Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21/10/2023, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a28a054ef02fad5162ebe58599860d30.dll
Resource
win7-20231020-en
General
-
Target
NEAS.a28a054ef02fad5162ebe58599860d30.dll
-
Size
120KB
-
MD5
a28a054ef02fad5162ebe58599860d30
-
SHA1
a3a37238132d5bbb43a8fb955d88c9efc660e44a
-
SHA256
162378b57cb5ffc29a00120725e8793f07a93f506783151e21e94b65647d13ba
-
SHA512
7cad2829760e0d8c436d19b2221e7c5977ad509fce4496914aa49c6c26c2b47af1f670bc885d1a665f6ae4707562777510ae46ada44096f3b04373cafc31c15c
-
SSDEEP
3072:n2vg20tu6fiquMnJhgl8K7wPMNIBWGNoo69S2Gx2gt4:IP4u/n9xiB5iSL4gt
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f7643b4.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76582e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76582e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76582e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f7643b4.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f7643b4.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7643b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76582e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7643b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7643b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7643b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7643b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7643b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7643b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76582e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76582e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76582e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76582e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76582e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76582e.exe -
Executes dropped EXE 3 IoCs
pid Process 1260 f7643b4.exe 2744 f764c2d.exe 1372 f76582e.exe -
Loads dropped DLL 6 IoCs
pid Process 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe 2184 rundll32.exe -
resource yara_rule behavioral1/memory/1260-13-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-12-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-15-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-16-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-20-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-24-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-33-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-49-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-53-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-60-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-27-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-61-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-62-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-72-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-78-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-79-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-81-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-82-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-84-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-86-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-105-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-107-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1260-140-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1372-144-0x0000000000910000-0x00000000019CA000-memory.dmp upx behavioral1/memory/1372-177-0x0000000000910000-0x00000000019CA000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76582e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7643b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7643b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7643b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76582e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7643b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76582e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76582e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76582e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7643b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7643b4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76582e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f7643b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76582e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7643b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76582e.exe -
