Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe
Resource
win10v2004-20220812-en
General
-
Target
8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe
-
Size
519KB
-
MD5
5d25fac49860ba271904ab1bf7b3a3e9
-
SHA1
8fae1aa5a01b39252b713a3364925d5430d6e56a
-
SHA256
8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88
-
SHA512
e71b73168d6d0a568c12c48c9e2cc56e267ce2dd3b3572393db02a56de582957ef34290501c4abda5bbf1acd3f59071ba885e747cd547bfaebc87ae4e4c9cb3d
-
SSDEEP
12288:pHuy6uI17ZFaRfXR9TD2pLh7QH0wJ0X2ppGqvplz+cjvWBjYoS:tOR+XR9TD2pL1QH22pIqpl+o
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\crgen.exe = "C:\\Users\\Admin\\AppData\\Roaming\\crgen.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\cge\crgen.exe = "C:\\Users\\Admin\\AppData\\Roaming\\cge\\crgen.exe:*:Enabled:Windows Messanger" reg.exe -
Executes dropped EXE 4 IoCs
pid Process 1352 ITNZa.EXE 640 crgen.exe 1368 crgen.exe 1364 crgen.exe -
resource yara_rule behavioral1/files/0x0008000000005c51-59.dat upx behavioral1/memory/1352-65-0x0000000000400000-0x0000000000431000-memory.dmp upx behavioral1/memory/1368-80-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/1368-84-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/1368-89-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/1368-98-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/1368-110-0x0000000000400000-0x0000000000474000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cgs = "C:\\Users\\Admin\\AppData\\Roaming\\cge\\crgen.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 640 set thread context of 1368 640 crgen.exe 31 PID 640 set thread context of 1364 640 crgen.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 4 IoCs
pid Process 2008 reg.exe 1768 reg.exe 1752 reg.exe 1848 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 1364 crgen.exe Token: 1 1368 crgen.exe Token: SeCreateTokenPrivilege 1368 crgen.exe Token: SeAssignPrimaryTokenPrivilege 1368 crgen.exe Token: SeLockMemoryPrivilege 1368 crgen.exe Token: SeIncreaseQuotaPrivilege 1368 crgen.exe Token: SeMachineAccountPrivilege 1368 crgen.exe Token: SeTcbPrivilege 1368 crgen.exe Token: SeSecurityPrivilege 1368 crgen.exe Token: SeTakeOwnershipPrivilege 1368 crgen.exe Token: SeLoadDriverPrivilege 1368 crgen.exe Token: SeSystemProfilePrivilege 1368 crgen.exe Token: SeSystemtimePrivilege 1368 crgen.exe Token: SeProfSingleProcessPrivilege 1368 crgen.exe Token: SeIncBasePriorityPrivilege 1368 crgen.exe Token: SeCreatePagefilePrivilege 1368 crgen.exe Token: SeCreatePermanentPrivilege 1368 crgen.exe Token: SeBackupPrivilege 1368 crgen.exe Token: SeRestorePrivilege 1368 crgen.exe Token: SeShutdownPrivilege 1368 crgen.exe Token: SeDebugPrivilege 1368 crgen.exe Token: SeAuditPrivilege 1368 crgen.exe Token: SeSystemEnvironmentPrivilege 1368 crgen.exe Token: SeChangeNotifyPrivilege 1368 crgen.exe Token: SeRemoteShutdownPrivilege 1368 crgen.exe Token: SeUndockPrivilege 1368 crgen.exe Token: SeSyncAgentPrivilege 1368 crgen.exe Token: SeEnableDelegationPrivilege 1368 crgen.exe Token: SeManageVolumePrivilege 1368 crgen.exe Token: SeImpersonatePrivilege 1368 crgen.exe Token: SeCreateGlobalPrivilege 1368 crgen.exe Token: 31 1368 crgen.exe Token: 32 1368 crgen.exe Token: 33 1368 crgen.exe Token: 34 1368 crgen.exe Token: 35 1368 crgen.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1352 ITNZa.EXE 1352 ITNZa.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1352 ITNZa.EXE 1352 ITNZa.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe 1352 ITNZa.EXE 1352 ITNZa.EXE 640 crgen.exe 1368 crgen.exe 1364 crgen.exe 1368 crgen.exe 1368 crgen.