Analysis
-
max time kernel
125s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:28
Static task
static1
Behavioral task
behavioral1
Sample
393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe
Resource
win10v2004-20220901-en
General
-
Target
393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe
-
Size
603KB
-
MD5
0fa5adfeeaab820419511b7349bb067c
-
SHA1
2f25c4439b55694ae58a2e86727425b5006faf40
-
SHA256
393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe
-
SHA512
8cfc75a07c749a5a2b501414e26f32269e5e420fce656b12767faa87d7687bfe3543b12e328c3c77573ca8d466029d89f920e42296f90d0fc23626c090e33762
-
SSDEEP
12288:8Iny5DYTE3dTEhZ4j4ASHkD2hRC4Hqld1xLaFhqBpRZx:aUTE3ChZ91dGmSd1xOFCZ
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 3984 installd.exe 4172 nethtsrv.exe 936 netupdsrv.exe 1828 nethtsrv.exe 2780 netupdsrv.exe -
Loads dropped DLL 14 IoCs
Processes:
393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exeinstalld.exenethtsrv.exenethtsrv.exepid process 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe 3984 installd.exe 4172 nethtsrv.exe 4172 nethtsrv.exe 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe 1828 nethtsrv.exe 1828 nethtsrv.exe 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exedescription ioc process File created C:\Windows\SysWOW64\hfnapi.dll 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe File created C:\Windows\SysWOW64\hfpapi.dll 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe File created C:\Windows\SysWOW64\installd.exe 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe File created C:\Windows\SysWOW64\nethtsrv.exe 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe File created C:\Windows\SysWOW64\netupdsrv.exe 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe -
Drops file in Program Files directory 3 IoCs
Processes:
393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\data.xml 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
Processes:
nethtsrv.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 672 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 1828 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exenet.exenet.exenet.exenet.exedescription pid process target process PID 2224 wrote to memory of 2640 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe net.exe PID 2224 wrote to memory of 2640 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe net.exe PID 2224 wrote to memory of 2640 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe net.exe PID 2640 wrote to memory of 2012 2640 net.exe net1.exe PID 2640 wrote to memory of 2012 2640 net.exe net1.exe PID 2640 wrote to memory of 2012 2640 net.exe net1.exe PID 2224 wrote to memory of 3896 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe net.exe PID 2224 wrote to memory of 3896 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe net.exe PID 2224 wrote to memory of 3896 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe net.exe PID 3896 wrote to memory of 3844 3896 net.exe net1.exe PID 3896 wrote to memory of 3844 3896 net.exe net1.exe PID 3896 wrote to memory of 3844 3896 net.exe net1.exe PID 2224 wrote to memory of 3984 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe installd.exe PID 2224 wrote to memory of 3984 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe installd.exe PID 2224 wrote to memory of 3984 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe