Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
General
-
Target
file.exe
-
Size
1.2MB
-
MD5
768ea902b8a19de2479cefe8ee38ab5b
-
SHA1
f422ee01f7cc935f68a8d4718c4fc01a8fb78972
-
SHA256
f29f199df3da80d14283b9ab186ab9515221b10d917319f0cc3c27e09330c5f3
-
SHA512
f43ced8dcc3fd999feb514fdca3ed3a782421e3c836c278fe33c7a66188e4a0f71f6a78317ea0699aab8be9b5b5aba61ae9a0ee838eebdc742e28d77f8d7aa91
-
SSDEEP
24576:nyiHHhbGu/cb7n7AG2Amah8Qaf24x5KXYmGbd4cAYAn:yihb9+0G2A5h8QafvXcRGO0
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1RE40cp9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1RE40cp9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1RE40cp9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1RE40cp9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1RE40cp9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1RE40cp9.exe -
Executes dropped EXE 5 IoCs
pid Process 2600 za6up07.exe 2720 wj7cP36.exe 2632 EP7BG61.exe 1720 1RE40cp9.exe 2556 2gS8319.exe -
Loads dropped DLL 14 IoCs
pid Process 2812 file.exe 2600 za6up07.exe 2600 za6up07.exe 2720 wj7cP36.exe 2720 wj7cP36.exe 2632 EP7BG61.exe 2632 EP7BG61.exe 1720 1RE40cp9.exe 2632 EP7BG61.exe 2556 2gS8319.exe 468 WerFault.exe 468 WerFault.exe 468 WerFault.exe 468 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 1RE40cp9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1RE40cp9.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" EP7BG61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za6up07.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" wj7cP36.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2556 set thread context of 1404 2556 2gS8319.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 468 2556 WerFault.exe 32 760 1404 WerFault.exe 33 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1720 1RE40cp9.exe 1720 1RE40cp9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1720 1RE40cp9.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2600 2812 file.exe 28 PID 2812 wrote to memory of 2600 2812 file.exe 28 PID 2812 wrote to memory of 2600 2812 file.exe 28 PID 2812 wrote to memory of 2600 2812 file.exe 28 PID 2812 wrote to memory of 2600 2812 file.exe 28 PID 2812 wrote to memory of 2600 2812 file.exe 28 PID 2812 wrote to memory of 2600 2812 file.exe 28 PID 2600 wrote to memory of 2720 2600 za6up07.exe 29 PID 2600 wrote to memory of 2720 2600 za6up07.exe 29 PID 2600 wrote to memory of 2720 2600 za6up07.exe 29 PID 2600 wrote to memory of 2720 2600 za6up07.exe 29 PID 2600 wrote to memory of 2720 2600 za6up07.exe 29 PID 2600 wrote to memory of 2720 2600 za6up07.exe 29 PID 2600 wrote to memory of 2720 2600 za6up07.exe 29 PID 2720 wrote to memory of 2632 2720 wj7cP36.exe 30 PID 2720 wrote to memory of 2632 2720 wj7cP36.exe 30 PID 2720 wrote to memory of 2632 2720 wj7cP36.exe 30 PID 2720 wrote to memory of 2632 2720 wj7cP36.exe 30 PID 2720 wrote to memory of 2632 2720 wj7cP36.exe 30 PID 2720 wrote to memory of 2632 2720 wj7cP36.exe 30 PID 2720 wrote to memory of 2632 2720 wj7cP36.exe 30 PID 2632 wrote to memory of 1720 