Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 17:22
Static task
static1
Behavioral task
behavioral1
Sample
fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7.exe
Resource
win7-20220901-en
General
-
Target
fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7.exe
-
Size
1.1MB
-
MD5
76129308241ae5ac4d200214b352f7d0
-
SHA1
ff30e79e82082092ae9a174d0682e60bf30f3fb6
-
SHA256
fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7
-
SHA512
ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b
-
SSDEEP
24576:YR/cLzx3RgD5mXegr4R0ejdwFTP2hTfqYT1+jM34mPL/fiWMtdsPg:e/c53RgD5mOdRTOShTfq4/34OniWMt
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\FirewallOverride = "1" hogqjuckdi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusDisableNotify = "1" hogqjuckdi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusOverride = "1" hogqjuckdi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" hogqjuckdi.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts qgwclb481o8fuocazl5j9.exe -
Executes dropped EXE 5 IoCs
pid Process 2568 qgwclb481o8fuocazl5j9.exe 3664 hogqjuckdi.exe 2464 kwatdsqcwjn.exe 4872 hogqjuckdi.exe 2928 qgwclb48a29fu.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4808 netsh.exe -
Loads dropped DLL 4 IoCs
pid Process 1376 fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7.exe 1376 fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7.exe 3664 hogqjuckdi.exe 3664 hogqjuckdi.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" hogqjuckdi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\FirewallOverride = "1" hogqjuckdi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusDisableNotify = "1" hogqjuckdi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusOverride = "1" hogqjuckdi.exe -
Drops file in Windows directory 22 IoCs
description ioc Process File opened for modification C:\Windows\lvwfaezgrypl\lck hogqjuckdi.exe File created C:\Windows\lvwfaezgrypl\rng hogqjuckdi.exe File opened for modification C:\Windows\lvwfaezgrypl\tst kwatdsqcwjn.exe File opened for modification C:\Windows\lvwfaezgrypl\tst hogqjuckdi.exe File created C:\Windows\kwatdsqcwjn.exe hogqjuckdi.exe File created C:\Windows\lvwfaezgrypl\cfg hogqjuckdi.exe File opened for modification C:\Windows\lvwfaezgrypl\tst hogqjuckdi.exe File created C:\Windows\lvwfaezgrypl\tst fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7.exe File opened for modification C:\Windows\hogqjuckdi.exe qgwclb481o8fuocazl5j9.exe File created C:\Windows\hogqjuckdi.exe qgwclb481o8fuocazl5j9.exe File opened for modification C:\Windows\kwatdsqcwjn.exe hogqjuckdi.exe File opened for modification C:\Windows\lvwfaezgrypl\rng hogqjuckdi.exe File opened for modification C:\Windows\lvwfaezgrypl\ hogqjuckdi.exe File opened for modification C:\Windows\lvwfaezgrypl\ qgwclb481o8fuocazl5j9.exe File created C:\Windows\lvwfaezgrypl\etc qgwclb481o8fuocazl5j9.exe File opened for modification C:\Windows\lvwfaezgrypl\ hogqjuckdi.exe File created C:\Windows\lvwfaezgrypl\run hogqjuckdi.exe File opened for modification C:\Windows\lvwfaezgrypl\ kwatdsqcwjn.exe File created C:\Windows\lvwfaezgrypl\lck hogqjuckdi.exe File opened for modification C:\Windows\lvwfaezgrypl\ fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7.exe File opened for modification C:\Windows\lvwfaezgrypl\tst qgwclb481o8fuocazl5j9.exe File created C:\Windows\lvwfaezgrypl\lck qgwclb481o8fuocazl5j9.