Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
libdirect3d_plugin.dll.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
libdirect3d_plugin.dll.html
Resource
win10v2004-20240412-en
General
-
Target
libdirect3d_plugin.dll.html
-
Size
7KB
-
MD5
f84068e81d88f39612bed3f98d2e2839
-
SHA1
e0d39f527ca2e251e563c125d6261ee855cd2a9e
-
SHA256
ea1f97f50c13f24a9f7b38a3f4301c1eaf3ae1da404c2053cd05a7e4044bca73
-
SHA512
af0c5742b0d71ca6f229dfdb00d09daa8ce850d29cdaeff3e6d4a0955e6a0bb32bd8cf83827cff489fae3be6cdc1ad0798a3eb6d03e23f2728ce1f92cf8a596f
-
SSDEEP
192:ZrvTPMcMHyx16vVv/Pv/dlv/qvC4v0mXHP5BxSnv/FvST/lo3f6vv1v/9vLfvMvG:ZnPMcMHyx1S/dthmXHP5BxSnYT/2SGsN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7A9D5DC1-FD18-11EE-8B6F-CA05972DBE1D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d084464f2591da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000049b5d5ecbe556893fa29fc9c3694343cdb30db274c558125ba63d1f5f69c3032000000000e80000000020000200000004803d17864a81af29a961530ceb63953dc70dc943cff44caf9a09a93933d51a290000000666c37ab3677b38643c94d2442a0f1ef46f30b8110a9d9bf1604f462879d61abce4a3f41b36f702752dd027578e15a0a9167cb27fb5cdde1ba1e84d5a8b58734470f5697a38a42859588fbbf496e464a2f554477c1e56bac0819d9868846903a18f213a4c9656b474651b64f1e2a3b0f4544b8c0feea3f3b5f57e1e3b75db28bf6c61b4ca7cf97c49831facfa341f597400000003d7395833a4259a0e5d81512975847f547757be0d5a1bd89949555d26a90aacc8c68efe31787cf0ce629b79fbec343ee439ff483d6df3e4bb0800ad63804bee8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000626ba0ef0a751f74ed6803a8a9f5668029e510e55baf7980259728c7e8a0538b000000000e8000000002000020000000ebf3b033f93311e68c2f9fa2d5d2fdc1a0d76bf50118497be05067b46ee9ec522000000033b2d42d1ee809de5fc91603cd758e210f6b14e90f88db1e3934e4bec8621c53400000004449c1cfe78aa7e3c4bf398ebb2283769ef9a1e69aa368b83ae282b87a9bd2ed5e1024d89cb074b9802fd8561ca2b08d837446ef85fcb7ab1aea0bbae69825ef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419561075" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2132 1728 iexplore.exe 28 PID 1728 wrote to memory of 2132 1728 iexplore.exe 28 PID 1728 wrote to memory of 2132 1728 iexplore.exe 28 PID 1728 wrote to memory of 2132 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libdirect3d_plugin.dll.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad142e48ad105e9617aa059f08be05d9
SHA175315b6e7a9c488e60f6062b3078e6ef79c58879
SHA256f73bd3a25665a41fe4ee92c5492df6dbd7a308799148d5b42180715d3a1eaaa0
SHA512990f8ba7bb36431d8c8df5dbf69f4babf547240f732c2eb6cdc01fe89f0d4038bd58f6b159c3cc793762021f481bec6fa644e491c8ac5fb09dc4122c40ca6c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e1beb94112e68acb9a310265c68407c
SHA17beced0e73d2109eafe37a93a8baa2378c356530
SHA256f960bc7933c07f770270734f79e0bb2c2dfdc98ed06fd74b6986b49a692879aa
SHA5127245f0466badb09970ce62c806c81697f8d18b91bd79f2ff490ac3341e1c33ffc5fa4176ed7e3200db0103dab2dbeba9ce5388262832512afc2035b38570f3f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a1b934ff410ae90cec01e98bfb75043
