Analysis
-
max time kernel
59s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:56
Static task
static1
Behavioral task
behavioral1
Sample
65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe
Resource
win10v2004-20220812-en
General
-
Target
65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe
-
Size
447KB
-
MD5
4253a688abc593e772cddaafcab9eeab
-
SHA1
375263b09c5d3874aabe4b1255eb1bb94fafb1cd
-
SHA256
65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5
-
SHA512
e1a30d3df3ff077bd6de63441f4b356c71a8a5068bba509520a8c047baa7eb4f0cab104a9e98ae7ec47b91dac936c7027e008034f83e0f7ff3266e94cc003978
-
SSDEEP
12288:kkzw3rNqG2ZbeQIlkbnyv19/gwiw96fLQFqpP:kzf2peQdbO19IwihjoqF
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 768 installd.exe 1400 nethtsrv.exe 384 netupdsrv.exe 1004 nethtsrv.exe 292 netupdsrv.exe -
Loads dropped DLL 13 IoCs
Processes:
65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exeinstalld.exenethtsrv.exenethtsrv.exepid process 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe 768 installd.exe 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe 1400 nethtsrv.exe 1400 nethtsrv.exe 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe 1004 nethtsrv.exe 1004 nethtsrv.exe 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exedescription ioc process File created C:\Windows\SysWOW64\nethtsrv.exe 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe File created C:\Windows\SysWOW64\netupdsrv.exe 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe File created C:\Windows\SysWOW64\hfnapi.dll 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe File created C:\Windows\SysWOW64\hfpapi.dll 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe File created C:\Windows\SysWOW64\installd.exe 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe -
Drops file in Program Files directory 3 IoCs
Processes:
65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\data.xml 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 460 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 1004 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1944 wrote to memory of 1956 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe net.exe PID 1944 wrote to memory of 1956 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe net.exe PID 1944 wrote to memory of 1956 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe net.exe PID 1944 wrote to memory of 1956 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe net.exe PID 1956 wrote to memory of 1236 1956 net.exe net1.exe PID 1956 wrote to memory of 1236 1956 net.exe net1.exe PID 1956 wrote to memory of 1236 1956 net.exe net1.exe PID 1956 wrote to memory of 1236 1956 net.exe net1.exe PID 1944 wrote to memory of 772 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe net.exe PID 1944 wrote to memory of 772 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe net.exe PID 1944 wrote to memory of 772 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe net.exe PID 1944 wrote to memory of 772 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe net.exe PID 772 wrote to memory of 576 772 net.exe net1.exe PID 772 wrote to memory of 576 772 net.exe net1.exe PID 772 wrote to memory of 576 772 net.exe net1.exe PID 772 wrote to memory of 576 772 net.exe net1.exe PID 1944 wrote to memory of 768 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe installd.exe PID 1944 wrote to memory of 768 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe installd.exe PID 1944 wrote to memory of 768 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe installd.exe PID 1944 wrote to memory of 768 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe installd.exe PID 1944 wrote to memory of 768 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe installd.exe PID 1944 wrote to memory of 768 