc83b19e793491b1c6ea0fd8b46cd9f32e592fc
SHA25601ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b
SHA512be688838ca8686e5c90689bf2ab585cef1137c999b48c70b92f67a5c34dc15697b5d11c982ed6d71be1e1e7f7b4e0733884aa97c3f7a339a8ed03577cf74be09
-
Filesize
33B
MD58799dd7db6874bb94d271eb721bdc6df
SHA17d7b07c08fdc437b1788d49e2c678135f2f53dfb
SHA2563cb73e6a5a1db41d39ae0a386d624eedf3d8e3cb4cdc5d1f51e08b26b8a1902c
SHA512e537aadb9c701a258b2989dd7f1292f22b2db34453b9eb11ba35f4016a4fb181168a6e0a7ee24689f1943eebb9109c1f47054beb5bdce5a825b2154506d8353b
-
Filesize
8.1MB
MD5fffd5cc10b8005fb12c592d13fead02f
SHA1ee4a4852528b41d13a90520c0df3d6c13c77d30c
SHA256246b1ee6e676d9e0012b5f9f5b68d98b4bb81597d6c739ff8377e1af1fbeafa4
SHA51254543275ab0421ffc4ac496f72ccb8aa7534307dda1e843ea241f0222d75b21e06c1024919e2c2ea0e1dc49923dbacc4bf93fa200a90c6650f19bd410717c29f
-
Filesize
8.1MB
MD5fffd5cc10b8005fb12c592d13fead02f
SHA1ee4a4852528b41d13a90520c0df3d6c13c77d30c
SHA256246b1ee6e676d9e0012b5f9f5b68d98b4bb81597d6c739ff8377e1af1fbeafa4
SHA51254543275ab0421ffc4ac496f72ccb8aa7534307dda1e843ea241f0222d75b21e06c1024919e2c2ea0e1dc49923dbacc4bf93fa200a90c6650f19bd410717c29f
-
Filesize
814B
MD5fd63ee3928edd99afc5bdf17e4f1e7b6
SHA11b40433b064215ea6c001332c2ffa093b1177875
SHA2562a2ddbdc4600e829ad756fd5e84a79c0401fa846ad4f2f2fb235b410e82434a9
SHA5121925cde90ee84db1e5c15fa774ee5f10fa368948df7643259b03599ad58cfce9d409fd2cd752ff4cbca60b4bbe92b184ff92a0c6e8b78849c4497d38266bd3b4
-
Filesize
1.4MB
MD5cf895d951da6690db4a66c796dca625c
SHA1a58dc570898eb28042a59149df78801cf8c32158
SHA256dc1f5e80db1729cea32d31dc95f8d0d352a7532a3cf0f2a0d887030eaa6061e9
SHA512dfed216ffab4d2ae62d50e8912439e42c47fdd7e4d6460218d85f1bd8cb5ef42fea33153411e22f5f9dbeb366be10502141b38bbc7d932a56364a84b1cf59b45
-
Filesize
1.4MB
MD5cf895d951da6690db4a66c796dca625c
SHA1a58dc570898eb28042a59149df78801cf8c32158
SHA256dc1f5e80db1729cea32d31dc95f8d0d352a7532a3cf0f2a0d887030eaa6061e9
SHA512dfed216ffab4d2ae62d50e8912439e42c47fdd7e4d6460218d85f1bd8cb5ef42fea33153411e22f5f9dbeb366be10502141b38bbc7d932a56364a84b1cf59b45
-
Filesize
1.4MB
MD5cf895d951da6690db4a66c796dca625c
SHA1a58dc570898eb28042a59149df78801cf8c32158
SHA256dc1f5e80db1729cea32d31dc95f8d0d352a7532a3cf0f2a0d887030eaa6061e9
SHA512dfed216ffab4d2ae62d50e8912439e42c47fdd7e4d6460218d85f1bd8cb5ef42fea33153411e22f5f9dbeb366be10502141b38bbc7d932a56364a84b1cf59b45
-
Filesize
5.6MB
MD5b431083586e39d018e19880ad1a5ce8f
SHA13bbf957ab534d845d485a8698accc0a40b63cedd
SHA256b525fdcc32c5a359a7f5738a30eff0c6390734d8a2c987c62e14c619f99d406b
SHA5127805a3464fcc3ac4ea1258e2412180c52f2af40a79b540348486c830a20c2bbed337bbf5f4a8926b3ef98c63c87747014f5b43c35f7ec4e7a3693b9dbd0ae67b
-
Filesize
8.2MB
MD5e7ea3f0f655f80b2d982af77660fdd72
SHA19c0875ade80f7b3126e89b3a743e68b95ffc11ab
SHA25698d8c88a67ec3d235a6eb5748bd4342469da1435be054a945aa3c441625125a5
SHA512274b0fe98e5fd13415cb02cc7f3bd5fa8a79aabbaf2ed79a5d38716a8b2ff9ebd6a204f8aea8270f8fed2fdb233fc7ec9472922bc2c942726afdc5d901a35184
-
Filesize
8.2MB
MD5e7ea3f0f655f80b2d982af77660fdd72
SHA19c0875ade80f7b3126e89b3a743e68b95ffc11ab
SHA25698d8c88a67ec3d235a6eb5748bd4342469da1435be054a945aa3c441625125a5
SHA512274b0fe98e5fd13415cb02cc7f3bd5fa8a79aabbaf2ed79a5d38716a8b2ff9ebd6a204f8aea8270f8fed2fdb233fc7ec9472922bc2c942726afdc5d901a35184
-
Filesize
11KB
MD5fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
Filesize
9KB
MD5ab101f38562c8545a641e95172c354b4
SHA1ec47ac5449f6ee4b14f6dd7ddde841a3e723e567
SHA2563cdf3e24c87666ed5c582b8b028c01ee6ac16d5a9b8d8d684ae67605376786ea
SHA51272d4b6dc439f40b7d68b03353a748fc3ad7ed10b0401741c5030705d9b1adef856406075e9ce4f1a08e4345a16e1c759f636c38ad92a57ef369867a9533b7037
-
Filesize
65.5MB
MD5c390f6d282e2f5b97ad69eda523e40b7
SHA11fba08349f180fab6bde8ed4f1001ed8903a1697
SHA256ecbb43dad45d3442d3dec14c66429766f19ea86ac050ad86c2edd7e20313b4df
SHA5122aff9913ae55c2106145d1066d52f3cb4be9689fda8c8a7d8d67e5f10efa303668c7fa4fb74e8adcb706c198967bfb3f5039d697121a995e385d0397261ec756
-
Filesize
65.5MB
MD5c390f6d282e2f5b97ad69eda523e40b7
SHA11fba08349f180fab6bde8ed4f1001ed8903a1697
SHA256ecbb43dad45d3442d3dec14c66429766f19ea86ac050ad86c2edd7e20313b4df
SHA5122aff9913ae55c2106145d1066d52f3cb4be9689fda8c8a7d8d67e5f10efa303668c7fa4fb74e8adcb706c198967bfb3f5039d697121a995e385d0397261ec756