Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 00:56
Static task
static1
Behavioral task
behavioral1
Sample
7104879870e0fad495276c52c5c39721.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7104879870e0fad495276c52c5c39721.html
Resource
win10v2004-20231215-en
General
-
Target
7104879870e0fad495276c52c5c39721.html
-
Size
53KB
-
MD5
7104879870e0fad495276c52c5c39721
-
SHA1
067b046ab5f38333c81e5c8169eb5136d018a5b1
-
SHA256
21fb6f0b19aefc9e0aba6ff4d8501f10321034f3930a1299544b0a4341783eba
-
SHA512
ad8feafb9ca07cadf29d7bfe006e7568205a42c17b10bc89ff50462f3759b724cb7ff1cf0fb11e26339388cd6613526edfce5552b27c86f5f8dc1b3191a406fb
-
SSDEEP
384:gbeb91RnEV01UEjorGCFyMBE906fyicfWPKF2C28o0jS0cV0+9PqvglR5LTo5u42:giZA1uHPMaf/w1SUhmxSnLq
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000fafc3bcdac9e5273a95fc0a0bc212b9a9c9439a06716b349f493b4e23390f049000000000e800000000200002000000031a4db24d483f8466b180f1d7a89cbd5634ab91d97d351a16e529bdc5b8c625320000000c891aa8c863a88408b33de1f0088c12464366f5ef7d6c7385a0db716076a261340000000551f62771b12ef1e11e163dcd4e1073fa86911ab5972bc0451de50f149acd5f53afa417f5c34db3bb6dd4bce8ab846ca357b60b62b9d7506a845b653bedcad0a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f03a48604eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{732E2D11-BA53-11EE-9905-C2500A176F17} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412219674" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000cc3af056d129f400daf07ca37107616c8203167c0e6e93c96c75d07cef0a377d000000000e800000000200002000000040d6580ca849e703faf278d6936655cbb1eba5290f4a3999f795ee9d56ffb76690000000c711e152202c1499cd9949b26c12abfbbae179c522f3b8e86a85ef6cafb518db5725321f1d47fb13bf2614677b3336916400bea15e26f7e63be80f4f885cee87a1f8563f42129f51c9a8ce5b4e486a5cf935355e649d9beaa2e868a499b4255c77615091703b6e35768f6bd09ed98f68f3f118a4381226f1c82ea39d1bba3eb60a5a013cd406a446e38328b9da133d274000000088b321ea3e2efbd182d093229b81c5175dd5307c6b69ba2a6d3b1e168e76fd4624580dc4b721532ea3a43c27bfcd79880f2cbe9c67b0fe62f3fd6889837d185c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1648 iexplore.exe 1648 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2708 1648 iexplore.exe 28 PID 1648 wrote to memory of 2708 1648 iexplore.exe 28 PID 1648 wrote to memory of 2708 1648 iexplore.exe 28 PID 1648 wrote to memory of 2708 1648 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7104879870e0fad495276c52c5c39721.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50824bcdc1fa9e8da29f43efe832a1896
SHA174da637bb975db99d58daa3ed35269807997e328
SHA25622276f84a0d2756013e6de9ce79f0384e5283822f5eb9eb92db0a583c53d5da0
SHA512d56e178ec938633f10d66ab43af5d4a828e2f46b1085974e67d882ffaf69259f5bd92f1dadced0d7d5887333eb79175393e1fe389ada973e3fc2a9e8339df75e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dca76063c91a290cf739e7329a612cf4
SHA1fdf5fc05c7b6c46c02274b9182d1d2fc1e58d6fe
SHA25648e3d2aa75405dcfc39347a826d377f8c30b0a700cb92adf785308c26964f784
