Analysis
-
max time kernel
153s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:16
Static task
static1
Behavioral task
behavioral1
Sample
a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe
Resource
win10v2004-20220812-en
General
-
Target
a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe
-
Size
601KB
-
MD5
88296cc56b251ccc709061f2c497996a
-
SHA1
04c86c0f2b799c884289b7c714f3da00768a37da
-
SHA256
a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a
-
SHA512
51cd4d470cb4e6b2c4bb844459d79af3aa3ce69dcc240e9a5c0b7a749b47bedec669515a2057e9bc6f690038e354ed6c2f3320c0b516a2bbd24945afde9fe535
-
SSDEEP
12288:FIny5DYTPIhOI0C5g9nwcKpaGTeBdrNN9lJ9zVUyrqmv1ENXDkE9:xUTP6Vg1wcKpNKt9lJUf8e
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 4852 installd.exe 2684 nethtsrv.exe 4136 netupdsrv.exe 220 nethtsrv.exe 4368 netupdsrv.exe -
Loads dropped DLL 14 IoCs
Processes:
a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exeinstalld.exenethtsrv.exenethtsrv.exepid process 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe 4852 installd.exe 2684 nethtsrv.exe 2684 nethtsrv.exe 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe 220 nethtsrv.exe 220 nethtsrv.exe 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exedescription ioc process File created C:\Windows\SysWOW64\hfnapi.dll a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe File created C:\Windows\SysWOW64\hfpapi.dll a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe File created C:\Windows\SysWOW64\installd.exe a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe File created C:\Windows\SysWOW64\nethtsrv.exe a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe File created C:\Windows\SysWOW64\netupdsrv.exe a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe -
Drops file in Program Files directory 3 IoCs
Processes:
a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\data.xml a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
Processes:
nethtsrv.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 648 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 220 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exenet.exenet.exenet.exenet.exedescription pid process target process PID 2960 wrote to memory of 4164 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe net.exe PID 2960 wrote to memory of 4164 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe net.exe PID 2960 wrote to memory of 4164 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe net.exe PID 4164 wrote to memory of 2508 4164 net.exe net1.exe PID 4164 wrote to memory of 2508 4164 net.exe net1.exe PID 4164 wrote to memory of 2508 4164 net.exe net1.exe PID 2960 wrote to memory of 1744 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe net.exe PID 2960 wrote to memory of 1744 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe net.exe PID 2960 wrote to memory of 1744 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe net.exe PID 1744 wrote to memory of 2888 1744 net.exe net1.exe PID 1744 wrote to memory of 2888 1744 net.exe net1.exe PID 1744 wrote to memory of 2888 1744 net.exe net1.exe PID 2960 wrote to memory of 4852 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe installd.exe PID 2960 wrote to memory of 4852 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe installd.exe PID 2960 wrote to memory of 4852 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe