Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe
Resource
win7-20240215-en
General
-
Target
c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe
-
Size
50KB
-
MD5
7a5b7ffa724719d0192866634464c040
-
SHA1
fa0a62aa6282576858285ee5396b16bd807c719b
-
SHA256
c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e
-
SHA512
3759b3f41f997a1f0a5d90adf1404c6f4af45e5d6cead213633661d9e6a6c6e657ec949d3f821d87c132e9136f0eb6c8633314b72686ac3796cbf1624843af0c
-
SSDEEP
768:PLpnGnElOIEvzMXqtwp/lttaL7HP4wIncLRdR5kP78a0RJW/a9IOOlT+P9zLLpKE:PhUaYzMXqtGNttyUn01Q78a4RCoH3WW
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Deletes itself 1 IoCs
pid Process 2532 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2780 Logo1_.exe 2356 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe -
Loads dropped DLL 1 IoCs
pid Process 2532 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Full\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\3082\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Temp\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe File created C:\Windows\Logo1_.exe c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe 2780 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2904 wrote to memory of 856 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 28 PID 2904 wrote to memory of 856 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 28 PID 2904 wrote to memory of 856 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 28 PID 2904 wrote to memory of 856 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 28 PID 856 wrote to memory of 2760 856 net.exe 30 PID 856 wrote to memory of 2760 856 net.exe 30 PID 856 wrote to memory of 2760 856 net.exe 30 PID 856 wrote to memory of 2760 856 net.exe 30 PID 2904 wrote to memory of 2532 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 31 PID 2904 wrote to memory of 2532 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 31 PID 2904 wrote to memory of 2532 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 31 PID 2904 wrote to memory of 2532 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 31 PID 2904 wrote to memory of 2780 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 33 PID 2904 wrote to memory of 2780 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 33 PID 2904 wrote to memory of 2780 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 33 PID 2904 wrote to memory of 2780 2904 c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe 33 PID 2780 wrote to memory of 2948 2780 Logo1_.exe 34 PID 2780 wrote to memory of 2948 2780 Logo1_.exe 34 PID 2780 wrote to memory of 2948 2780 Logo1_.exe 34 PID 2780 wrote to memory of 2948 2780 Logo1_.exe 34 PID 2948 wrote to memory of 2640 2948 net.exe 36 PID 2948 wrote to memory of 2640 2948 net.exe 36 PID 2948 wrote to memory of 2640 2948 net.exe 36 PID 2948 wrote to memory of 2640 2948 net.exe 36 PID 2532 wrote to memory of 2356 2532 cmd.exe 37 PID 2532 wrote to memory of 2356 2532 cmd.exe 37 PID 2532 wrote to memory of 2356 2532 cmd.exe 37 PID 2532 wrote to memory of 2356 2532 cmd.exe 37 PID 2780 wrote to memory of 2500 2780 Logo1_.exe 38 PID 2780 wrote to memory of 2500 2780 Logo1_.exe 38 PID 2780 wrote to memory of 2500 2780 Logo1_.exe 38 PID 2780 wrote to memory of 2500 2780 Logo1_.exe 38 PID 2500 wrote to memory of 2380 2500 net.exe 40 PID 2500 wrote to memory of 2380 2500 net.exe 40 PID 2500 wrote to memory of 2380 2500 net.exe 40 PID 2500 wrote to memory of 2380 2500 net.exe 40 PID 2780 wrote to memory of 1140 2780 Logo1_.exe 20 PID 2780 wrote to memory of 1140 2780 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe"C:\Users\Admin\AppData\Local\Temp\c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1D70.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe"C:\Users\Admin\AppData\Local\Temp\c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe"4⤵
- Executes dropped EXE
PID:2356
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2640
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2380
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5ebb1acf3749aab2799316e438dfdbdf4
SHA1704fe023ab74891eeff0ba9779303aff0b0da5aa
SHA2562f7d16cda5245419705eeff7f92014c5d80e91d8a2d04beff74d79f832f7e77f
SHA512ff93751e380f95501d316a68f459a42e116d3ca10a1d609f4f48ca679e5b9c820021ab2c1869a8d13c5a47a291a3f81e6e22966f41ed55f0f4d64a65902bacb4
-
Filesize
478KB
MD5db30f5e16c744915af12c09f1ccf3e41
SHA1d5feb47e0ca1c47b0a4cfc90be501e97f613ce90
SHA256cfc87b2273f90e5125ca09d4fed15c56a82dabc54e418301f8ce23476201950e
SHA512ff466c60abd62f72cbe687d48fcc485855e0df65599da37112d3872324176bf68428c312d8fbfaf20deba2295b2c7fc51129436a73ba8bdc58836289f6a47f6b
-
Filesize
722B
MD5b67ca361f8f6116cbbf3363b1c3f1bd0
SHA18211374e981e51de5b47411f28bc4f6687472beb
SHA2561982b90a7e0c94b87809a95855a3d3d9f50f5ee4f07bed5dadf92fb8df40e607
SHA5127a1be6163a7fdb7c7c8c4c2f19e3f2d4f6f4e01cd28ba181aa2fba3fbd40886fca47acdbd6a6c3ca5f5ccb65e8c8519fa4553f5c707311c883006e2475e3d740
-
C:\Users\Admin\AppData\Local\Temp\c077728a0c290ba8f96b81ea0d915cd5d77d89990435d332747dbd67d2aa5f6e.exe.exe
Filesize16KB
MD55587c5663414e345518f8b6dac344877
SHA1882f53d66d9fa78340a9b8d892fd3216ff6ab99d
SHA256cc1f45cb2173797fcc43c4193c27547a55cc3469e65f4f8189db311c8ef08e9c
SHA5123e6ad3830362433143485261c8673cc7daa41a9cab81a8e7ed9b67a687b688ec4c36eaefd46ecb796e69f6c148933ae51a78190865a3f2f631f4254c7d3f4c73
-
Filesize
33KB
MD5b889976a7791068af99766aca8f357d8
SHA1146247c065098fb7f98f6cc1094825486b77d65c
SHA2562d86f486401387ff3dcf30a8ffca900063a26c269b2e44bc1b925cbfafc30e92
SHA512bad98a62f1e63adf7fef79f14ea027179ad4255a862f30114918046d14c89256cd2f5dcc3044941ecde471d9ede8d18a4ee040ca300cd1a9b9243aabbeee9558
-
Filesize
832B
MD57e3a0edd0c6cd8316f4b6c159d5167a1
SHA1753428b4736ffb2c9e3eb50f89255b212768c55a
SHA2561965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA5129c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f
-
Filesize
9B
MD5e850d9ceb7ebcc619d731dc2f1377b2b
SHA1a45553c9057075c02e28f90d5e8ea57a0dddbacc
SHA256b682a6e85069777ca22f84b99607acd09640eaa80029d74363c0a5aabddead4c
SHA512be92bd8393d0fe69559ec55e1068fcd77ccc699361a9cb98d467bd51a029c371852b7a1196ad53fa8865e956582e6a4d35f6ac6fea3832058b7a427133b0048c