Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe
Resource
win10v2004-20220812-en
General
-
Target
e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe
-
Size
1.2MB
-
MD5
a3b9ed42cf228971471a2926717257ef
-
SHA1
1c157acccb3f6d88169788b823190bf57f10b9d3
-
SHA256
e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70
-
SHA512
75b907e17d626a6e05c47b24bcd21f318367e1d4211a5b6aadf1b007d3c84e4a5a86992fda7ca3e25979a7eb3c1f2ee194c62a275bff6b32a1d38ae43bfb0ae1
-
SSDEEP
24576:684Fb6PHUotlxRz0rs2v62W5su0S7sBpbum:6/6PHpMA2v6L0S7sBpKm
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\safe.ico e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File opened for modification C:\progra~1\ico\Taobao.ico expand.exe File created C:\progra~1\ico\0c4efe8fcadc49e1abf5d0809382274c$dpx$.tmp\0a15e4e500b9cd4b8446f1b280969f1f.tmp expand.exe File opened for modification C:\progra~1\ico\Chat.ico expand.exe File created C:\progra~1\ico\0c4efe8fcadc49e1abf5d0809382274c$dpx$.tmp\f97cfc1a30f11e4b8f96766c80c7792f.tmp expand.exe File opened for modification C:\progra~1\ico\meiv.ico expand.exe File created C:\progra~1\ico\0c4efe8fcadc49e1abf5d0809382274c$dpx$.tmp\fa385a5a11305042bf777968a6746dd6.tmp expand.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\1b514183-1fdb-4c59-9469-bb7912e4ac89.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221030053715.pma setup.exe File opened for modification C:\progra~1\ico\Beauty.ico expand.exe File opened for modification C:\progra~1\ico\Film.ico expand.exe File created C:\progra~1\ico\0c4efe8fcadc49e1abf5d0809382274c$dpx$.tmp\2caf41718884094181946c1061321404.tmp expand.exe File opened for modification C:\progra~1\ico\Video.ico expand.exe File opened for modification C:\progra~1\ico\{D427AB74-26C9-480A-B8A1-6EB13B3951E6} expand.exe File opened for modification C:\progra~1\ico\0c4efe8fcadc49e1abf5d0809382274c$dpx$.tmp expand.exe File created C:\progra~1\ico\0c4efe8fcadc49e1abf5d0809382274c$dpx$.tmp\a648bb9be08c0d42b8fbf0d00d1717dd.tmp expand.exe File opened for modification C:\progra~1\ico\0c4efe8fcadc49e1abf5d0809382274c$dpx$.tmp\job.xml expand.exe File created C:\progra~1\ico\0c4efe8fcadc49e1abf5d0809382274c$dpx$.tmp\5f3949e4dfe43b4c85aa73a0c908185f.tmp expand.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1864 e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe 1864 e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe 1864 e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe 1864 e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe 5076 msedge.exe 5076 msedge.exe 4308 msedge.exe 4308 msedge.exe 2356 identity_helper.exe 2356 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1864 e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1864 e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe 1864 e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1864 wrote to memory of 1016 1864 e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe 84 PID 1864 wrote to memory of 1016 1864 e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe 84 PID 1864 wrote to memory of 1016 1864 e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe 84 PID 1864 wrote to memory of 4404 1864 e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe 85 PID 1864 wrote to memory of 4404 1864 e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe 85 PID 1864 wrote to memory of 4404 1864 e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe 85 PID 1016 wrote to memory of 4216 1016 cmd.exe 88 PID 1016 wrote to memory of 4216 1016 cmd.exe 88 PID 1016 wrote to memory of 4216 1016 cmd.exe 88 PID 2132 wrote to memory of 4308 2132 explorer.exe 90 PID 2132 wrote to memory of 4308 2132 explorer.exe 90 PID 4308 wrote to memory of 2360 4308 msedge.exe 93 PID 4308 wrote to memory of 2360 4308 msedge.exe 93 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 3680 4308 msedge.exe 96 PID 4308 wrote to memory of 5076 4308 msedge.exe 97 PID 4308 wrote to memory of 5076 4308 msedge.exe 97 PID 4308 wrote to memory of 3880 4308 msedge.exe 99 PID 4308 wrote to memory of 3880 4308 msedge.exe 99 PID 4308 wrote to memory of 3880 4308 msedge.exe 99 PID 4308 wrote to memory of 3880 4308 msedge.exe 99 PID 4308 wrote to memory of 3880 4308 msedge.exe 99 PID 4308 wrote to memory of 3880 4308 msedge.exe 99 PID 4308 wrote to memory of 3880 4308 msedge.exe 99 PID 4308 wrote to memory of 3880 4308 msedge.exe 99 PID 4308 wrote to memory of 3880 4308 msedge.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe"C:\Users\Admin\AppData\Local\Temp\e8920e56f6cb7fdf505366f3a215210013fe5e02403a315be2892ee6cee79c70.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\QbDIY.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\ico.cab" -F:*.* "C:\progra~1\ico"3⤵
- Drops file in Program Files directory
- Drops file in Windows directory
PID:4216
-
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://www.v258.net/list/list16.html?mmm2⤵PID:4404
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.v258.net/list/list16.html?mmm2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffaa2dd46f8,0x7ffaa2dd4708,0x7ffaa2dd47183⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,8262040757215357034,11934682795183253254,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:23⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,8262040757215357034,11934682795183253254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,8262040757215357034,11934682795183253254,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:83⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8262040757215357034,11934682795183253254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:13⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8262040757215357034,11934682795183253254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:13⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8262040757215357034,11934682795183253254,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:13⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8262040757215357034,11934682795183253254,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:13⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8262040757215357034,11934682795183253254,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:13⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8262040757215357034,11934682795183253254,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3764 /prefetch:13⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:2188 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x288,0x28c,0x290,0x264,0x294,0x7ff6deac5460,0x7ff6deac5470,0x7ff6deac54804⤵PID:4676
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,8262040757215357034,11934682795183253254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:83⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,8262040757215357034,11934682795183253254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8262040757215357034,11934682795183253254,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:13⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8262040757215357034,11934682795183253254,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6672 /prefetch:13⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2132,8262040757215357034,11934682795183253254,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4100 /prefetch:83⤵PID:1568
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2812
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD5ada787702460241a372c495dc53dbdcf
SHA1da7d65ec9541fe9ed13b3531f38202f83b0ac96d
SHA2560d0f600f95192d2d602dbda346c4e08745295f331f5a0349deae21705367b850
SHA512c86091735b855691c89c7946145591dec6a6a6a36a2438d392587a9cc1f2d85c1ebe44fcff1cc9d94271a24ebbc2ca38639577a6f5c592e9e10517da26572708
-
Filesize
20KB
MD51319e9998cedc513c68fa6d590b6ad63
SHA1ae95b333e88a13886994f320f5dfb4856168a710
SHA2569a5b18efe243fbe9b9b0be3674a24080e9210436986988f3f85a4007905083bb
SHA512d4052a899c6c310296e2f5fdf6c2031c22d2644be620cb34ddcc6b59789d82a6462daaeb34466c568be48ee975c4a5ab43143eab0792312a6cd0d49f9fbd8d3f