Analysis
-
max time kernel
27s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:53
Static task
static1
Behavioral task
behavioral1
Sample
b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe
Resource
win10v2004-20220812-en
General
-
Target
b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe
-
Size
445KB
-
MD5
0eb6e7daf803d6175fc8773cf44fda2a
-
SHA1
b04de286719d19f1927362eced1f0b460bd867bb
-
SHA256
b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78
-
SHA512
6848e706471ad9226bc86fe87afe5a233b4b5adbdd8fb418e015a5e144a422940fa54a0cca4389d88b3497d13b2a925fae4ace3ba2bb9faf7afe4e7e07e713f7
-
SSDEEP
12288:VYV22N6BQz7H2BY+OVj6Zmtie7YIIxatUbh:VYMe6SG/SVti+JtUd
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 2004 installd.exe 860 nethtsrv.exe 1536 netupdsrv.exe 1464 nethtsrv.exe 1044 netupdsrv.exe -
Loads dropped DLL 13 IoCs
Processes:
b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exeinstalld.exenethtsrv.exenethtsrv.exepid process 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe 2004 installd.exe 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe 860 nethtsrv.exe 860 nethtsrv.exe 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe 1464 nethtsrv.exe 1464 nethtsrv.exe 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exedescription ioc process File created C:\Windows\SysWOW64\hfnapi.dll b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe File created C:\Windows\SysWOW64\hfpapi.dll b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe File created C:\Windows\SysWOW64\installd.exe b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe File created C:\Windows\SysWOW64\nethtsrv.exe b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe File created C:\Windows\SysWOW64\netupdsrv.exe b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe -
Drops file in Program Files directory 3 IoCs
Processes:
b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\ver.xml b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe File created C:\Program Files (x86)\Common Files\Config\data.xml b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 464 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 1464 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1976 wrote to memory of 1316 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe net.exe PID 1976 wrote to memory of 1316 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe net.exe PID 1976 wrote to memory of 1316 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe net.exe PID 1976 wrote to memory of 1316 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe net.exe PID 1316 wrote to memory of 1136 1316 net.exe net1.exe PID 1316 wrote to memory of 1136 1316 net.exe net1.exe PID 1316 wrote to memory of 1136 1316 net.exe net1.exe PID 1316 wrote to memory of 1136 1316 net.exe net1.exe PID 1976 wrote to memory of 1060 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe net.exe PID 1976 wrote to memory of 1060 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe net.exe PID 1976 wrote to memory of 1060 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe net.exe PID 1976 wrote to memory of 1060 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe net.exe PID 1060 wrote to memory of 1768 1060 net.exe net1.exe PID 1060 wrote to memory of 1768 1060 net.exe net1.exe PID 1060 wrote to memory of 1768 1060 net.exe net1.exe PID 1060 wrote to memory of 1768 1060 net.exe net1.exe PID 1976 wrote to memory of 2004 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe installd.exe PID 1976 wrote to memory of 2004 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe installd.exe PID 1976 wrote to memory of 2004 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe installd.exe PID 1976 wrote to memory of 2004 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe installd.exe PID 1976 wrote to memory of 2004 