Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
184s -
max time network
190s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe
Resource
win10v2004-20220812-en
General
-
Target
aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe
-
Size
1.1MB
-
MD5
effbea685e7b77b9fa92604418c4f8f4
-
SHA1
27059309b55f180b4135ace1016b4f407f26be70
-
SHA256
aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b
-
SHA512
7b0e9d7c21d1960ff76df9f8f333014793e694b85bea3eccf3db6963d496a881efd782d7ec102b4b69a8efd29929a00a070d035f914c431f97b73121076b5da1
-
SSDEEP
24576:2NGQvfd4wzQP6ASSvTd7z/fl3F6e8P25XZkKcs9hzTQVF4CFU:UGQHuaQiWvZ7ThW2tZZcs99Q0
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 616 downhill.exe 984 downhill.exe 1372 downhill.exe -
Loads dropped DLL 14 IoCs
pid Process 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 616 downhill.exe 616 downhill.exe 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 984 downhill.exe 984 downhill.exe 1372 downhill.exe 1372 downhill.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 downhill.exe File opened for modification \??\PhysicalDrive0 downhill.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main downhill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 downhill.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde downhill.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 1372 downhill.exe 1372 downhill.exe 1372 downhill.exe 1372 downhill.exe 1372 downhill.exe 1372 downhill.exe 1372 downhill.exe 1372 downhill.exe 1372 downhill.exe 1372 downhill.exe 1372 downhill.exe 984 downhill.exe 984 downhill.exe 984 downhill.exe 984 downhill.exe 984 downhill.exe 984 downhill.exe 984 downhill.exe 984 downhill.exe 984 downhill.exe 984 downhill.exe 984 downhill.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1576 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1576 AUDIODG.EXE Token: 33 1576 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1576 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 616 downhill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 984 downhill.exe 984 downhill.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 892 wrote to memory of 616 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 29 PID 892 wrote to memory of 616 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 29 PID 892 wrote to memory of 616 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 29 PID 892 wrote to memory of 616 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 29 PID 892 wrote to memory of 616 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 29 PID 892 wrote to memory of 616 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 29 PID 892 wrote to memory of 616 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 29 PID 892 wrote to memory of 984 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 30 PID 892 wrote to memory of 984 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 30 PID 892 wrote to memory of 984 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 30 PID 892 wrote to memory of 984 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 30 PID 892 wrote to memory of 984 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 30 PID 892 wrote to memory of 984 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 30 PID 892 wrote to memory of 984 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 30 PID 892 wrote to memory of 1372 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 31 PID 892 wrote to memory of 1372 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 31 PID 892 wrote to memory of 1372 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 31 PID 892 wrote to memory of 1372 