SHA137868408712ea54c0446a065e4e9185f30aa107f
SHA2563361a1db5a0339dd90307375c2741acfd2b16e218dd7bf7eccc3df29d069c3c6
SHA512290d3359ee9dc8bee8ceca803b88076047a31bdd363a1080d7f041916638c99edf60f07816098eff852c88d2a2e433c823244b4200f579add6b5d6f3225c4d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b236c8fd506baf9f633e8228aabef7f
SHA17fb01458fd0f3d8383b8636c15489456e9dc97ba
SHA256781e4d55cdc4a54cb0d0a016c699b394bbe057308768914bdfe642e9ef9143dd
SHA512b0da4f8eb401ecda3fb18294d28d19625a1e425d7c850727227fd4a597cf34708cfe77c3baea7b834c7b111a506b818c77c43fabd1e0936f6467cfdcefe28406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5913262261cc56d167893e8bb739cdb91
SHA1b7e0818ff15625ccc7f29a5eb8bcb8f1fbf463ec
SHA256ef9aa77534b84aa9ef94faf897edf659531b003628358208370c0bd3fa0bd4e9
SHA512603ded7b56123483988b2162586fe9d67c67141383920dc27743d3e29ab6acfea3a2773580bb2d27603fd0dcb3e6f2a47854b3590833cf927ee3fa9a0bc862c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b89dcb9b539a59beddd1b76a8a587339
SHA13bdbc5dcaaeb7bbd7a501f73d18da992389f6154
SHA256d613235fba0382fe8272766259ef534d9b5d0e2e466ab49f996bc28eb81ce7b1
SHA51284541fa632ab886f5ba51ecf5f01c4972c12bf8c604523b96a1d2b57136492e9ffc1bb3e1db1ce4ae1a60d6cf12946f45fed73512563dba395724ab24d30d630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5061d1cd960c11ca2c2334874bc06fd1e
SHA1935d1300b09d39a0e9143888dba960d835969055
SHA256a6bc8387875d2bcf2ee62d046d0a1f1138372ac8e759ef649f8d3139e8f43455
SHA51262c1761ad16563ed78f504f18fbf863fee798f1f99948f37f9231760ecd1c7f38b2fd920c5bed829c6e2950e6b646b8faaea909f67287ae5d62284074181044b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528baf1e6b6f5289b66e6bd925f722543
SHA1cc6b67fa12791545daa9f7a7dc7902919529fbce
SHA2567576c29d13567718551f522a4bcdc5307ab27c81561c2adde599f8631f0a6ec9
SHA51216a5e4c34d26512caac4520a2f65e3a0772e644815fd11bb66ac958ee6987cf465d260ad910abb44c7a69322bd61f975e73c748466e931e2d07853eb2be57372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521c341e931b5c36a7699b43dd6eac480
SHA1143c2825e3a6e39922c610d6e71b89a6c50a739c
SHA2565735f84292dcbcffa33c09dc634442e9c6584e57c00f4a746482fe3f0ba3a411
SHA5121547b251f1c5c43d1cb5937e0ffa7225d4954175b8fa7ac08b3c85ba0db1210b9f2b905d128e8038cebade52406d033cb9d69b79179c9ddd70594edf8ef4222c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fb58779f26070b67f95f88c69a047a0
SHA1286f993aa167757968e8632bb9466d55ccdf80f1
SHA256412dd0f31cbb410ac2223f280761af2ddb998076ff0b522e989f885f52b71b24
SHA5128a03924922dcf9c3a16485bf6fefa44b341d5fbd691fbbb15d51bd1dc3c7a5ae0968330e3388ab21c67a37e8b218d7d6e13c26a61224082735a99e3e588ec631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5791291fbca640af41e96592c2db09b
SHA1c01c86e0713aa25e3ace4ace2740cb7e3ebb18b0
SHA2569669850260de95e4edeb1c2c9faac94187251083ff74a38f5520502239d74985