installd.exe PID 2960 wrote to memory of 2684 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe nethtsrv.exe PID 2960 wrote to memory of 2684 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe nethtsrv.exe PID 2960 wrote to memory of 2684 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe nethtsrv.exe PID 2960 wrote to memory of 4136 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe netupdsrv.exe PID 2960 wrote to memory of 4136 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe netupdsrv.exe PID 2960 wrote to memory of 4136 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe netupdsrv.exe PID 2960 wrote to memory of 4232 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe net.exe PID 2960 wrote to memory of 4232 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe net.exe PID 2960 wrote to memory of 4232 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe net.exe PID 4232 wrote to memory of 5068 4232 net.exe net1.exe PID 4232 wrote to memory of 5068 4232 net.exe net1.exe PID 4232 wrote to memory of 5068 4232 net.exe net1.exe PID 2960 wrote to memory of 2264 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe net.exe PID 2960 wrote to memory of 2264 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe net.exe PID 2960 wrote to memory of 2264 2960 a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe net.exe PID 2264 wrote to memory of 3360 2264 net.exe net1.exe PID 2264 wrote to memory of 3360 2264 net.exe net1.exe PID 2264 wrote to memory of 3360 2264 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe"C:\Users\Admin\AppData\Local\Temp\a8f839298aeae3aadff3718997be73e01e56b79cce30246c64b9c0acd2b11d1a.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:2508
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:2888
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4852 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2684 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:4136 -
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:5068
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:3360
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:220
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:4368
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD520df9dd84abb4cf2276978a21b714983
SHA183c8716026278376a831415e58681903e9ffc19a
SHA2566a9166a72b9648403174722bce644feed5ff7d3de766fd994af6ba9837e1d64e
SHA512956c39956eb84cd5caf287aa4b666f17337d54a234bdd4bba67da34cd2a19a22a6195707a02caf7e8ba9f6662198c589df70a5cb70e19e85389a635b7db16ddb
-
Filesize
106KB
MD520df9dd84abb4cf2276978a21b714983
SHA183c8716026278376a831415e58681903e9ffc19a
SHA2566a9166a72b9648403174722bce644feed5ff7d3de766fd994af6ba9837e1d64e
SHA512956c39956eb84cd5caf287aa4b666f17337d54a234bdd4bba67da34cd2a19a22a6195707a02caf7e8ba9f6662198c589df70a5cb70e19e85389a635b7db16ddb
-
Filesize
106KB
MD520df9dd84abb4cf2276978a21b714983
SHA183c8716026278376a831415e58681903e9ffc19a
SHA2566a9166a72b9648403174722bce644feed5ff7d3de766fd994af6ba9837e1d64e
SHA512956c39956eb84cd5caf287aa4b666f17337d54a234bdd4bba67da34cd2a19a22a6195707a02caf7e8ba9f6662198c589df70a5cb70e19e85389a635b7db16ddb
-
Filesize
106KB
MD520df9dd84abb4cf2276978a21b714983
SHA183c8716026278376a831415e58681903e9ffc19a
SHA2566a9166a72b9648403174722bce644feed5ff7d3de766fd994af6ba9837e1d64e
SHA512956c39956eb84cd5caf287aa4b666f17337d54a234bdd4bba67da34cd2a19a22a6195707a02caf7e8ba9f6662198c589df70a5cb70e19e85389a635b7db16ddb
