Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 08:08
Static task
static1
Behavioral task
behavioral1
Sample
8ea5295b3be779bed04b9f7a86611cd6.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ea5295b3be779bed04b9f7a86611cd6.html
Resource
win10v2004-20231222-en
General
-
Target
8ea5295b3be779bed04b9f7a86611cd6.html
-
Size
44KB
-
MD5
8ea5295b3be779bed04b9f7a86611cd6
-
SHA1
e87d318cffaba61e182259abd0de8f3944334acc
-
SHA256
516680faa6cd111328d7a561a61f590c19814a87078d0c1648f9f4060f2de382
-
SHA512
ecfa668975a5cb3df1572b176add5e61f191d381e0cb168f8f9265e8a2fcaf5cf33e6d1f4e55d1c23568022bdca82b527198739701aa2b2372b898f945a82d0d
-
SSDEEP
768:mwS0l/sGVLsk8ejW4mTNn2oR/elgXdnRYALDk:mZJt7/elgXK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10724cad4157da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A63BB2B1-C334-11EE-BD5F-6E3D54FB2439} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000d1012eee531e751c88d8a51540840b1a4adb36d355900eaf92b2d2749f95d250000000000e80000000020000200000002d923a643fd41537707f89c8924a6851b25d6a5a771a3d2054b3faa61b5b44bd20000000854621eb8eaea2e396a13503515b2b057235d60bbd6b72f02cadd24bc6ef878740000000a20f04ffd0f709f509fb1136af7512bede5817070ffde762f42ef68c25fc9b02d5b1d179fd5690dd4a2a4cbef037ab92f14d28c5035718dbec0a7c966f46035a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413196007" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c000000000200000000001066000000010000200000001bb6c4747f8297ea694f02acd867417feb70437af88d6af84d0dd569ef96a2e6000000000e800000000200002000000015d5280b4695c4c3a473fe0706bcce4dee4ecc946e2fe2279328dc37ca91b4c8900000001a8a9e57f2d1ff9f578b50bc04afb550518230af4f3bfcc631cce22e5b866b02e258e7758d277d2245948955d229c56cd532b91f5f4d5294bfde365762a9027a3836f90fe24d2c6f0a7e2da93604fa6afc9f0619778ab223722c7a86bce60065a122ad5f4e84b359338c68c095123c2c94c50f7ce7104b992fd68b4dc083dd52b5bbb39c9c0ca74209de7b8250ebd5534000000050722102a6d6f4e5f1a80e462ae1732974b1264d6da01ab349c4e183c7c3fa29fe2470db1b2a2ad23017ab70b74b6122671876a4d3b642646dc29efe4ae75667 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2740 3032 iexplore.exe 17 PID 3032 wrote to memory of 2740 3032 iexplore.exe 17 PID 3032 wrote to memory of 2740 3032 iexplore.exe 17 PID 3032 wrote to memory of 2740 3032 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8ea5295b3be779bed04b9f7a86611cd6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58706d2a7708aeb477948f2e95c0b7fa7
SHA1794a3cd6938510c5fbb28a4d195a64c1a463bb99
SHA256787d1f4f6adc7a767265e85f6278b506dba60cf0e921752517d1d61148f10e5d
SHA51250ac3a7b4a57feb9d87f585e46ca009d1d4bdb890a2e158f0ea0bdda2653db3ee4c946fc695e70ec836571c50c0242d350d5409321b73d8fdfe271ebc1c55012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbef5c6266df076273191ca5a4c4d5b3
SHA13b66b4cc4db495bc3a644040a09b189f2dc1da5a
SHA256c1a8066f7019bd020fc69ef6f0ec36ea39529a5132786ddc022bc03471bd343a
SHA5122aa21762810da6cc28e469db1f08d4030cc638f2d438a3763a7d496e3676136d6d384ccdc77ecbffc393ed6f8221f1ae5db3f4984f5db6923f7a82a78737956d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa9c3fb01f3c847905478aa09840275a
