Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2022, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
5c88d239c19b0fcd7063203854335986d1f1fe543a98c0ec96f27e63257487a5.exe
Resource
win10v2004-20220812-en
General
-
Target
5c88d239c19b0fcd7063203854335986d1f1fe543a98c0ec96f27e63257487a5.exe
-
Size
717KB
-
MD5
ab01754731188abea88024b2d19fe16d
-
SHA1
6884de5b235a4aee053d796c0f91b0d400a81402
-
SHA256
5c88d239c19b0fcd7063203854335986d1f1fe543a98c0ec96f27e63257487a5
-
SHA512
b8c21588387d6869ecf4f93344ac2fc103139d01f54f5cca8d9493bbfa8fb28d927e4150b6f4636a7e5ad90dcaac265e0489ce000078bae53f107b54ee255376
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4984 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4528 schtasks.exe 2712 schtasks.exe 5080 schtasks.exe 4444 schtasks.exe 4328 schtasks.exe 1700 schtasks.exe 4356 schtasks.exe 1828 schtasks.exe 3104 schtasks.exe 3212 schtasks.exe 4316 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1300 powershell.exe 1300 powershell.exe 5016 powershell.exe 5016 powershell.exe 3360 powershell.exe 3360 powershell.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1300 powershell.exe Token: SeDebugPrivilege 2592 5c88d239c19b0fcd7063203854335986d1f1fe543a98c0ec96f27e63257487a5.exe Token: SeDebugPrivilege 5016 powershell.exe Token: SeDebugPrivilege 3360 powershell.exe Token: SeDebugPrivilege 4984 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2592 wrote to memory of 3792 2592 5c88d239c19b0fcd7063203854335986d1f1fe543a98c0ec96f27e63257487a5.exe 80 PID 2592 wrote to memory of 3792 2592 5c88d239c19b0fcd7063203854335986d1f1fe543a98c0ec96f27e63257487a5.exe 80 PID 2592 wrote to memory of 3792 2592 5c88d239c19b0fcd7063203854335986d1f1fe543a98c0ec96f27e63257487a5.exe 80 PID 3792 wrote to memory of 384 3792 cmd.exe 82 PID 3792 wrote to memory of 384 3792 cmd.exe 82 PID 3792 wrote to memory of 384 3792 cmd.exe 82 PID 3792 wrote to memory of 1300 3792 cmd.exe 83 PID 3792 wrote to memory of 1300 3792 cmd.exe 83 PID 3792 wrote to memory of 1300 3792 cmd.exe 83 PID 3792 wrote to memory of 5016 3792 cmd.exe 84 PID 3792 wrote to memory of 5016 3792 cmd.exe 84 PID 3792 wrote to memory of 5016 3792 cmd.exe 84 PID 3792 wrote to memory of 3360 3792 cmd.exe 85 PID 3792 wrote to memory of 3360 3792 cmd.exe 85 PID 3792 wrote to memory of 3360 3792 cmd.exe 85 PID 2592 wrote to memory of 4984 2592 5c88d239c19b0fcd7063203854335986d1f1fe543a98c0ec96f27e63257487a5.exe 89 PID 2592 wrote to memory of 4984 2592 5c88d239c19b0fcd7063203854335986d1f1fe543a98c0ec96f27e63257487a5.exe 89 PID 2592 wrote to memory of 4984 2592 5c88d239c19b0fcd7063203854335986d1f1fe543a98c0ec96f27e63257487a5.exe 89 PID 4984 wrote to memory of 3560 4984 dllhost.exe 90 PID 4984 wrote to memory of 3560 4984 dllhost.exe 90 PID 4984 wrote to memory of 3560 4984 dllhost.exe 90 PID 4984 wrote to memory of 3488 4984 dllhost.exe 95 PID 4984 wrote to memory of 3488 4984 dllhost.exe 95 PID 4984 wrote to memory of 3488 4984 dllhost.exe 95 PID 4984 wrote to memory of 3532 4984 dllhost.exe 92 PID 4984 wrote to memory of 3532 4984 dllhost.exe 92 PID 4984 wrote to memory of 3532 4984 dllhost.exe 92 PID 4984 wrote to memory of 4776 4984 dllhost.exe 93 PID 4984 wrote to memory of 4776 4984 dllhost.exe 93 PID 4984 wrote to memory of 4776 4984 dllhost.exe 93 PID 4984 wrote to memory of 2596 4984 dllhost.exe 96 PID 4984 wrote to memory of 2596 4984 dllhost.exe 96 PID 4984 wrote to memory of 2596 4984 dllhost.exe 96 PID 4984 wrote to memory of 4476 4984 dllhost.exe 98 PID 4984 wrote to memory of 4476 4984 dllhost.exe 98 PID 4984 wrote to memory of 4476 4984 dllhost.exe 98 PID 4984 wrote to memory of 3120 4984 dllhost.exe 102 PID 4984 wrote to memory of 3120 4984 dllhost.exe 102 PID 4984 wrote to memory of 3120 4984 dllhost.exe 102 PID 4984 wrote to memory of 1924 4984 dllhost.exe 99 PID 4984 wrote to memory of 1924 4984 dllhost.exe 99 PID 4984 wrote to memory of 1924 4984 dllhost.exe 99 PID 4984 wrote to memory of 3980 4984 dllhost.exe 111 PID 4984 wrote to memory of 3980 4984 dllhost.exe 111 PID 4984 wrote to memory of 3980 4984 dllhost.exe 111 PID 4984 wrote to memory of 928 4984 dllhost.exe 105 PID 4984 wrote to memory of 928 4984 dllhost.exe 105 PID 4984 wrote to memory of 928 4984 dllhost.exe 105 PID 4984 wrote to memory of 