Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    114s
  • max time network
    110s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 04:48

General

  • Target

    cdba0935f95f8e97ffadb50d510ace60N.exe

  • Size

    482KB

  • MD5

    cdba0935f95f8e97ffadb50d510ace60

  • SHA1

    22940e1590aaa949c23faeaf02c46c0e1c8c9d6a

  • SHA256

    af8b500428ae1502c2b6c3ed6f91714b873f8c4f418847cd234fb2b9e2b5a0c2

  • SHA512

    d6428c70a44b77ad441ecd806a80e5c4f56400cc41e6675598f86d467b3ec6870787d0304dbe183a6e7f510e869f54c12081db67d58f685d62e11cd8c0565f2e

  • SSDEEP

    12288:ZpG3lMqLngPixjkRGAy4EkqDkJE+FUsr0v:ZSMqLgPilOytc2cLr0v

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 18 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cdba0935f95f8e97ffadb50d510ace60N.exe
    "C:\Users\Admin\AppData\Local\Temp\cdba0935f95f8e97ffadb50d510ace60N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Users\Admin\AppData\Roaming\Genieo\Application\TrayUi\bin\gentray.exe
      "C:\Users\Admin\AppData\Roaming\Genieo\Application\TrayUi\bin\gentray.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2792
    • C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\bin\genupdater.exe
      "C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\bin\genupdater.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\bin\genupdater.exe
        "C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\bin\genupdater.exe" -wait 360
        3⤵
        • Executes dropped EXE
        PID:276
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" url.dll,FileProtocolHandler http://userfeedback-genieo.appspot.com/installfail.jsp?errcode=14000007
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2044
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://userfeedback-genieo.appspot.com/installfail.jsp?errcode=14000007
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1644
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1604
      • C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\uninstall\updater_uninstall.exe
        "C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\uninstall\updater_uninstall.exe" /S -skip_check true
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
          "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" /S -skip_check true _?=C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\uninstall\
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1764
          • C:\Users\Admin\AppData\Roaming\Genieo\Application\TrayUi\bin\gentray.exe
            "C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\..\TrayUi\bin\gentray.exe" -kill
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7960379938182bea639733f42fe618a

    SHA1

    5834217d9bbfc44bca6b86cab46380a333214935

    SHA256

    d54cd36430a87e8aa93ec218b8934374e36e0646a55cbd32d5103a3e9c0806f9

    SHA512

    2cab28fe58709eea8c21a576a7f210146c9ea2fa27be43eec9e1ffd48f2c78f04dc08660af2a01694374393359bd4a49757fbabe3c94854e7dfb72463cb565f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    066de2cf726563b2735928ddcd98ac94

    SHA1

    357992ed4402797156be8c1b776993aecda83817

    SHA256

    2f1a2bdb3ff3b1f69c99c61cbe0aaccc9e284a959252e7ae66e42fb79b99e20b

    SHA512

    620c740fff01390fa0c5aafc1e7f0e9180164fa4103d9a0d39992938667de0e805b811ecdb69e5275b3bd397c579674c8cc4960069596a919222ae68386f0837

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6d3412f8f5916b3ce398c8f034e4b9b

    SHA1

    64abf4318a088829901baa669c7e6b7ee226ea0d

    SHA256

    02d372b02ed519822bbd24f02090c6d740f89f4cb3a60c3fabb14667b8ded4c8

    SHA512

    5df81dd2efef94a178fba79c24a2977cdb85003202db4bc5d1f0571f6867a00dee732b6929af43624002dd4c246e0d4febec9723f04f598fc4828c550ecfe6e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31faa90d333e250e25d7e7c9fe2e6aa4

    SHA1

    bef038888635e4138ba6c7d6effd908a5a2b1d46

    SHA256

    c08c12334e7270aca9a829cf094fa6ae23e783fb8b2965a4cae42375bcdd9576

    SHA512

    e4f35a0cf50365d99c2b4a960f966336c862d0d1f0918417c499f401897eb7825b654851524ba9024845d757ca0de725f9541f1ff0541c750670f160250db024