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe installd.exe PID 1944 wrote to memory of 768 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe installd.exe PID 1944 wrote to memory of 1400 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe nethtsrv.exe PID 1944 wrote to memory of 1400 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe nethtsrv.exe PID 1944 wrote to memory of 1400 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe nethtsrv.exe PID 1944 wrote to memory of 1400 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe nethtsrv.exe PID 1944 wrote to memory of 384 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe netupdsrv.exe PID 1944 wrote to memory of 384 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe netupdsrv.exe PID 1944 wrote to memory of 384 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe netupdsrv.exe PID 1944 wrote to memory of 384 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe netupdsrv.exe PID 1944 wrote to memory of 384 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe netupdsrv.exe PID 1944 wrote to memory of 384 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe netupdsrv.exe PID 1944 wrote to memory of 384 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe netupdsrv.exe PID 1944 wrote to memory of 820 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe net.exe PID 1944 wrote to memory of 820 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe net.exe PID 1944 wrote to memory of 820 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe net.exe PID 1944 wrote to memory of 820 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe net.exe PID 820 wrote to memory of 796 820 net.exe net1.exe PID 820 wrote to memory of 796 820 net.exe net1.exe PID 820 wrote to memory of 796 820 net.exe net1.exe PID 820 wrote to memory of 796 820 net.exe net1.exe PID 1944 wrote to memory of 988 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe net.exe PID 1944 wrote to memory of 988 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe net.exe PID 1944 wrote to memory of 988 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe net.exe PID 1944 wrote to memory of 988 1944 65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe net.exe PID 988 wrote to memory of 660 988 net.exe net1.exe PID 988 wrote to memory of 660 988 net.exe net1.exe PID 988 wrote to memory of 660 988 net.exe net1.exe PID 988 wrote to memory of 660 988 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe"C:\Users\Admin\AppData\Local\Temp\65555cbb123472bcec1602521db2028c132e6cd9355c0e922cfbb5e5ca04b9c5.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1236
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:576
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:768 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1400 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:384 -
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:796
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:660
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:292
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD53c82f4d8e1db2ec437bf3ab0c98496de
SHA1886897b8ab5b97bf869bb9880a4a1fa9ecccb374
SHA25672b44fa4d86e18c9a9757558896dbdebbae92985a83d5bf443f3d4c667610c44
SHA512d4801c663f40662a1c2f648f7646e2c75a7a03dbc58763f6c05b4717592ca60cda1fc9efb4a3f1c89bcc49bba8d8ca25055be135922af18f0aca5c51a7c9f0aa
-
Filesize
244KB
MD5a514be9428bce5ada537baad1df09ec6
SHA1e87fbacb3018f1d333df62e5fd997fe89673dfd4
SHA25690ad66ab31f9a679a62edd0adc6de733bdac573df7fd97f2965f8a43e4d7a636
SHA512f408c2124013faead345ef71417eec4560b01e00e3c61f6ee7653d873d97adb237afcd21312a2c6245277e010b07bc8bc4c78e8a92fd0cdfe9d62f1b1ac69582
-
Filesize
108KB
MD5cac6d9c9802dfd89b53d73e135c0c1fa
SHA1d871a758bb1a6fc30d2952e41f3ba542b9dd62ee
SHA2564f34beeec2007980ddda98964412df4228bd094682b7b4dd27fb508e8a015374