SHA512c1c5be820495074d5c8a1f788bb888a7af5a6e0122fc3974994a424dec107524fdb59a3019adc1f3d1c33872213e341b098625920d638ffdc0c8821cf3a5e296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534ffdbf02f2d46b204e65432052b750d
SHA12160f9a07c6b559a7af3d4c7244c81b09c3f3657
SHA256a5b56c624dadf80a2762de0832c98035922ea805fbc20c1f9251de6b87fe7fa5
SHA512f91623748baae824c2e5840c23ccad4083c8d81a8bf1687e6ec2c47c3d707016fcee92134716e2112cce893b32bca6164f05fe8f35d470258943ea69e36fb3b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58985deb9e3f3d84a332d25e680ced6bb
SHA1389516bf60e70e4dc4b5b3f6e1df4a5d988c09b5
SHA256a21686469f270703779b46a968a1c890d89e96599c61fc22c034bc29b4bafdcb
SHA512c2a44028555362d55a3a07ba6bd17d59a05195f2940939ce2df2008785b182859b8e2cd8eb621a4a20774ba1a7b1ef390f94b5cbe5c7bebd19ff2dae508078ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568e4cdab93c6d1d48c33fce75fe3c71b
SHA13a6259d1fbadc1cbf676ed0b297381718c1ab197
SHA256657f726ca0a1b9e542a54803e6bdd9d80b09fca02888dc2b94245ceff42e176a
SHA5121bdf91dfff406deab1e4b66e2245b9b0a1fe724df52b75799bc617e69772366c8dd00793ab1528bcfd898adc2f50572e218db20b85451e92634ee39d72a75290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501dc06ec14e84f1640004c48e388f542
SHA1be828ad5130f13bca9bfaa348889f76ae549cbc7
SHA25633e1dcc8c4e76780e5c9cba4522ae6d5c8c669d20e45e8e50cdb0b6b473ed725
SHA512fcca2007b694748410a958a7583efa2e4ed681f3a4278f75a13c301f00b1f2f6196fc1540abaf99cf729d649a596e0c0138c73d50639e9c023fadb13167fb6b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511cf3e51576ebec56c546c342f740e3c
SHA17d06e3d69a0c3a3e23a9510cc44b5d70901c19f3
SHA256304da8f319178c4aaf5bae8d13d83fb9d6c6ce7bfba74772ebf8e2283a929910
SHA5127f0a6b332a6da0f25dddb63a64277b5ff53f0cffe714d7dddd2b9a5b9f71e7894ad8b83b1d54027fa77987daba88ac3a97078daa530ec262503a3f0bd44e9904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5534256a5a683862720a6bc955c482e65
SHA12dd84f796184374e4dcbfb48977e9239464b981d
SHA2563397e8ddc30f3c1ae7ea8b5b84e8e3e3b1adf8b6a4aeff74647e7e726c669ca8
SHA512901792d080f50a7d63fc76ed358f05032138946281aee83fbf954b31965fa03cfdd38b3bd564807d7a76fe984f1bf348051c229d625cbce2ca9756572b4d8e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d59cd13eac20eb30a0e8b7b056cd6611
SHA16f29e21492f371c66c77f52ab32135486f369c3e
SHA256037b8332a2ef23a63cc4f61082caaec7076259276d1b8269529e6e14bb2eaf18
SHA5129d74fc9bc45f837192f26c748c366f3115f9cb48524a09097a6651f0ac4f0caaf9d723d752c3c91761d696638a6725b830e754ef7aa679db40d989f997bfb1a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f5c0a15074a1fa43cff7d9bcaa03b6b
SHA116dafcb22b0318e0bff0a43bf78bbd2e9fb26a31
SHA2560c087276803ebc8ddcb08142f679f41a04b6d88ae216c82edeee2839e5bf8d88
SHA512253c3ef75ee62a4951c92119f6e91f87b54bc08b2075735bd915a5b1a3223762423a037f4c611ce48e160b1fb7575f850b3e0df27db7592e6a3b7754fb454ebf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a