Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
53s -
max time network
218s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:18
Behavioral task
behavioral1
Sample
0e344d7e163cce6460421737655679c5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e344d7e163cce6460421737655679c5.exe
Resource
win10v2004-20231215-en
General
-
Target
0e344d7e163cce6460421737655679c5.exe
-
Size
667KB
-
MD5
0e344d7e163cce6460421737655679c5
-
SHA1
1b7a4a016fc96ab28018f225efd2cb8138f7530c
-
SHA256
6c0f58301af03021f6238a9e6cab0119b096a6a2c4fbca275a6bd91bb76c5985
-
SHA512
d602949110f2be0494cebc6feeacf2ebf39b6447dc963ebb7102281181f6bb4e27fc22684e8f3ef6b19303bfdabc9c61ba9388e5a186b7b9c8adb29a2998b64b
-
SSDEEP
12288:WbMqmqEEb4E9F/ATyGv4XKGQi2lJLm1Giizl6oAlpxElrW1A:WIYEEb4Ev/ATEXKGVnGTzpA1Ec1A
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" DV245F.exe -
ModiLoader Second Stage 12 IoCs
resource yara_rule behavioral1/memory/2116-12-0x0000000000400000-0x00000000004CF000-memory.dmp modiloader_stage2 behavioral1/memory/2116-13-0x0000000000400000-0x00000000004CF000-memory.dmp modiloader_stage2 behavioral1/memory/2216-9-0x0000000000400000-0x000000000041F000-memory.dmp modiloader_stage2 behavioral1/files/0x00050000000120fa-49.dat modiloader_stage2 behavioral1/files/0x00050000000120fa-48.dat modiloader_stage2 behavioral1/files/0x00050000000120fa-45.dat modiloader_stage2 behavioral1/files/0x00050000000120fa-43.dat modiloader_stage2 behavioral1/memory/2116-50-0x0000000000400000-0x00000000004CF000-memory.dmp modiloader_stage2 behavioral1/memory/2452-64-0x0000000000400000-0x000000000041E000-memory.dmp modiloader_stage2 behavioral1/files/0x00050000000120fa-63.dat modiloader_stage2 behavioral1/memory/2996-198-0x00000000005C0000-0x00000000006C0000-memory.dmp modiloader_stage2 behavioral1/memory/2116-241-0x0000000000400000-0x00000000004CF000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 2092 DV245F.exe 2808 deaxoi.exe -
Loads dropped DLL 4 IoCs
pid Process 2116 0e344d7e163cce6460421737655679c5.exe 2116 0e344d7e163cce6460421737655679c5.exe 2092 DV245F.exe 2092 DV245F.exe -
resource yara_rule behavioral1/memory/2116-5-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral1/memory/2116-12-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral1/memory/2116-13-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral1/memory/2116-11-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral1/memory/2116-3-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral1/memory/2116-2-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral1/memory/2116-50-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral1/memory/2812-70-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2812-69-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2812-68-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2812-67-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2812-59-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2812-56-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2812-54-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