SHA51237e07dbbfad52fa172d99f6fd36d66aaa5bbdf10a89d1287d401c0242278b0d72d001fa13f96c02aad4612867cacd6ee56f855bb7bd074f45b5a7028983a4584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed46b2628f95f07e9d1b1f7c9e2aeb06
SHA130e40a85adfd0f192949b9d39e5b93b6c3f672fc
SHA2561ae45dd7e02a59f08ed15c837e8c2896c1f3b918e0e6d77ee286d4e795f17991
SHA51295ff4a494a894cc3e5f3409fcc9e99d3c48208eb3cb158e85b0a4b7a768280b0bc20ac406e2225493af28ad8513536a0d0fe673f0c2a761f1afc2b96f4419f3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580aca8fd3f960b7c90e720331c6b9d08
SHA1fb5e581381f7e86d01870e7d83a67ffea9821fb3
SHA25694263df8990ef9670c5016f667cef2092fa891708fb872521a2f0ee02f494d63
SHA51253d0d04f9bb4358757530819bf4ae6f0be7dc58423bba6ccb88200a4be1f67f4a2bd665da151679f75e6d38a01eb0168ec9335ebd3a7d2625570e7bc309898aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5132f7e0bb060eef76c45c84ad593b4db
SHA15bf559c95b070269e3136850a51f09a613faa31a
SHA256d568f23fb71121e815b06b3ee93bd07fe823b86e03b2c140485f2a2757200561
SHA512ee66c1c33f4027c65d722720d3a97bb8d64448d0f2bb2421a7aa187c783e834346222f96f312f8d0a30e33da4b0b329594ae496def14d55d61ce06e7165deeec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59da4f37188d59b88d000935029739d06
SHA115831fdb473b3ccd6ba025d7430c8b250f70c8e3
SHA2562e50977d4f0adf23e7017762b26c28239c82cb19b5a5c08d08b4ba0d7b733cba
SHA512d053804116764355a695a72d718fe02d1e5dbc510e89f2d348c02c754724834a59002b00b0e8584661525fe2ee723168234e6f5821ac208873644d2b801af96d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e929e74f217dfbc8c93d72f87d79a403
SHA186ddcdb27f26c64dd048d82891bf5dd7f2e4957e
SHA256ead30f779f2ad0bff1400ab1bf4835d6b91b4036f360fe5d8f4618a398fb6dfb
SHA512874b42b6d4c4f0e836ffd1882827c26eec5bb97b8416323c5b38d8a91c58220390dd13b18308b49c1fe8468760c771bcc55485ca8ae439b1ee6f540137c8a811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e46fc9be37e22cb099912a7e51f6a84
SHA162b056d63611434eeba1902fcd88428b165138dc
SHA2564cbaa6f92d0279bdced79343827baa997a9219902ed6597e3d6f6bf4dd9c1d24
SHA51214856b1ea90fa0583d0d01c9be584f95191b6de1af17871a1060ebfa55cb371766ff5479a8b058fc5d8b9fa0f254abfe2f1df19bc0da1b775b7c773f00b75e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b93d48374aadf0bce474c64f4ea1a9a
SHA144c6b4d49c8e9f087b946b34d716c6b846614aad
SHA25668c50e37b7fa42f321ed68c76ec38b39fea633f286f678b6f4995e1e28177d8d
SHA5122a67ffc632aab738c9de93656265175860b1ca7738c122f25e739e6551d13b6396aebbe825b6049c45df045d44405bb01e664e1c3e17e32fe0fbf8a9f36d8ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569e331e4ecb041e2002a7085e41b4347
SHA184f19f6aabff956d21ee96757f2d83b582b78d52
SHA256d58f28e017c404f998241881e2a15d4be165f4bde2ef1f2a706a36a47d241fe8
SHA512b7e32b8952ec0e1190fa196cd5877e145c241ea42d7b4e10f39f7fc6665243c85bf0aa450a2e742f49cee58c493581748312db0f1448178abe008f650adb0a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5008764fe6611f399402ca5e52c92cf1d
SHA1ef6e40db862992b6bb4abe59f71d466c7b1d2b0d
SHA256cbdf09e50b96bc6d0518d9ad2387c28ab6534a5715555171a3a95e2382e83256
SHA5123dc9c30c842f75bbf4ddb9ae3ee874a04f041880d5332bc8bc1442719cc2f8a02b801ae09981c1c0d696e99de998c11010b7b508db0776ae27c92aef86133130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5468d20e46935be3d192cce6c5f628ac5