2408 4984 dllhost.exe 107 PID 4984 wrote to memory of 2408 4984 dllhost.exe 107 PID 4984 wrote to memory of 2408 4984 dllhost.exe 107 PID 4984 wrote to memory of 4424 4984 dllhost.exe 108 PID 4984 wrote to memory of 4424 4984 dllhost.exe 108 PID 4984 wrote to memory of 4424 4984 dllhost.exe 108 PID 3120 wrote to memory of 1700 3120 cmd.exe 114 PID 3120 wrote to memory of 1700 3120 cmd.exe 114 PID 3120 wrote to memory of 1700 3120 cmd.exe 114 PID 1924 wrote to memory of 4528 1924 cmd.exe 115 PID 1924 wrote to memory of 4528 1924 cmd.exe 115 PID 1924 wrote to memory of 4528 1924 cmd.exe 115 PID 3560 wrote to memory of 3212 3560 cmd.exe 119 PID 3560 wrote to memory of 3212 3560 cmd.exe 119 PID 3560 wrote to memory of 3212 3560 cmd.exe 119 PID 4776 wrote to memory of 1828 4776 cmd.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c88d239c19b0fcd7063203854335986d1f1fe543a98c0ec96f27e63257487a5.exe"C:\Users\Admin\AppData\Local\Temp\5c88d239c19b0fcd7063203854335986d1f1fe543a98c0ec96f27e63257487a5.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:384
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3360
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3212
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3532
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4444
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1828
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3488
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4356
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2596
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3104
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4476
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:5080
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4528
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1700
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk6887" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:928
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk2150" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2408
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk2150" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2712
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk2143" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4424
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk2143" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4316
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk6074" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3980
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk6074" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4328
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:1316
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:3020
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4936
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4228
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4548
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4224
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
895KB
MD539495116aeea27dc185c09e3858ab643
SHA1d5202f0b8d3f1391a590becdaac38cf8ea76f8e0
SHA2562efa86b9d8a116ef4c046ef15fa6cd8ea5ec361b563d9166cb99157bfaf3e0cc
SHA5125b0ac2f7dc6ade9481744fb9e61d3561934d56e4f849851b341107e65ce0ff2bcb3795a926a63007ed7e9aba520b10b746b8dc7f71536986017ec99635a93a66
-
Filesize
895KB
MD539495116aeea27dc185c09e3858ab643
SHA1d5202f0b8d3f1391a590becdaac38cf8ea76f8e0
SHA2562efa86b9d8a116ef4c046ef15fa6cd8ea5ec361b563d9166cb99157bfaf3e0cc
SHA5125b0ac2f7dc6ade9481744fb9e61d3561934d56e4f849851b341107e65ce0ff2bcb3795a926a63007ed7e9aba520b10b746b8dc7f71536986017ec99635a93a66
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD57695d8d9e492378a1dbc01721f6c769d
SHA12bf0d715daa2e9abb1c89615f923dd8bd8b5b478
SHA2568865c1d7ac4ae61ce830fedd173dfc38446dcd49330819ce8c74736b75a4aa24
SHA5128332cb1095dcd8eb5249fd81fe981fe034f1b28952dd52bd3f6f12ab1af67251ed8857c1a5854c3d04d651a6cee4f6177329ffd4693a1c8095bb111791759334
-
Filesize
18KB
MD5392b32d03fdb22df5df4bb1dce435b9d
SHA1882e8c7141812ce3cf6a643c326f08717857f764
SHA256ed2b56f37f0b057d796ba678c9ecf6e196a5069978961d38c6816e16b1c3caf7
SHA5120b1249f139e45f8f990176058adc72c1ec1c852c354e2786b3ae907feeac5291b6e3a9f0e9a728087a41173cdc5607a5d309b069a2898dc1b7e4f214a744b886