-
Filesize
241KB
MD5bcdfbc8732e76809fbf7dc00d8ef431a
SHA16c60a33224aaed8d96ff483bf806e6635505d2ce
SHA2561ea3d1229cb5e3c0c04c97749fbf0e908d108fd7770dd8c99378193a75edbe90
SHA5121b4e9fd0a76ec296d7553c6b2dc81413583b1c79712296978c936fa43af35b2de624ae2adfc9027aeb2cb9f1ef6870797f2671ad4458471d82e58eba063e83bb
-
Filesize
241KB
MD5bcdfbc8732e76809fbf7dc00d8ef431a
SHA16c60a33224aaed8d96ff483bf806e6635505d2ce
SHA2561ea3d1229cb5e3c0c04c97749fbf0e908d108fd7770dd8c99378193a75edbe90
SHA5121b4e9fd0a76ec296d7553c6b2dc81413583b1c79712296978c936fa43af35b2de624ae2adfc9027aeb2cb9f1ef6870797f2671ad4458471d82e58eba063e83bb
-
Filesize
241KB
MD5bcdfbc8732e76809fbf7dc00d8ef431a
SHA16c60a33224aaed8d96ff483bf806e6635505d2ce
SHA2561ea3d1229cb5e3c0c04c97749fbf0e908d108fd7770dd8c99378193a75edbe90
SHA5121b4e9fd0a76ec296d7553c6b2dc81413583b1c79712296978c936fa43af35b2de624ae2adfc9027aeb2cb9f1ef6870797f2671ad4458471d82e58eba063e83bb
-
Filesize
108KB
MD5f9e9fe8a51a1ee841056d852ad11983a
SHA18708dc3dc5ad17f4240231feb526d505c8f87fc3
SHA256756a41e6a2fffb870f947b83801f327d07912938924b9fae9752aa16c67ff584
SHA51263fb4bb733ad28f42a1b41217f0a249f7b16425bb2ce2fde8f27208e71d4b471f30f65d1757efcf6d4449f4d2de8ae5326db840411627a52a4b29884236d2660
-
Filesize
108KB
MD5f9e9fe8a51a1ee841056d852ad11983a
SHA18708dc3dc5ad17f4240231feb526d505c8f87fc3
SHA256756a41e6a2fffb870f947b83801f327d07912938924b9fae9752aa16c67ff584
SHA51263fb4bb733ad28f42a1b41217f0a249f7b16425bb2ce2fde8f27208e71d4b471f30f65d1757efcf6d4449f4d2de8ae5326db840411627a52a4b29884236d2660
-
Filesize
176KB
MD50f0e3b9b783d4b1bcdc981f090b23991
SHA120ffe50107cdcdf1042f0f24b32bb3f075043338
SHA25659935c514fe91ee66c01fbf8acf6b5437d29b0ce659fca4d03dfa8e53fe79b51
SHA512cb093463decd69de79547c0e5081c91d3927e00cb451bf1a5cce09d5f96fa3933228f90ecac20a3da15ab9018abef69904baf195527f8ecaf67d203d98c1a55a
-
Filesize
176KB
MD50f0e3b9b783d4b1bcdc981f090b23991
SHA120ffe50107cdcdf1042f0f24b32bb3f075043338
SHA25659935c514fe91ee66c01fbf8acf6b5437d29b0ce659fca4d03dfa8e53fe79b51
SHA512cb093463decd69de79547c0e5081c91d3927e00cb451bf1a5cce09d5f96fa3933228f90ecac20a3da15ab9018abef69904baf195527f8ecaf67d203d98c1a55a
-
Filesize
176KB
MD50f0e3b9b783d4b1bcdc981f090b23991
SHA120ffe50107cdcdf1042f0f24b32bb3f075043338
SHA25659935c514fe91ee66c01fbf8acf6b5437d29b0ce659fca4d03dfa8e53fe79b51
SHA512cb093463decd69de79547c0e5081c91d3927e00cb451bf1a5cce09d5f96fa3933228f90ecac20a3da15ab9018abef69904baf195527f8ecaf67d203d98c1a55a
-
Filesize
158KB
MD537a5b427a135d2c8e4620a007c325492
SHA1762dd54adbe7f94743fff2502fa31cd032929033
SHA256d68b4caa0c85584e20fd2a7c28f6ef5e459a420ad3596df94f5090ca8cb40d5c
SHA51215cec56f88e6c08a6f5c48ccb324429d75612fcf613d99f2d477ad2235b504582c39b5694f152fe9a99c606ff919be8e3acbb7f2aacf0c2a9c48b3e0d7519883
-
Filesize
158KB
MD537a5b427a135d2c8e4620a007c325492
SHA1762dd54adbe7f94743fff2502fa31cd032929033
SHA256d68b4caa0c85584e20fd2a7c28f6ef5e459a420ad3596df94f5090ca8cb40d5c
SHA51215cec56f88e6c08a6f5c48ccb324429d75612fcf613d99f2d477ad2235b504582c39b5694f152fe9a99c606ff919be8e3acbb7f2aacf0c2a9c48b3e0d7519883
-
Filesize
158KB
MD537a5b427a135d2c8e4620a007c325492
SHA1762dd54adbe7f94743fff2502fa31cd032929033
SHA256d68b4caa0c85584e20fd2a7c28f6ef5e459a420ad3596df94f5090ca8cb40d5c
SHA51215cec56f88e6c08a6f5c48ccb324429d75612fcf613d99f2d477ad2235b504582c39b5694f152fe9a99c606ff919be8e3acbb7f2aacf0c2a9c48b3e0d7519883