Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
038876658f0a3d5c1fe4aa0eb01c44cd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
038876658f0a3d5c1fe4aa0eb01c44cd.exe
Resource
win10v2004-20231215-en
General
-
Target
038876658f0a3d5c1fe4aa0eb01c44cd.exe
-
Size
436KB
-
MD5
038876658f0a3d5c1fe4aa0eb01c44cd
-
SHA1
e5d3f9970a8f5b2ccf554e8ec57115376a44daac
-
SHA256
e7a0498f63793a1462059c96f5a9c5d32c4edc02390aa2aeca7363293cfa09bc
-
SHA512
39b01eee490e34dcf4f8397eb8526f070c2193bd208092d6969b203a48233b1afe0834ccf1d8ef47af04aba3e6b2258627e4f676bcebcebb64c5c1f7383e644b
-
SSDEEP
6144:Y33QGwxkz6bJcnKpK7ZuVU6f+jgwU/I550ab1vjXQoR2izdVUiln9vqqqlgAqwFf:Y33Q9q2bG0VPS26Yiz0iF9PqlgG
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts bffd.exe -
Executes dropped EXE 3 IoCs
pid Process 3908 bffd.exe 3080 bffd.exe 3924 bffd.exe -
Loads dropped DLL 29 IoCs
pid Process 3996 regsvr32.exe 3924 bffd.exe 2040 rundll32.exe 4312 rundll32.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe 3924 bffd.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\ = "winhome" regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification \??\PhysicalDrive0 bffd.exe File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\a1l8.dlltmp 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\SysWOW64\34ua.exe 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\SysWOW64\b3fs.dll 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\SysWOW64\8b4o.dll 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\SysWOW64\bffd.exe 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\SysWOW64\8b4o.dlltmp 038876658f0a3d5c1fe4aa0eb01c44cd.exe File created C:\Windows\SysWOW64\00c9 rundll32.exe File opened for modification C:\Windows\SysWOW64\14rb.exe 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\SysWOW64\1ba4.dll 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\SysWOW64\b4cb.dll 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\SysWOW64\b4cb.dlltmp 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\SysWOW64\4f3r.dll 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\SysWOW64\144d.exe 038876658f0a3d5c1fe4aa0eb01c44cd.exe File created C:\Windows\SysWOW64\-110-1-25103 rundll32.exe File opened for modification C:\Windows\SysWOW64\a1l8.dll 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\SysWOW64\4f3r.dlltmp 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\SysWOW64\841e.dll 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\SysWOW64\3bef.dll 038876658f0a3d5c1fe4aa0eb01c44cd.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\4bad.flv 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\8f6d.exe 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\bf14.bmp 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\a34b.flv 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\a8f.flv 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\a8fd.exe 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\a8fd.flv 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\14ba.exe 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\8f6.exe 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\f6fu.bmp 038876658f0a3d5c1fe4aa0eb01c44cd.exe File created C:\Windows\Tasks\ms.job 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\f6f.bmp 038876658f0a3d5c1fe4aa0eb01c44cd.exe File opened for modification C:\Windows\6f1u.bmp 038876658f0a3d5c1fe4aa0eb01c44cd.exe -
Modifies registry class 47 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\InprocServer32\ = "C:\\Windows\\SysWow64\\8b4o.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\ = "BHO 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\ = "CFunPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\TypeLib\ = "{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib\ = "{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CLSID\ = "{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\ = "CFunPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\TypeLib\ = "{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\CLSID\ = "{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\8b4o.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ = "IFunPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ = "IFunPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\ProgID\ = "BHO.FunPlayer.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\VersionIndependentProgID\ = "BHO.FunPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84C4A916-2F38-41C4-99BD-C4E8FA05EA54}\AppID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\ = "CFunPlayer Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CurVer\ = "BHO.FunPlayer.