2632 EP7BG61.exe 31 PID 2632 wrote to memory of 1720 2632 EP7BG61.exe 31 PID 2632 wrote to memory of 1720 2632 EP7BG61.exe 31 PID 2632 wrote to memory of 1720 2632 EP7BG61.exe 31 PID 2632 wrote to memory of 1720 2632 EP7BG61.exe 31 PID 2632 wrote to memory of 1720 2632 EP7BG61.exe 31 PID 2632 wrote to memory of 1720 2632 EP7BG61.exe 31 PID 2632 wrote to memory of 2556 2632 EP7BG61.exe 32 PID 2632 wrote to memory of 2556 2632 EP7BG61.exe 32 PID 2632 wrote to memory of 2556 2632 EP7BG61.exe 32 PID 2632 wrote to memory of 2556 2632 EP7BG61.exe 32 PID 2632 wrote to memory of 2556 2632 EP7BG61.exe 32 PID 2632 wrote to memory of 2556 2632 EP7BG61.exe 32 PID 2632 wrote to memory of 2556 2632 EP7BG61.exe 32 PID 2556 wrote to memory of 1404 2556 2gS8319.exe 33 PID 2556 wrote to memory of 1404 2556 2gS8319.exe 33 PID 2556 wrote to memory of 1404 2556 2gS8319.exe 33 PID 2556 wrote to memory of 1404 2556 2gS8319.exe 33 PID 2556 wrote to memory of 1404 2556 2gS8319.exe 33 PID 2556 wrote to memory of 1404 2556 2gS8319.exe 33 PID 2556 wrote to memory of 1404 2556 2gS8319.exe 33 PID 2556 wrote to memory of 1404 2556 2gS8319.exe 33 PID 2556 wrote to memory of 1404 2556 2gS8319.exe 33 PID 2556 wrote to memory of 1404 2556 2gS8319.exe 33 PID 2556 wrote to memory of 1404 2556 2gS8319.exe 33 PID 2556 wrote to memory of 1404 2556 2gS8319.exe 33 PID 2556 wrote to memory of 1404 2556 2gS8319.exe 33 PID 2556 wrote to memory of 1404 2556 2gS8319.exe 33 PID 1404 wrote to memory of 760 1404 AppLaunch.exe 35 PID 1404 wrote to memory of 760 1404 AppLaunch.exe 35 PID 1404 wrote to memory of 760 1404 AppLaunch.exe 35 PID 2556 wrote to memory of 468 2556 2gS8319.exe 34 PID 2556 wrote to memory of 468 2556 2gS8319.exe 34 PID 2556 wrote to memory of 468 2556 2gS8319.exe 34 PID 1404 wrote to memory of 760 1404 AppLaunch.exe 35 PID 1404 wrote to memory of 760 1404 AppLaunch.exe 35 PID 1404 wrote to memory of 760 1404 AppLaunch.exe 35 PID 2556 wrote to memory of 468 2556 2gS8319.exe 34 PID 2556 wrote to memory of 468 2556 2gS8319.exe 34 PID 2556 wrote to memory of 468 2556 2gS8319.exe 34 PID 1404 wrote to memory of 760 1404 AppLaunch.exe 35 PID 2556 wrote to memory of 468 2556 2gS8319.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za6up07.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za6up07.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wj7cP36.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wj7cP36.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\EP7BG61.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\EP7BG61.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1RE40cp9.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1RE40cp9.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2gS8319.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2gS8319.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 2687⤵
- Program crash
PID:760
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:468
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD55f6f2e90497891c3e2a4a5659fc6ec10
