Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2022, 11:14
Static task
static1
Behavioral task
behavioral1
Sample
1e6b66ee8cd8d3093dcb297130b2b5f5883cd78e8816917ea1a6e4b400431bf5.exe
Resource
win10v2004-20220812-en
General
-
Target
1e6b66ee8cd8d3093dcb297130b2b5f5883cd78e8816917ea1a6e4b400431bf5.exe
-
Size
731KB
-
MD5
c119c3c9045ade693d983a12ec96787c
-
SHA1
a09aab4828ae92a64807655590dedeb8ef9260f9
-
SHA256
1e6b66ee8cd8d3093dcb297130b2b5f5883cd78e8816917ea1a6e4b400431bf5
-
SHA512
1eb4d60d50ca84a539fe36d241e7211483d671e3774c00961b7c6e91a341c5e38cc9b6ddd1deed47e1c9a82217fb38aa2ef79fc8f5a0ec9255808fbdb4126f23
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3680 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4176 schtasks.exe 3232 schtasks.exe 3584 schtasks.exe 5112 schtasks.exe 4008 schtasks.exe 832 schtasks.exe 2844 schtasks.exe 3552 schtasks.exe 536 schtasks.exe 2364 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1604 powershell.exe 1604 powershell.exe 1104 powershell.exe 1104 powershell.exe 1740 powershell.exe 1740 powershell.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe 3680 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1604 powershell.exe Token: SeDebugPrivilege 4124 1e6b66ee8cd8d3093dcb297130b2b5f5883cd78e8816917ea1a6e4b400431bf5.exe Token: SeDebugPrivilege 1104 powershell.exe Token: SeDebugPrivilege 1740 powershell.exe Token: SeDebugPrivilege 3680 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4124 wrote to memory of 1084 4124 1e6b66ee8cd8d3093dcb297130b2b5f5883cd78e8816917ea1a6e4b400431bf5.exe 80 PID 4124 wrote to memory of 1084 4124 1e6b66ee8cd8d3093dcb297130b2b5f5883cd78e8816917ea1a6e4b400431bf5.exe 80 PID 4124 wrote to memory of 1084 4124 1e6b66ee8cd8d3093dcb297130b2b5f5883cd78e8816917ea1a6e4b400431bf5.exe 80 PID 1084 wrote to memory of 1484 1084 cmd.exe 82 PID 1084 wrote to memory of 1484 1084 cmd.exe 82 PID 1084 wrote to memory of 1484 1084 cmd.exe 82 PID 1084 wrote to memory of 1604 1084 cmd.exe 83 PID 1084 wrote to memory of 1604 1084 cmd.exe 83 PID 1084 wrote to memory of 1604 1084 cmd.exe 83 PID 1084 wrote to memory of 1104 1084 cmd.exe 89 PID 1084 wrote to memory of 1104 1084 cmd.exe 89 PID 1084 wrote to memory of 1104 1084 cmd.exe 89 PID 1084 wrote to memory of 1740 1084 cmd.exe 92 PID 1084 wrote to memory of 1740 1084 cmd.exe 92 PID 1084 wrote to memory of 1740 1084 cmd.exe 92 PID 4124 wrote to memory of 3680 4124 1e6b66ee8cd8d3093dcb297130b2b5f5883cd78e8816917ea1a6e4b400431bf5.exe 93 PID 4124 wrote to memory of 3680 4124 1e6b66ee8cd8d3093dcb297130b2b5f5883cd78e8816917ea1a6e4b400431bf5.exe 93 PID 4124 wrote to memory of 3680 4124 1e6b66ee8cd8d3093dcb297130b2b5f5883cd78e8816917ea1a6e4b400431bf5.exe 93 PID 3680 wrote to memory of 3144 3680 dllhost.exe 94 PID 3680 wrote to memory of 3144 3680 dllhost.exe 94 PID 3680 wrote to memory of 3144 3680 dllhost.exe 94 PID 3680 wrote to memory of 4960 3680 dllhost.exe 95 PID 3680 wrote to memory of 4960 3680 dllhost.exe 95 PID 3680 wrote to memory of 4960 3680 dllhost.exe 95 PID 3680 wrote to memory of 1612 3680 dllhost.exe 96 PID 3680 wrote to memory of 1612 3680 dllhost.exe 96 PID 3680 wrote to memory of 1612 3680 dllhost.exe 96 PID 3680 wrote to memory of 4452 3680 dllhost.exe 97 PID 3680 wrote to memory of 4452 3680 dllhost.exe 97 PID 3680 wrote to memory of 4452 3680 dllhost.exe 97 PID 3680 wrote to memory of 528 3680 dllhost.exe 98 PID 3680 wrote to memory of 528 3680 dllhost.exe 98 PID 3680 wrote to memory of 528 3680 dllhost.exe 98 PID 3680 wrote to memory of 3488 3680 dllhost.exe 104 PID 3680 wrote to memory of 3488 3680 dllhost.exe 104 PID 3680 wrote to memory of 3488 3680 dllhost.exe 104 PID 3680 wrote to memory of 1860 3680 dllhost.exe 106 PID 3680 wrote to memory of 1860 3680 dllhost.exe 106 PID 3680 wrote to memory of 1860 3680 dllhost.exe 106 PID 3680 wrote to memory of 1284 3680 dllhost.exe 107 PID 3680 wrote to memory of 1284 3680 dllhost.exe 107 PID 3680 wrote to memory of 1284 3680 dllhost.exe 107 PID 3680 wrote to memory of 4240 3680 dllhost.exe 108 PID 3680 wrote to memory of 4240 3680 dllhost.exe 108 PID 3680 wrote to memory of 4240 3680 dllhost.exe 108 PID 3680 wrote to memory of 1488 3680 dllhost.exe 110 PID 3680 wrote to