Overview
overview
10Static
static
100A6172B017F62EAA.exe
windows7-x64
100A6172B017F62EAA.exe
windows10-2004-x64
102891E1D4BAC70EBA.exe
windows7-x64
102891E1D4BAC70EBA.exe
windows10-2004-x64
103472CB2D1AB89AAB.exe
windows7-x64
103472CB2D1AB89AAB.exe
windows10-2004-x64
10613788884CE0093F.exe
windows7-x64
10613788884CE0093F.exe
windows10-2004-x64
107189AED8B8AE6568.exe
windows7-x64
107189AED8B8AE6568.exe
windows10-2004-x64
10CC3B1F89FAA517E4.exe
windows7-x64
10CC3B1F89FAA517E4.exe
windows10-2004-x64
10F5657AC3DC58DC8C.exe
windows7-x64
10F5657AC3DC58DC8C.exe
windows10-2004-x64
10Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 13:19
Behavioral task
behavioral1
Sample
0A6172B017F62EAA.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0A6172B017F62EAA.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
2891E1D4BAC70EBA.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
2891E1D4BAC70EBA.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
3472CB2D1AB89AAB.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
3472CB2D1AB89AAB.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
613788884CE0093F.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
613788884CE0093F.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
7189AED8B8AE6568.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
7189AED8B8AE6568.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
CC3B1F89FAA517E4.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
CC3B1F89FAA517E4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
F5657AC3DC58DC8C.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
F5657AC3DC58DC8C.exe
Resource
win10v2004-20241007-en
General
-
Target
3472CB2D1AB89AAB.exe
-
Size
137KB
-
MD5
cdb5b9402d4db31b15abd8dd2eb1947d
-
SHA1
912c9ac3addd53685b3409c46dcb73946a74ecd3
-
SHA256
ba6a4d65b25c86faa7179d1aa3db48c2fc445e393d1b8c0035dbd81d27b93d54
-
SHA512
50280c0dc4e6d2709d2f18ff77134e029d1a123a5fcb173fab5fc4cd164b64d5b168b6286f39f6d5be7b0dcd140550692963d4fd08577a79682a833d6a6f8619
-
SSDEEP
3072:PLIQ8YzXEMZK1A2czbFk58x+o+EFz9/t2f65q8hj2bIoKb:PstYrEMw6Bxk5zOFNtgJOCUb
Malware Config
Extracted
C:\ProgramData\biobio ransmoware.txt
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (9065) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
3472CB2D1AB89AAB.exedescription ioc process File opened (read-only) \??\F: 3472CB2D1AB89AAB.exe File opened (read-only) \??\D: 3472CB2D1AB89AAB.exe -
Drops file in Program Files directory 64 IoCs
Processes:
3472CB2D1AB89AAB.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\eula.ini.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02740U.BMP 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer_3.2.200.v20140827-1444.jar 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.directorywatcher.nl_zh_4.4.0.v20140623020002.jar.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsImageTemplate.html.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\VideoLAN\VLC\COPYING.txt 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341344.JPG 3472CB2D1AB89AAB.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\biobio ransmoware.txt 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\utilityfunctions.js.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-snaptracer_zh_CN.jar 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\de-DE\sqloledb.rll.mui 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CALSO11.POC 3472CB2D1AB89AAB.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\biobio ransmoware.txt 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\TipTsf.dll.mui 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\gadget.xml 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.felix.gogo.shell_0.10.0.v201212101605.jar.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Lisbon.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\Windows Media Player\WMPDMCCore.dll 3472CB2D1AB89AAB.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Stationery\biobio ransmoware.txt 3472CB2D1AB89AAB.exe File created C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\biobio ransmoware.txt 3472CB2D1AB89AAB.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\biobio ransmoware.txt 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\SKY.ELM 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\browse.json.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\flyout.css 3472CB2D1AB89AAB.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\biobio ransmoware.txt 3472CB2D1AB89AAB.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\biobio ransmoware.txt 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\feature.xml 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLWVW.DLL.IDX_DLL 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Events.accdt 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\system_m.png 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00416_.WMF.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Urban.xml.