Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
33s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 09:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www3.bairesdev.com/go?s=vsO5OHqQt04W6LJhQZB4peQUaXqiO_cUxUJ4e-m9pw9rkmX6Q5RVrr_8NTMe3dk97_R4UOZbQ-phfLSs81TgKluJ3Xk2aKAKaJgpewGLbqSFnaxH
Resource
win10v2004-20240226-en
General
-
Target
https://www3.bairesdev.com/go?s=vsO5OHqQt04W6LJhQZB4peQUaXqiO_cUxUJ4e-m9pw9rkmX6Q5RVrr_8NTMe3dk97_R4UOZbQ-phfLSs81TgKluJ3Xk2aKAKaJgpewGLbqSFnaxH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 4244 msedge.exe 4244 msedge.exe 2608 identity_helper.exe 2608 identity_helper.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1800 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 1800 OpenWith.exe 1800 OpenWith.exe 1800 OpenWith.exe 1800 OpenWith.exe 1800 OpenWith.exe 1800 OpenWith.exe 1800 OpenWith.exe 1800 OpenWith.exe 1800 OpenWith.exe 1800 OpenWith.exe 1800 OpenWith.exe 1800 OpenWith.exe 1800 OpenWith.exe 1800 OpenWith.exe 1800 OpenWith.exe 1800 OpenWith.exe 1800 OpenWith.exe 1800 OpenWith.exe 1800 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3136 wrote to memory of 1900 3136 msedge.exe 87 PID 3136 wrote to memory of 1900 3136 msedge.exe 87 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 5092 3136 msedge.exe 88 PID 3136 wrote to memory of 4244 3136 msedge.exe 89 PID 3136 wrote to memory of 4244 3136 msedge.exe 89 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90 PID 3136 wrote to memory of 1500 3136 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www3.bairesdev.com/go?s=vsO5OHqQt04W6LJhQZB4peQUaXqiO_cUxUJ4e-m9pw9rkmX6Q5RVrr_8NTMe3dk97_R4UOZbQ-phfLSs81TgKluJ3Xk2aKAKaJgpewGLbqSFnaxH1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb44f446f8,0x7ffb44f44708,0x7ffb44f447182⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,1413119028522995030,11559556649513951770,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,1413119028522995030,11559556649513951770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,1413119028522995030,11559556649513951770,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2600 /prefetch:82⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1413119028522995030,11559556649513951770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1413119028522995030,11559556649513951770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1413119028522995030,11559556649513951770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1413119028522995030,11559556649513951770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1413119028522995030,11559556649513951770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1413119028522995030,11559556649513951770,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1413119028522995030,11559556649513951770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1413119028522995030,11559556649513951770,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:3936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1564
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument mailto:[email protected]2⤵PID:5248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb44f446f8,0x7ffb44f44708,0x7ffb44f447183⤵PID:5348
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
Filesize
6KB
MD5f27ef798dae2bf90418eb8c0f4cc0c0f
SHA1786dfd84d81118fbef5494f8b8f918913a87ea7d
SHA2566d1a398e0d0ee1df356588bfd3bb813ea192f204572a3a3c017f0d56b8cb9ba0
SHA512517b5528230704b4f8a14772f313c88567fcbdc45e5dafe110f2c7cb01b0b001bde80b7a8aa4019f9ae7f1517868c68033389b55f4f1fdc2eba0203635727319
-
Filesize
6KB
MD556b1cda8ff7c0012d4e526a48ba1366e
SHA1f9edf8d95d6ad0863158e9165f6a5fbad38ab166
SHA256041c2c3ac8f5e05e0d00b640f18d25b0e54a891072ba1c90f329a2aabaa9b28d
SHA512ee0158176422da5da6a2f66890dd57233741d3623af8c50845054c793591c57a01c174fb99f053084a9d9ed07e32d5f84cdfdd6c44ef0fa86859331ab80de68f
-
Filesize
6KB
MD5b60d4591dc3b4453e3e0fd456b8be8c5
SHA13c45e887d908aae5ac2e695c82b33bed96133bae
SHA25639f6c7fc2183bcf5589cc931aa9993db1b5ee50e5dcfae7d491431643e92e9e9
SHA512f6efb7f3a69678e4f7dd423fbe6c9fda5bb9674d4b98c6ab757b188ceb51cbae5a18e2827e33c89510b541be221b55e8e82578d69f5685579543dd954a54639a
-
Filesize
6KB
MD5a5dc406a4e8de6027109eab2ef5cec26
SHA1e368049e980e29f749ee5a5739fb02838830797b
SHA256284c5dbd3dc1d3c45e8a2f3afb4f543b2c465f05554972bf4257d7f189c147ee
SHA5125fd1c8a83020acf98f429cf03fa73d7c785e462851f99448c45210fe186c2daa2bf16c307c2fd3f52cf14bfd40d9713c200ae69675bc5fb7c7a55e04ffc408c4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50162e22fddf8779765d1cf4872545a7f
SHA10a8da035f2cb93baddbde5338e75078526ba44fe
SHA256f78cd70006a8860a0a6f2fa09777643a89e75c3e8e3c19efb606cd5217a6f88d
SHA5122c713edb3cb949a552e7966a01586bc06909fbcf64f934e73aa7dac477f65feed5113888b6107daa06289e5a949c778af526024b8a87cf0d2aa2875eff3ea3eb
-
Filesize
11KB
MD5992727bc10211fc8e3ba4aa30857c3bb
SHA103ab0fcdb22afaad53e87185159720907d41a165
SHA25680cb819f8e0ab483c1d3c9d5f4f55591172c042d5cfab8f7c3766e243ecc73fa
SHA5123488909bd05b8e2836f13b6a07b56fe08bb2e2328fe3c7d135fabc8bbf98678853aa6f7948c61fdc0fcccc4cc49ea48b3d61e88af54408b63fd5cc318e99d228
-
Filesize
11KB
MD5749cf4c30c88546840e632d83ca51a4d
SHA13d941879e490d67ef82850df3130e11e60d26421
SHA2566d19980198b15cd23e9860c71fe7f7bff04aebdf6056e6b9a5d18fd95385ecb5
SHA5122a9dd8f7862875b3884d10e6107d9856be15444d8fd0dd07b01acd78fcddb48779daac7464813d04cf20c3d43e6377fd49e9dde86590d3ec770f22b930d7b82d