SHA1ea67aa19b7f4b32f5aaac5eb8f56506ae9084389
SHA256840c7b9d6892ad64931e33baca9b5df2357ed2ebd45b6a9c133b8da1d4aa587e
SHA5124ab5204b8ff3d788d3cda842c237d365303772b58cc75f1e297136f7a484cd37fd582ddfa32338ffc723495c2ad0ea504d558551ad81b9306c3bb3bef04f37ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5699e822337884ca85fe60c2b08e00fe8
SHA185f09249efbd614953dedff80b103728c6d63b31
SHA2566fa9c64e737880a80b3911fde8c4efe8a3b85821a4dc57a3c4096839bedd75d3
SHA5128f6c489c0ede00f84aa17e0a6d0c618adfc3daa7853c019580d2c799d91585ae1875f6ff695f37bf5fb6ba5763396937898425d8e6c6fc885e5a8e5aa287366d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8306a7e16567a90d3fd8fcd03fdd743
SHA1f7ebdc8b324b10f747f5ae72327e6033955238a3
SHA2563b4d20ba484088702c7571e1daf23200b9b83a814ddb8d1869d08082c8da7319
SHA51261d5a2556aaa464c8f18a582d549e65cbe83c8931086c7139ea38ef0d92546685fa11086ec3486a877e5fed97f54833e900b25f6549dddd3bfc9e3b81fbfc8bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fb64f560662d0223e9d4e9a8be33108
SHA1b87e900531e29774e92ab83fdabd229fc5aadb81
SHA256503ad8a28eb9fb8ecd658e9a66dbfbaa263f77046bdf207cea3a7f1891af329b
SHA512e916e445f048062279debbfc36ae3f3959402c78b225765f81ae1cb8527cb93adac0b506363f620298088c85c34b310ab62197540265533c38b3756793ed5749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543121c5a4eccb06326a2006efa22447a
SHA1de7ded6b8ccd4f92144f50c3db48ec1aa11851d5
SHA256dc09fbc26ef4ca29e2a659b0eccaae528e398786e32314038e700c12d1af19b2
SHA5126f3ec8d55713856118d1ffe229e72417c97e3739dc507a26c97c3a7ddccbaf63e13b0489dea05544594fadfd6ab48867c0d36191ff08fff173149c543add99c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5785e58898e504e3ed63dee3290977f47
SHA1a9e16c96e5fe567241026bd81fca047787c87fc4
SHA25623e52d117ef754782b45ef94d10de4618ba3a1c9a9a8f14664aad8458f87d7e9
SHA51295a97bf706e8d457083f52e7c6e2525ecd59e5187b9f6ac0d86ec96824e84b7934643d5d5d4656822855c239abf42abbf1f8ff48aff5173b152e3c0e61ad31df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50765286d49cdd7acdbbcc433fd235564
SHA1caf6633d8b0176bdec7bf51c98a6c44404590cbe
SHA256b9d9a1432e22097ddb0f7eb72e8115290575cc7808ffde88b2a5398987ec7f54
SHA5120ec366fd9c80cdcd0a0ef1e404926005bc5e968c8ab59abe1cae14ce27b43eb75f16059dc673793bee4bd91d48f24f21cd5b8a2029b02a430a6d5522177d4992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587a1946faa6b289a95e5534841649c5c
SHA17bffe7aa882086c3188cbcfe31456836d30f08d0
SHA2564fe13ebb5a29294e34b3dcb1d429cfa606a8901eff3c96971ebd822ffe1e5c0a
SHA51213236e841ce025a45fe5d351b223c1f9bab6a59becc003cc3f80b4f578f36ddbade39e4bb7107aa74affddb85e48d4f65237fa5cf12dd752e8636d93e880334f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c90e397399cbe34bef53ed2b16d79e2e
SHA1218c370ed4556045e0a04c058a0d7469790b4e14
SHA2562177b764f6075e34128df70efd9ffb0fd478fbba21069ed3d96be32ba830408a
SHA5121b31d218f4763ae3194290357bc4a34b0f90ea4b525037a7c37ac6fa2fd2d0df540722ea28f80ffbdae25f2eb769e42d00284a5b08219e571b3bca5bb5280ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53928bcfafe88b2e75a8f36ae24b5de1a