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 31 PID 892 wrote to memory of 1372 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 31 PID 892 wrote to memory of 1372 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 31 PID 892 wrote to memory of 1372 892 aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe"C:\Users\Admin\AppData\Local\Temp\aab3477d4c76ae28869ebf49da7f0d45a6101b2e4b56d75a3dbdaa242abf888b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Roaming\downhill\downhill.exe"C:\Users\Admin\AppData\Roaming\downhill\downhill.exe" /ShowDeskTop2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:616
-
-
C:\Users\Admin\AppData\Roaming\downhill\downhill.exe"C:\Users\Admin\AppData\Roaming\downhill\downhill.exe" /autorun /setuprun2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:984
-
-
C:\Users\Admin\AppData\Roaming\downhill\downhill.exe"C:\Users\Admin\AppData\Roaming\downhill\downhill.exe" /setupsucc2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4741⤵
- Suspicious use of AdjustPrivilegeToken
PID:1576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385B
MD5a8b026c95775d16f527120d350cc3631
SHA1a2a8133b83bec4a9f0baaada4f303cec885d12ba
SHA256f3affca4ff95be62d54dfc2d3ec38a40e7fd035321ee63fe95b9d941a5735527
SHA512c138c9a37283b9dece201067a55371c0e43209a1c4249fb84194a3e81d05a9e5e90ebf914001a4c9d82203efa2966c8ad2b70c126bc240c9d31aa10d3590ffc0
-
Filesize
448B
MD5e70cd03f8ea64e0fe70e9bf7e24c4d0f
SHA1f8f3e79505ddf9abfd7db5079a34463926ff52e8
SHA2567e08b3b37da8376f312d6149a070ef3f203a52919599cf177599e83560c78672
SHA5120daeb04ab21acb12fce040ee5bd5d007675527fcc8109292a24d9c3e264ad1de0676c83669186ecc555700436c0a76d141d3b12e8fce42ef482cf00285393967
-
Filesize
448B
MD5e70cd03f8ea64e0fe70e9bf7e24c4d0f
SHA1f8f3e79505ddf9abfd7db5079a34463926ff52e8
SHA2567e08b3b37da8376f312d6149a070ef3f203a52919599cf177599e83560c78672
SHA5120daeb04ab21acb12fce040ee5bd5d007675527fcc8109292a24d9c3e264ad1de0676c83669186ecc555700436c0a76d141d3b12e8fce42ef482cf00285393967
-
Filesize
1.3MB
MD5ce25a1dd39160a76c2897033a6994b16
SHA1d8fc1e6b7ede9c4aa9322607a2f9d10c423945de
SHA25653822e59b4ae7c2df39d938e0a4b96f4cde12c1bdd639866e9737c996c0dc4c8
SHA512a93653b7715b8ed010dcce07da0edd905203c5cf03182341de5e926f16d3f8cad3e70eda55ed8856a3f72e2570df83d82986ed2a328bd2f40b276a6d76458f65
-
Filesize
1.3MB
MD5ce25a1dd39160a76c2897033a6994b16
SHA1d8fc1e6b7ede9c4aa9322607a2f9d10c423945de
SHA25653822e59b4ae7c2df39d938e0a4b96f4cde12c1bdd639866e9737c996c0dc4c8
SHA512a93653b7715b8ed010dcce07da0edd905203c5cf03182341de5e926f16d3f8cad3e70eda55ed8856a3f72e2570df83d82986ed2a328bd2f40b276a6d76458f65
-
Filesize
1.3MB
MD5ce25a1dd39160a76c2897033a6994b16
SHA1d8fc1e6b7ede9c4aa9322607a2f9d10c423945de
SHA25653822e59b4ae7c2df39d938e0a4b96f4cde12c1bdd639866e9737c996c0dc4c8
SHA512a93653b7715b8ed010dcce07da0edd905203c5cf03182341de5e926f16d3f8cad3e70eda55ed8856a3f72e2570df83d82986ed2a328bd2f40b276a6d76458f65
-
Filesize
1.3MB
MD5ce25a1dd39160a76c2897033a6994b16
SHA1d8fc1e6b7ede9c4aa9322607a2f9d10c423945de
SHA25653822e59b4ae7c2df39d938e0a4b96f4cde12c1bdd639866e9737c996c0dc4c8
SHA512a93653b7715b8ed010dcce07da0edd905203c5cf03182341de5e926f16d3f8cad3e70eda55ed8856a3f72e2570df83d82986ed2a328bd2f40b276a6d76458f65
-
Filesize
404B
MD5dc9c63a7f4e6edd809e6ecf53ff9fe20
SHA184f4ee14918b5a353eee1c6f99206e7845aa1269
SHA256c0c85d0f3b78062b6e8dc30f147ee50e134421909f483764f3d427155e9be153
SHA512aecb8eb2da8cdfe960b14d8922247a45e34a9919c65b12538afad91ba8e47be604f4fe0d7b0ef554ca3a9165bb708e125654593ffaad069c4fab0466ce1c25a8
-
Filesize
3KB
MD58614c450637267afacad1645e23ba24a
SHA1e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2
SHA2560fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758