SHA1e9d66d8765a11ac1aa96c6272bbb165978359b8b
SHA256e2188146b25739570613fb57161003ab8ce3dfd4111d119e723ab27615dec20f
SHA5126837d97a550d2d867f90f39b5ee8e3b6e4b367f8661cd0f48d4c7f39b8bc540e2ac407296066577e950ddb90ee8a391785c8f3f2dac62b8a689c1408136da861
-
Filesize
1.0MB
MD55f6f2e90497891c3e2a4a5659fc6ec10
SHA1e9d66d8765a11ac1aa96c6272bbb165978359b8b
SHA256e2188146b25739570613fb57161003ab8ce3dfd4111d119e723ab27615dec20f
SHA5126837d97a550d2d867f90f39b5ee8e3b6e4b367f8661cd0f48d4c7f39b8bc540e2ac407296066577e950ddb90ee8a391785c8f3f2dac62b8a689c1408136da861
-
Filesize
744KB
MD50f45f794a6725a0f950c0ed7e15d0fd8
SHA1aa1f7d406e748457b0d0ff383387eeeb7709dbba
SHA256f8a32f3d67b2d962a15f1df2e4553ae1a57edae0ae9c626beed6b127b497834a
SHA512c62740744e38ab25674d3d832e9e7bcb9c2c4e3e8c848df8549bf717aa661b216824a654a5bea91dba42353ba109ee3a59115fc502aa7ada802ce066f0273085
-
Filesize
744KB
MD50f45f794a6725a0f950c0ed7e15d0fd8
SHA1aa1f7d406e748457b0d0ff383387eeeb7709dbba
SHA256f8a32f3d67b2d962a15f1df2e4553ae1a57edae0ae9c626beed6b127b497834a
SHA512c62740744e38ab25674d3d832e9e7bcb9c2c4e3e8c848df8549bf717aa661b216824a654a5bea91dba42353ba109ee3a59115fc502aa7ada802ce066f0273085
-
Filesize
492KB
MD551a06520d3d4b04e7e0339c88780f502
SHA12c06643b4af99b109c2ef1c27033a8c2e749e4ee
SHA2560e755659628cf59713982d70026d09b730777c3de22d0c17cb2a6599324400de
SHA51206849b668e64c356a8e1f1ef178db6dfd400f004a018c243f2d925b8b1ce0b22dd721b5be3d0a80d6f036521067d48cb78711d04ba44d170e04ce5a34b9daab2
-
Filesize
492KB
MD551a06520d3d4b04e7e0339c88780f502
SHA12c06643b4af99b109c2ef1c27033a8c2e749e4ee
SHA2560e755659628cf59713982d70026d09b730777c3de22d0c17cb2a6599324400de
SHA51206849b668e64c356a8e1f1ef178db6dfd400f004a018c243f2d925b8b1ce0b22dd721b5be3d0a80d6f036521067d48cb78711d04ba44d170e04ce5a34b9daab2
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
446KB
MD5d4deda2731d5874e222a6d3a6aeb0b7f
SHA1437b5aaa25608bd89a2aac85174718e8448873b4
SHA25693003b640af4060989df99edbd3b39a10bd44230157270bad40bd170f0a7eb45
SHA5124009b34a8f9a5a59fa907b05752ba93c8f6ddc0995b3abab188524dff6e6f92a71e127fd24323aaca58f1ee996e2243913f14a6c6f9db3e936d40d5ae64cacf1
-
Filesize
446KB
MD5d4deda2731d5874e222a6d3a6aeb0b7f
SHA1437b5aaa25608bd89a2aac85174718e8448873b4
SHA25693003b640af4060989df99edbd3b39a10bd44230157270bad40bd170f0a7eb45
SHA5124009b34a8f9a5a59fa907b05752ba93c8f6ddc0995b3abab188524dff6e6f92a71e127fd24323aaca58f1ee996e2243913f14a6c6f9db3e936d40d5ae64cacf1
-
Filesize
1.0MB
MD55f6f2e90497891c3e2a4a5659fc6ec10
SHA1e9d66d8765a11ac1aa96c6272bbb165978359b8b
SHA256e2188146b25739570613fb57161003ab8ce3dfd4111d119e723ab27615dec20f
SHA5126837d97a550d2d867f90f39b5ee8e3b6e4b367f8661cd0f48d4c7f39b8bc540e2ac407296066577e950ddb90ee8a391785c8f3f2dac62b8a689c1408136da861
-
Filesize
1.0MB
MD55f6f2e90497891c3e2a4a5659fc6ec10
SHA1e9d66d8765a11ac1aa96c6272bbb165978359b8b
SHA256e2188146b25739570613fb57161003ab8ce3dfd4111d119e723ab27615dec20f
SHA5126837d97a550d2d867f90f39b5ee8e3b6e4b367f8661cd0f48d4c7f39b8bc540e2ac407296066577e950ddb90ee8a391785c8f3f2dac62b8a689c1408136da861
-
Filesize
744KB