installd.exe PID 2224 wrote to memory of 4172 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe nethtsrv.exe PID 2224 wrote to memory of 4172 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe nethtsrv.exe PID 2224 wrote to memory of 4172 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe nethtsrv.exe PID 2224 wrote to memory of 936 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe netupdsrv.exe PID 2224 wrote to memory of 936 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe netupdsrv.exe PID 2224 wrote to memory of 936 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe netupdsrv.exe PID 2224 wrote to memory of 3856 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe net.exe PID 2224 wrote to memory of 3856 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe net.exe PID 2224 wrote to memory of 3856 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe net.exe PID 3856 wrote to memory of 1112 3856 net.exe net1.exe PID 3856 wrote to memory of 1112 3856 net.exe net1.exe PID 3856 wrote to memory of 1112 3856 net.exe net1.exe PID 2224 wrote to memory of 3480 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe net.exe PID 2224 wrote to memory of 3480 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe net.exe PID 2224 wrote to memory of 3480 2224 393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe net.exe PID 3480 wrote to memory of 4320 3480 net.exe net1.exe PID 3480 wrote to memory of 4320 3480 net.exe net1.exe PID 3480 wrote to memory of 4320 3480 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe"C:\Users\Admin\AppData\Local\Temp\393a99b230210e34ef01f6634c6aa3dadeb0b78ec84343798d3395b8018e78fe.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:2012
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:3844
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3984 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4172 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:936 -
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1112
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:4320
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:2780
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD54d19b92f670b50554a29a9878f03639c
SHA1263287f84d68bd5cec0b301ed12339bbf1383cc3
SHA256c1767a4a654d6353bcf6440cc043c532486be927f9fbfe3deb786301cb57433d
SHA512496c0428e71e58858fbdb4c77448605af716f48f575c93411765dd8d9c0c5419f1f91c17e56e2c3b404936930028c4607e99b0ca430b04c1e47cc4ada8f49906
-
Filesize
106KB
MD54d19b92f670b50554a29a9878f03639c
SHA1263287f84d68bd5cec0b301ed12339bbf1383cc3
SHA256c1767a4a654d6353bcf6440cc043c532486be927f9fbfe3deb786301cb57433d
SHA512496c0428e71e58858fbdb4c77448605af716f48f575c93411765dd8d9c0c5419f1f91c17e56e2c3b404936930028c4607e99b0ca430b04c1e47cc4ada8f49906
-
Filesize
106KB
MD54d19b92f670b50554a29a9878f03639c
SHA1263287f84d68bd5cec0b301ed12339bbf1383cc3
SHA256c1767a4a654d6353bcf6440cc043c532486be927f9fbfe3deb786301cb57433d
SHA512496c0428e71e58858fbdb4c77448605af716f48f575c93411765dd8d9c0c5419f1f91c17e56e2c3b404936930028c4607e99b0ca430b04c1e47cc4ada8f49906
-
Filesize
106KB
MD54d19b92f670b50554a29a9878f03639c
SHA1263287f84d68bd5cec0b301ed12339bbf1383cc3
SHA256c1767a4a654d6353bcf6440cc043c532486be927f9fbfe3deb786301cb57433d
SHA512496c0428e71e58858fbdb4c77448605af716f48f575c93411765dd8d9c0c5419f1f91c17e56e2c3b404936930028c4607e99b0ca430b04c1e47cc4ada8f49906