SHA512af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
1.3MB
MD5ce25a1dd39160a76c2897033a6994b16
SHA1d8fc1e6b7ede9c4aa9322607a2f9d10c423945de
SHA25653822e59b4ae7c2df39d938e0a4b96f4cde12c1bdd639866e9737c996c0dc4c8
SHA512a93653b7715b8ed010dcce07da0edd905203c5cf03182341de5e926f16d3f8cad3e70eda55ed8856a3f72e2570df83d82986ed2a328bd2f40b276a6d76458f65
-
Filesize
1.3MB
MD5ce25a1dd39160a76c2897033a6994b16
SHA1d8fc1e6b7ede9c4aa9322607a2f9d10c423945de
SHA25653822e59b4ae7c2df39d938e0a4b96f4cde12c1bdd639866e9737c996c0dc4c8
SHA512a93653b7715b8ed010dcce07da0edd905203c5cf03182341de5e926f16d3f8cad3e70eda55ed8856a3f72e2570df83d82986ed2a328bd2f40b276a6d76458f65
-
Filesize
1.3MB
MD5ce25a1dd39160a76c2897033a6994b16
SHA1d8fc1e6b7ede9c4aa9322607a2f9d10c423945de
SHA25653822e59b4ae7c2df39d938e0a4b96f4cde12c1bdd639866e9737c996c0dc4c8
SHA512a93653b7715b8ed010dcce07da0edd905203c5cf03182341de5e926f16d3f8cad3e70eda55ed8856a3f72e2570df83d82986ed2a328bd2f40b276a6d76458f65
-
Filesize
1.3MB
MD5ce25a1dd39160a76c2897033a6994b16
SHA1d8fc1e6b7ede9c4aa9322607a2f9d10c423945de
SHA25653822e59b4ae7c2df39d938e0a4b96f4cde12c1bdd639866e9737c996c0dc4c8
SHA512a93653b7715b8ed010dcce07da0edd905203c5cf03182341de5e926f16d3f8cad3e70eda55ed8856a3f72e2570df83d82986ed2a328bd2f40b276a6d76458f65
-
Filesize
1.3MB
MD5ce25a1dd39160a76c2897033a6994b16
SHA1d8fc1e6b7ede9c4aa9322607a2f9d10c423945de
SHA25653822e59b4ae7c2df39d938e0a4b96f4cde12c1bdd639866e9737c996c0dc4c8
SHA512a93653b7715b8ed010dcce07da0edd905203c5cf03182341de5e926f16d3f8cad3e70eda55ed8856a3f72e2570df83d82986ed2a328bd2f40b276a6d76458f65
-
Filesize
1.3MB
MD5ce25a1dd39160a76c2897033a6994b16
SHA1d8fc1e6b7ede9c4aa9322607a2f9d10c423945de
SHA25653822e59b4ae7c2df39d938e0a4b96f4cde12c1bdd639866e9737c996c0dc4c8
SHA512a93653b7715b8ed010dcce07da0edd905203c5cf03182341de5e926f16d3f8cad3e70eda55ed8856a3f72e2570df83d82986ed2a328bd2f40b276a6d76458f65
-
Filesize
1.3MB
MD5ce25a1dd39160a76c2897033a6994b16
SHA1d8fc1e6b7ede9c4aa9322607a2f9d10c423945de
SHA25653822e59b4ae7c2df39d938e0a4b96f4cde12c1bdd639866e9737c996c0dc4c8
SHA512a93653b7715b8ed010dcce07da0edd905203c5cf03182341de5e926f16d3f8cad3e70eda55ed8856a3f72e2570df83d82986ed2a328bd2f40b276a6d76458f65
-
Filesize
1.3MB
MD5ce25a1dd39160a76c2897033a6994b16
SHA1d8fc1e6b7ede9c4aa9322607a2f9d10c423945de
SHA25653822e59b4ae7c2df39d938e0a4b96f4cde12c1bdd639866e9737c996c0dc4c8
SHA512a93653b7715b8ed010dcce07da0edd905203c5cf03182341de5e926f16d3f8cad3e70eda55ed8856a3f72e2570df83d82986ed2a328bd2f40b276a6d76458f65
-
Filesize
1.3MB
MD5ce25a1dd39160a76c2897033a6994b16
SHA1d8fc1e6b7ede9c4aa9322607a2f9d10c423945de
SHA25653822e59b4ae7c2df39d938e0a4b96f4cde12c1bdd639866e9737c996c0dc4c8
SHA512a93653b7715b8ed010dcce07da0edd905203c5cf03182341de5e926f16d3f8cad3e70eda55ed8856a3f72e2570df83d82986ed2a328bd2f40b276a6d76458f65
-
Filesize
1.3MB
MD5ce25a1dd39160a76c2897033a6994b16
SHA1d8fc1e6b7ede9c4aa9322607a2f9d10c423945de
SHA25653822e59b4ae7c2df39d938e0a4b96f4cde12c1bdd639866e9737c996c0dc4c8
SHA512a93653b7715b8ed010dcce07da0edd905203c5cf03182341de5e926f16d3f8cad3e70eda55ed8856a3f72e2570df83d82986ed2a328bd2f40b276a6d76458f65
-
Filesize
1.3MB
MD5ce25a1dd39160a76c2897033a6994b16
SHA1d8fc1e6b7ede9c4aa9322607a2f9d10c423945de
SHA25653822e59b4ae7c2df39d938e0a4b96f4cde12c1bdd639866e9737c996c0dc4c8
SHA512a93653b7715b8ed010dcce07da0edd905203c5cf03182341de5e926f16d3f8cad3e70eda55ed8856a3f72e2570df83d82986ed2a328bd2f40b276a6d76458f65
-
Filesize
1.3MB
MD5ce25a1dd39160a76c2897033a6994b16
SHA1d8fc1e6b7ede9c4aa9322607a2f9d10c423945de
SHA25653822e59b4ae7c2df39d938e0a4b96f4cde12c1bdd639866e9737c996c0dc4c8
SHA512a93653b7715b8ed010dcce07da0edd905203c5cf03182341de5e926f16d3f8cad3e70eda55ed8856a3f72e2570df83d82986ed2a328bd2f40b276a6d76458f65