Analysis
-
max time kernel
42s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:24
Static task
static1
Behavioral task
behavioral1
Sample
6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe
Resource
win10v2004-20220812-en
General
-
Target
6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe
-
Size
602KB
-
MD5
7619e7f3182f9438b75862d4201bd3b9
-
SHA1
4494ef3fcbaab934465e19545695bef20e65a3a2
-
SHA256
6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63
-
SHA512
bf9274d6f8381709ca2d051e9839652aaaf1ce1868e8ab40ca90eaec18e659e88eed4d9152794e968ea00b452c622595b7dcae90408befc6296fe6d4b77ee2b6
-
SSDEEP
12288:3Iny5DYTgKGE6gzKGneOzCz/CFrKvCQviqufZVJM2R2t/V:fUTgK7nzzG/m+vpMZVlAtd
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 1108 installd.exe 980 nethtsrv.exe 1476 netupdsrv.exe 776 nethtsrv.exe 1056 netupdsrv.exe -
Loads dropped DLL 13 IoCs
Processes:
6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exeinstalld.exenethtsrv.exenethtsrv.exepid process 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe 1108 installd.exe 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe 980 nethtsrv.exe 980 nethtsrv.exe 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe 776 nethtsrv.exe 776 nethtsrv.exe 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exedescription ioc process File created C:\Windows\SysWOW64\nethtsrv.exe 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe File created C:\Windows\SysWOW64\netupdsrv.exe 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe File created C:\Windows\SysWOW64\hfnapi.dll 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe File created C:\Windows\SysWOW64\hfpapi.dll 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe File created C:\Windows\SysWOW64\installd.exe 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe -
Drops file in Program Files directory 3 IoCs
Processes:
6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\data.xml 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 464 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 776 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1752 wrote to memory of 1552 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe net.exe PID 1752 wrote to memory of 1552 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe net.exe PID 1752 wrote to memory of 1552 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe net.exe PID 1752 wrote to memory of 1552 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe net.exe PID 1552 wrote to memory of 768 1552 net.exe net1.exe PID 1552 wrote to memory of 768 1552 net.exe net1.exe PID 1552 wrote to memory of 768 1552 net.exe net1.exe PID 1552 wrote to memory of 768 1552 net.exe net1.exe PID 1752 wrote to memory of 560 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe net.exe PID 1752 wrote to memory of 560 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe net.exe PID 1752 wrote to memory of 560 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe net.exe PID 1752 wrote to memory of 560 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe net.exe PID 560 wrote to memory of 576 560 net.exe net1.exe PID 560 wrote to memory of 576 560 net.exe net1.exe PID 560 wrote to memory of 576 560 net.exe net1.exe PID 560 wrote to memory of 576 560 net.exe net1.exe PID 1752 wrote to memory of 1108 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe installd.exe PID 1752 wrote to memory of 1108 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe installd.exe PID 1752 wrote to memory of 1108 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe installd.exe PID 1752 wrote to memory of 1108 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe installd.exe PID 1752 wrote to memory of 1108 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe installd.exe PID 1752 wrote to memory of 1108 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe