Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
24s -
max time network
28s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 01:00
Behavioral task
behavioral1
Sample
8d7e7c63b0739df784f5db7c063be7b3ef2d1f6b6b71d76e0ed1e5b6592512a6.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d7e7c63b0739df784f5db7c063be7b3ef2d1f6b6b71d76e0ed1e5b6592512a6.exe
Resource
win10v2004-20240802-en
General
-
Target
8d7e7c63b0739df784f5db7c063be7b3ef2d1f6b6b71d76e0ed1e5b6592512a6.exe
-
Size
2.6MB
-
MD5
1070606475ed9490c4fe6a4b817d75ed
-
SHA1
8ff64041d3bd4efed4a2a1b3101025f765a5768c
-
SHA256
8d7e7c63b0739df784f5db7c063be7b3ef2d1f6b6b71d76e0ed1e5b6592512a6
-
SHA512
038b9745ac178cdce6375e96ed6f5a4d2a1dc5b4bd786f7e9984a2f127c855a9c115eb1973cde827ead9f8b7eed0b09b82ffcd5cab5af5e2d320fdcec0f5bd1b
-
SSDEEP
49152:ubA3jtdJjzj1xCdkkxnV3OtgINg0ZxUeGRJpO99E1agk6K:ub2ZoFxVsUGEJc9aagw
Malware Config
Signatures
-
DcRat 16 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 2840 schtasks.exe 2776 schtasks.exe 2372 schtasks.exe 1844 schtasks.exe 1632 schtasks.exe 2628 schtasks.exe 2624 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d7e7c63b0739df784f5db7c063be7b3ef2d1f6b6b71d76e0ed1e5b6592512a6.exe 2772 schtasks.exe 1956 schtasks.exe 2540 schtasks.exe 2304 schtasks.exe 2764 schtasks.exe 2492 schtasks.exe 2076 schtasks.exe 2640 schtasks.exe -
Modifies WinLogon for persistence 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\ba13f242-3a65-11ef-94cb-d685e2345d05\\WmiPrvSE.exe\"" msContainerweb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\ba13f242-3a65-11ef-94cb-d685e2345d05\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Media Player\\OSPPSVC.exe\"" msContainerweb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\ba13f242-3a65-11ef-94cb-d685e2345d05\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Media Player\\OSPPSVC.exe\", \"C:\\driverinto\\wininit.exe\"" msContainerweb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\ba13f242-3a65-11ef-94cb-d685e2345d05\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Media Player\\OSPPSVC.exe\", \"C:\\driverinto\\wininit.exe\", \"C:\\Recovery\\ba13f242-3a65-11ef-94cb-d685e2345d05\\sppsvc.exe\"" msContainerweb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\ba13f242-3a65-11ef-94cb-d685e2345d05\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Windows Media Player\\OSPPSVC.exe\", \"C:\\driverinto\\wininit.exe\", \"C:\\Recovery\\ba13f242-3a65-11ef-94cb-d685e2345d05\\sppsvc.exe\", \"C:\\Program Files\\MSBuild\\explorer.exe\"" msContainerweb.exe -
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2764 2752 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 2752 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 2752 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2840 2752 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 2752 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2624 2752 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2772 2752 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2076 2752 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1956 2752 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2372 2752 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2540 2752 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2304 2752 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2492 2752 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1844 2752 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 2752 schtasks.exe 33 -
resource yara_rule behavioral1/files/0x0006000000018bd4-9.dat dcrat behavioral1/memory/2216-13-0x0000000000E20000-0x0000000001072000-memory.dmp dcrat behavioral1/memory/1420-39-0x0000000000100000-0x0000000000352000-memory.dmp dcrat -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 2216 msContainerweb.exe 1420 WmiPrvSE.exe -
Loads dropped DLL 2 IoCs
pid Process 564 cmd.exe 564 cmd.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Recovery\\ba13f242-3a65-11ef-94cb-d685e2345d05\\WmiPrvSE.exe\"" msContainerweb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files (x86)\\Windows Media Player\\OSPPSVC.exe\"" msContainerweb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Recovery\\ba13f242-3a65-11ef-94cb-d685e2345d05\\sppsvc.exe\"" msContainerweb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Recovery\\ba13f242-3a65-11ef-94cb-d685e2345d05\\WmiPrvSE.exe\"" msContainerweb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files (x86)\\Windows Media Player\\OSPPSVC.exe\"" msContainerweb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\driverinto\\wininit.exe\"" msContainerweb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\driverinto\\wininit.exe\"" msContainerweb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Recovery\\ba13f242-3a65-11ef-94cb-d685e2345d05\\sppsvc.exe\"" msContainerweb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files\\MSBuild\\explorer.exe\"" msContainerweb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files\\MSBuild\\explorer.exe\"" msContainerweb.