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1552 wrote to memory of 1352 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe 26 PID 1552 wrote to memory of 1352 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe 26 PID 1552 wrote to memory of 1352 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe 26 PID 1552 wrote to memory of 1352 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe 26 PID 1552 wrote to memory of 1076 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe 27 PID 1552 wrote to memory of 1076 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe 27 PID 1552 wrote to memory of 1076 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe 27 PID 1552 wrote to memory of 1076 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe 27 PID 1076 wrote to memory of 948 1076 cmd.exe 29 PID 1076 wrote to memory of 948 1076 cmd.exe 29 PID 1076 wrote to memory of 948 1076 cmd.exe 29 PID 1076 wrote to memory of 948 1076 cmd.exe 29 PID 1552 wrote to memory of 640 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe 30 PID 1552 wrote to memory of 640 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe 30 PID 1552 wrote to memory of 640 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe 30 PID 1552 wrote to memory of 640 1552 8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe 30 PID 640 wrote to memory of 1368 640 crgen.exe 31 PID 640 wrote to memory of 1368 640 crgen.exe 31 PID 640 wrote to memory of 1368 640 crgen.exe 31 PID 640 wrote to memory of 1368 640 crgen.exe 31 PID 640 wrote to memory of 1368 640 crgen.exe 31 PID 640 wrote to memory of 1368 640 crgen.exe 31 PID 640 wrote to memory of 1368 640 crgen.exe 31 PID 640 wrote to memory of 1368 640 crgen.exe 31 PID 640 wrote to memory of 1368 640 crgen.exe 31 PID 640 wrote to memory of 1364 640 crgen.exe 32 PID 640 wrote to memory of 1364 640 crgen.exe 32 PID 640 wrote to memory of 1364 640 crgen.exe 32 PID 640 wrote to memory of 1364 640 crgen.exe 32 PID 640 wrote to memory of 1364 640 crgen.exe 32 PID 640 wrote to memory of 1364 640 crgen.exe 32 PID 640 wrote to memory of 1364 640 crgen.exe 32 PID 640 wrote to memory of 1364 640 crgen.exe 32 PID 1368 wrote to memory of 564 1368 crgen.exe 33 PID 1368 wrote to memory of 564 1368 crgen.exe 33 PID 1368 wrote to memory of 564 1368 crgen.exe 33 PID 1368 wrote to memory of 564 1368 crgen.exe 33 PID 1368 wrote to memory of 1320 1368 crgen.exe 35 PID 1368 wrote to memory of 1320 1368 crgen.exe 35 PID 1368 wrote to memory of 1320 1368 crgen.exe 35 PID 1368 wrote to memory of 1320 1368 crgen.exe 35 PID 564 wrote to memory of 2008 564 cmd.exe 36 PID 564 wrote to memory of 2008 564 cmd.exe 36 PID 564 wrote to memory of 2008 564 cmd.exe 36 PID 564 wrote to memory of 2008 564 cmd.exe 36 PID 1368 wrote to memory of 936 1368 crgen.exe 37 PID 1368 wrote to memory of 936 1368 crgen.exe 37 PID 1368 wrote to memory of 936 1368 crgen.exe 37 PID 1368 wrote to memory of 936 1368 crgen.exe 37 PID 1368 wrote to memory of 1980 1368 crgen.exe 39 PID 1368 wrote to memory of 1980 1368 crgen.exe 39 PID 1368 wrote to memory of 1980 1368 crgen.exe 39 PID 1368 wrote to memory of 1980 1368 crgen.exe 39 PID 1320 wrote to memory of 1768 1320 cmd.exe 40 PID 1320 wrote to memory of 1768 1320 cmd.exe 40 PID 1320 wrote to memory of 1768 1320 cmd.exe 40 PID 1320 wrote to memory of 1768 1320 cmd.exe 40 PID 936 wrote to memory of 1752 936 cmd.exe 43 PID 936 wrote to memory of 1752 936 cmd.exe 43 PID 936 wrote to memory of 1752 936 cmd.exe 43 PID 936 wrote to memory of 1752 936 cmd.exe 43 PID 1980 wrote to memory of 1848 1980 cmd.exe 44 PID 1980 wrote to memory of 1848 1980 cmd.exe 44 PID 1980 wrote to memory of 1848 1980 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe"C:\Users\Admin\AppData\Local\Temp\8e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\ITNZa.EXE"C:\ITNZa.EXE"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1352
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HSrZV.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "cgs" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\cge\crgen.exe" /f3⤵
- Adds Run key to start application
PID:948
-
-
-
C:\Users\Admin\AppData\Roaming\cge\crgen.exe"C:\Users\Admin\AppData\Roaming\cge\crgen.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Roaming\cge\crgen.exeC:\Users\Admin\AppData\Roaming\cge\crgen.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:2008
