Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2023, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.04478518d9714c9d108fed9484f29800.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.04478518d9714c9d108fed9484f29800.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.04478518d9714c9d108fed9484f29800.exe
-
Size
422KB
-
MD5
04478518d9714c9d108fed9484f29800
-
SHA1
a97100d826dd03369880e180edf091a4bd39e652
-
SHA256
afd92a84eabb59e3891beb6a668f55cd90142133284a68fafefe0d70107c8466
-
SHA512
9d66c1fa837dfb2ee15bdd877e630552f7bfde3adea13a56482de77b17803ec2fb2c1e2902de6c41afca925123e736bfb524e3d9a1a529848af10b3451d4c7f6
-
SSDEEP
6144:QWU2TF0GSbabO6FSPnvZU1AF+6FSPnvZhDYsKKo6FSPnvZU1AF+6FSPnvZq:QWU2TFoGaXgA4XfczXgA4XA
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmqmma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhfajjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhfajjoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfnjafap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmqmma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" NEAS.04478518d9714c9d108fed9484f29800.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dopigd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dopigd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhocqigp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.04478518d9714c9d108fed9484f29800.exe -
Executes dropped EXE 7 IoCs
pid Process 3304 Cmqmma32.exe 2580 Dhfajjoj.exe 4228 Dopigd32.exe 5092 Dfnjafap.exe 2940 Dmgbnq32.exe 1856 Dhocqigp.exe 5056 Dmllipeg.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ihidnp32.dll Dfnjafap.exe File created C:\Windows\SysWOW64\Dhocqigp.exe Dmgbnq32.exe File created C:\Windows\SysWOW64\Cmqmma32.exe NEAS.04478518d9714c9d108fed9484f29800.exe File created C:\Windows\SysWOW64\Poahbe32.dll Dopigd32.exe File created C:\Windows\SysWOW64\Dmgbnq32.exe Dfnjafap.exe File opened for modification C:\Windows\SysWOW64\Dhocqigp.exe Dmgbnq32.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dhocqigp.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dhocqigp.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dhocqigp.exe File opened for modification C:\Windows\SysWOW64\Dfnjafap.exe Dopigd32.exe File created C:\Windows\SysWOW64\Eokchkmi.dll Cmqmma32.exe File created C:\Windows\SysWOW64\Dfnjafap.exe Dopigd32.exe File created C:\Windows\SysWOW64\Elkadb32.dll Dmgbnq32.exe File created C:\Windows\SysWOW64\Okgoadbf.dll NEAS.04478518d9714c9d108fed9484f29800.exe File created C:\Windows\SysWOW64\Dhfajjoj.exe Cmqmma32.exe File opened for modification C:\Windows\SysWOW64\Dhfajjoj.exe Cmqmma32.exe File created C:\Windows\SysWOW64\Dopigd32.exe Dhfajjoj.exe File opened for modification C:\Windows\SysWOW64\Dopigd32.exe Dhfajjoj.exe File created C:\Windows\SysWOW64\Hcjccj32.dll Dhfajjoj.exe File opened for modification C:\Windows\SysWOW64\Dmgbnq32.exe Dfnjafap.exe File opened for modification C:\Windows\SysWOW64\Cmqmma32.exe NEAS.04478518d9714c9d108fed9484f29800.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1892 5056 WerFault.exe 92 -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} NEAS.04478518d9714c9d108fed9484f29800.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" NEAS.04478518d9714c9d108fed9484f29800.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dopigd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfnjafap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eokchkmi.dll" Cmqmma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcjccj32.dll" Dhfajjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihidnp32.dll" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elkadb32.dll" Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmgbnq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 NEAS.04478518d9714c9d108fed9484f29800.