SHA5129c9de761e69cdfde04188870df3cefc68d1991408a99057e421a0a379a9946e7c30d9b7569857e3ab328ea7154c46c81df29719722ffbb1ae3e9cc2db7bef2ff
-
Filesize
176KB
MD5031cd028927a865b6207310ea301738e
SHA1118f6a32ccdfe411d31d4a91084cfe21817fcd6e
SHA2569622699ca52d74d8118488176339517304e2e193353243c924efccec5959bc56
SHA51211f89222aa61320441807b5b0b933646d522f6766963619342975c06ce69911efe13ded9856986aa7815c0c11c0bbcd9f1cbaf516df5d5bac15704988e97a704
-
Filesize
176KB
MD5031cd028927a865b6207310ea301738e
SHA1118f6a32ccdfe411d31d4a91084cfe21817fcd6e
SHA2569622699ca52d74d8118488176339517304e2e193353243c924efccec5959bc56
SHA51211f89222aa61320441807b5b0b933646d522f6766963619342975c06ce69911efe13ded9856986aa7815c0c11c0bbcd9f1cbaf516df5d5bac15704988e97a704
-
Filesize
158KB
MD57abf18ab74d2b8209880dd401d5b15de
SHA1ea47295e32cc283bda139c993445982092d63c12
SHA256f47d75486d9da9c7d6ea4f3600c2b324bbec3f39df2629270d6d112a47cc27fb
SHA51248d82e1ddd0a21cb4df08b440bc01befd00b245bce843385d475338a937d860fcca8832e7c7731e5681db53684204aa45d52d7c9f197131b1fdd22b296153b1b
-
Filesize
158KB
MD57abf18ab74d2b8209880dd401d5b15de
SHA1ea47295e32cc283bda139c993445982092d63c12
SHA256f47d75486d9da9c7d6ea4f3600c2b324bbec3f39df2629270d6d112a47cc27fb
SHA51248d82e1ddd0a21cb4df08b440bc01befd00b245bce843385d475338a937d860fcca8832e7c7731e5681db53684204aa45d52d7c9f197131b1fdd22b296153b1b
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD53c82f4d8e1db2ec437bf3ab0c98496de
SHA1886897b8ab5b97bf869bb9880a4a1fa9ecccb374
SHA25672b44fa4d86e18c9a9757558896dbdebbae92985a83d5bf443f3d4c667610c44
SHA512d4801c663f40662a1c2f648f7646e2c75a7a03dbc58763f6c05b4717592ca60cda1fc9efb4a3f1c89bcc49bba8d8ca25055be135922af18f0aca5c51a7c9f0aa
-
Filesize
106KB
MD53c82f4d8e1db2ec437bf3ab0c98496de
SHA1886897b8ab5b97bf869bb9880a4a1fa9ecccb374
SHA25672b44fa4d86e18c9a9757558896dbdebbae92985a83d5bf443f3d4c667610c44
SHA512d4801c663f40662a1c2f648f7646e2c75a7a03dbc58763f6c05b4717592ca60cda1fc9efb4a3f1c89bcc49bba8d8ca25055be135922af18f0aca5c51a7c9f0aa
-
Filesize
106KB
MD53c82f4d8e1db2ec437bf3ab0c98496de
SHA1886897b8ab5b97bf869bb9880a4a1fa9ecccb374
SHA25672b44fa4d86e18c9a9757558896dbdebbae92985a83d5bf443f3d4c667610c44
SHA512d4801c663f40662a1c2f648f7646e2c75a7a03dbc58763f6c05b4717592ca60cda1fc9efb4a3f1c89bcc49bba8d8ca25055be135922af18f0aca5c51a7c9f0aa
-
Filesize
244KB
MD5a514be9428bce5ada537baad1df09ec6
SHA1e87fbacb3018f1d333df62e5fd997fe89673dfd4
SHA25690ad66ab31f9a679a62edd0adc6de733bdac573df7fd97f2965f8a43e4d7a636
SHA512f408c2124013faead345ef71417eec4560b01e00e3c61f6ee7653d873d97adb237afcd21312a2c6245277e010b07bc8bc4c78e8a92fd0cdfe9d62f1b1ac69582
-
Filesize
244KB
MD5a514be9428bce5ada537baad1df09ec6
SHA1e87fbacb3018f1d333df62e5fd997fe89673dfd4
SHA25690ad66ab31f9a679a62edd0adc6de733bdac573df7fd97f2965f8a43e4d7a636
SHA512f408c2124013faead345ef71417eec4560b01e00e3c61f6ee7653d873d97adb237afcd21312a2c6245277e010b07bc8bc4c78e8a92fd0cdfe9d62f1b1ac69582
-
Filesize
108KB
MD5cac6d9c9802dfd89b53d73e135c0c1fa
SHA1d871a758bb1a6fc30d2952e41f3ba542b9dd62ee
SHA2564f34beeec2007980ddda98964412df4228bd094682b7b4dd27fb508e8a015374
SHA5129c9de761e69cdfde04188870df3cefc68d1991408a99057e421a0a379a9946e7c30d9b7569857e3ab328ea7154c46c81df29719722ffbb1ae3e9cc2db7bef2ff
-
Filesize
176KB
MD5031cd028927a865b6207310ea301738e
SHA1118f6a32ccdfe411d31d4a91084cfe21817fcd6e
SHA2569622699ca52d74d8118488176339517304e2e193353243c924efccec5959bc56
SHA51211f89222aa61320441807b5b0b933646d522f6766963619342975c06ce69911efe13ded9856986aa7815c0c11c0bbcd9f1cbaf516df5d5bac15704988e97a704
-
Filesize
158KB
MD57abf18ab74d2b8209880dd401d5b15de
SHA1ea47295e32cc283bda139c993445982092d63c12
SHA256f47d75486d9da9c7d6ea4f3600c2b324bbec3f39df2629270d6d112a47cc27fb
SHA51248d82e1ddd0a21cb4df08b440bc01befd00b245bce843385d475338a937d860fcca8832e7c7731e5681db53684204aa45d52d7c9f197131b1fdd22b296153b1b