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe installd.exe PID 1976 wrote to memory of 2004 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe installd.exe PID 1976 wrote to memory of 2004 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe installd.exe PID 1976 wrote to memory of 860 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe nethtsrv.exe PID 1976 wrote to memory of 860 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe nethtsrv.exe PID 1976 wrote to memory of 860 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe nethtsrv.exe PID 1976 wrote to memory of 860 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe nethtsrv.exe PID 1976 wrote to memory of 1536 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe netupdsrv.exe PID 1976 wrote to memory of 1536 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe netupdsrv.exe PID 1976 wrote to memory of 1536 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe netupdsrv.exe PID 1976 wrote to memory of 1536 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe netupdsrv.exe PID 1976 wrote to memory of 1536 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe netupdsrv.exe PID 1976 wrote to memory of 1536 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe netupdsrv.exe PID 1976 wrote to memory of 1536 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe netupdsrv.exe PID 1976 wrote to memory of 1532 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe net.exe PID 1976 wrote to memory of 1532 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe net.exe PID 1976 wrote to memory of 1532 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe net.exe PID 1976 wrote to memory of 1532 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe net.exe PID 1532 wrote to memory of 1960 1532 net.exe net1.exe PID 1532 wrote to memory of 1960 1532 net.exe net1.exe PID 1532 wrote to memory of 1960 1532 net.exe net1.exe PID 1532 wrote to memory of 1960 1532 net.exe net1.exe PID 1976 wrote to memory of 1492 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe net.exe PID 1976 wrote to memory of 1492 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe net.exe PID 1976 wrote to memory of 1492 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe net.exe PID 1976 wrote to memory of 1492 1976 b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe net.exe PID 1492 wrote to memory of 808 1492 net.exe net1.exe PID 1492 wrote to memory of 808 1492 net.exe net1.exe PID 1492 wrote to memory of 808 1492 net.exe net1.exe PID 1492 wrote to memory of 808 1492 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe"C:\Users\Admin\AppData\Local\Temp\b020a58cc12bf8a3a219eff3003f0742fce6aed78c747f804da2649c1ed48e78.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1136
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1768
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2004 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:860 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1960
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:808
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:1044
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5fd0e041ed1c860fe3624dfe942149375
SHA19fc29de9b65adfd942cbc7ce8eff5c0ea1524449
SHA2569df018a418a2dffec026e9e42e526cdecc7907bdd205961dc414489ba0ce0340
SHA5124f79b066d51b4485f03b137a8216f759405dd98ec0332218e7a2f9b45d22b69ccdabb06f74c22a22056324d88d217b7b2d64ceb8ae3cc54e654afff02d5b0407
-
Filesize
241KB
MD5b32ca37ab512cca0ddc8db1ccaac5760
SHA16ef0406185585eaeb5d05531f4de26da5e85c3db
SHA2562348625d0465212de8c49c3812e7f12b4cc56e48771d8a25193bd2b49ac20362
SHA512266369c8799bb533d692a0e601cb831f04ecb519500410751090d8946558726e300abc443bdc54d93e596b9676ba37597bd90ffeb6d1883e051ff00f2d10bb3d
-
Filesize
108KB
MD5589150576166fc3febc2948dad1d0d9e
SHA12b5af5242c0b92202955a576009a6a59028c3b19