2932-80-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2932-95-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/3020-138-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2932-141-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2996-197-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2996-196-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2932-240-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2116-241-0x0000000000400000-0x00000000004CF000-memory.dmp upx behavioral1/memory/2932-309-0x0000000000400000-0x0000000000452000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\deaxoi = "C:\\Users\\Admin\\deaxoi.exe /U" DV245F.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2216 set thread context of 2116 2216 0e344d7e163cce6460421737655679c5.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2804 tasklist.exe 1248 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2092 DV245F.exe 2092 DV245F.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2116 0e344d7e163cce6460421737655679c5.exe 2092 DV245F.exe 2808 deaxoi.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2116 2216 0e344d7e163cce6460421737655679c5.exe 29 PID 2216 wrote to memory of 2116 2216 0e344d7e163cce6460421737655679c5.exe 29 PID 2216 wrote to memory of 2116 2216 0e344d7e163cce6460421737655679c5.exe 29 PID 2216 wrote to memory of 2116 2216 0e344d7e163cce6460421737655679c5.exe 29 PID 2216 wrote to memory of 2116 2216 0e344d7e163cce6460421737655679c5.exe 29 PID 2216 wrote to memory of 2116 2216 0e344d7e163cce6460421737655679c5.exe 29 PID 2216 wrote to memory of 2116 2216 0e344d7e163cce6460421737655679c5.exe 29 PID 2216 wrote to memory of 2116 2216 0e344d7e163cce6460421737655679c5.exe 29 PID 2116 wrote to memory of 2092 2116 0e344d7e163cce6460421737655679c5.exe 30 PID 2116 wrote to memory of 2092 2116 0e344d7e163cce6460421737655679c5.exe 30 PID 2116 wrote to memory of 2092 2116 0e344d7e163cce6460421737655679c5.exe 30 PID 2116 wrote to memory of 2092 2116 0e344d7e163cce6460421737655679c5.exe 30 PID 2092 wrote to memory of 2808 2092 DV245F.exe 31 PID 2092 wrote to memory of 2808 2092 DV245F.exe 31 PID 2092 wrote to memory of 2808 2092 DV245F.exe 31 PID 2092 wrote to memory of 2808 2092 DV245F.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e344d7e163cce6460421737655679c5.exe"C:\Users\Admin\AppData\Local\Temp\0e344d7e163cce6460421737655679c5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\0e344d7e163cce6460421737655679c5.exe0e344d7e163cce6460421737655679c5.exe2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\DV245F.exeC:\Users\Admin\DV245F.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\deaxoi.exe"C:\Users\Admin\deaxoi.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del DV245F.exe4⤵PID:3016
-
-
-
C:\Users\Admin\aohost.exeC:\Users\Admin\aohost.exe3⤵PID:2452
-
C:\Users\Admin\aohost.exeaohost.exe4⤵PID:2812
-
-
-
C:\Users\Admin\bohost.exeC:\Users\Admin\bohost.exe3⤵PID:2932
-
C:\Users\Admin\bohost.exeC:\Users\Admin\bohost.exe startC:\Users\Admin\AppData\Roaming\73C6E\0C5DE.exe%C:\Users\Admin\AppData\Roaming\73C6E4⤵PID:3020