-
Filesize
241KB
MD58240d2dcaa2c4c7fe6f91b0613abb1de
SHA10e7fe1d2517dd5a8c5cb3535e9a43b4cd77874e2
SHA2563896724153e58fe338a5f660f3f43f81a2ef5aab887abb976c90e0c69a1dedd7
SHA512baa8788c64221e78a9a3943e607af966cbbd99ad0266cec0910d4264e6fcfbc1f8cd56dd51626b637f5bb3d98f4866ef990040baed24d7e8c7cdd4eaba69468f
-
Filesize
241KB
MD58240d2dcaa2c4c7fe6f91b0613abb1de
SHA10e7fe1d2517dd5a8c5cb3535e9a43b4cd77874e2
SHA2563896724153e58fe338a5f660f3f43f81a2ef5aab887abb976c90e0c69a1dedd7
SHA512baa8788c64221e78a9a3943e607af966cbbd99ad0266cec0910d4264e6fcfbc1f8cd56dd51626b637f5bb3d98f4866ef990040baed24d7e8c7cdd4eaba69468f
-
Filesize
241KB
MD58240d2dcaa2c4c7fe6f91b0613abb1de
SHA10e7fe1d2517dd5a8c5cb3535e9a43b4cd77874e2
SHA2563896724153e58fe338a5f660f3f43f81a2ef5aab887abb976c90e0c69a1dedd7
SHA512baa8788c64221e78a9a3943e607af966cbbd99ad0266cec0910d4264e6fcfbc1f8cd56dd51626b637f5bb3d98f4866ef990040baed24d7e8c7cdd4eaba69468f
-
Filesize
108KB
MD5378ea96a2625f43a4bc0535912c1004a
SHA136d7d73aa44423c567d38046dc574eb597892be6
SHA25625405a1b4db7d8882c1d8ff2155d9b1db9987b96f0cbdc3636b37c84a0949b03
SHA5122ac22e3f9adfed481b0b9d483ac49348c40250d7179a696c2ec766e9a2f8e496d7a5247125b363f6ecd131f678f1f849ac9e409bec83082d5cb936507eb0d52d
-
Filesize
108KB
MD5378ea96a2625f43a4bc0535912c1004a
SHA136d7d73aa44423c567d38046dc574eb597892be6
SHA25625405a1b4db7d8882c1d8ff2155d9b1db9987b96f0cbdc3636b37c84a0949b03
SHA5122ac22e3f9adfed481b0b9d483ac49348c40250d7179a696c2ec766e9a2f8e496d7a5247125b363f6ecd131f678f1f849ac9e409bec83082d5cb936507eb0d52d
-
Filesize
176KB
MD5afe0a536a15a5fc24e2e99890139bbf7
SHA1005751ee59636618d392048f53e996156becafec
SHA25635941e057915838b4a2d6e1ba12d9f61fd379ffa31c5cdfc7a6e28f4f90ef903
SHA51248d48e0f53781a100eedebe62f3d251b20b33523abe185e4e307fc876e18d56beffc922730890be4bd0a6532d52b5a1474af70ef3e697f49063c8aacb67833d0
-
Filesize
176KB
MD5afe0a536a15a5fc24e2e99890139bbf7
SHA1005751ee59636618d392048f53e996156becafec
SHA25635941e057915838b4a2d6e1ba12d9f61fd379ffa31c5cdfc7a6e28f4f90ef903
SHA51248d48e0f53781a100eedebe62f3d251b20b33523abe185e4e307fc876e18d56beffc922730890be4bd0a6532d52b5a1474af70ef3e697f49063c8aacb67833d0
-
Filesize
176KB
MD5afe0a536a15a5fc24e2e99890139bbf7
SHA1005751ee59636618d392048f53e996156becafec
SHA25635941e057915838b4a2d6e1ba12d9f61fd379ffa31c5cdfc7a6e28f4f90ef903
SHA51248d48e0f53781a100eedebe62f3d251b20b33523abe185e4e307fc876e18d56beffc922730890be4bd0a6532d52b5a1474af70ef3e697f49063c8aacb67833d0
-
Filesize
159KB
MD599568da559a884a89604b7bcfea00996
SHA11d2b33ecb296e04791127015f7f0394e5b7384e2
SHA2567374faf35d0a53f588b01d1c61304950aa6e1d439ab34ef81dfadbf19f4d100a
SHA512412e6c57a092fa9b44253ed46a74503a2824fe4c02f8fdc80c89da2defb0b7124166187a49418cc885011bc322dc872eed111ae7be2a92620ae1063f34f5eab5
-
Filesize
159KB
MD599568da559a884a89604b7bcfea00996
SHA11d2b33ecb296e04791127015f7f0394e5b7384e2
SHA2567374faf35d0a53f588b01d1c61304950aa6e1d439ab34ef81dfadbf19f4d100a
SHA512412e6c57a092fa9b44253ed46a74503a2824fe4c02f8fdc80c89da2defb0b7124166187a49418cc885011bc322dc872eed111ae7be2a92620ae1063f34f5eab5
-
Filesize
159KB
MD599568da559a884a89604b7bcfea00996
SHA11d2b33ecb296e04791127015f7f0394e5b7384e2
SHA2567374faf35d0a53f588b01d1c61304950aa6e1d439ab34ef81dfadbf19f4d100a
SHA512412e6c57a092fa9b44253ed46a74503a2824fe4c02f8fdc80c89da2defb0b7124166187a49418cc885011bc322dc872eed111ae7be2a92620ae1063f34f5eab5