Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2024, 14:13
Behavioral task
behavioral1
Sample
3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe
Resource
win7-20240903-en
General
-
Target
3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe
-
Size
4.0MB
-
MD5
3c4510f89e7cefa5316dd0170809a5af
-
SHA1
3cff629e390af8a37ab0e82af2babab9ad6615d3
-
SHA256
3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870
-
SHA512
e5ec479ef6f3f7fb3e43e9c499930956e6fce136246ff0ef2ee563fbe54dc3052743c820c6df1ee5500aa96e011b3e6fb4f3e8f454cc6a282c599cc4e5cab2a8
-
SSDEEP
49152:rVxwJxin6ea59xUQoBkHcYJs993X+s8KuqGaX0ToIBAUZLYep:jKxinS9oBk8YJs92JBAUZL7
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe -
resource yara_rule behavioral2/memory/1332-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-100-0x00000000036D0000-0x000000000370E000-memory.dmp upx behavioral2/memory/1332-123-0x00000000036D0000-0x000000000370E000-memory.dmp upx behavioral2/memory/1332-98-0x00000000036D0000-0x000000000370E000-memory.dmp upx behavioral2/memory/1332-96-0x00000000036D0000-0x000000000370E000-memory.dmp upx behavioral2/memory/1332-94-0x00000000036D0000-0x000000000370E000-memory.dmp upx behavioral2/memory/1332-92-0x00000000036D0000-0x000000000370E000-memory.dmp upx behavioral2/memory/1332-90-0x00000000036D0000-0x000000000370E000-memory.dmp upx behavioral2/memory/1332-88-0x00000000036D0000-0x000000000370E000-memory.dmp upx behavioral2/memory/1332-86-0x00000000036D0000-0x000000000370E000-memory.dmp upx behavioral2/memory/1332-84-0x00000000036D0000-0x000000000370E000-memory.dmp upx behavioral2/memory/1332-82-0x00000000036D0000-0x000000000370E000-memory.dmp upx behavioral2/memory/1332-81-0x00000000036D0000-0x000000000370E000-memory.dmp upx behavioral2/memory/1332-80-0x00000000036D0000-0x000000000370E000-memory.dmp upx behavioral2/memory/1332-79-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-75-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-73-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-71-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-61-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-65-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-63-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-270-0x0000000010000000-0x000000001003E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RunDll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch RunDll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" RunDll32.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133738208213360374" 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\Content rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\Extensible Cache rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\Cookies\CacheLimit = "1" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\Content\CachePrefix rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\Content\CacheVersion = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\Content\CacheLimit = "51200" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\Cookies\CacheVersion = "1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\Cookies rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\History rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\History\CacheVersion = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\History\CacheLimit = "1" rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\SystemCertificates\REQUEST 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\D9999380ACB4E455F453A493301730B7E835B733 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\D9999380ACB4E455F453A493301730B7E835B733\Blob = 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 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D9999380ACB4E455F453A493301730B7E835B733 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D9999380ACB4E455F453A493301730B7E835B733\Blob = 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 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D9999380ACB4E455F453A493301730B7E835B733\Blob = 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 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D9999380ACB4E455F453A493301730B7E835B733\Blob = 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 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3720 RunDll32.