-
-
C:\Users\Admin\bohost.exeC:\Users\Admin\bohost.exe startC:\Program Files (x86)\6E662\lvvm.exe%C:\Program Files (x86)\6E6624⤵PID:2996
-
-
-
C:\Users\Admin\dohost.exeC:\Users\Admin\dohost.exe3⤵PID:2024
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 0e344d7e163cce6460421737655679c5.exe3⤵PID:2428
-
-
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
PID:2804
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:2636
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1956
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
PID:1248
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xc41⤵PID:1660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD5b6c0fb2ebd85e43313b544d2eb57f5a9
SHA17631586b2131f40050112a52bf549e6f50f14d76
SHA2565b2e59e6dcaa05650c3e25fe517414db392aa93d1a535349ff2fe593f1d2014b
SHA51271aa1c103d62c8c7de96f59e1136d35d4a053fb42bb9d8d8e81f5bf2df81d1e23d6ba4a9c304b605b2ba77311936bd1b6158c4e45c5c2c8d870eb6cba3b0acde
-
Filesize
600B
MD5a98da53813f4384922a28fb75ad1d1cb
SHA17f97385c11f37b0d32eb501b10dd29442d5a1bcd
SHA256d4dfa288eaf7ff17850e3ae3aec72de5cbd73ceadca9fefa934c6a7a1b879367
SHA5124c8819f74a3db1f4ff793e5c1bf131dba3787c32d59016a7829dff9069b2f3f947bb2ca8b2ef00b3954e4007526907f6e6647c5f4e0aa57801490c1849ed97e5
-
Filesize
1KB
MD5c6a3c655a5bf49021d20616176c614c1
SHA1565be588ce5eee280fc4f3ea4e430eeb36bcda15
SHA2561dfc7205a0daddd194013ad0f1dde591d42599d897a32644b4b5c94dd76cd565
SHA51275595fce03e63d09c63c3e9ba3e66ba86970dbeb63025f0e70ca6bdd78b157a2c6a098124db8a133d614018176f228145d0cba2fdf2cc575212d63afc552024e
-
Filesize
1KB
MD5bb35473b0ebfa57bb86f6b4d45a254c7
SHA14b0642e1abeacc487a0e4ae637acff1dd88d6652
SHA256d0f224ba77a9cd74571f34cf150caee4e414ed5e3eec3719cf6d7c786c54f859
SHA512915b8d8cf69a901bac33124b1ea1c16345835154eb5904d83a9a6b03f5f223785f3e6ac518a4f6cb301219541fae49548f527c2c112f946202a54e6503483152
-
Filesize
67KB
MD5c830a2c9963091589b6abee481fd4818
SHA196ed9502bf829bad71eda29c5839a894445d3988
SHA256cbaff7d699ac260efe2d1d9f9f971ec10dfdec4b3b5f6206a87a8be6ca99b84d
SHA512fdfad33be0ee9f0ff18b27f8507ea19b909b11b3d81fca3ca1b163f487cd26101247907018cee2848a137130905141a43a4f16094191f445141f394512dcb8e1
-
Filesize
16KB
MD57d163b72ac81bf456f3de9ccad39e679
SHA17883d5a92499774ab42526682a160e3cd8219e98
SHA256502bd2dca73b0db2b13625d09e2ae86e29aeeb173008cbc9490f079fa88ec71a
SHA5122163855a90de7dedba4d1a950c6570d25c32ad215291f0835de68124d2dc7509afc909e3a947977ad880ff05d9f6a299816b69a437f55b2a9c56aa6cc0116360
-
Filesize
38KB
MD5bc92917d0e228e7de6ae2349846bf690
SHA1fb1f5bee0e7fa7e19ca57093599943833696bf9b
SHA256f7a9724014634ca59221819b7d477c25e5d63fc922715ce2f6dab2ac4f5ba772
SHA512f10855625de45c5b0192be86fe4770b887d52dd68efb3d836c630a4b4ab1f3410f237876e9cf87f89fb40ba413ba3cd4aa338db1ac9b52a170605682526f3b39
-
Filesize
52KB
MD54755cdf397d5118f363a28aefc36d803
SHA1093fcdd86a63c1990d8875f2f0430afd48c3e11e
SHA25686580e0acfbff5c38a2b2cb85f914504c448f4eee9a2dd9dce8e2a7c2d67daad
SHA5124773f78dd9adffa8f10df99a338db78a9ab2c6d17ec308c9ddd93ff047efce0c0b6c249d5d95296de2547d63ccb57189eb70dcec3b09aa119fb9ae7dd0c10a8d