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\cge\crgen.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\cge\crgen.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\cge\crgen.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\cge\crgen.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1752
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\crgen.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\crgen.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\crgen.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\crgen.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1848
-
-
-
-
C:\Users\Admin\AppData\Roaming\cge\crgen.exeC:\Users\Admin\AppData\Roaming\cge\crgen.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1364
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD50433471d11abf320dbf44ac874b47596
SHA1a647632a352ab64a51772da91364f3ae0cbb5369
SHA2568a9640b6b83a32a6ad8247bfa155e4885edcd59ce3cead8bcf189667a48826f2
SHA51284afd9cca3120dd0cceca08e7012ad7a54e5b8a65e8468a8104f5c3a9d1a9cd6ff289a396ffdbfc731dfc2af50501e12b49e23757f6eb39cf005af0831d84657
-
Filesize
132B
MD5868bec696e993871ab22e39997b9a211
SHA189cba2b6d5867f08b605b08f90ac11d87ff1e042
SHA25652101e8b6b1f463e825430d299b5dfdd6235ada62df93c2c30154a166cf09693
SHA512a2a91cf48bea9a95d47e6811c05934980c7cbaa72610be0093eee9ba1a35b2513547577c12ef58bddb887f3dfc013bad5824e3169ebe2780f2ccb223175cee1d
-
Filesize
519KB
MD55d25fac49860ba271904ab1bf7b3a3e9
SHA18fae1aa5a01b39252b713a3364925d5430d6e56a
SHA2568e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88
SHA512e71b73168d6d0a568c12c48c9e2cc56e267ce2dd3b3572393db02a56de582957ef34290501c4abda5bbf1acd3f59071ba885e747cd547bfaebc87ae4e4c9cb3d
-
Filesize
519KB
MD55d25fac49860ba271904ab1bf7b3a3e9
SHA18fae1aa5a01b39252b713a3364925d5430d6e56a
SHA2568e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88
SHA512e71b73168d6d0a568c12c48c9e2cc56e267ce2dd3b3572393db02a56de582957ef34290501c4abda5bbf1acd3f59071ba885e747cd547bfaebc87ae4e4c9cb3d
-
Filesize
519KB
MD55d25fac49860ba271904ab1bf7b3a3e9
SHA18fae1aa5a01b39252b713a3364925d5430d6e56a
SHA2568e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88
SHA512e71b73168d6d0a568c12c48c9e2cc56e267ce2dd3b3572393db02a56de582957ef34290501c4abda5bbf1acd3f59071ba885e747cd547bfaebc87ae4e4c9cb3d
-
Filesize
519KB
MD55d25fac49860ba271904ab1bf7b3a3e9
SHA18fae1aa5a01b39252b713a3364925d5430d6e56a
SHA2568e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88
SHA512e71b73168d6d0a568c12c48c9e2cc56e267ce2dd3b3572393db02a56de582957ef34290501c4abda5bbf1acd3f59071ba885e747cd547bfaebc87ae4e4c9cb3d
-
Filesize
519KB
MD55d25fac49860ba271904ab1bf7b3a3e9
SHA18fae1aa5a01b39252b713a3364925d5430d6e56a
SHA2568e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88
SHA512e71b73168d6d0a568c12c48c9e2cc56e267ce2dd3b3572393db02a56de582957ef34290501c4abda5bbf1acd3f59071ba885e747cd547bfaebc87ae4e4c9cb3d
-
Filesize
519KB
MD55d25fac49860ba271904ab1bf7b3a3e9
SHA18fae1aa5a01b39252b713a3364925d5430d6e56a
SHA2568e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88
SHA512e71b73168d6d0a568c12c48c9e2cc56e267ce2dd3b3572393db02a56de582957ef34290501c4abda5bbf1acd3f59071ba885e747cd547bfaebc87ae4e4c9cb3d
-
Filesize
519KB
MD55d25fac49860ba271904ab1bf7b3a3e9
SHA18fae1aa5a01b39252b713a3364925d5430d6e56a
SHA2568e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88
SHA512e71b73168d6d0a568c12c48c9e2cc56e267ce2dd3b3572393db02a56de582957ef34290501c4abda5bbf1acd3f59071ba885e747cd547bfaebc87ae4e4c9cb3d
-
Filesize
519KB
MD55d25fac49860ba271904ab1bf7b3a3e9
SHA18fae1aa5a01b39252b713a3364925d5430d6e56a
SHA2568e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88
SHA512e71b73168d6d0a568c12c48c9e2cc56e267ce2dd3b3572393db02a56de582957ef34290501c4abda5bbf1acd3f59071ba885e747cd547bfaebc87ae4e4c9cb3d
-
Filesize
519KB
MD55d25fac49860ba271904ab1bf7b3a3e9
SHA18fae1aa5a01b39252b713a3364925d5430d6e56a
SHA2568e13a6108622b66fca1518674d19629562220a02f5405a9ba081c77b5f407a88
SHA512e71b73168d6d0a568c12c48c9e2cc56e267ce2dd3b3572393db02a56de582957ef34290501c4abda5bbf1acd3f59071ba885e747cd547bfaebc87ae4e4c9cb3d