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node NEAS.04478518d9714c9d108fed9484f29800.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmqmma32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhfajjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhfajjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfnjafap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID NEAS.04478518d9714c9d108fed9484f29800.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Okgoadbf.dll" NEAS.04478518d9714c9d108fed9484f29800.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmqmma32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dopigd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Poahbe32.dll" Dopigd32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3584 wrote to memory of 3304 3584 NEAS.04478518d9714c9d108fed9484f29800.exe 87 PID 3584 wrote to memory of 3304 3584 NEAS.04478518d9714c9d108fed9484f29800.exe 87 PID 3584 wrote to memory of 3304 3584 NEAS.04478518d9714c9d108fed9484f29800.exe 87 PID 3304 wrote to memory of 2580 3304 Cmqmma32.exe 86 PID 3304 wrote to memory of 2580 3304 Cmqmma32.exe 86 PID 3304 wrote to memory of 2580 3304 Cmqmma32.exe 86 PID 2580 wrote to memory of 4228 2580 Dhfajjoj.exe 88 PID 2580 wrote to memory of 4228 2580 Dhfajjoj.exe 88 PID 2580 wrote to memory of 4228 2580 Dhfajjoj.exe 88 PID 4228 wrote to memory of 5092 4228 Dopigd32.exe 89 PID 4228 wrote to memory of 5092 4228 Dopigd32.exe 89 PID 4228 wrote to memory of 5092 4228 Dopigd32.exe 89 PID 5092 wrote to memory of 2940 5092 Dfnjafap.exe 90 PID 5092 wrote to memory of 2940 5092 Dfnjafap.exe 90 PID 5092 wrote to memory of 2940 5092 Dfnjafap.exe 90 PID 2940 wrote to memory of 1856 2940 Dmgbnq32.exe 91 PID 2940 wrote to memory of 1856 2940 Dmgbnq32.exe 91 PID 2940 wrote to memory of 1856 2940 Dmgbnq32.exe 91 PID 1856 wrote to memory of 5056 1856 Dhocqigp.exe 92 PID 1856 wrote to memory of 5056 1856 Dhocqigp.exe 92 PID 1856 wrote to memory of 5056 1856 Dhocqigp.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.04478518d9714c9d108fed9484f29800.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.04478518d9714c9d108fed9484f29800.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\Cmqmma32.exeC:\Windows\system32\Cmqmma32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3304
-
-
C:\Windows\SysWOW64\Dhfajjoj.exeC:\Windows\system32\Dhfajjoj.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\Dopigd32.exeC:\Windows\system32\Dopigd32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\Dfnjafap.exeC:\Windows\system32\Dfnjafap.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\Dmgbnq32.exeC:\Windows\system32\Dmgbnq32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\Dhocqigp.exeC:\Windows\system32\Dhocqigp.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe6⤵
- Executes dropped EXE
PID:5056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 3967⤵
- Program crash
PID:1892
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5056 -ip 50561⤵PID:3912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422KB
MD56f8d611bce4f544d806f0ae5410f4ed1
SHA1126d2ca08bd9df51f57c8f68ba7a8f0468782749
SHA2569e824e36b897f7f880f82318246e9c0883cfffd1d533dd2cc48fc52ce53270f3
SHA5126575654ba6db35b301f305e5adcc82efe33441b6b2788ce169b294aa3ff2698e65c7ebc5a734528a30d0c2dde2512d22ad2f5ac2cbf7c666e80c6fc0624ac695
-
Filesize
422KB
MD56f8d611bce4f544d806f0ae5410f4ed1
SHA1126d2ca08bd9df51f57c8f68ba7a8f0468782749
SHA2569e824e36b897f7f880f82318246e9c0883cfffd1d533dd2cc48fc52ce53270f3
SHA5126575654ba6db35b301f305e5adcc82efe33441b6b2788ce169b294aa3ff2698e65c7ebc5a734528a30d0c2dde2512d22ad2f5ac2cbf7c666e80c6fc0624ac695