-
Filesize
5KB
MD5adf0097a8a2dc33b59590b39da77babb
SHA1632d66cddd8a4e0b5390ef5558d7e91606d304e0
SHA256690d72b3da063716f6964b27b5dc9a760bd70bf4a824bb42f2977ea95248449f
SHA512fb91ff0c63713b8fb99bcc39cab72c923af6182eff3f4cec8aa5d2a7b332588346b26a2282e2b0a40195a384280bc527bc75e69ee64aab947bbc8e7112574b85
-
Filesize
9KB
MD57c4f15223243e748d19edf3c1b5aeb91
SHA13ab3be5996eae6b316ea185af23b61ebb7abe1b3
SHA2562d27c8ce4da8ef4eb89e1cd78eec187852dea806a223fcac6eb1ee62c60ac302
SHA5126867d4c7e1a77748dc6eb535fdd12946a84411fe567c7380689a153b4ac1893044095093138e73a71a133d525d735d451829c5a4172c87a1f5600e28eae0cb0b
-
Filesize
46KB
MD5523a2c4f510856fec895b0e595f357b6
SHA188305c9c5e639177411393970793e68c4027eaaa
SHA256fb25310b184ef02c02dc0e95c1f58718f844b3a4c10611de2a289636d9dc0325
SHA512659db9f4e0464097349641336cee1c23ab78847fdb3f5a4daec0eb89371b4486367fb8e291a75884c7278fb083782d9b4b226c1e5026260593e45d49d8e68597
-
Filesize
14KB
MD56c1f1835ca921e66b79d027bcbc44eef
SHA1bf7f01b243c7edfccdc3cddd1ed6b7badea76ded
SHA256eafa8229f66402ac1ae78687bcb2e9ab745aa67017f3cecb2279ac254847f187
SHA5125a2be5a86d8d0149b26575ad50867ad11b8ea8faa667e3ff75ef0e42ee65a0311694fb283d3752a8e01af631d37948ae86665c48d7a16e7dfaac3d7663dc9d9b
-
Filesize
12KB
MD537915d046f65b2b23aaae123844a0e47
SHA1c83f41c125067618d3c7a59f170c4e910932086f
SHA256ab6003820e41ab5f68c5d14f8b5ff31970093062488347c8bc999b74a4a2c0b8
SHA51217c93593b587cfe83c3177f74bb7050e1108bac1975bf7597ceccf0c0adf4bb60d76eb0c3e5382a2880f43364aa5e585147eba37312c6362d0b906a3da1e2aef
-
Filesize
19KB
MD5cf7d3e2173f69ce893c9089ba09623b6
SHA15e689e326985ca7b4388e284c2a225c1655b54f5
SHA2567e5cd07af833153932bb752727255ad7ca1b6d5518724d9dd46b7819d5441358
SHA51295eeba90ef30d8b97fb423f79abdc6f2cb98d6ac7772ac418c8d5fe9295521016151d5b31b1759e95abc529bf34f08b4639898838a0f30a9bfa3f6b50296b9ab
-
Filesize
30KB
MD5d35e96a929ad380d89ae43920f2c9e0c
SHA1298c91fdaf3fdcee37ebf52db04dfc63fbc52b0d
SHA2561d3236099de74f9a900bcb817a37854a798dcfc5b790df29920498ceecedd951
SHA512b54b7e33db034b51109ffc2a84c0959a9c204ce7ab70aecedb66133e527c7cb1e9ef04d296ff13eaae7ca510c4181732a833e07d39a64bb8e581c10c5b6eff64
-
Filesize
21KB
MD5b884ba9939e1ce582fb1fe28832b709f
SHA12b12c67914bef8e252b417457a8330829c8d9c0c
SHA2560a5a926228bf2df1d187aba10371b95c6d9c5e93e70f637987607f0176967a5b
SHA512ef193d10f39431504c1b6be4f156d2bdb12826214cd2ba4e5850bd32dda249267cf4c4003e99b03d8e21ac35ffaf4a3a032a9e96f9d5fb8860224b1246433f1b
-
Filesize
23KB
MD548fd912a6c2154d4344898aa58836a2e
SHA1d6e1379e0179a52469c819e6314d7ee23c722e17
SHA256a1908acb7e2f0ba775c71c2dc41955485c784149deba08b04f8ac08b4c9ce866
SHA5126c452b9ecc8e4f0b8217560dbb31578b26a1fc7c13997cefbae588bac974a47c43b7968bff2c6df966b3e63a5c2a24df34a60617ff5e0b67bfa6a381e0c2bbbe
-
Filesize
6KB
MD55ccf013114d2cef64c69b79bfa8a997e
SHA1d29fa1ba9735cb5ccc0249cdf086539e0580bb3b
SHA25676833e6778aa40bb23ca4560b1441ac88fbd5011d02ed03822823b3ac23b4450
SHA5127fd66eeb039668e41cba67838f40a8df6445bfc8af102c102485928db17cd4dbfc76fd6003eda7f21adc2cfe54143eb4be374cc66e2055cd0db29c7e5ca2c637