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-101 = "Provides DHCP based enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-2 = "Provides IPsec based enforcement for Network Access Protection" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-100 = "EAP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-102 = "1.0" netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-4 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-3 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-100 = "RD Gateway Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-102 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-100 = "DHCP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-103 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-1 = "IPsec Relying Party" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-101 = "Provides RD Gateway enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-101 = "Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies." netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-102 = "Microsoft Corporation" netsh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3664 hogqjuckdi.exe 3664 hogqjuckdi.exe 3664 hogqjuckdi.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe 2464 kwatdsqcwjn.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1376 wrote to memory of 2568 1376 fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7.exe 26 PID 1376 wrote to memory of 2568 1376 fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7.exe 26 PID 1376 wrote to memory of 2568 1376 fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7.exe 26 PID 1376 wrote to memory of 2568 1376 fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7.exe 26 PID 3664 wrote to memory of 2464 3664 hogqjuckdi.exe 28 PID 3664 wrote to memory of 2464 3664 hogqjuckdi.exe 28 PID 3664 wrote to memory of 2464 3664 hogqjuckdi.exe 28 PID 3664 wrote to memory of 2464 3664 hogqjuckdi.exe 28 PID 3664 wrote to memory of 4808 3664 hogqjuckdi.exe 29 PID 3664 wrote to memory of 4808 3664 hogqjuckdi.exe 29 PID 3664 wrote to memory of 4808 3664 hogqjuckdi.exe 29 PID 3664 wrote to memory of 4808 3664 hogqjuckdi.exe 29 PID 2568 wrote to memory of 4872 2568 qgwclb481o8fuocazl5j9.exe 31 PID 2568 wrote to memory of 4872 2568 qgwclb481o8fuocazl5j9.exe 31 PID 2568 wrote to memory of 4872 2568 qgwclb481o8fuocazl5j9.exe 31 PID 2568 wrote to memory of 4872 2568 qgwclb481o8fuocazl5j9.exe 31 PID 3664 wrote to memory of 2928 3664 hogqjuckdi.exe 32 PID 3664 wrote to memory of 2928 3664 hogqjuckdi.exe 32 PID 3664 wrote to memory of 2928 3664 hogqjuckdi.exe 32 PID 3664 wrote to memory of 2928 3664 hogqjuckdi.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7.exe"C:\Users\Admin\AppData\Local\Temp\fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\qgwclb481o8fuocazl5j9.exe"C:\Users\Admin\AppData\Local\Temp\qgwclb481o8fuocazl5j9.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\hogqjuckdi.exe"C:\Windows\hogqjuckdi.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4872
-
-
-
C:\Windows\hogqjuckdi.exeC:\Windows\hogqjuckdi.exe1⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\kwatdsqcwjn.exeWATCHDOGPROC "c:\windows\hogqjuckdi.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe firewall set opmode disable2⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:4808
-
-
C:\Windows\TEMP\qgwclb48a29fu.exeC:\Windows\TEMP\qgwclb48a29fu.exe -r 51412 tcp2⤵
- Executes dropped EXE
PID:2928
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD576129308241ae5ac4d200214b352f7d0
SHA1ff30e79e82082092ae9a174d0682e60bf30f3fb6
SHA256fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7
SHA512ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b
-
Filesize
34KB
MD5476f447617f65eebf35c52d4fd3b3188
SHA1179ee6e698803a45be916f107638f01d553d6e65
SHA256a8c7fd29a25658f115213c3516dd8f77d44d42c40f9348996443e593d878dcf0
SHA51237c51cb92a2adaa3fdb70ae41c95f5499e25cc772020d6c701ef9ce157320017ae207896dcc0e27b9841d0b7890a8b37440bff6dfa0468dc01f72275d4c820f9