installd.exe PID 1752 wrote to memory of 1108 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe installd.exe PID 1752 wrote to memory of 980 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe nethtsrv.exe PID 1752 wrote to memory of 980 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe nethtsrv.exe PID 1752 wrote to memory of 980 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe nethtsrv.exe PID 1752 wrote to memory of 980 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe nethtsrv.exe PID 1752 wrote to memory of 1476 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe netupdsrv.exe PID 1752 wrote to memory of 1476 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe netupdsrv.exe PID 1752 wrote to memory of 1476 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe netupdsrv.exe PID 1752 wrote to memory of 1476 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe netupdsrv.exe PID 1752 wrote to memory of 1476 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe netupdsrv.exe PID 1752 wrote to memory of 1476 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe netupdsrv.exe PID 1752 wrote to memory of 1476 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe netupdsrv.exe PID 1752 wrote to memory of 1272 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe net.exe PID 1752 wrote to memory of 1272 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe net.exe PID 1752 wrote to memory of 1272 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe net.exe PID 1752 wrote to memory of 1272 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe net.exe PID 1272 wrote to memory of 1604 1272 net.exe net1.exe PID 1272 wrote to memory of 1604 1272 net.exe net1.exe PID 1272 wrote to memory of 1604 1272 net.exe net1.exe PID 1272 wrote to memory of 1604 1272 net.exe net1.exe PID 1752 wrote to memory of 876 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe net.exe PID 1752 wrote to memory of 876 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe net.exe PID 1752 wrote to memory of 876 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe net.exe PID 1752 wrote to memory of 876 1752 6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe net.exe PID 876 wrote to memory of 1364 876 net.exe net1.exe PID 876 wrote to memory of 1364 876 net.exe net1.exe PID 876 wrote to memory of 1364 876 net.exe net1.exe PID 876 wrote to memory of 1364 876 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe"C:\Users\Admin\AppData\Local\Temp\6661533d672b7c7ecab81c11e2666be4f41c955cee5652242bbe7e97c367ca63.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:768
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:576
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1108
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:980
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1476
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1604
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1364
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:776
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:1056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD544c17bc19a26bf84145fd9afd90d9418
SHA1a154425cb005073c4ef09cfbe75f75a0d48f6e5a
SHA256e3b3492cbc2863a5b394dd8a688f7987b323e92d9bb19d363a0e1e491d94f404
SHA512750ce44df758997726bf146100fbdf7414288863ed2183da20d20b1c817f7791ee32dfbfa3bd3c74dee2007283c5c6d080054e1b54d3f32e6a0801fe63bdff3b
-
Filesize
241KB
MD5fd4172e99d19f7f52f894a006482ca4c
SHA1ffdc8bb7fab452a1dcee90b6f5474421e6b3951d
SHA256d9836407cce58af8e50d9d2bb2ef6253d1cd4754402b707d2c6c8e3139265904
SHA512dc7358c4d3a77e5242efdf7fcf02071a355d8478ba72f724fdf9fd4c2fd09c1f9a2c4883aa0cfe1ff6f9326f49c8f2088502ec8d95ad3d72f7ff07f5a5087019
-
Filesize
108KB
MD5f4a3830489d2b5ea11aced03592424a9
SHA11e07edabf0f24d6878dca6592ee5f797cd3b7ad4