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    003eded262b468d05cc601693fbb879b

    SHA1

    f227ea5c920940c6e623785e370248315c96c090

    SHA256

    ecc5b3f9041d5776a8a845aa25f7b44cfc28a33386331f0b7c8b6151da5f0517

    SHA512

    b4dcc1cae81c00c75c1a1cad9bab5c380762d853808494f648d97815f1cddcae4859d6b7137e3c8909b3ee546c014f7acdeb4e3d34bf574ad325da7b31ef90f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1352a99d3d8fc8c6384496151addffcb

    SHA1

    ef591b2269e0d0ede870795ca38bdb54b9f36562

    SHA256

    d0138de28b067532185afd45c08eeb481fb9207cc2bfb68191519b8a7026a88e

    SHA512

    cc678afaa95cba864a380c552b916d2a2b3a770afea9bcd2bf4906982221e6f5d44e8b9ee5ca2ad7fd767da51caff68b8dfba6a6a43eab157a995c174f74dd76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    277a09459894c39afd9b9366f4f02da5

    SHA1

    52f07168eb26ee23d8414af3f31298a435c33ab6

    SHA256

    6babfed2ee00c5bde455de16e0dc2a46075e2d8f4585602235650b11e6a05306

    SHA512

    91ec2162ed106f60a0d4bfaa7cc78c41d14841bdc1e9823f7cd769815c45cd9860bcd1f453aa30db9b6876c8c8a485e4dd46961a125a10464d0d090efbeaece9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e71981fb50e8ed4f51c053760f2eae6b

    SHA1

    dd2bf84909c612c20ec3319a7e37989a5f05b83a

    SHA256

    753cdff87deff9de9fd5c38926c1c39e7b74ee1101391ac6e1bd3a2567deb78a

    SHA512

    92411c2abfd843bc90e8364346c7ef77f9ec16a9e46209d9415fc8f0ecd1df49e1fce352a7597ad4dd71e4deb7136a952d6073afd0f3092926b0ce2afa023f46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99372a815142d03cd018d58d0bd334ec

    SHA1

    973c50fdf7eda61d4ffbe44d59a43cf90cae2f43

    SHA256

    90e2b6d40b9dd9c8cf4a889c9e732f74a373c72c811337fd41950a039a1999de

    SHA512

    5759395508d8e382ffe7f7f44a4e9e8701209509f153a07c4f97862bad3ae681a833466198014c63a21241719cea7b21f1ccd5aa22b6c7782b1aeb4eb7ca6d85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1316844df7ba3c8dc4f6c59548df5fbc

    SHA1

    c2fa3d69c404fa402ab00c48787d054e7a91a094

    SHA256

    f22cf86eb072ef2222f3b2e63f3e1d8934d185c9c743a9779a2e9b801ad40259

    SHA512

    526ad92d475e9224a330332c35e952dc27d9c57acf4fe8813425be477db47ebb9029920445e3a0b069aaadabc87c0f2668c80af302ad79272c542c7e45ac3144

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b53fa41afe0fb461bbbf68c1346a3cea

    SHA1

    3f90e65c64ecf56dc72d77507642867810890411

    SHA256

    8ab0665f3060b971467adcf91b1c89f30a9c1e219ec65bfcde40fe7c221d6dc3

    SHA512

    137efb88965d413cdd51d4624d097a182feaae63ac680fd44289f1b523acee3abb2d3838cad1df17b4e031f55ba1eb0f53439ee52ca06e8c5deee9672da94255

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7a0c6f0cc7854d986347e8c86ed0311

