Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe
Resource
win10v2004-20220812-en
General
-
Target
cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe
-
Size
1.8MB
-
MD5
bc12b2e7deab49ab4c7e56a538287f9b
-
SHA1
20db61918dd5d3dd72c242da4dfeb95e26fdaef3
-
SHA256
cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f
-
SHA512
c9c5ffa8322cd6d45aa2a6a00f1a1f0c9f187765de7c928af454a56f68c93891f18e5e9f0fb5a8414add26d1fbe4e88a12f1ea9f84888251c2c13212b5b06a83
-
SSDEEP
49152:/iZ2ei3daoP9ugXMbzwAKmEjrMHp/916LqV+r:/i2ei3djPLM3wAKRrMJl0Br
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3324 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe -
resource yara_rule behavioral2/memory/3324-137-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-139-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-138-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-141-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-143-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-145-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-147-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-149-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-151-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-153-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-155-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-157-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-159-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-161-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-163-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-165-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-167-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-169-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-171-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-173-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-175-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-177-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-179-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3324-180-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 940 cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe 940 cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\ff0dc755-2431-4bb5-84cb-205feaa80986.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221125210342.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1252 msedge.exe 1252 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 384 identity_helper.exe 384 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3324 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe Token: SeIncBasePriorityPrivilege 3324 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 396 msedge.exe 396 msedge.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3324 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe 3324 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe 3324 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe 3324 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe 3324 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 940 wrote to memory of 3324 940 cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe 82 PID 940 wrote to memory of 3324 940 cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe 82 PID 940 wrote to memory of 3324 940 cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe 82 PID 3324 wrote to memory of 396 3324 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe 83 PID 3324 wrote to memory of 396 3324 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe 83 PID 396 wrote to memory of 3736 396 msedge.exe 84 PID 396 wrote to memory of 3736 396 msedge.exe 84 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1100 396 msedge.exe 90 PID 396 wrote to memory of 1252 396 msedge.exe 91 PID 396 wrote to memory of 1252 396 msedge.exe 91 PID 396 wrote to memory of 3556 396 msedge.exe 94 PID 396 wrote to memory of 3556 396 msedge.exe 94 PID 396 wrote to memory of 3556 396 msedge.exe 94 PID 396 wrote to memory of 3556 396 msedge.exe 94 PID 396 wrote to memory of 3556 396 msedge.exe 94 PID 396 wrote to memory of 3556 396 msedge.exe 94 PID 396 wrote to memory of 3556 396 msedge.exe 94 PID 396 wrote to memory of 3556 396 msedge.exe 94 PID 396 wrote to memory of 3556 396 msedge.exe 94 PID 396 wrote to memory of 3556 396 msedge.exe 94 PID 396 wrote to memory of 3556 396 msedge.exe 94 PID 396 wrote to memory of 3556 396 msedge.exe 94 PID 396 wrote to memory of 3556 396 msedge.exe 94 PID 396 wrote to memory of 3556 396 msedge.exe 94 PID 396 wrote to memory of 3556 396 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe"C:\Users\Admin\AppData\Local\Temp\cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe"C:\Users\Admin\AppData\Local\Temp\СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://xydz.110zm.com/3⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd117046f8,0x7ffd11704708,0x7ffd117047184⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,5909090309970514343,12333571820678341266,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:24⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,5909090309970514343,12333571820678341266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,5909090309970514343,12333571820678341266,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:84⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5909090309970514343,12333571820678341266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3864 /prefetch:14⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5909090309970514343,12333571820678341266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:14⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,5909090309970514343,12333571820678341266,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5408 /prefetch:84⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,5909090309970514343,12333571820678341266,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5820 /prefetch:84⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5909090309970514343,12333571820678341266,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:14⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5909090309970514343,12333571820678341266,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:14⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,5909090309970514343,12333571820678341266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6540 /prefetch:84⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:3596 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x27c,0x280,0x284,0x258,0x288,0x7ff6a8285460,0x7ff6a8285470,0x7ff6a82854805⤵PID:1808
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,5909090309970514343,12333571820678341266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6540 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2144,5909090309970514343,12333571820678341266,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3424 /prefetch:84⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2144,5909090309970514343,12333571820678341266,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5232 /prefetch:84⤵PID:1784
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5a1bba35c752b36f575350cb7ddf238e4
SHA19603b691ae71d4fbc7a14dbb837bd97cecac8aab
SHA2560667863d71a3021ab844069b6dd0485f874bf638af478ab11c6fb8b7d6c834b6
SHA512eb5d3498dd994bec42a437cf91343665d3c35bfe3f6277a7393af6a0b8348772c3166d9be48955edddf6ef79fa508ec8d4f96d7d5df37ecdc52c90042e0a2967
-
Filesize
14KB
MD5254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
Filesize
2.4MB
MD560eadc798c1e8bf93ebd8e69a2218c06
SHA1a68b12e94c7dd9b2869c06f985a6ec2e14d3ea9b
SHA2563ea7cc6387bd7fe1edd57a32f62cee107e85373fe0a1f447e8927d290cf95a07
SHA5124583e1f82a63ed49c98a210d3c2887484a01b72d168e468fddc24b6b3438e533799a415785f16e2d3ae179643496a98c6ff531a2a79298d3e0bbb8ea16d0a87b
-
Filesize
2.4MB
MD560eadc798c1e8bf93ebd8e69a2218c06
SHA1a68b12e94c7dd9b2869c06f985a6ec2e14d3ea9b
SHA2563ea7cc6387bd7fe1edd57a32f62cee107e85373fe0a1f447e8927d290cf95a07
SHA5124583e1f82a63ed49c98a210d3c2887484a01b72d168e468fddc24b6b3438e533799a415785f16e2d3ae179643496a98c6ff531a2a79298d3e0bbb8ea16d0a87b