Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
submitted
22/11/2024, 03:48 UTC
Static task
static1
Behavioral task
behavioral1
Sample
Acrobat_DC_x64_VIP_v10.12.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Acrobat_DC_x64_VIP_v10.12.msi
Resource
win10v2004-20241007-en
General
-
Target
Acrobat_DC_x64_VIP_v10.12.msi
-
Size
2.7MB
-
MD5
b9632555b2c19b9182cab9c098c22d8e
-
SHA1
100d612540c51413141f52c3888114cddb76e9a0
-
SHA256
1164b944f47a9701ddd682f59c60425faed350647e3f9e562e1abc140a89c7f2
-
SHA512
b90b26af09115c4ad37f5cb40135de51835ccffbd666168934062fb587a9111fa535e21c1e231aed76a5e871d63a9f71b686367defed3d584f6d76f75e5acb52
-
SSDEEP
49152:/O05mqQDiCjwnwVv+i2MF/NtSftHFDSy4dx21N+NfSf/wXoCBBUQZcUJ8+mp3gi/:/rABiCjwnwVmGF1t6R1j4dx8Njf/w4C2
Malware Config
Extracted
bumblebee
138704
-
dga
45urhm0ldgxb.live
gx6xly9rp6vl.live
zv46ga4ntybq.live
7n1hfolmrnbl.live
vivh2xlt9i6q.live
97t3nh4kk510.live
kbkdtwucfl40.live
qk6a1ahb63uz.live
whko7loy7h5z.live
dad1zg44n0bn.live
7xwz4hw8dts9.live
ovekd5n3gklq.live
amwnef8mjo4v.live
e7ivqfhnss0x.live
rjql4nicl6bg.live
4mo318kk29i4.live
zpo18lm8vg1x.live
jc51pt290y0n.live
rg26t2dc4hf4.live
qw9a58vunuja.live
ugm94zjzl5nl.live
mckag832orba.live
pdw0v9voxlxr.live
m4tx2apfmoxo.live
n2uc737ef71m.live
hkk3112645hz.live
ugko9g5ipa4o.live
8wgq2x4dybx9.live
h81fx7sj8srr.live
a4tgoqi1cm8x.live
kse2q7uxyrwp.live
mfwnbxvt9qme.live
x99ahfftf28l.live
9n6bmko47gxe.live
6l96lk6edlyf.live
st5j8zqdrppf.live
dxjeucbj4p0j.live
bnpuxnov7lhr.live
a8bxv8lqe1m0.live
yczi2ujcyyro.live
sbeo0cztn1kh.live
o337yf9fh4bf.live
zoki7ma89z7b.live
x2r9bglz76r7.live
wi1w9yu1vush.live
mtqdvzkai700.live
r6o2sj70m85m.live
ut6qohwra5lm.live
9yi98fh7usy1.live
kkpjp9jzbzba.live
whvffwd7zphw.live
uztmazsno4y5.live
i3iubj73c21c.live
b72o02l2ilc6.live
wom4o4cutfx6.live
fek3qya20lid.live
nhkvd56j82xw.live
midyxlu6b22f.live
vp9c9rziba2a.live
rkffupb7i1gv.live
8u7r35mu2e4g.live
3c2xflq8mztc.live
wswis3sptby1.live
9rib57u1zu3c.live
sv3pldc5gkdl.live
bmdcn5celetq.live
y3mpywhmem7t.live
avwtkc23ffmw.live
nvgirtryox1z.live
3rlfa7w0bz37.live
vy9u47oyzltu.live
ysdwk0l8xass.live
tbt0aqol3sp2.live
xqqoo0a8zk0w.live
nevkq7lku38l.live
5u42wjin0vfz.live
y626kbnryktm.live
5k9b8nmc0x8r.live
i18t3jshekua.live
4hk1bcnxbse0.live
si00bu9fv5he.live
g3in90m5caz2.live
f6s4n6w41oov.live
sgl7og2qswmm.live
vrrbk7ykz8h1.live
zl7bmlfq8n9w.live
qydstwmw2imy.live
y9s73mnvurxr.live
7zggkh833im1.live
cvnsiogvl3kt.live
enf3gev34gis.live
doj6z5i9g803.live
zsm954jr5ek4.live
6z96z4mk84dc.live
e0et68offggh.live
au97foecnlrm.live
3ibjpmls5x46.live
mmmpa1byo300.live
3e60zvd64d8y.live
zt3nnzr70hn0.live
-
dga_seed
7834006444057268685
-
domain_length
12
-
num_dga_domains
300
-
port
443
Signatures
-
Bumblebee family
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe -
resource yara_rule behavioral2/files/0x0007000000023c5f-16.dat upx behavioral2/memory/3172-25-0x0000000000B10000-0x0000000000F55000-memory.dmp upx behavioral2/memory/3172-40-0x0000000000B10000-0x0000000000F55000-memory.dmp upx -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{DD475EBC-D960-4AF4-BB8A-BE91FA942756} msiexec.exe File opened for modification C:\Windows\Installer\MSI5196.tmp msiexec.exe File created C:\Windows\Installer\e5850cd.msi msiexec.exe File created C:\Windows\Installer\e5850cb.msi msiexec.exe File opened for modification C:\Windows\Installer\e5850cb.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe -
Executes dropped EXE 1 IoCs
pid Process 3172 Reader_Install_Setup.exe -
Loads dropped DLL 1 IoCs
pid Process 2532 rundll32.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 3024 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Reader_Install_Setup.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 404 msiexec.exe 404 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3024 msiexec.exe Token: SeIncreaseQuotaPrivilege 3024 msiexec.exe Token: SeSecurityPrivilege 404 msiexec.exe Token: SeCreateTokenPrivilege 3024 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3024 msiexec.exe Token: SeLockMemoryPrivilege 3024 msiexec.exe Token: SeIncreaseQuotaPrivilege 3024 msiexec.exe Token: SeMachineAccountPrivilege 3024 msiexec.exe Token: SeTcbPrivilege 3024 msiexec.exe Token: SeSecurityPrivilege 3024 msiexec.exe Token: SeTakeOwnershipPrivilege 3024 msiexec.exe Token: SeLoadDriverPrivilege 3024 msiexec.exe Token: SeSystemProfilePrivilege 3024 msiexec.exe Token: SeSystemtimePrivilege 3024 msiexec.exe Token: SeProfSingleProcessPrivilege 3024 msiexec.exe Token: SeIncBasePriorityPrivilege 3024 msiexec.exe Token: SeCreatePagefilePrivilege 3024 msiexec.exe Token: SeCreatePermanentPrivilege 3024 msiexec.exe Token: SeBackupPrivilege 3024 msiexec.exe Token: SeRestorePrivilege 3024 msiexec.exe Token: SeShutdownPrivilege 3024 msiexec.exe Token: SeDebugPrivilege 3024 msiexec.exe Token: SeAuditPrivilege 3024 msiexec.exe Token: SeSystemEnvironmentPrivilege 3024 msiexec.exe Token: SeChangeNotifyPrivilege 3024 msiexec.exe Token: SeRemoteShutdownPrivilege 3024 msiexec.exe Token: SeUndockPrivilege 3024 msiexec.exe Token: SeSyncAgentPrivilege 3024 msiexec.exe Token: SeEnableDelegationPrivilege 3024 msiexec.exe Token: SeManageVolumePrivilege 3024 msiexec.exe Token: SeImpersonatePrivilege 3024 msiexec.exe Token: SeCreateGlobalPrivilege 3024 msiexec.exe Token: SeBackupPrivilege 1344 vssvc.exe Token: SeRestorePrivilege 1344 vssvc.exe Token: SeAuditPrivilege 1344 vssvc.exe Token: SeBackupPrivilege 404 msiexec.exe Token: SeRestorePrivilege 404 msiexec.exe Token: SeRestorePrivilege 404 msiexec.exe Token: SeTakeOwnershipPrivilege 404 msiexec.exe Token: SeRestorePrivilege 404 msiexec.exe Token: SeTakeOwnershipPrivilege 404 msiexec.exe Token: SeRestorePrivilege 404 msiexec.exe Token: SeTakeOwnershipPrivilege 404 msiexec.exe Token: SeRestorePrivilege 404 msiexec.exe Token: SeTakeOwnershipPrivilege 404 msiexec.exe Token: SeRestorePrivilege 404 msiexec.exe Token: SeTakeOwnershipPrivilege 404 msiexec.exe Token: SeRestorePrivilege 404 msiexec.exe Token: SeTakeOwnershipPrivilege 404 msiexec.exe Token: SeRestorePrivilege 404 msiexec.exe Token: SeTakeOwnershipPrivilege 404 msiexec.exe Token: SeRestorePrivilege 404 msiexec.exe Token: SeTakeOwnershipPrivilege 404 msiexec.exe Token: SeRestorePrivilege 404 msiexec.exe Token: SeTakeOwnershipPrivilege 404 msiexec.exe Token: SeRestorePrivilege 404 msiexec.exe Token: SeTakeOwnershipPrivilege 404 msiexec.exe Token: SeRestorePrivilege 404 msiexec.exe Token: SeTakeOwnershipPrivilege 404 msiexec.exe Token: SeRestorePrivilege 404 msiexec.exe Token: SeTakeOwnershipPrivilege 404 msiexec.exe Token: SeRestorePrivilege 404 msiexec.exe Token: SeTakeOwnershipPrivilege 404 msiexec.exe Token: SeRestorePrivilege 404 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3024 msiexec.exe 3024 msiexec.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3172 Reader_Install_Setup.exe 3172 Reader_Install_Setup.exe 3172 Reader_Install_Setup.exe 3172 Reader_Install_Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 404 wrote to memory of 1416 404 msiexec.exe 99 PID 404 wrote to memory of 1416 404 msiexec.exe 99 PID 404 wrote to memory of 2532 404 msiexec.exe 101 PID 404 wrote to memory of 2532 404 msiexec.exe 101 PID 404 wrote to memory of 3172 404 msiexec.exe 102 PID 404 wrote to memory of 3172 404 msiexec.exe 102 PID 404 wrote to memory of 3172 404 msiexec.exe 102 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Acrobat_DC_x64_VIP_v10.12.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3024
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:1416
-
-
C:\Windows\system32\rundll32.exe"rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\qpgEZsswIP.dll",DllRegisterServer2⤵
- Loads dropped DLL
PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe"C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3172
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1344
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request23.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request84.162.74.23.in-addr.arpaIN PTRResponse84.162.74.23.in-addr.arpaIN PTRa23-74-162-84deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestuse.typekit.netIN AResponseuse.typekit.netIN CNAMEuse-stls.adobe.com.edgesuite.netuse-stls.adobe.com.edgesuite.netIN CNAMEa1988.dscg1.akamai.neta1988.dscg1.akamai.netIN A23.56.238.58a1988.dscg1.akamai.netIN A23.56.238.83
-
Remote address:23.56.238.58:443RequestGET /bxf0ivf.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: use.typekit.net
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: text/javascript;charset=utf-8
Vary: Accept-Encoding
Strict-Transport-Security: max-age=31536000; includeSubDomains;
Timing-Allow-Origin: *
Access-Control-Allow-Origin: *
Cross-Origin-Resource-Policy: cross-origin
Content-Encoding: gzip
Content-Length: 6811
Date: Fri, 22 Nov 2024 03:49:12 GMT
Connection: keep-alive
-