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: f7643b4.exe File opened (read-only) \??\H: f7643b4.exe File opened (read-only) \??\I: f7643b4.exe File opened (read-only) \??\J: f7643b4.exe File opened (read-only) \??\N: f7643b4.exe File opened (read-only) \??\E: f7643b4.exe File opened (read-only) \??\K: f7643b4.exe File opened (read-only) \??\L: f7643b4.exe File opened (read-only) \??\M: f7643b4.exe File opened (read-only) \??\O: f7643b4.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f769f3c f76582e.exe File created C:\Windows\f7645d6 f7643b4.exe File opened for modification C:\Windows\SYSTEM.INI f7643b4.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1260 f7643b4.exe 1260 f7643b4.exe 1372 f76582e.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1260 f7643b4.exe Token: SeDebugPrivilege 1372 f76582e.exe Token: SeDebugPrivilege 1372 f76582e.exe Token: SeDebugPrivilege 1372 f76582e.exe Token: SeDebugPrivilege 1372 f76582e.exe Token: SeDebugPrivilege 1372 f76582e.exe Token: SeDebugPrivilege 1372 f76582e.exe Token: SeDebugPrivilege 1372 f76582e.exe Token: SeDebugPrivilege 1372 f76582e.exe Token: SeDebugPrivilege 1372 f76582e.exe Token: SeDebugPrivilege 1372 f76582e.exe Token: SeDebugPrivilege 1372 f76582e.exe Token: SeDebugPrivilege 1372 f76582e.exe Token: SeDebugPrivilege 1372 f76582e.exe Token: SeDebugPrivilege 1372 f76582e.exe Token: SeDebugPrivilege 1372 f76582e.exe Token: SeDebugPrivilege 1372 f76582e.exe Token: SeDebugPrivilege 1372 f76582e.exe Token: SeDebugPrivilege 1372 f76582e.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1208 wrote to memory of 2184 1208 rundll32.exe 28 PID 1208 wrote to memory of 2184 1208 rundll32.exe 28 PID 1208 wrote to memory of 2184 1208 rundll32.exe 28 PID 1208 wrote to memory of 2184 1208 rundll32.exe 28 PID 1208 wrote to memory of 2184 1208 rundll32.exe 28 PID 1208 wrote to memory of 2184 1208 rundll32.exe 28 PID 1208 wrote to memory of 2184 1208 rundll32.exe 28 PID 2184 wrote to memory of 1260 2184 rundll32.exe 29 PID 2184 wrote to memory of 1260 2184 rundll32.exe 29 PID 2184 wrote to memory of 1260 2184 rundll32.exe 29 PID 2184 wrote to memory of 1260 2184 rundll32.exe 29 PID 1260 wrote to memory of 1112 1260 f7643b4.exe 12 PID 1260 wrote to memory of 1172 1260 f7643b4.exe 16 PID 1260 wrote to memory of 1252 1260 f7643b4.exe 15 PID 1260 wrote to memory of 1196 1260 f7643b4.exe 23 PID 1260 wrote to memory of 1208 1260 f7643b4.exe 27 PID 1260 wrote to memory of 2184 1260 f7643b4.exe 28 PID 1260 wrote to memory of 2184 1260 f7643b4.exe 28 PID 2184 wrote to memory of 2744 2184 rundll32.exe 30 PID 2184 wrote to memory of 2744 2184 rundll32.exe 30 PID 2184 wrote to memory of 2744 2184 rundll32.exe 30 PID 2184 wrote to memory of 2744 2184 rundll32.exe 30 PID 2184 wrote to memory of 1372 2184 rundll32.exe 31 PID 2184 wrote to memory of 1372 2184 rundll32.exe 31 PID 2184 wrote to memory of 1372 2184 rundll32.exe 31 PID 2184 wrote to memory of 1372 2184 rundll32.exe 31 PID 1260 wrote to memory of 1112 1260 f7643b4.exe 12 PID 1260 wrote to memory of 1172 1260 f7643b4.exe 16 PID 1260 wrote to memory of 1252 1260 f7643b4.exe 15 PID 1260 wrote to memory of 2744 1260 f7643b4.exe 30 PID 1260 wrote to memory of 2744 1260 f7643b4.exe 30 PID 1260 wrote to memory of 1372 1260 f7643b4.exe 31 PID 1260 wrote to memory of 1372 1260 f7643b4.exe 31 PID 1372 wrote to memory of 1112 1372 f76582e.exe 12 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7643b4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76582e.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.a28a054ef02fad5162ebe58599860d30.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.a28a054ef02fad5162ebe58599860d30.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\f7643b4.exeC:\Users\Admin\AppData\Local\Temp\f7643b4.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1260