SHA17cea917915539b7eba7f2e254410a70d2e24d9f2
SHA256b5e46c13638d625ccb2b66fce563e368f584a8e8dfbead9dd79d8f3af09789ea
SHA5127d72ac5f4ce66858298b1ac9b879ead618b11d3d97e8157e7608a691af0591079151eda9dc21871e51ca888e4f5cbed7e8657bb5a5fe1f0befee055974613544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56778fe27770a35abaee0339d4c4a7f64
SHA129ccc5780b5d5f84e27738ffb9e5961341d9f517
SHA256f626d16475a04dab24a73f571ff416273957e1a12cd12c8831631a004c0afd20
SHA512fa3f956b5c23ee5fe8a926913238840be274f72b6dd36a6c8f192a04187185ad2aff1368fabc22a4221f6ff131a24be4329b1096163e87627c61afe889ceca0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557ad981e13bfefa055d6385d924cc179
SHA13538a1f1670c7dc27c0411b6c8914faab4bdeb9c
SHA2566d1c81d92eacd7101357f4193be0d9bb695ee39bcc4488a53352dba68c0a4392
SHA51252f849dab3505c83039abcfd422f7d5b6caacc8712116f4061d889286ff1cdb28f881cc41be2cb2e9393c61f5eea90e83fe791e66ba1627001883c1794989728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561e1069c5db63ea26a1f1c20453497f3
SHA136ef205871b542b40af7109cbbe62bebc79c8f22
SHA2568b20225b8ee569f7146d22e863a346fe6e4eb52f48e892614f36a10d8578e62c
SHA512a10c784da998424febb17a7ef9cd1bfae3a18300e29ec06356f08053a72028ce173344e4b873c84250752c4ad3e1379ec4ee052b1fc0e45a277def64af82c8d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b57b21e4e886fb58a1f3d15c7fe7a79
SHA1818fa60007d910b9cf0464a40194fb75b720ba6c
SHA2567b4bc58a6a65d2ca5aa99a6866c12611ddb52c04e532244a646c15c34119d727
SHA512240c017f1cb418c44c6067fb83a0176b638032bca8c8809ffdb75c9295474bdd9eee2881a16099200a4aab049b6ef35327dc239ed5a45b119a77311b03f7501d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d30395bd97ab3a4edba54b430064e763
SHA13b5796a3bb11fef943c513dfd91ab76f0c357126
SHA2564227e593dd040e945d591a88f51b7fbbc8f049985b532291d16dcacbe916662f
SHA5129b33b737f00f0d7223115cdda95bf95ad752b4301e56cb6827364798e9955d21bf41cdac71eafc7723d8f26284d4645ef22e885a430a3bd64c3a349e7737e07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542fabc7c929f172620c5747c0c0fbc61
SHA157597240a970af46c1e2bfd478d97f3fa5246fe6
SHA256a12424816853ed97ce1c15703718d539daa2191ac308f8b37c105f22874e8eb1
SHA5128829125f77f748165c2389466ce2775a3e7002478618c8b8d1279b949798d1becbb7f229dcec8e3ea970e35939c17e3d090728200156236e79442548819f6cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f19f0ae061162d3e81b91110eeb421dd
SHA13c0a1903485188e1f7cc5deaab17c4c8b7e2c7eb
SHA256af7935486ade187df4dee9b01b1298940dffa70d14b6da667350071864179cdf
SHA51209fae4891b17a670006ba04c2df31958db9c00f6671d61cd607b876f8f60d661395733a5a5bfafb1e9753eb0f14e3b80554a5db575fcaf1309305e89ea38e925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561fd675ef10e5c2e3608448ff92ff363
SHA17e08eb32b35a47f9b36af6860b8d4d4d469cd320
SHA256bbffc00b13f23b67947af55b7b7ff4820fb2de84373b5471306a91766a62fe2c
SHA512a8ca9f3e5aaa5704afd6407a5a8a72e783c311d13e743aa9eaed300ded4067b7370e4c967c10f20a7e6a5a8e935591f20424dac49a31f3f78453efbff1c61bea
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06