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Media Player\1610b97d3ab4a7 msContainerweb.exe File created C:\Program Files\MSBuild\explorer.exe msContainerweb.exe File created C:\Program Files\MSBuild\7a0fd90576e088 msContainerweb.exe File created C:\Program Files (x86)\Windows Media Player\OSPPSVC.exe msContainerweb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d7e7c63b0739df784f5db7c063be7b3ef2d1f6b6b71d76e0ed1e5b6592512a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2692 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1632 schtasks.exe 2764 schtasks.exe 2628 schtasks.exe 2776 schtasks.exe 1844 schtasks.exe 2624 schtasks.exe 2076 schtasks.exe 2372 schtasks.exe 2540 schtasks.exe 2304 schtasks.exe 2492 schtasks.exe 2640 schtasks.exe 2840 schtasks.exe 2772 schtasks.exe 1956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2216 msContainerweb.exe 1420 WmiPrvSE.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2216 msContainerweb.exe Token: SeDebugPrivilege 1420 WmiPrvSE.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2056 wrote to memory of 840 2056 8d7e7c63b0739df784f5db7c063be7b3ef2d1f6b6b71d76e0ed1e5b6592512a6.exe 29 PID 2056 wrote to memory of 840 2056 8d7e7c63b0739df784f5db7c063be7b3ef2d1f6b6b71d76e0ed1e5b6592512a6.exe 29 PID 2056 wrote to memory of 840 2056 8d7e7c63b0739df784f5db7c063be7b3ef2d1f6b6b71d76e0ed1e5b6592512a6.exe 29 PID 2056 wrote to memory of 840 2056 8d7e7c63b0739df784f5db7c063be7b3ef2d1f6b6b71d76e0ed1e5b6592512a6.exe 29 PID 840 wrote to memory of 564 840 WScript.exe 30 PID 840 wrote to memory of 564 840 WScript.exe 30 PID 840 wrote to memory of 564 840 WScript.exe 30 PID 840 wrote to memory of 564 840 WScript.exe 30 PID 564 wrote to memory of 2216 564 cmd.exe 32 PID 564 wrote to memory of 2216 564 cmd.exe 32 PID 564 wrote to memory of 2216 564 cmd.exe 32 PID 564 wrote to memory of 2216 564 cmd.exe 32 PID 2216 wrote to memory of 1636 2216 msContainerweb.exe 49 PID 2216 wrote to memory of 1636 2216 msContainerweb.exe 49 PID 2216 wrote to memory of 1636 2216 msContainerweb.exe 49 PID 1636 wrote to memory of 1300 1636 cmd.exe 52 PID 1636 wrote to memory of 1300 1636 cmd.exe 52 PID 1636 wrote to memory of 1300 1636 cmd.exe 52 PID 564 wrote to memory of 2692 564 cmd.exe 51 PID 564 wrote to memory of 2692 564 cmd.exe 51 PID 564 wrote to memory of 2692 564 cmd.exe 51 PID 564 wrote to memory of 2692 564 cmd.exe 51 PID 1636 wrote to memory of 1420 1636 cmd.exe 53 PID 1636 wrote to memory of 1420 1636 cmd.exe 53 PID 1636 wrote to memory of 1420 1636 cmd.exe 53 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d7e7c63b0739df784f5db7c063be7b3ef2d1f6b6b71d76e0ed1e5b6592512a6.exe"C:\Users\Admin\AppData\Local\Temp\8d7e7c63b0739df784f5db7c063be7b3ef2d1f6b6b71d76e0ed1e5b6592512a6.exe"1⤵
- DcRat
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\driverinto\beEm9RTMhbsv.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\driverinto\oinlY8qQ6a4Ke7jZpeewRPwKJYS.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:564 -
C:\driverinto\msContainerweb.exe"C:\driverinto\msContainerweb.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9B8oJjIX7T.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1300
-
-
C:\Recovery\ba13f242-3a65-11ef-94cb-d685e2345d05\WmiPrvSE.exe"C:\Recovery\ba13f242-3a65-11ef-94cb-d685e2345d05\WmiPrvSE.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2692
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Recovery\ba13f242-3a65-11ef-94cb-d685e2345d05\WmiPrvSE.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\ba13f242-3a65-11ef-94cb-d685e2345d05\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Recovery\ba13f242-3a65-11ef-94cb-d685e2345d05\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Media Player\OSPPSVC.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Media Player\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\driverinto\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\driverinto\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\driverinto\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Recovery\ba13f242-3a65-11ef-94cb-d685e2345d05\sppsvc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\ba13f242-3a65-11ef-94cb-d685e2345d05\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Recovery\ba13f242-3a65-11ef-94cb-d685e2345d05\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files\MSBuild\explorer.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\MSBuild\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Program Files\MSBuild\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD546cb4bb60993df1e1bb930e55abb3ecb
SHA1bf7618efc774e81aeeefb0189045b347357ef600
SHA256bb5ab73f02d07036c6e7f79298a18c674ae94550a11c83085f27895cab704890
SHA512dba71abe6b081285b43e3585cb3c7445334d4c86d6931e98481d4477b09d082c9cc3544d5b0a2ee7c63f865cd33e15807d283e6c2603955416bf187f15d95f00
-
Filesize
214B
MD50d816b4987b3b15868e2b66608ce16e5
SHA11eea58986eb6a7e1b38988fb5934e0a0aa4b93d2
SHA256f1878f7870c201ba0217fc2293e99cb0b9d6233714f2012e457a2a391822d551
SHA5129843660313de3a5eaaf330fe64cc48f4d550389cf15690e9047c8c39c7fc76b737dc1c2bfa9bd75f65f74406da75acdd735c5a62802acf6106dca024e159eac8
-
Filesize
146B
MD5d429ec862b7a16c73c46cbd221f43e29
SHA1f8053dbc6eb1a22a77a2095b924bb5b76a227a09
SHA256b8c06c4169c3189e6f44f34d73ff2402c0ce1fbff8c72b5e12a8ff6fbe09803b
SHA512e7d28ef13063ee7b63870e9560bd11820f9a0f02ff62fe4f30a626af0d609f3fb843785f835cafc725d26e9a2b82b625d35d8c261e670381c11d5bfcaecf56ff
-
Filesize
2.3MB
MD55e3ab139f070af0ac087e35577f4d2c6
SHA17f9909b35d3b8012a57f7b77236c126473ffe3e5
SHA256e020fa8f6c54a401a49e37bb2902d809040bd98878ab631371d047dad0450a0c
SHA5124717f16b9b6cf9e88403e99f8fcf9c4a33836b72885b6b2806ee79c2ceec63fb90ac0c13427c903c849d92c2b7b42970f40898bfbad71ad43696d2cb46973fcf