Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 13:41
Static task
static1
Behavioral task
behavioral1
Sample
a1fdd1e367851bbd91cdde603d10d4b9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1fdd1e367851bbd91cdde603d10d4b9.exe
Resource
win10v2004-20240221-en
General
-
Target
a1fdd1e367851bbd91cdde603d10d4b9.exe
-
Size
552KB
-
MD5
a1fdd1e367851bbd91cdde603d10d4b9
-
SHA1
2b0f640b54ea44b7c59b31b7eb0c08e233ee4876
-
SHA256
883d51c41271cd28a3b20969f14789c13bc5f7971f884013e84fc8d1f54f7304
-
SHA512
8311f900beb589902ef014d385525a7728bce2154e6d24c9aa8f6ab8a988aa5aea64d10fa6d056f99995ba5f846ceb611df887056d15a27a6a266438433a6496
-
SSDEEP
12288:2JupwI3iV2ENXh2mqBMDMe8BZqW9vg/ddK32s/QjkOSR2QaY:2PI3Q2yh27M0ZB0d+QjkjQm
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts bffd.exe -
Executes dropped EXE 3 IoCs
pid Process 4628 bffd.exe 1812 bffd.exe 3304 bffd.exe -
Loads dropped DLL 33 IoCs
pid Process 4436 regsvr32.exe 3304 bffd.exe 4460 rundll32.exe 3440 rundll32.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe 3304 bffd.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\ = "Microsoft User" regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification \??\PhysicalDrive0 bffd.exe File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\14rb.exe a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\a1l8.dlltmp a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\1ba4.dll a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\b3fs.dll a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\4f3r.dlltmp a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\841e.dll a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\8b4o.dlltmp a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\a1l8.dll a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\b4cb.dlltmp a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\144d.exe a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\bffd.exe a1fdd1e367851bbd91cdde603d10d4b9.exe File created C:\Windows\SysWOW64\0356 rundll32.exe File opened for modification C:\Windows\SysWOW64\b4cb.dll a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\34ua.exe a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\4f3r.dll a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\8b4o.dll a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\SysWOW64\3bef.dll a1fdd1e367851bbd91cdde603d10d4b9.exe File created C:\Windows\SysWOW64\-117-70-12561 rundll32.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\8f6d.exe a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\14ba.exe a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\f6f.bmp a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\8f6.exe a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\a34b.flv a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\a8fd.exe a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\a8fd.flv a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\bf14.bmp a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\6f1u.bmp a1fdd1e367851bbd91cdde603d10d4b9.exe File created C:\Windows\Tasks\ms.job a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\a8f.flv a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\4bad.flv a1fdd1e367851bbd91cdde603d10d4b9.exe File opened for modification C:\Windows\f6fu.bmp a1fdd1e367851bbd91cdde603d10d4b9.exe -
Modifies registry class 47 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\ = "IFunPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\TypeLib\ = "{797AD939-E96C-43E1-ACBD-778DFFD8748C}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\CLSID\ = "{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CurVer\ = "BHO.FunPlayer.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\ = "CFunPlayer Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\TypeLib\ = "{797AD939-E96C-43E1-ACBD-778DFFD8748C}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\ = "CFunPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\TypeLib\ = "{797AD939-E96C-43E1-ACBD-778DFFD8748C}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CLSID\ = "{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\InprocServer32\ = "C:\\Windows\\SysWow64\\8b4o.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\AppID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\8b4o.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\ = "CFunPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\VersionIndependentProgID\ = "BHO.FunPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0\ = "BHO 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{797AD939-E96C-43E1-ACBD-778DFFD8748C}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\ = "IFunPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CC0BADE-4049-4B84-B998-D1AD4D7B9C44}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ED493CC4-E87B-4D8C-AC59-2A87A14237A0}\ProgID\ = "BHO.FunPlayer.1" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3304 bffd.exe 3304 bffd.