Remote address:8.8.8.8:53Request58.238.56.23.in-addr.arpaIN PTRResponse58.238.56.23.in-addr.arpaIN PTRa23-56-238-58deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request212.20.149.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.42.69.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request83.121.18.2.in-addr.arpaIN PTRResponse83.121.18.2.in-addr.arpaIN PTRa2-18-121-83deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request29.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request209.143.182.52.in-addr.arpaIN PTRResponse
-
1.6kB 13.1kB 20 17
HTTP Request
GET https://use.typekit.net/bxf0ivf.jsHTTP Response
200
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
23.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
84.162.74.23.in-addr.arpa
-
61 B 169 B 1 1
DNS Request
use.typekit.net
DNS Response
23.56.238.5823.56.238.83
-
71 B 135 B 1 1
DNS Request
58.238.56.23.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
212.20.149.52.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
241.42.69.40.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
83.121.18.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
29.243.111.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
209.143.182.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD59489260459ff77e479047fd8950865fc
SHA1f7dd642f2fe6f53de0df6f6df9b7ac252594e32f
SHA25634bd8e57c838d695a4ec7629342ac20dca8f15c159f192b612aca085ce6d7c0e
SHA512d3ab26959c5818efc7f8574afba0da24247afc097844a5075d5d78bfcf62666d81358e13fe77b30c031598de2f22f40254bfcf71faaecc2fdfec73374fcabb8b
-
Filesize
1.4MB
MD5e4e96d377207c990295577e0ebd93f79
SHA16c6ed98b484f8a1a145ebe7d900df36fb4abc931
SHA256ac6311039d5bfe719198c15577d3ee870185529f9510f5c0ddc066f1c8d8c462
SHA5123db14a6f3dfa2e2768b1c25a65bc6f48c5dc763d80fee576cd7d0b21f3ecdcd25c0096b10c947f6b24999c23df75709604a4dc0fd1d894cdb1b9a556e1e6eaf7
-
Filesize
2.3MB
MD53cf367e01d074e622e14c36fe1685c0a
SHA1f9b347b843f438564e606a7d3e273659e0fb7cc7
SHA2562cb0aea0f3dfe49b99f5f7a0e6f6020413c916e4a21d05d2df1cca3de3e7e91d
SHA5124033d7e17e673ec67947367fed5f5992d578b61a0da0d24743d03ab0e1bf17f26bce7f80d5b0d23f87736e3d8c429fd4420bec708c295d81d125700bbf4ab3a9
-
Filesize
2.7MB
MD5b9632555b2c19b9182cab9c098c22d8e
SHA1100d612540c51413141f52c3888114cddb76e9a0
SHA2561164b944f47a9701ddd682f59c60425faed350647e3f9e562e1abc140a89c7f2
SHA512b90b26af09115c4ad37f5cb40135de51835ccffbd666168934062fb587a9111fa535e21c1e231aed76a5e871d63a9f71b686367defed3d584f6d76f75e5acb52
-
Filesize
24.1MB
MD5612689c954f7d4e96aa1c7f172a5d733
SHA1c14822499b5435f215b0d7c573d6ff80ba2d09ab
SHA25686c938a56176d0864a57ee8417648ccd984f65eb2e2dcee8c351e5976dd8a1fb
SHA512bf50ba232eb0ba9b52fc6cee57b9e823ce828b006aa5671bae1f63bf8b3b6b8dcbebef976befd66a90781f2a2cb0c676b0e89b570efc18e8977dd2f98e43f92b
-
\??\Volume{612d9cf5-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{ed36143a-5dfb-47a3-baac-d026ed2e7fb9}_OnDiskSnapshotProp
Filesize6KB
MD5f9823c999957e1125a930031f883655b
SHA1886973a3e6202cb5f56e7587cae5d8b67691dd2c
SHA256edf4b6f0c89f00334edd01545c0a1a87a85762efdbc03adb8f7aed1466a5cb1f
SHA512af77902d866fb7322038ebb4855a538ff7991d9ca02c8c44d1c66d88cd9b9ee8f959942f8e8d699d5e940f5f829d765e7bb59b98953f4b798caf8bd094e640ca