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1332 wrote to memory of 3720 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 87 PID 1332 wrote to memory of 3720 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 87 PID 1332 wrote to memory of 3720 1332 3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe 87 PID 3720 wrote to memory of 3424 3720 RunDll32.exe 88 PID 3720 wrote to memory of 3424 3720 RunDll32.exe 88 PID 3720 wrote to memory of 3424 3720 RunDll32.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe"C:\Users\Admin\AppData\Local\Temp\3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\RunDll32.exeRunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 82⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:8 WinX:0 WinY:0 IEFrame:000000003⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3424
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
505KB
MD579fe5228b7ccdc88cf7ddba2893ea71f
SHA14313028e5354d66be81fd2103a16b16e1ad1a6f3
SHA2565850d403352d76e7f7ebda93a7bff5ab1ea57c91a54a2f6c2cfaf1c9d356d55f
SHA512f46380ccd2fcb8246206f176f17c1931d57c3bc1312c95e059cf9feab4bc392ad31fa6ffc6a1dac3b0bd70c5393ab1c2cf21729e357cb7c523d487dd92aacac3
-
Filesize
2KB
MD5a85644e124f5b897053b7a4dab70b7e6
SHA1e8f0fe7bd62a03bfb18a7f680a4fab3b503715a6
SHA2565fe44f8198a4e1726d3aff26750fd44120bde200125cada7def41be752bb3a8e
SHA512e761e9d77196939ad115c500e49fabbfa7538ab800f4ebd547011e4c45a0b4d81641842ccf701b5b112183b62c4e366c0ef9de99b42baf21e2121ae7e2e7d501
-
Filesize
2KB
MD576e5147b104d18da369a6bb5b6f49d63
SHA1f872419ddcc0c213e13e952a52744ad76d47b565
SHA25632f2970b753d82233916aa0c846f24a81b338a2c621b3d6d6ce1096d79fde958
SHA512776f52a752ac13ab7815b3739032756e85e02ed3486da9d6b6df8aa0faf8ba1c0de06554f2296d7ec33217fc45594e5287dc198a117cceb1fa475ae9f077f010
-
Filesize
2KB
MD5f3634adb7524232d5babf6234b0504e7
SHA18fe1c4f95cded13e49728d2a6aa971f7f37a42f1
SHA2567d5a43f6656bb1f7123e00a815952a851428f26c80de603487c33717c0f8823e
SHA5121c8790554b76544d556ee0997df6456572664b0da93d23ef71c0eb2efd009de35e0af71b49ca583eab2c9cfc713d4746c45d9b83df9e0d4272138f799961dc50
-
Filesize
38KB
MD582aff43dea5b7e114cb75f1a9c625b9a
SHA1744f47a54429f23f49a36b45f7bd376d78110f36
SHA256d5bcdb257b09fcf88e616206a17c9d65864ec1bcbf81b79ffcfd971fbd6f0f19
SHA5128860c4fa405bd921d65241959218ba840a6ca8ec3fc9f3cd222bfd14edda073591f7323ae6e69c19a1e2d3beb39a9e1f3b52f19160f269dfa7ff78e7f600c65c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\096fd12a852e642e869c264e594e5567_4304acb9-c3f6-452a-9860-eb4e85d38d4e
Filesize2KB
MD52a56242930f1c74f3fae0264824db75f
SHA16bba8b04d4574652179538d435b48ee153cf4742
SHA2563f446ec653eac8b7b94855b31413abc88a717cc80e949b4b98a8e248e40987d7
SHA512be98c9e1cc2bc539126b19e1217b9cc3981fedcb689005abfcd9f1c21a44e8e0149904cf668c97816930bd302730e902669beaa0031d9116e0ebf5612f78d2e2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2437139445-1151884604-3026847218-1000\854d64d1545d4733c2345910d16fd957_4304acb9-c3f6-452a-9860-eb4e85d38d4e
Filesize2KB
MD5fed39f05bf1b171aede9de05a1d0d3f6
SHA1a90e4f0cfbee24c559796ba6b1ddcea780b294a0
SHA256a2737732cbed12ff9d6564640bcc083e97e47193dd242b4888b6b3c48a9568dd
SHA512cf8f1f2f42aae3518bd8bdf50953b139943dc77a5806ef6543534db193480f84e9c9a43c49929ad95a98d677de92a0f2c9d989c1d3a8854c07051aa70cbe9e7f
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\7E1013A7CC4A44921A57D124B3603ADC2127CEDC
Filesize1KB
MD5d8d27672b4f5b40040ed68bc11319950
SHA1de9bc3d422bf4beea838f3591bdf56643d76b8ec
SHA256d942658283dfdfd4f141339e02729ea45116c67787e8a5f0fcd1122479bed827
SHA512906170b158d774e69c194be80f386f032806eef8d63945f9da95f9bdc962031980abf4bfdcd66300c10939e1b5c8e6163ff4d26878b97e984d95baffbf4516af
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\D9999380ACB4E455F453A493301730B7E835B733
Filesize1KB
MD55a3827ffedd268f1188401c44e6a237b
SHA10532c9f77b55a51c79c043a78bdf2ed5e012f52b
SHA256f74b455d3ebf19eaa64dae6f79f66e7eec2b8f0efa3555f3ad6d88eda5d11ba2
SHA51288f8bbf8d9c51758c6b0d486a62677521962fee5ec16d7a1fbb37fda9cea797fec78dccd1ca7509f87139b67458691f6f50ce16bcda980b31165ccbe5342804c