-
Filesize
24KB
MD5d7390e209a42ea46d9cbfc5177b8324e
SHA1eff57330de49be19d2514dd08e614afc97b061d2
SHA256d2d49c37bdf2313756897245c3050494b39e824af448450eca1c0e83cf95b1e5
SHA512de0eb11dd20cd9d74f47b138fb4189a299a57173fe2635150045b01629354f35b26e0575acd25501403af0db238a123b2e5a79582b47aee1d6e786f5eec1929d
-
Filesize
42KB
MD5f69cb6b9859402736dea889caf09bed9
SHA12b1dc777f6a465c19231122e41edc04865422eb9
SHA2564fccad5a8f9976f8c73a0fc875445556f0fbde2029bfe8910f0885ca146f1f84
SHA51200a40f06217bb870a4baa343e3172d2358e211a133ea0f298f8a700703b52aac405cfdda2db68e89a11c3cc3646a0e3483f4ec76aa61440a89c0843f21a3c7be
-
Filesize
64KB
MD5ccc751bd8087deb003586b7332830f88
SHA184dbf2dc7f3cebba7f335505b60964555590a7cd
SHA2569cd1f86972a236bb3942e3c8e8b565a53321f2ddf074b466822011ab0fefb3e0
SHA512f883244dc0223ed759809f6ace40f9379e6c77d38d2b40592983cdd885058240bfdfe3879bc2d1da5c9384988af96ba0fd05f69f0bb1b92d30c78016ed481ede
-
Filesize
17KB
MD589eb70a7d7932464f6e3116fc207244a
SHA17e81b0a897ac3f2bbb4d8cc76c88fcd01b8d7ed9
SHA256be55134124f99d0f1c34fa210a891935bf2d41d1232e5f7dd2927f4201852e23
SHA512df2e0665d9dfe3339a96c971386bc1c8bd98df424abddbe4c1ea5aba0fdf7f375032653ab15879fdcd1a3fa23b23c7c8a144fbf53aa7b885c5be1276aa3897a9
-
Filesize
1KB
MD531f20246dbe2d955fecc4a0432dd4498
SHA1d14fd56df01769ac63d25e8c626129a162bd5980
SHA25655ee227658b10becd6739f42eb3683d95649ff8cd05106eab59bd9dc27eeea74
SHA5121e62fca534207f5db0988bb911e60b826cc5d1e38d2da8db6a0ce42ca8fa631b62f5426e4af95195836f9d99d9affc6934eb8a150e9d9e9a757e7c428be60f83
-
Filesize
27KB
MD5eb20aa8569c4d81d94d4e3840ffd7cbe
SHA15fef0993e58078267c3f4abbf25b2cb7116e841c
SHA2565116d64c90fca5bba0f8da700f810a4f0444d08aea84152a102fc76b003edac4
SHA512b4ccab693031c23e4a7d2ab1d803f16b363e15b7da0d4b41be3763b4fc5679f42cd03941b45f13766715199208008579bd906ab4def419ddfd250745e469597f
-
Filesize
2KB
MD5cd914b4a8d7fd8049b3235a95d06e8ba
SHA18c840f6cada8c82dc937838a186dc74dae1574bd
SHA25601e64b616f7ecf5695079213853f0d994a3e8d0b39d3967cfe75d131ba4ddf71
SHA5128bc8bbb5ed8aa02afd2ed18e99795570dbc0c92596032695acd2865c1b73501d614741e52581bb4aa8815f50cbd6adc38f11ce0840604cfd9f79d43415dd2244
-
Filesize
45KB
MD5f8693ee00c105fdccea04db6d4935844
SHA13a36e18a532babc94da6fbf6604dcfcd3d45c4ef
SHA256110e8d2fec48882c63f7c27786501252dfe12288a7f2d0949627e3da63884478
SHA5129b60c8f147f4b68aa4b8231152f48cf1511d9610e50e032990bedcc1cfbc14e517c4e8aebc045d2c56f2f5065141796305838c02352dae38b53e57235a3ca530
-
Filesize
27KB
MD52fa3a40198ea8543fe4441583724e82c
SHA14de1cd2b76faae508b5ed9ff672744662a27411b
SHA25658fcecf0224baf10a62c7e5f0eff57ff23d622437b8fbc578010eb5bb1ccddd7
SHA5127ab89fbbcf6568af4696c7f826c35f677459468793048a8e4db80d8dd8af402c2c1ec058dd2a7b2d71d7ad3fefd8bcb401123581ca1886e617ffdff92aaa6098
-
Filesize
5KB
MD511528b7e78ef381b96907c26cb8af241
SHA129c013f8e951b3895acc9812a04cad9ae38674ce
SHA25687775d172c8a5a4b667ea4e9f81ff6e1c54524489985ddf0e3cf9a34c1485a4d
SHA512163937faf7a88b0f6c9d792722e8663a9a5962c390ea4fdc1ff520cb2c18e8874d74a78fa758b6f951721d2530a500d7126e3f25c2e5e04995d987bb8f070058