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4632 wrote to memory of 864 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 85 PID 4632 wrote to memory of 864 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 85 PID 4632 wrote to memory of 864 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 85 PID 4632 wrote to memory of 396 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 86 PID 4632 wrote to memory of 396 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 86 PID 4632 wrote to memory of 396 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 86 PID 4632 wrote to memory of 3420 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 87 PID 4632 wrote to memory of 3420 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 87 PID 4632 wrote to memory of 3420 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 87 PID 4632 wrote to memory of 2392 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 88 PID 4632 wrote to memory of 2392 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 88 PID 4632 wrote to memory of 2392 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 88 PID 4632 wrote to memory of 4436 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 90 PID 4632 wrote to memory of 4436 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 90 PID 4632 wrote to memory of 4436 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 90 PID 4632 wrote to memory of 4628 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 92 PID 4632 wrote to memory of 4628 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 92 PID 4632 wrote to memory of 4628 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 92 PID 4632 wrote to memory of 1812 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 95 PID 4632 wrote to memory of 1812 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 95 PID 4632 wrote to memory of 1812 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 95 PID 4632 wrote to memory of 4460 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 98 PID 4632 wrote to memory of 4460 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 98 PID 4632 wrote to memory of 4460 4632 a1fdd1e367851bbd91cdde603d10d4b9.exe 98 PID 3304 wrote to memory of 3440 3304 bffd.exe 99 PID 3304 wrote to memory of 3440 3304 bffd.exe 99 PID 3304 wrote to memory of 3440 3304 bffd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1fdd1e367851bbd91cdde603d10d4b9.exe"C:\Users\Admin\AppData\Local\Temp\a1fdd1e367851bbd91cdde603d10d4b9.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\a1l8.dll"2⤵PID:864
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\b4cb.dll"2⤵PID:396
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4f3r.dll"2⤵PID:3420
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\8b4o.dll"2⤵PID:2392
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\8b4o.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4436
-
-
C:\Windows\SysWOW64\bffd.exeC:\Windows\system32\bffd.exe -i2⤵
- Executes dropped EXE
PID:4628
-
-
C:\Windows\SysWOW64\bffd.exeC:\Windows\system32\bffd.exe -s2⤵
- Executes dropped EXE
PID:1812
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32\841e.dll, Always2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:4460
-
-
C:\Windows\SysWOW64\bffd.exeC:\Windows\SysWOW64\bffd.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32\841e.dll,Always2⤵
- Loads dropped DLL
PID:3440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD552b5c9d6743e2273919f245329a8386a
SHA1b5dbff920d6f4683f52c509d3d634c11e64045f2
SHA2562d5cca3f09415a3461d63bac5062675122414fe9b3d78e387e57283fb930b170
SHA512fab010cce3d3038da2359daf722540df0adce10aa11f0c1b584a63b542bcd3ef25ee0f1d076fce1718f59339565e451a14aa5a311f327d58980774f5822826ce
-
Filesize
408KB
MD547e27cde1286526ef3aaf4f972c18567
SHA112ea74cd7afb48d90330735f08f9ee3db5fc369b
SHA25671de1a96284a1230fc1b379017f8284fcb807f5088ce0e0d706fd296e48b87a1
SHA5125061672e028b8a39d0f4a5923dadded3b578f31770c6e975f0e385189478a437523d987da44b4c6779f261a8524415231db3699a4858fe9594bcaebc5f9050b3
-
Filesize
148KB
MD53cb29611293c9cd7c9d932e80fbc7edd
SHA17d79840f4e8f89e62a03653ee1db6300020f3382
SHA2566eddf063ad03016fca61f74d195e6ea49e9dddf618332c8fef2dd5e67a256856
SHA512b3b8fba18e8fee28ad22144ea55a6dc8e3cf0ed9bceeedaf944b0965547455a84114dcf39c29ae84ad6a47ff32debd06b43e34d78241b82a31be6e7dd1b2b3bb
-
Filesize
267KB
MD5762c9489e82bf633850e996c2cc6ea58
SHA17bdc73a2543b636f5a391f5de28e0ff4faf31d9e
SHA256759454ca3966154d91303eabd4adb00e0705f8e3dadb5102e65e3de7bb082bbd
SHA512fcb4119a749be44e2e61a9f837255a098324f7fa217431ffa5e59a4edacf036d84ca217b2b2ff1a5c32d878d257165a71c1d068720fa940a306cc8e95282cc73