Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
176s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe
Resource
win10v2004-20220812-en
General
-
Target
83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe
-
Size
656KB
-
MD5
00b7c65ca3b12ad7a444a5b44da56220
-
SHA1
00a4f28d98dc8b39cfb1ee8d6d2215b85517c7cb
-
SHA256
83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55
-
SHA512
889c369ab3c8265c44762c37bd84ccc431d559e5c914dc99822cb060f3412190204f29832481abf1cc5b4ce257636dd50d7e786b7075e6c47cf403e2118c4edb
-
SSDEEP
12288:0+a5ShViVnhiAEZFkQWLTMrq2yh+SQPHNYnUDBcvODK6ZTbkYFHWJa:0BQhViVn4AEZa1Gq2HPNMUSODNZTL2c
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5092 Logo1_.exe 5020 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\F: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\DESIGNER\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre1.8.0_66\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\B11EF506-7DE1-455F-8E20-67264DD4AF60\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\keytool.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\db\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RMNSQUE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\STUDIO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Cartridges\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\DEEPBLUE\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ECLIPSE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre1.8.0_66\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\B11EF506-7DE1-455F-8E20-67264DD4AF60\root\vfs\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RICEPAPR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\gui\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\core\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\GettingStarted16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\GRPHFLT\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\STUDIO\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\Updates\Download\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\NETWORK\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe File created C:\Windows\Logo1_.exe 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe 5092 Logo1_.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2092 wrote to memory of 968 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 79 PID 2092 wrote to memory of 968 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 79 PID 2092 wrote to memory of 968 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 79 PID 968 wrote to memory of 4308 968 net.exe 81 PID 968 wrote to memory of 4308 968 net.exe 81 PID 968 wrote to memory of 4308 968 net.exe 81 PID 2092 wrote to memory of 1060 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 82 PID 2092 wrote to memory of 1060 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 82 PID 2092 wrote to memory of 1060 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 82 PID 2092 wrote to memory of 5092 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 84 PID 2092 wrote to memory of 5092 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 84 PID 2092 wrote to memory of 5092 2092 83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe 84 PID 5092 wrote to memory of 1376 5092 Logo1_.exe 85 PID 5092 wrote to memory of 1376 5092 Logo1_.exe 85 PID 5092 wrote to memory of 1376 5092 Logo1_.exe 85 PID 1376 wrote to memory of 4032 1376 net.exe 87 PID 1376 wrote to memory of 4032 1376 net.exe 87 PID 1376 wrote to memory of 4032 1376 net.exe 87 PID 1060 wrote to memory of 5020 1060 cmd.exe 88 PID 1060 wrote to memory of 5020 1060 cmd.exe 88 PID 1060 wrote to memory of 5020 1060 cmd.exe 88 PID 5092 wrote to memory of 1316 5092 Logo1_.exe 89 PID 5092 wrote to memory of 1316 5092 Logo1_.exe 89 PID 5092 wrote to memory of 1316 5092 Logo1_.exe 89 PID 1316 wrote to memory of 4312 1316 net.exe 91 PID 1316 wrote to memory of 4312 1316 net.exe 91 PID 1316 wrote to memory of 4312 1316 net.exe 91 PID 5092 wrote to memory of 2592 5092 Logo1_.exe 16 PID 5092 wrote to memory of 2592 5092 Logo1_.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe"C:\Users\Admin\AppData\Local\Temp\83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:4308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aEA.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe"C:\Users\Admin\AppData\Local\Temp\83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe"4⤵
- Executes dropped EXE
PID:5020
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4032
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4312
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
720B
MD520808c56d0ec81d5c5bed82878a90169
SHA159aab6cf22029232e5b2967553c782d0fc4129d9
SHA25688af518946c0efed7cfc550bea2cb7ec538c921b74e9e21e44e94af934e1ccba
SHA512fe1b47986a2aa6ddee964371db434539479ac0313d3f46d6dc0000e5181af4d806ed874cadfa4e95d2fff7cf7c8e5dfb60bdbf1b7f9d8a77eccf09968bd24f1c
-
C:\Users\Admin\AppData\Local\Temp\83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe
Filesize623KB
MD5e5ca2ebcf1d6ecb6dacef20fcde132e9
SHA1bc3ad7d5b426535604b3573c960efb12cbb5d8f4
SHA2566f952b39c013fced1686cf6fbcd2a7bc75d947629e3b9e5dbc7aceb7786d145f
SHA512747f6b70524c10149111d0b1a0c5fc8224c324ea8e6914c511b002b6542d19cba460f9fdf77d97a2d6148f725d4e27d413f8406408ffb659b4644cace14ae1c7
-
C:\Users\Admin\AppData\Local\Temp\83210f152adb2e903a58d8c9d7edc14a5f28420ccaa1928e720667fb361f2c55.exe.exe
Filesize623KB
MD5e5ca2ebcf1d6ecb6dacef20fcde132e9
SHA1bc3ad7d5b426535604b3573c960efb12cbb5d8f4
SHA2566f952b39c013fced1686cf6fbcd2a7bc75d947629e3b9e5dbc7aceb7786d145f
SHA512747f6b70524c10149111d0b1a0c5fc8224c324ea8e6914c511b002b6542d19cba460f9fdf77d97a2d6148f725d4e27d413f8406408ffb659b4644cace14ae1c7
-
Filesize
33KB
MD56a6f427787f08bc9dd4011586840fea6
SHA1bfdd466f2766de3873ea7fd8e0c11c4c15c67a2b
SHA25610681f0d26abaa23bfc8f2aff9729f656ae9fefbf74e842a89529555b1d64c6c
SHA5122bc15635aef97dba954a481b3f294e81348cd28aa238d5521d9e6bd9a66a378217460106bc0b301cb46e2a0fc0aee6e1a132cfe17eed87f2b6fe24fe699cd82b
-
Filesize
33KB
MD56a6f427787f08bc9dd4011586840fea6
SHA1bfdd466f2766de3873ea7fd8e0c11c4c15c67a2b
SHA25610681f0d26abaa23bfc8f2aff9729f656ae9fefbf74e842a89529555b1d64c6c
SHA5122bc15635aef97dba954a481b3f294e81348cd28aa238d5521d9e6bd9a66a378217460106bc0b301cb46e2a0fc0aee6e1a132cfe17eed87f2b6fe24fe699cd82b
-
Filesize
33KB
MD56a6f427787f08bc9dd4011586840fea6
SHA1bfdd466f2766de3873ea7fd8e0c11c4c15c67a2b
SHA25610681f0d26abaa23bfc8f2aff9729f656ae9fefbf74e842a89529555b1d64c6c
SHA5122bc15635aef97dba954a481b3f294e81348cd28aa238d5521d9e6bd9a66a378217460106bc0b301cb46e2a0fc0aee6e1a132cfe17eed87f2b6fe24fe699cd82b