SHA1b539b15b77293568491f6d378ddb2d627e5d9949
SHA256e7138dd2de2bfc24a425eaad54250d67e71295eb8146cea914857c767fb6a0df
SHA5120690f79dd3b7555ab9920666d300243a73a47c989dae6c59ac5780bbbec77881aa65b584467194eefaed9247fd7d458f05eb9eac06cd706ab35d0f8d3b42cdb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dafd4ab746fe7f85b65f2807028d5ddf
SHA12e7cfb2ab3b132bf9e73d5dc0ba992c628067e46
SHA2567106fb5ac47488ec49dc8798b0449e4fe36b0b97c97d60206ef7509229f9c319
SHA5127349fce4d419cb6cf79d088eca7e1b37ce1f2f9325ebca7a275c24740243e35312275953ef02a21742eefa790a3bceb82bc167ddf8c5b9373a3f07a980241f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9d413cfea20311e88e6cfa8f83ba2b3
SHA14104706483b2457115fc16aef1ae8fc5e04fa9d8
SHA256c1183a5715208cc897db328176af91d8cfa86608771aa928e08c7c87172187c8
SHA5128f474f504d68bd04f77fbe4931536849b0776a4a5b62c2b5fd9424e05fed8e7845519d4db8d1f4a9c69ffc0b8abc15c3d336c6cf07dd9fa6964c9956af58b9b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f602e444f4a8d0148c32cdd0005e384
SHA1481bd468e5791f86c2a2bfb8d06a8addd7512e05
SHA256739804bebf9b89e77e4b590886596677df58c7d2c87a8184d69421a681e59fe6
SHA512d4555743c82a0966992ec0a5f7dd8e07319dfd6845844c29e3e235dfab8e7fc14b07636e526a116491a18c64cf7304c39c5f386b75fdb7a0228d736936b22f26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a2cf693feecb16e2afcd5fe4f1b5cd5
SHA1149c3733ebd7137beefc005c04969d6c35925b5b
SHA25648277da3db6e2fc90ecbc24de29b1e1f90068f18291fe6b45ef8aaf6b9a92b25
SHA5120764f69031d92c0c8722b53f845014edaf7e0ce2d052658086339860f44a5daa5ccc7955827f087499e74aabada302b92323374aa69762d0dde315ae4911b309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed6690b864de7269885bba962e70e9b8
SHA189f1be7aa5212678b82f99c769fbe06f901cfece
SHA256f756cdcd002375e3d9650d81124c6075e0bf97954d9087b9bd69d97139e6e4b7
SHA51257d6f48034e2e63208f6cb1667d269298c06016421428cf568eb6beaee217b0d0ad4b8d59d17c5cead511eb76d384727233c06f32e5146396129c71a42f0114a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a3b910af8b1062ad83510fbda3bfa87
SHA1cb8bf3d71e94b867962790362d18923adfb235f5
SHA256621dfc38cfa5cce5fc3d373b42636011680eb9c6568f1398e47b20aed940f640
SHA51248ec1051163fe58a199c6b197c86ba907f8461f373fe8adab808b99a1ebc36aae8245eb3242b94afec9bb283b6e16734295de7867de12d0087f165540f4f1a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55359a23e84856c42cab18eb506789dc4
SHA1280e59cb2b87ca724f5d117f9803b5245f5d0499
SHA256f6a367c319fa1c656933b3c74a5212933380a5699c1a638b3df380b0fbc12c02
SHA512eeb5c9cf0ddadc5d8be24cd0e22f3d6c26f6ec289f6b29743af87ab9ef52ed3270cb157b47ef7044be43bdd903489e3baaba9c568149c6721eb82b74bb1c4786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52da932cc345ed564044eb2111a433964
SHA13ae42e47f1e4fdbe4e1a87604275eaa9d560e087
SHA256c37da444402e44fa62b2a89555e4721d10659aac7c114f5117a06ba06a9c3acb
SHA51286421e22d629ee4130ce638c30935bf58fe91a689eee308d7af5df798bd26f416a7f5d49c863140271a1771d4d6f155b283fc1ef5123b3d41cacbb50332481fd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06