    SHA1

    96794a8b163fb835c3e4b6aa3f386a190f1d9e17

    SHA256

    62a0340c8a87a9f077874968cf1212a0c8800b36fc85b65e53580372eb1f9234

    SHA512

    e0f21b0f2e1619c548ba65fdc939a133555cf33e0f3956344ac88569326aeb6a7413e1ff3dc32eba6f12f3ee650dc387850004f91f451619a268db55ae132c10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    704302562574822fabea8d7173641194

    SHA1

    f49ff23ec1e313c804bce29249bbf055f2e8982b

    SHA256

    fdca04ab05df45f65cc8898b73c235bccc00ca29d812e94522dddc716fa8c937

    SHA512

    814095e66b160908d027aec286efe8168e505559b38849d339a046caa1fd5a8fbef1c8cc386015560e0ee4151ad0457032311046b8398c60511f8f2897e5d232

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6ed941c5a120777c9f3347e34aa9ce7

    SHA1

    13b6a02b93e63e72f399b2c331a4f4f0bcf40958

    SHA256

    535402296416952ee5b1218a18167da6d0e116a1a83e433ddd13d6e27110dbfd

    SHA512

    27b4e3694a589f5600c0fc6547b8abaa167678bb29b236b6646a97a19c41cf17beaa1ba7ed8c49fa2721cd088b33b561a0890533b9db367386a709512ecf211e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8e8b7be5ebaa7ce8ca4c86e01a0bded

    SHA1

    b72eeca5223db289b81377e88692fcf5f0c1a04f

    SHA256

    92d00b7f45d7dc7a4e9b8a74a78f3c3734b191f6ce57a1923132a29550264f17

    SHA512

    3ff92214fa9d5c3150aba42aa522dcfd017d33c37e8530e3e4ea016c56de734e90b69f67804ce457529a8e5ba0195f129d10f0305425e80932f4a35a4b19c013

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d6d19f2227901ee732984c1201f2b32

    SHA1

    30bdb42a49c45ce48e381ec91efc1875588620da

    SHA256

    3f429134b08109b386999f79e0d93974973f4e5cbb7be7ac468f2e1d0cbc7187

    SHA512

    5f2baf064080c780660819ca42a8813769304deb4202b6082fed04902951189388df51ee9090d9f70374119c9c2f9c715108e8edfcf2f83e23a63789a2adf00e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ebda726f7d74866d25e9f6b2e96ef08

    SHA1

    9aed9652b0e7a5f8f0af3773140f1f633370fa82

    SHA256

    48830a5aa932e701b0051e34a1be6b49873854b73ff3356035781201aab7e368

    SHA512

    4e6bd25fc81b3e343779c04abfe86e0204c6b1886607108688e74a4b31e33a2b41ddacd857f6bd3f2f8a4d56150826aff650e7b6883f7869a01ce43c94faa099

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72b4eb7d19299abb1ccf86af36f1b1a0

    SHA1

    2c829d5e5e6867a8ba9d0287f706ae1019766e7f

    SHA256

    29eafa1e326fb3262932ffdc1900813c879968c5458e34952a942fb0fe816f86

    SHA512

    a3498644fc2880a20afb9d4c9b8118d43f99615bd1620c751f3e2a51c74be81ad073915bae9cbd50ba718f52eb0651d6b19192f7313dc67fb735fb649ae048b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4d520f1967d5f8631e11d74b061dd30

    SHA1

    b34d180aba5ea66a471b9af0f75c56b8a2fcb4b2

    SHA256

    13132ce0b40f25411f3dc9f5cf59cc3ce00d97b9800357a80504881a1e0ef826

    SHA512

    0bfcfaa64f4b302b231d0bbddaaa77614d948d99d86d15ebea75207b789a0a94ccfcd040537d3be9107585ade19e69b29b04cb964c87a06e81ca9e27a04120c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a0f1e1d9fa22434efe60fa857b93e08