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9A5E127F-4EB8-4E6C-92EA-5C8631054C7D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D8644A6-61C5-4641-A655-31C637BD560C} regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3924 bffd.exe 3924 bffd.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 64 wrote to memory of 4964 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 64 PID 64 wrote to memory of 4964 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 64 PID 64 wrote to memory of 4964 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 64 PID 64 wrote to memory of 2592 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 86 PID 64 wrote to memory of 2592 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 86 PID 64 wrote to memory of 2592 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 86 PID 64 wrote to memory of 4088 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 90 PID 64 wrote to memory of 4088 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 90 PID 64 wrote to memory of 4088 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 90 PID 64 wrote to memory of 4988 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 92 PID 64 wrote to memory of 4988 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 92 PID 64 wrote to memory of 4988 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 92 PID 64 wrote to memory of 3996 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 94 PID 64 wrote to memory of 3996 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 94 PID 64 wrote to memory of 3996 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 94 PID 64 wrote to memory of 3908 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 96 PID 64 wrote to memory of 3908 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 96 PID 64 wrote to memory of 3908 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 96 PID 64 wrote to memory of 3080 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 99 PID 64 wrote to memory of 3080 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 99 PID 64 wrote to memory of 3080 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 99 PID 64 wrote to memory of 2040 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 100 PID 64 wrote to memory of 2040 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 100 PID 64 wrote to memory of 2040 64 038876658f0a3d5c1fe4aa0eb01c44cd.exe 100 PID 3924 wrote to memory of 4312 3924 bffd.exe 101 PID 3924 wrote to memory of 4312 3924 bffd.exe 101 PID 3924 wrote to memory of 4312 3924 bffd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\038876658f0a3d5c1fe4aa0eb01c44cd.exe"C:\Users\Admin\AppData\Local\Temp\038876658f0a3d5c1fe4aa0eb01c44cd.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\a1l8.dll"2⤵PID:4964
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\b4cb.dll"2⤵PID:2592
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4f3r.dll"2⤵PID:4088
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\8b4o.dll"2⤵PID:4988
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\8b4o.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:3996
-
-
C:\Windows\SysWOW64\bffd.exeC:\Windows\system32\bffd.exe -i2⤵
- Executes dropped EXE
PID:3908
-
-
C:\Windows\SysWOW64\bffd.exeC:\Windows\system32\bffd.exe -s2⤵
- Executes dropped EXE
PID:3080
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32\841e.dll, Always2⤵
- Loads dropped DLL
PID:2040
-
-
C:\Windows\SysWOW64\bffd.exeC:\Windows\SysWOW64\bffd.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32\841e.dll,Always2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:4312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD55605002081a7a9518917514e8dc328a4
SHA1655a19e3094e6ff268b83125e160be304310c598
SHA256a00e0476a445fcb01d2e0e994a14eab203fb7c693ed38053e87b310e444830c8
SHA5123a94e12091da34bb1bec8622b36bef91b58a6605ac4fdd83e0dabb2fad210534ae090f7552ea63485c2468a658066fba3f5052f8ea2454b8b13c18056e0fb809
-
Filesize
217KB
MD522067cb22570d1cbc492f3ab4920362f
SHA1a76e03c5f3ac81285c9d465a8e3c66c88a30cd5f
SHA256d911fc009ec8f7906e321c84217d50ad5093cc89fd168c8383872756b5d29bfb
SHA512a4f30f3f89e095067fc72fbf83a8eac3bc9260d44b881004e047addf08658d70f69c6e415b8374badb1b77c824433c0eee6580ba2a92678fbb226803b65c1a74
-
Filesize
65KB
MD5b714fcd0ade2c8327e41ea232b0a96dd
SHA12ac173cfd5df8045d2e32710e62fbddb22e43e0f
SHA256bea4738eda4fae2286c9f858dbea86a13f1690170218266d9e5a600b1daee999
SHA5122dacb0068f55e6c15eee2c7cec3213278b357372593c7ec77751912c05dad72cacf2473a51b448992ff7f01b87e6585a7b357d8e44ae692cd24afe222c711868
-
Filesize
92KB
MD58825c4d8bb49c34322a96b8350eb268a
SHA138a6ef0ba7b6ad29cfdd21108556090642202795
SHA256a9c93784d8b85b88dba509d6b95e30abd7a7108fc23f846c5e289a40bb96f347
SHA512a6418bcfe74c4386306c0e61a825d81da0b30ae187f6752f48eb443039aae351a92e31261f9ef1eaf98f8719c9c5aa95fda5760fe432d56f99086d84f4364dc2