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\HST10.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\PhotoAcq.dll.mui 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2ssv.dll.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0400001.PNG.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Perspective.xml 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0216858.WMF 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0285750.WMF.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0299587.WMF.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libcdg_plugin.dll.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\ProtectShow.mpeg2.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\Windows Media Player\es-ES\setup_wm.exe.mui 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\MP00132_.WMF.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bNext-down.png 3472CB2D1AB89AAB.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\biobio ransmoware.txt 3472CB2D1AB89AAB.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\biobio ransmoware.txt 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY00560_.WMF 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Civic.eftx 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\vlc.mo 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\btn-back-static.png 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\forms_super.gif.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.core.commands.nl_ja_4.4.0.v20140623020002.jar 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SlateBlue.css 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\msado28.tlb 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00487_.WMF.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\icon.png 3472CB2D1AB89AAB.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\biobio ransmoware.txt 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0239943.WMF.EMAIL=[[email protected]]ID=[3472CB2D1AB89AAB].biobio 3472CB2D1AB89AAB.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\biobio ransmoware.txt 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\weather.html 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Flow.thmx 3472CB2D1AB89AAB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00166_.WMF 3472CB2D1AB89AAB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3472CB2D1AB89AAB.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3472CB2D1AB89AAB.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 2128 vssadmin.exe 564 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3472CB2D1AB89AAB.exepid process 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe 1904 3472CB2D1AB89AAB.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
3472CB2D1AB89AAB.exevssvc.exedescription pid process Token: SeDebugPrivilege 1904 3472CB2D1AB89AAB.exe Token: SeRestorePrivilege 1904 3472CB2D1AB89AAB.exe Token: SeBackupPrivilege 1904 3472CB2D1AB89AAB.exe Token: SeTakeOwnershipPrivilege 1904 3472CB2D1AB89AAB.exe Token: SeAuditPrivilege 1904 3472CB2D1AB89AAB.exe Token: SeSecurityPrivilege 1904 3472CB2D1AB89AAB.exe Token: SeIncBasePriorityPrivilege 1904 3472CB2D1AB89AAB.exe Token: SeBackupPrivilege 2612 vssvc.exe Token: SeRestorePrivilege 2612 vssvc.exe Token: SeAuditPrivilege 2612 vssvc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
3472CB2D1AB89AAB.execmd.execmd.exedescription pid process target process PID 1904 wrote to memory of 2716 1904 3472CB2D1AB89AAB.exe cmd.exe PID 1904 wrote to memory of 2716 1904 3472CB2D1AB89AAB.exe cmd.exe PID 1904 wrote to memory of 2716 1904 3472CB2D1AB89AAB.exe cmd.exe PID 1904 wrote to memory of 2716 1904 3472CB2D1AB89AAB.exe cmd.exe PID 2716 wrote to memory of 2128 2716 cmd.exe vssadmin.exe PID 2716 wrote to memory of 2128 2716 cmd.exe vssadmin.exe PID 2716 wrote to memory of 2128 2716 cmd.exe vssadmin.exe PID 1904 wrote to memory of 1568 1904 3472CB2D1AB89AAB.exe cmd.exe PID 1904 wrote to memory of 1568 1904 3472CB2D1AB89AAB.exe cmd.exe PID 1904 wrote to memory of 1568 1904 3472CB2D1AB89AAB.exe cmd.exe PID 1904 wrote to memory of 1568 1904 3472CB2D1AB89AAB.exe cmd.exe PID 1568 wrote to memory of 564 1568 cmd.exe vssadmin.exe PID 1568 wrote to memory of 564 1568 cmd.exe vssadmin.exe PID 1568 wrote to memory of 564 1568 cmd.exe vssadmin.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3472CB2D1AB89AAB.exe"C:\Users\Admin\AppData\Local\Temp\3472CB2D1AB89AAB.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2128
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:564
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2612
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
402B
MD54cca299786028771f81f76d2c8cf2eb6
SHA1e475afddad2af29b02cd70281c834bcdaf12e4df
SHA256324014b0ad34a853196650fa9a9f1fba91f597f7d7038f144561d68524edc53d
SHA51295e156f0e55af7aa6887857f0c54e466ff5f26e802043e717f7e7a0bbc83840d7d745a7b9871e2ef445c85b0d1e482f5d75b2d2ed44aff6bb9da2537b0df584a