memory of 1488 3680 dllhost.exe 110 PID 3680 wrote to memory of 1488 3680 dllhost.exe 110 PID 3680 wrote to memory of 3576 3680 dllhost.exe 113 PID 3680 wrote to memory of 3576 3680 dllhost.exe 113 PID 3680 wrote to memory of 3576 3680 dllhost.exe 113 PID 3680 wrote to memory of 2168 3680 dllhost.exe 115 PID 3680 wrote to memory of 2168 3680 dllhost.exe 115 PID 3680 wrote to memory of 2168 3680 dllhost.exe 115 PID 3144 wrote to memory of 4176 3144 cmd.exe 119 PID 3144 wrote to memory of 4176 3144 cmd.exe 119 PID 3144 wrote to memory of 4176 3144 cmd.exe 119 PID 1284 wrote to memory of 832 1284 cmd.exe 118 PID 1284 wrote to memory of 832 1284 cmd.exe 118 PID 1284 wrote to memory of 832 1284 cmd.exe 118 PID 1612 wrote to memory of 3232 1612 cmd.exe 121 PID 1612 wrote to memory of 3232 1612 cmd.exe 121 PID 1612 wrote to memory of 3232 1612 cmd.exe 121 PID 4960 wrote to memory of 2844 4960 cmd.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e6b66ee8cd8d3093dcb297130b2b5f5883cd78e8816917ea1a6e4b400431bf5.exe"C:\Users\Admin\AppData\Local\Temp\1e6b66ee8cd8d3093dcb297130b2b5f5883cd78e8816917ea1a6e4b400431bf5.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:1484
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4176
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3232
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4452
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:528
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:536
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3488
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3552
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1860
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:5112
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:832
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk8036" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4240
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk8036" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2364
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5121" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1488
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5121" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3584
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9526" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3576
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6161" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2168
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6161" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4008
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4224
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:2656
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:544
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4300
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:1028
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:3764
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
950KB
MD52ca6cb0ee861dd79c0a7ce667d70d4a4
SHA1dbb534e346fdcb1d23d8f66dc59e7572a9906a05
SHA2566b00096c89a3ff6cbe551a37534b3b49bbf5d27874e80f84d1f1a26f047b45df
SHA512271b2429e119ac2a423d07b4718997f18fbf37a16f700d155ecc1a7f912145260730c6a7137294ec7f69637581e34b5399d2e58fa7ee0f5cf3cc2b419fa645bd
-
Filesize
950KB
MD52ca6cb0ee861dd79c0a7ce667d70d4a4
SHA1dbb534e346fdcb1d23d8f66dc59e7572a9906a05
SHA2566b00096c89a3ff6cbe551a37534b3b49bbf5d27874e80f84d1f1a26f047b45df
SHA512271b2429e119ac2a423d07b4718997f18fbf37a16f700d155ecc1a7f912145260730c6a7137294ec7f69637581e34b5399d2e58fa7ee0f5cf3cc2b419fa645bd
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD51bd731ae94f6b20f841bca0d34d48974
SHA1e89072777793afdbb18c375fff8a88431fbb38d1
SHA256ec8ccfb75050edfba06e61682a881539f4bd0eecf0ec9758b518e535dec4f772
SHA512c63152c92907630cc8bf65cc61626e7cf4d247ffe23b71019e5752c0b55aab32a115eac77306d397e4895d8ef2be6463f1566e7fa58f944a972ddeb64b711d0b
-
Filesize
18KB
MD5ded5cd8bb54252668f95c75ab9a1390f
SHA165e1dbf6c6da8782868e251110d64f1ab7ed09ad
SHA25606a446cd233ddb73317e91b2c1c0c56416ea17d6419abc9cb922309055c6345b
SHA512ad5fc6f63c014a7028a2072aa1ffef0a7f24287a832a09815ebd6700b122da0a4cc20f5859533dd3ad0325e962ec4a1b95f699dbf15f24977bd69d6f3a31f4d7