SHA2562d9376b90e9770ab9d43f659d5bea3f21293c5b51dd2535b36648e1e26e5c0b1
SHA512d8fb1706d4425cca4906f177722de4bd64994a319a44bfe5c1229c32e0b468b40eddd9745b3ad81a5c152aa0d7b5e7dccccc5350c020f04c98c24493fdee1f37
-
Filesize
176KB
MD5aad4565814d1d6f4f2255abd1fad3b0c
SHA194100cd678df0f2659c754724b2f132f18e1be77
SHA2568a17e5de1c5f540f7c3687db3a1e7a55f349bbfeb50f77248ed9a10f04a9233f
SHA51252425316396743c8a3d76b4bd483ffc3afa3a1a9bb4344457401b735e9bdd54d712a5641b2f886ab9f4d894e6f5453f39bfc26c7a357a84ad4f53119389c5950
-
Filesize
176KB
MD5aad4565814d1d6f4f2255abd1fad3b0c
SHA194100cd678df0f2659c754724b2f132f18e1be77
SHA2568a17e5de1c5f540f7c3687db3a1e7a55f349bbfeb50f77248ed9a10f04a9233f
SHA51252425316396743c8a3d76b4bd483ffc3afa3a1a9bb4344457401b735e9bdd54d712a5641b2f886ab9f4d894e6f5453f39bfc26c7a357a84ad4f53119389c5950
-
Filesize
158KB
MD59eb530d4b9eb01ddc36b388237f3befd
SHA15dfa752d60b89d097719fc9f4d5251cca0b6df61
SHA25685dff4cff208172692f03184ad339bbc542f211b078c1851834b67329660bf2b
SHA512ccaa3538bfdf521199e7e35c13dda5770582ce3f28d861805d526782a01d9805fe39ec6d5bfc39ecd45b11559d6b6b26e35f211071d1db617e8279b9e363e724
-
Filesize
158KB
MD59eb530d4b9eb01ddc36b388237f3befd
SHA15dfa752d60b89d097719fc9f4d5251cca0b6df61
SHA25685dff4cff208172692f03184ad339bbc542f211b078c1851834b67329660bf2b
SHA512ccaa3538bfdf521199e7e35c13dda5770582ce3f28d861805d526782a01d9805fe39ec6d5bfc39ecd45b11559d6b6b26e35f211071d1db617e8279b9e363e724
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5fd0e041ed1c860fe3624dfe942149375
SHA19fc29de9b65adfd942cbc7ce8eff5c0ea1524449
SHA2569df018a418a2dffec026e9e42e526cdecc7907bdd205961dc414489ba0ce0340
SHA5124f79b066d51b4485f03b137a8216f759405dd98ec0332218e7a2f9b45d22b69ccdabb06f74c22a22056324d88d217b7b2d64ceb8ae3cc54e654afff02d5b0407
-
Filesize
106KB
MD5fd0e041ed1c860fe3624dfe942149375
SHA19fc29de9b65adfd942cbc7ce8eff5c0ea1524449
SHA2569df018a418a2dffec026e9e42e526cdecc7907bdd205961dc414489ba0ce0340
SHA5124f79b066d51b4485f03b137a8216f759405dd98ec0332218e7a2f9b45d22b69ccdabb06f74c22a22056324d88d217b7b2d64ceb8ae3cc54e654afff02d5b0407
-
Filesize
106KB
MD5fd0e041ed1c860fe3624dfe942149375
SHA19fc29de9b65adfd942cbc7ce8eff5c0ea1524449
SHA2569df018a418a2dffec026e9e42e526cdecc7907bdd205961dc414489ba0ce0340
SHA5124f79b066d51b4485f03b137a8216f759405dd98ec0332218e7a2f9b45d22b69ccdabb06f74c22a22056324d88d217b7b2d64ceb8ae3cc54e654afff02d5b0407
-
Filesize
241KB
MD5b32ca37ab512cca0ddc8db1ccaac5760
SHA16ef0406185585eaeb5d05531f4de26da5e85c3db
SHA2562348625d0465212de8c49c3812e7f12b4cc56e48771d8a25193bd2b49ac20362
SHA512266369c8799bb533d692a0e601cb831f04ecb519500410751090d8946558726e300abc443bdc54d93e596b9676ba37597bd90ffeb6d1883e051ff00f2d10bb3d
-
Filesize
241KB
MD5b32ca37ab512cca0ddc8db1ccaac5760
SHA16ef0406185585eaeb5d05531f4de26da5e85c3db
SHA2562348625d0465212de8c49c3812e7f12b4cc56e48771d8a25193bd2b49ac20362
SHA512266369c8799bb533d692a0e601cb831f04ecb519500410751090d8946558726e300abc443bdc54d93e596b9676ba37597bd90ffeb6d1883e051ff00f2d10bb3d
-
Filesize
108KB
MD5589150576166fc3febc2948dad1d0d9e
SHA12b5af5242c0b92202955a576009a6a59028c3b19
SHA2562d9376b90e9770ab9d43f659d5bea3f21293c5b51dd2535b36648e1e26e5c0b1
SHA512d8fb1706d4425cca4906f177722de4bd64994a319a44bfe5c1229c32e0b468b40eddd9745b3ad81a5c152aa0d7b5e7dccccc5350c020f04c98c24493fdee1f37
-
Filesize
176KB
MD5aad4565814d1d6f4f2255abd1fad3b0c
SHA194100cd678df0f2659c754724b2f132f18e1be77
SHA2568a17e5de1c5f540f7c3687db3a1e7a55f349bbfeb50f77248ed9a10f04a9233f
SHA51252425316396743c8a3d76b4bd483ffc3afa3a1a9bb4344457401b735e9bdd54d712a5641b2f886ab9f4d894e6f5453f39bfc26c7a357a84ad4f53119389c5950
-
Filesize
158KB
MD59eb530d4b9eb01ddc36b388237f3befd
SHA15dfa752d60b89d097719fc9f4d5251cca0b6df61
SHA25685dff4cff208172692f03184ad339bbc542f211b078c1851834b67329660bf2b
SHA512ccaa3538bfdf521199e7e35c13dda5770582ce3f28d861805d526782a01d9805fe39ec6d5bfc39ecd45b11559d6b6b26e35f211071d1db617e8279b9e363e724