MD50f45f794a6725a0f950c0ed7e15d0fd8
SHA1aa1f7d406e748457b0d0ff383387eeeb7709dbba
SHA256f8a32f3d67b2d962a15f1df2e4553ae1a57edae0ae9c626beed6b127b497834a
SHA512c62740744e38ab25674d3d832e9e7bcb9c2c4e3e8c848df8549bf717aa661b216824a654a5bea91dba42353ba109ee3a59115fc502aa7ada802ce066f0273085
-
Filesize
744KB
MD50f45f794a6725a0f950c0ed7e15d0fd8
SHA1aa1f7d406e748457b0d0ff383387eeeb7709dbba
SHA256f8a32f3d67b2d962a15f1df2e4553ae1a57edae0ae9c626beed6b127b497834a
SHA512c62740744e38ab25674d3d832e9e7bcb9c2c4e3e8c848df8549bf717aa661b216824a654a5bea91dba42353ba109ee3a59115fc502aa7ada802ce066f0273085
-
Filesize
492KB
MD551a06520d3d4b04e7e0339c88780f502
SHA12c06643b4af99b109c2ef1c27033a8c2e749e4ee
SHA2560e755659628cf59713982d70026d09b730777c3de22d0c17cb2a6599324400de
SHA51206849b668e64c356a8e1f1ef178db6dfd400f004a018c243f2d925b8b1ce0b22dd721b5be3d0a80d6f036521067d48cb78711d04ba44d170e04ce5a34b9daab2
-
Filesize
492KB
MD551a06520d3d4b04e7e0339c88780f502
SHA12c06643b4af99b109c2ef1c27033a8c2e749e4ee
SHA2560e755659628cf59713982d70026d09b730777c3de22d0c17cb2a6599324400de
SHA51206849b668e64c356a8e1f1ef178db6dfd400f004a018c243f2d925b8b1ce0b22dd721b5be3d0a80d6f036521067d48cb78711d04ba44d170e04ce5a34b9daab2
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
446KB
MD5d4deda2731d5874e222a6d3a6aeb0b7f
SHA1437b5aaa25608bd89a2aac85174718e8448873b4
SHA25693003b640af4060989df99edbd3b39a10bd44230157270bad40bd170f0a7eb45
SHA5124009b34a8f9a5a59fa907b05752ba93c8f6ddc0995b3abab188524dff6e6f92a71e127fd24323aaca58f1ee996e2243913f14a6c6f9db3e936d40d5ae64cacf1
-
Filesize
446KB
MD5d4deda2731d5874e222a6d3a6aeb0b7f
SHA1437b5aaa25608bd89a2aac85174718e8448873b4
SHA25693003b640af4060989df99edbd3b39a10bd44230157270bad40bd170f0a7eb45
SHA5124009b34a8f9a5a59fa907b05752ba93c8f6ddc0995b3abab188524dff6e6f92a71e127fd24323aaca58f1ee996e2243913f14a6c6f9db3e936d40d5ae64cacf1
-
Filesize
446KB
MD5d4deda2731d5874e222a6d3a6aeb0b7f
SHA1437b5aaa25608bd89a2aac85174718e8448873b4
SHA25693003b640af4060989df99edbd3b39a10bd44230157270bad40bd170f0a7eb45
SHA5124009b34a8f9a5a59fa907b05752ba93c8f6ddc0995b3abab188524dff6e6f92a71e127fd24323aaca58f1ee996e2243913f14a6c6f9db3e936d40d5ae64cacf1
-
Filesize
446KB
MD5d4deda2731d5874e222a6d3a6aeb0b7f
SHA1437b5aaa25608bd89a2aac85174718e8448873b4
SHA25693003b640af4060989df99edbd3b39a10bd44230157270bad40bd170f0a7eb45
SHA5124009b34a8f9a5a59fa907b05752ba93c8f6ddc0995b3abab188524dff6e6f92a71e127fd24323aaca58f1ee996e2243913f14a6c6f9db3e936d40d5ae64cacf1
-
Filesize
446KB
MD5d4deda2731d5874e222a6d3a6aeb0b7f
SHA1437b5aaa25608bd89a2aac85174718e8448873b4
SHA25693003b640af4060989df99edbd3b39a10bd44230157270bad40bd170f0a7eb45
SHA5124009b34a8f9a5a59fa907b05752ba93c8f6ddc0995b3abab188524dff6e6f92a71e127fd24323aaca58f1ee996e2243913f14a6c6f9db3e936d40d5ae64cacf1
-
Filesize
446KB
MD5d4deda2731d5874e222a6d3a6aeb0b7f
SHA1437b5aaa25608bd89a2aac85174718e8448873b4
SHA25693003b640af4060989df99edbd3b39a10bd44230157270bad40bd170f0a7eb45
SHA5124009b34a8f9a5a59fa907b05752ba93c8f6ddc0995b3abab188524dff6e6f92a71e127fd24323aaca58f1ee996e2243913f14a6c6f9db3e936d40d5ae64cacf1