SHA256b11bc2898480708b208934b8f41ed0aaa09e0c0c3b15db3550668f94285de1c4
SHA512cfe68860f4044762229bef4cc43f89ec279c501ddcb80c8c217fb87a86f7f24cd0263a88305af9be6f8ff9bbcce16c291e2e01551ba352b57ea630b3f549c132
-
Filesize
176KB
MD576dabc2a2e077b5da31f1f1f18a933ca
SHA167710249dff4a9c010e1df8c02993d9e83a0e695
SHA256c20acc9661c4a38afded1402020313b83aef984cdfa3dad39331d07dc3d894da
SHA512e57af762952910374e1952ffbc72694dc5cd1a597830a0c9253d2443bedb87e5ade1769027106ba0071d275803c0bf61f5a49be363614e8ee5fd2c64733fb8bf
-
Filesize
176KB
MD576dabc2a2e077b5da31f1f1f18a933ca
SHA167710249dff4a9c010e1df8c02993d9e83a0e695
SHA256c20acc9661c4a38afded1402020313b83aef984cdfa3dad39331d07dc3d894da
SHA512e57af762952910374e1952ffbc72694dc5cd1a597830a0c9253d2443bedb87e5ade1769027106ba0071d275803c0bf61f5a49be363614e8ee5fd2c64733fb8bf
-
Filesize
158KB
MD5b8c3c06991251574d0ca2bedfcd21536
SHA18b90e3f6bbbfd848c009adea9506415979efb28d
SHA256dbdd245f4895b289fbc701cd0fc72bf7a66cc80162d1ad0e0b903da74cb0c7ea
SHA512b0cdf0e5d07916f03645967a6924d37f3a67686e29b4cfaa0b2360f0ce2d493fd02c0dfeb4db7d12dc4191aca63327122f8b334a7ab8d58b80704cd797cf56e9
-
Filesize
158KB
MD5b8c3c06991251574d0ca2bedfcd21536
SHA18b90e3f6bbbfd848c009adea9506415979efb28d
SHA256dbdd245f4895b289fbc701cd0fc72bf7a66cc80162d1ad0e0b903da74cb0c7ea
SHA512b0cdf0e5d07916f03645967a6924d37f3a67686e29b4cfaa0b2360f0ce2d493fd02c0dfeb4db7d12dc4191aca63327122f8b334a7ab8d58b80704cd797cf56e9
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD544c17bc19a26bf84145fd9afd90d9418
SHA1a154425cb005073c4ef09cfbe75f75a0d48f6e5a
SHA256e3b3492cbc2863a5b394dd8a688f7987b323e92d9bb19d363a0e1e491d94f404
SHA512750ce44df758997726bf146100fbdf7414288863ed2183da20d20b1c817f7791ee32dfbfa3bd3c74dee2007283c5c6d080054e1b54d3f32e6a0801fe63bdff3b
-
Filesize
106KB
MD544c17bc19a26bf84145fd9afd90d9418
SHA1a154425cb005073c4ef09cfbe75f75a0d48f6e5a
SHA256e3b3492cbc2863a5b394dd8a688f7987b323e92d9bb19d363a0e1e491d94f404
SHA512750ce44df758997726bf146100fbdf7414288863ed2183da20d20b1c817f7791ee32dfbfa3bd3c74dee2007283c5c6d080054e1b54d3f32e6a0801fe63bdff3b
-
Filesize
106KB
MD544c17bc19a26bf84145fd9afd90d9418
SHA1a154425cb005073c4ef09cfbe75f75a0d48f6e5a
SHA256e3b3492cbc2863a5b394dd8a688f7987b323e92d9bb19d363a0e1e491d94f404
SHA512750ce44df758997726bf146100fbdf7414288863ed2183da20d20b1c817f7791ee32dfbfa3bd3c74dee2007283c5c6d080054e1b54d3f32e6a0801fe63bdff3b
-
Filesize
241KB
MD5fd4172e99d19f7f52f894a006482ca4c
SHA1ffdc8bb7fab452a1dcee90b6f5474421e6b3951d
SHA256d9836407cce58af8e50d9d2bb2ef6253d1cd4754402b707d2c6c8e3139265904
SHA512dc7358c4d3a77e5242efdf7fcf02071a355d8478ba72f724fdf9fd4c2fd09c1f9a2c4883aa0cfe1ff6f9326f49c8f2088502ec8d95ad3d72f7ff07f5a5087019
-
Filesize
241KB
MD5fd4172e99d19f7f52f894a006482ca4c
SHA1ffdc8bb7fab452a1dcee90b6f5474421e6b3951d
SHA256d9836407cce58af8e50d9d2bb2ef6253d1cd4754402b707d2c6c8e3139265904
SHA512dc7358c4d3a77e5242efdf7fcf02071a355d8478ba72f724fdf9fd4c2fd09c1f9a2c4883aa0cfe1ff6f9326f49c8f2088502ec8d95ad3d72f7ff07f5a5087019
-
Filesize
108KB
MD5f4a3830489d2b5ea11aced03592424a9
SHA11e07edabf0f24d6878dca6592ee5f797cd3b7ad4
SHA256b11bc2898480708b208934b8f41ed0aaa09e0c0c3b15db3550668f94285de1c4
SHA512cfe68860f4044762229bef4cc43f89ec279c501ddcb80c8c217fb87a86f7f24cd0263a88305af9be6f8ff9bbcce16c291e2e01551ba352b57ea630b3f549c132
-
Filesize
176KB
MD576dabc2a2e077b5da31f1f1f18a933ca
SHA167710249dff4a9c010e1df8c02993d9e83a0e695
SHA256c20acc9661c4a38afded1402020313b83aef984cdfa3dad39331d07dc3d894da
SHA512e57af762952910374e1952ffbc72694dc5cd1a597830a0c9253d2443bedb87e5ade1769027106ba0071d275803c0bf61f5a49be363614e8ee5fd2c64733fb8bf
-
Filesize
158KB
MD5b8c3c06991251574d0ca2bedfcd21536
SHA18b90e3f6bbbfd848c009adea9506415979efb28d
SHA256dbdd245f4895b289fbc701cd0fc72bf7a66cc80162d1ad0e0b903da74cb0c7ea
SHA512b0cdf0e5d07916f03645967a6924d37f3a67686e29b4cfaa0b2360f0ce2d493fd02c0dfeb4db7d12dc4191aca63327122f8b334a7ab8d58b80704cd797cf56e9