    SHA1

    b21fd6b6b22cdd31378fa9244ac2ef9028a280ce

    SHA256

    49b324eec6aa457e5d2db3f742f3a3f3cc9ab681b3064552f0564e959635ad6b

    SHA512

    c1067876f29d486d011904cc0e685ad96ccc945b9e8d6e64d9e2d3b15a559b1cde5cdbf85dd21348ea1aca09d305baaf05815757fea19e4b7fe456bf89bb53dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10e4d654d87d7c786e96cf4755f22700

    SHA1

    50d8110b58c5021f8d88ce68a8dc423ddcd206d8

    SHA256

    e96ce0e459e8da9407c0f85b407481c7c5d258c760869b6aca3894f07e647b9d

    SHA512

    99a83f18c026ecd424f33f05fb5e61fd2d7296f64d3a01f090685589eeb72dcaf7b35ed82eab6d2b440a98a21106422fa55c67620bf5b61b467533137863ca36

  • C:\Users\Admin\AppData\Local\Temp\Cab98BA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9968.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\conf\conf.ini

    Filesize

    227B

    MD5

    08e88b4716a7dc0a6530d85491d19736

    SHA1

    f56f189e549770ad693a26cac7e4dfa1e628adf9

    SHA256

    9fa119137767b82d3f79ef819004b9a5288a9f244202cb43a07deb77a17fe260

    SHA512

    22573165e1a7952bbccc4f3e3df11581bdec3da26f36a253aed3896a1127174b6bc7855086bae191ace660757f69a8ca79ddbbcaf6b242ae4b1fb0155fa8e2f1

  • C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\uninstall\updater_uninstall.exe

    Filesize

    71KB

    MD5

    9c492d2dbc8f61f7bb6d8f49e2665222

    SHA1

    1d8dfd0f61bf4adb1e23760ab5ceabf4db584800

    SHA256

    2f43535d9f670760fbf5e47aaa15e019ba72e2ffc8ecb79f4db89ab8ce867335

    SHA512

    dd090d999e87cad30138f1febb7e8c1a2f061f67c4c320d254894fabedddbb40791312854f47ed52a95c62754939c2ee33b84939f5edf1b32a698af93655fb80

  • \Users\Admin\AppData\Local\Temp\nstDE21.tmp\KillProcDLL.dll

    Filesize

    32KB

    MD5

    83142eac84475f4ca889c73f10d9c179

    SHA1

    dbe43c0de8ef881466bd74861b2e5b17598b5ce8

    SHA256

    ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729

    SHA512

    1c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1

  • \Users\Admin\AppData\Local\Temp\nstDE21.tmp\fct.dll

    Filesize

    4KB

    MD5

    e3f3809f51c7982d96aaf9c090f7d176

    SHA1

    7494daa8000c0b31c58d94edc509232569a4606f

    SHA256

    010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29

    SHA512

    3fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc

  • \Users\Admin\AppData\Roaming\Genieo\Application\TrayUi\bin\gentray.exe

    Filesize

    550KB

    MD5

    7103eddedf089adaff84539585df19af

    SHA1

    a4cbef70b9233956bcfeccff176ae971fb16b73e

    SHA256

    41e09d91850d85cf97ba5cef2936cf9bda879595694b1457e27c9aecad1ac349

    SHA512

    38fd37ce6e3a72cd350dc6535222dffc011d0c66dfb09ce4adb3cb2ed1eb1834b7444172500e7e2062b8660b0c61925fbb2d249b5fced9166c7da7c49b93e191

  • \Users\Admin\AppData\Roaming\Genieo\Application\Updater\bin\genupdater.exe

    Filesize

    274KB

    MD5

    986cc427326543cb6428895c9d18285f

    SHA1

    29f9700c639df045b7959aada45654f27a200e1c

    SHA256

    9f4a160ad96e6b2ebc8312a9d7883493bbeb474432565dedc33541f8758812eb

    SHA512

    272d40369d636bb8753afce3336691014f8648601b466a73768f1b66da89b2b0ca23c6bcadd1a4d5e6069432b0a333cbb1e2d37005a08310ede655fa57ec6e4d