-
Filesize
1.1MB
MD576129308241ae5ac4d200214b352f7d0
SHA1ff30e79e82082092ae9a174d0682e60bf30f3fb6
SHA256fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7
SHA512ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b
-
Filesize
1.1MB
MD576129308241ae5ac4d200214b352f7d0
SHA1ff30e79e82082092ae9a174d0682e60bf30f3fb6
SHA256fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7
SHA512ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b
-
Filesize
1.1MB
MD576129308241ae5ac4d200214b352f7d0
SHA1ff30e79e82082092ae9a174d0682e60bf30f3fb6
SHA256fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7
SHA512ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b
-
Filesize
10B
MD5f88afa0fa241403dfd98c4a821363068
SHA151222887163b34f02dc35eaffbb127940b44ec91
SHA2563ec913f1de6e549c24261b68f8623fcd609afcc301985d231414cbaa09e2b55e
SHA512e836a09cab1a5d9663da898b1a23f322dfae5244ec88282b7135b2c7fda47682cf490b0bac3a1fc7555b931bfc1f12a5892ee7dedc2c9238b45e9b86ff56814b
-
Filesize
4B
MD540497c86020084c2bbf5445cd18d597a
SHA1bd3e974b3c0619c84b98c0be0aabf91f4101bc64
SHA25695289b2dda0e64fd15afd08d382f6af6a1cf08d74d1dc4e3b607d8ca89f23760
SHA512b2d5bbd49a298259676b4ea9f0fa318f1286aac256ff69250d17a9ed96519ad564be1edd5d4f805e5f60d1fad1249c64f1491e9c2b1d19387220d646cf286779
-
Filesize
10B
MD5d9e0d258df86c6859951b803fa0e539c
SHA1d04df79fdffa92605bdc478f4247fa2b55fceb7f
SHA256e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e
SHA5128c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e
-
Filesize
10B
MD5d9e0d258df86c6859951b803fa0e539c
SHA1d04df79fdffa92605bdc478f4247fa2b55fceb7f
SHA256e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e
SHA5128c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e
-
Filesize
10B
MD5d9e0d258df86c6859951b803fa0e539c
SHA1d04df79fdffa92605bdc478f4247fa2b55fceb7f
SHA256e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e
SHA5128c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e
-
Filesize
10B
MD5d9e0d258df86c6859951b803fa0e539c
SHA1d04df79fdffa92605bdc478f4247fa2b55fceb7f
SHA256e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e
SHA5128c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e
-
Filesize
1.1MB
MD576129308241ae5ac4d200214b352f7d0
SHA1ff30e79e82082092ae9a174d0682e60bf30f3fb6
SHA256fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7
SHA512ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b
-
Filesize
1.1MB
MD576129308241ae5ac4d200214b352f7d0
SHA1ff30e79e82082092ae9a174d0682e60bf30f3fb6
SHA256fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7
SHA512ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b
-
Filesize
1.1MB
MD576129308241ae5ac4d200214b352f7d0
SHA1ff30e79e82082092ae9a174d0682e60bf30f3fb6
SHA256fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7
SHA512ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b
-
Filesize
1.1MB
MD576129308241ae5ac4d200214b352f7d0
SHA1ff30e79e82082092ae9a174d0682e60bf30f3fb6
SHA256fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7
SHA512ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b
-
Filesize
34KB
MD5476f447617f65eebf35c52d4fd3b3188
SHA1179ee6e698803a45be916f107638f01d553d6e65
SHA256a8c7fd29a25658f115213c3516dd8f77d44d42c40f9348996443e593d878dcf0
SHA51237c51cb92a2adaa3fdb70ae41c95f5499e25cc772020d6c701ef9ce157320017ae207896dcc0e27b9841d0b7890a8b37440bff6dfa0468dc01f72275d4c820f9
-
Filesize
34KB
MD5476f447617f65eebf35c52d4fd3b3188
SHA1179ee6e698803a45be916f107638f01d553d6e65
SHA256a8c7fd29a25658f115213c3516dd8f77d44d42c40f9348996443e593d878dcf0
SHA51237c51cb92a2adaa3fdb70ae41c95f5499e25cc772020d6c701ef9ce157320017ae207896dcc0e27b9841d0b7890a8b37440bff6dfa0468dc01f72275d4c820f9