Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2023, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe
Resource
win10v2004-20230703-en
General
-
Target
234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe
-
Size
819KB
-
MD5
17500fa3d5f63cf1a86f8083b817484b
-
SHA1
833dbc681e704dfc22bc38254c42aaf9b97b15cb
-
SHA256
234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261
-
SHA512
765d742872e2639f8b269df8666d13a629fd649db15a9bcb67056af55323b75c7feedefd4e6a8d30e6800244f6a0d20742b20aca693722ffc49e27ba3b50abe7
-
SSDEEP
12288:E7+osN4Vtk0zVF6HzERkfGBVrPJxZv6crpKa+Q0M2n9uAnPAW25yYTfDEAfA:E76yLyHY6fGrPJXvd+Qx29uh1yGEAfA
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1656 Logo1_.exe 3676 234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\contrast-standard\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\hi-IN\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Images\contrast-standard\theme-dark\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\TextConv\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\210x173\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\Comprehensive\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\PlayReadyCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\3DViewer.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe File created C:\Windows\Logo1_.exe 234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe 1656 Logo1_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3676 234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3676 234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe 3676 234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe 3676 234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe 3676 234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1780 wrote to memory of 4356 1780 234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe 80 PID 1780 wrote to memory of 4356 1780 234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe 80 PID 1780 wrote to memory of 4356 1780 234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe 80 PID 1780 wrote to memory of 1656 1780 234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe 81 PID 1780 wrote to memory of 1656 1780 234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe 81 PID 1780 wrote to memory of 1656 1780 234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe 81 PID 1656 wrote to memory of 5052 1656 Logo1_.exe 84 PID 1656 wrote to memory of 5052 1656 Logo1_.exe 84 PID 1656 wrote to memory of 5052 1656 Logo1_.exe 84 PID 5052 wrote to memory of 2096 5052 net.exe 85 PID 5052 wrote to memory of 2096 5052 net.exe 85 PID 5052 wrote to memory of 2096 5052 net.exe 85 PID 4356 wrote to memory of 3676 4356 cmd.exe 86 PID 4356 wrote to memory of 3676 4356 cmd.exe 86 PID 1656 wrote to memory of 3164 1656 Logo1_.exe 75 PID 1656 wrote to memory of 3164 1656 Logo1_.exe 75
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe"C:\Users\Admin\AppData\Local\Temp\234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aDE89.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe"C:\Users\Admin\AppData\Local\Temp\234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3676
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2096
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5e29368905a100d96162dcc78c1af61fd
SHA1d72d6df28ab47529e6f44692566e91ca04a2751f
SHA256caf1a884e5421d183108d5ea579f65ef2545cfc3e69169bb0f053d49db27ff87
SHA5121e143cf4d4a93488e2419a940a05b3e60ada76a0e1260d196b46bb3757bd138edfc6fce5c3f5aa9e7ca6daf9af21e35e430c3ee28bd2aa5f0096d4ed6c4000d9
-
Filesize
484KB
MD50d7a0c584a8015c2210d75f431708878
SHA10e73a1eca416cf184accf2e49ee252641981a26e
SHA25620fb8a0d08e43ab5f3af560962600dfd44bdcf9400826831c1c2a2940fbed29e
SHA5127b749b9dbee2d7e494e42c1fb3e723de73b8c6c5b9c8595a1757586eecadc052d3f9fee4329d86c8b871c91f45e209e44d135a07b2b365cb858df545be415a51
-
Filesize
722B
MD5eda1dac44785362ee7c5ab84c2e548a7
SHA19235f995e02344d1ca8e5914f418425b174b0e12
SHA256292c1570f59f42092d5423a6b790ff3784c8abc2663cd22a5f218ffbea61052b
SHA512b9e3fb93634ef54d2a60a92db76718623bf08a46375e064f6b189b097fd71c3681a7ee001ff40de335657cc107534e45089dd3508c8b21a7544f6964241f453b
-
C:\Users\Admin\AppData\Local\Temp\234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe
Filesize792KB
MD581311d13023830cb0f1373c9ff74ca70
SHA129fef76ad974c002ba011223cc5cb57d23b7c8c0
SHA25663aed075c6f4c7add62c3c50e9487272c5f387290ba5718a56bf579ab5b0da86
SHA51261172ffe0a48e2ae819615660444f284a05d98ad31e84a70bcf8d8b9bf6d91f89cb87fda6209077eb788a3b6a9137efb7cfa776a2d0595c1dc29fa8da03a9fd1
-
C:\Users\Admin\AppData\Local\Temp\234eaad9ff475134113331bb8bc02bde0564c131e84656468d33ff417eeb8261.exe.exe
Filesize792KB
MD581311d13023830cb0f1373c9ff74ca70
SHA129fef76ad974c002ba011223cc5cb57d23b7c8c0
SHA25663aed075c6f4c7add62c3c50e9487272c5f387290ba5718a56bf579ab5b0da86
SHA51261172ffe0a48e2ae819615660444f284a05d98ad31e84a70bcf8d8b9bf6d91f89cb87fda6209077eb788a3b6a9137efb7cfa776a2d0595c1dc29fa8da03a9fd1
-
Filesize
26KB
MD5de0dae37e3ab0f247fd76004c786aecf
SHA191432f8210ec7bf7be785129a7e78c78bc0d9c10
SHA256ced55110287736a436b221a78374b59a0d7798e3babe3729bebe21f5e69533f0
SHA5129bfc3a5228cfe4294f0b3ac73591b37925bf48c2366662d63b98837f91348868d17c973314a8472744dc8bb3fa25c22718d5fa8dcd71c8295cba959e0886d21a
-
Filesize
26KB
MD5de0dae37e3ab0f247fd76004c786aecf
SHA191432f8210ec7bf7be785129a7e78c78bc0d9c10
SHA256ced55110287736a436b221a78374b59a0d7798e3babe3729bebe21f5e69533f0
SHA5129bfc3a5228cfe4294f0b3ac73591b37925bf48c2366662d63b98837f91348868d17c973314a8472744dc8bb3fa25c22718d5fa8dcd71c8295cba959e0886d21a
-
Filesize
26KB
MD5de0dae37e3ab0f247fd76004c786aecf
SHA191432f8210ec7bf7be785129a7e78c78bc0d9c10
SHA256ced55110287736a436b221a78374b59a0d7798e3babe3729bebe21f5e69533f0
SHA5129bfc3a5228cfe4294f0b3ac73591b37925bf48c2366662d63b98837f91348868d17c973314a8472744dc8bb3fa25c22718d5fa8dcd71c8295cba959e0886d21a
-
Filesize
9B
MD5f69e51f788b9591cc1a5c32b5d8555e0
SHA18690c2639d514f6a56d096f7729496ef0e7dbccf
SHA2569c946a7ed190442c6c3cab3b0c1324cee605d4e233e75fc2192f4cff06c92c28
SHA5122db2a58e8a4bb5db019f8a378abf6e12526810029bd9540474ff68cca7e9dc6705f4de550106bfd7f4ba33308da7722c641bb3d5d1b13a2d972609fbb3fb8c34