-
-
C:\Users\Admin\AppData\Local\Temp\f764c2d.exeC:\Users\Admin\AppData\Local\Temp\f764c2d.exe4⤵
- Executes dropped EXE
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\f76582e.exeC:\Users\Admin\AppData\Local\Temp\f76582e.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1372
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1196
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD5516c6553e31fe1d9705c5b56f8294304
SHA18b3075c4d87fa77fadcba5e8593a05131ca4cfd4
SHA25660f82427c9898e85888b1947b38383ab5824a651e0e20dda8f3252115acac1cc
SHA512fce75a4a5665d7792f8c99e30ea4702da4c10526408da3e2e82d97442bd034cfc4c71b603c9c564bd8ed3981151d2d7ba89bf7ef9b936e165dc6a3a2a74cc9fa
-
Filesize
97KB
MD5516c6553e31fe1d9705c5b56f8294304
SHA18b3075c4d87fa77fadcba5e8593a05131ca4cfd4
SHA25660f82427c9898e85888b1947b38383ab5824a651e0e20dda8f3252115acac1cc
SHA512fce75a4a5665d7792f8c99e30ea4702da4c10526408da3e2e82d97442bd034cfc4c71b603c9c564bd8ed3981151d2d7ba89bf7ef9b936e165dc6a3a2a74cc9fa
-
Filesize
97KB
MD5516c6553e31fe1d9705c5b56f8294304
SHA18b3075c4d87fa77fadcba5e8593a05131ca4cfd4
SHA25660f82427c9898e85888b1947b38383ab5824a651e0e20dda8f3252115acac1cc
SHA512fce75a4a5665d7792f8c99e30ea4702da4c10526408da3e2e82d97442bd034cfc4c71b603c9c564bd8ed3981151d2d7ba89bf7ef9b936e165dc6a3a2a74cc9fa
-
Filesize
97KB
MD5516c6553e31fe1d9705c5b56f8294304
SHA18b3075c4d87fa77fadcba5e8593a05131ca4cfd4
SHA25660f82427c9898e85888b1947b38383ab5824a651e0e20dda8f3252115acac1cc
SHA512fce75a4a5665d7792f8c99e30ea4702da4c10526408da3e2e82d97442bd034cfc4c71b603c9c564bd8ed3981151d2d7ba89bf7ef9b936e165dc6a3a2a74cc9fa
-
Filesize
257B
MD55d091e297b9945a95842ffd5ccb12257
SHA1d2f040b455d18c07cc892804006878ac08ac18fb
SHA25625bdf07e740acfa35bae8a110bcd90865b5d0b7dc5068fdb74ebff4dce3790a5
SHA512d6827399b8863c277d96b60114cce12b6312e2539e196631e3ba7616fdffba35f7e5e7bf8df0c130c3b69dbdea303c62c6a954d8ac779f75a400cbab11285f24
-
Filesize
97KB
MD5516c6553e31fe1d9705c5b56f8294304
SHA18b3075c4d87fa77fadcba5e8593a05131ca4cfd4
SHA25660f82427c9898e85888b1947b38383ab5824a651e0e20dda8f3252115acac1cc
SHA512fce75a4a5665d7792f8c99e30ea4702da4c10526408da3e2e82d97442bd034cfc4c71b603c9c564bd8ed3981151d2d7ba89bf7ef9b936e165dc6a3a2a74cc9fa
-
Filesize
97KB
MD5516c6553e31fe1d9705c5b56f8294304
SHA18b3075c4d87fa77fadcba5e8593a05131ca4cfd4
SHA25660f82427c9898e85888b1947b38383ab5824a651e0e20dda8f3252115acac1cc
SHA512fce75a4a5665d7792f8c99e30ea4702da4c10526408da3e2e82d97442bd034cfc4c71b603c9c564bd8ed3981151d2d7ba89bf7ef9b936e165dc6a3a2a74cc9fa
-
Filesize
97KB
MD5516c6553e31fe1d9705c5b56f8294304
SHA18b3075c4d87fa77fadcba5e8593a05131ca4cfd4
SHA25660f82427c9898e85888b1947b38383ab5824a651e0e20dda8f3252115acac1cc
SHA512fce75a4a5665d7792f8c99e30ea4702da4c10526408da3e2e82d97442bd034cfc4c71b603c9c564bd8ed3981151d2d7ba89bf7ef9b936e165dc6a3a2a74cc9fa
-
Filesize
97KB
MD5516c6553e31fe1d9705c5b56f8294304
SHA18b3075c4d87fa77fadcba5e8593a05131ca4cfd4
SHA25660f82427c9898e85888b1947b38383ab5824a651e0e20dda8f3252115acac1cc
SHA512fce75a4a5665d7792f8c99e30ea4702da4c10526408da3e2e82d97442bd034cfc4c71b603c9c564bd8ed3981151d2d7ba89bf7ef9b936e165dc6a3a2a74cc9fa
-
Filesize
97KB
MD5516c6553e31fe1d9705c5b56f8294304
SHA18b3075c4d87fa77fadcba5e8593a05131ca4cfd4
SHA25660f82427c9898e85888b1947b38383ab5824a651e0e20dda8f3252115acac1cc
SHA512fce75a4a5665d7792f8c99e30ea4702da4c10526408da3e2e82d97442bd034cfc4c71b603c9c564bd8ed3981151d2d7ba89bf7ef9b936e165dc6a3a2a74cc9fa
-
Filesize
97KB
MD5516c6553e31fe1d9705c5b56f8294304
SHA18b3075c4d87fa77fadcba5e8593a05131ca4cfd4
SHA25660f82427c9898e85888b1947b38383ab5824a651e0e20dda8f3252115acac1cc
SHA512fce75a4a5665d7792f8c99e30ea4702da4c10526408da3e2e82d97442bd034cfc4c71b603c9c564bd8ed3981151d2d7ba89bf7ef9b936e165dc6a3a2a74cc9fa