-
Filesize
422KB
MD594d6d0aa850027da1e9fb5e061e158b8
SHA11bc5d0b26ea9a56ed8a81cbe17bdec956c75b69b
SHA2565d0417e19acd6509347482932a3797df9c354d91fbb99b04d2e339302d2c5dd5
SHA512c3d4f14d396780ad4b7eb0bc838e86ffae0d1939dcfd6a4c53201806b221f821e0067fe07066d31ba8c2edc9eebe52296b56ec6636d1ea8f5d2e20bd1abdf685
-
Filesize
422KB
MD594d6d0aa850027da1e9fb5e061e158b8
SHA11bc5d0b26ea9a56ed8a81cbe17bdec956c75b69b
SHA2565d0417e19acd6509347482932a3797df9c354d91fbb99b04d2e339302d2c5dd5
SHA512c3d4f14d396780ad4b7eb0bc838e86ffae0d1939dcfd6a4c53201806b221f821e0067fe07066d31ba8c2edc9eebe52296b56ec6636d1ea8f5d2e20bd1abdf685
-
Filesize
422KB
MD5eccf84434f52f9d3f0e6f4794abab558
SHA1e6e7c2f718442f32499c2d760584f93472023e36
SHA256779cddf6537db10bd7c0afef1c194e499a92a37db893af9cce0cd9247ea9e3b5
SHA51273c6202b17d9846e0ca60ca6b0ad69ec93c2aac143068246ac2eaeecf09d82428d9996caeab27ea38177aa813019b954441f3c6ff41c54d4ce57bff6192564e0
-
Filesize
422KB
MD5eccf84434f52f9d3f0e6f4794abab558
SHA1e6e7c2f718442f32499c2d760584f93472023e36
SHA256779cddf6537db10bd7c0afef1c194e499a92a37db893af9cce0cd9247ea9e3b5
SHA51273c6202b17d9846e0ca60ca6b0ad69ec93c2aac143068246ac2eaeecf09d82428d9996caeab27ea38177aa813019b954441f3c6ff41c54d4ce57bff6192564e0
-
Filesize
422KB
MD5a7075341270dbd31d1ccb9ccbf4870fa
SHA14a65fe1520de3cf736fdca25c94d7ba90f042d2f
SHA2562ae65d3d466e57b06ddf196d8174949aa3fbb1a0aaab14f61e75ffdbbbe85232
SHA512e9db7a684e088ac38ae7e3bd657bcca90a580dff9017eb66ea3823bd6afc1e0a5c8e698c05d833ffb8f25de7f273c486e96b1bcbefb4d13051f6335ae1c62485
-
Filesize
422KB
MD5a7075341270dbd31d1ccb9ccbf4870fa
SHA14a65fe1520de3cf736fdca25c94d7ba90f042d2f
SHA2562ae65d3d466e57b06ddf196d8174949aa3fbb1a0aaab14f61e75ffdbbbe85232
SHA512e9db7a684e088ac38ae7e3bd657bcca90a580dff9017eb66ea3823bd6afc1e0a5c8e698c05d833ffb8f25de7f273c486e96b1bcbefb4d13051f6335ae1c62485
-
Filesize
422KB
MD5eb9a7ee9b845b368026226250f14631a
SHA1a3790db6703496dd1e52369bcf1500b331e7b968
SHA256774e0d0cd9ab123efac56b2cb157928bd3f750708d5794dfe16b7b35f5310eab
SHA5128b4c5ce54568aaacca934a530a461983e88efdb3d23d20530f6e77cebff7b30a3e8584cae66d3ade2b5f1ba850e29afa89fd8b088ef96a97461deb2d141e925b
-
Filesize
422KB
MD5eb9a7ee9b845b368026226250f14631a
SHA1a3790db6703496dd1e52369bcf1500b331e7b968
SHA256774e0d0cd9ab123efac56b2cb157928bd3f750708d5794dfe16b7b35f5310eab
SHA5128b4c5ce54568aaacca934a530a461983e88efdb3d23d20530f6e77cebff7b30a3e8584cae66d3ade2b5f1ba850e29afa89fd8b088ef96a97461deb2d141e925b
-
Filesize
422KB
MD5b8dd7fac56b71731edceab62b3e79d08
SHA11b623ea2e627021a7b07ef3ec4534c3eaf8cb142
SHA2569b5d09dd5a4cf4b3b46fc4893d028c9e0db4d0ffb7e9df6d693764b2d7549902
SHA512f32dc4ec6d23f1b2b9a991ecfb010ee22c577e62432e3971d96f7a1626c28afe0da94a8f763f6882b7aa63de5bd587136fc65929c8a9e9689af08174186ae85a
-
Filesize
422KB
MD5b8dd7fac56b71731edceab62b3e79d08
SHA11b623ea2e627021a7b07ef3ec4534c3eaf8cb142
SHA2569b5d09dd5a4cf4b3b46fc4893d028c9e0db4d0ffb7e9df6d693764b2d7549902
SHA512f32dc4ec6d23f1b2b9a991ecfb010ee22c577e62432e3971d96f7a1626c28afe0da94a8f763f6882b7aa63de5bd587136fc65929c8a9e9689af08174186ae85a
-
Filesize
422KB
MD538e803fab45433dfb3836bed0ef79f60
SHA13c4b60134f93ce7703eea5a9a9302f2db45c574f
SHA256fbc4fcbfb0f1d01527399237e80e6a3587a38923dfc9b89875c1e25f134a1456
SHA512d21c5d45b357ef310d69eda68d68af190a40fb1db9dcdfa89d3606b002fae8d977305c6337d71dbd5b71d6e9c157b2fc0c7643468b1f7e656f52f94bd1311f80
-
Filesize
422KB
MD538e803fab45433dfb3836bed0ef79f60
SHA13c4b60134f93ce7703eea5a9a9302f2db45c574f
SHA256fbc4fcbfb0f1d01527399237e80e6a3587a38923dfc9b89875c1e25f134a1456
SHA512d21c5d45b357ef310d69eda68d68af190a40fb1db9dcdfa89d3606b002fae8d977305c6337d71dbd5b71d6e9c157b2fc0c7643468b1f7e656f52f94bd1311f80