Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
earths-deadliest-computer-virus-mydoom.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
earths-deadliest-computer-virus-mydoom.html
Resource
win10v2004-20240426-en
General
-
Target
earths-deadliest-computer-virus-mydoom.html
-
Size
181KB
-
MD5
d6a049c265c70f89c17856ee2fead90c
-
SHA1
92cd8cc0ec6f32c27fb93e37b1a19c107813cba4
-
SHA256
6690321f81485fe8496c4cf967407f3772f9531fcdcb8b8ff6fce828062e4bdd
-
SHA512
3a26e522c2b3a0e2dd8694d926d364c2a4cabbfb595f7420899de703b82339490733749fd69b0f276f927fb7ea3874865bd47adfa4254ae7a716210f9e647328
-
SSDEEP
1536:8SeWDaVNCHxYfiV4bRCSR4DLllPnW7y30vD932/s4DOjhZ+kDVRMDyWx0ZA:8Sew2fPR1qllPDbAjCkD+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2764 msedge.exe 2764 msedge.exe 3496 msedge.exe 3496 msedge.exe 928 identity_helper.exe 928 identity_helper.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3496 wrote to memory of 564 3496 msedge.exe 80 PID 3496 wrote to memory of 564 3496 msedge.exe 80 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 1480 3496 msedge.exe 81 PID 3496 wrote to memory of 2764 3496 msedge.exe 82 PID 3496 wrote to memory of 2764 3496 msedge.exe 82 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83 PID 3496 wrote to memory of 2372 3496 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\earths-deadliest-computer-virus-mydoom.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeec7246f8,0x7ffeec724708,0x7ffeec7247182⤵PID:564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14040359698319066056,14993222493626864652,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,14040359698319066056,14993222493626864652,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,14040359698319066056,14993222493626864652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14040359698319066056,14993222493626864652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14040359698319066056,14993222493626864652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14040359698319066056,14993222493626864652,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14040359698319066056,14993222493626864652,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14040359698319066056,14993222493626864652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14040359698319066056,14993222493626864652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14040359698319066056,14993222493626864652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3632 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14040359698319066056,14993222493626864652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14040359698319066056,14993222493626864652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14040359698319066056,14993222493626864652,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14040359698319066056,14993222493626864652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14040359698319066056,14993222493626864652,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14040359698319066056,14993222493626864652,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\854cdd93-f1e8-4ab3-b154-ba810d12b5f5.tmp
Filesize6KB
MD5929cc38dd18767d1611ed6e9c4127152
SHA10464c96f87f1085c026a7888c83de460874ee313
SHA25643bb97d8b2a08ec5f3b41e273bef90824f33aaf84e42db06aa9bc6f61b7d6b94
SHA51220aef4eb22d6b7ba9ce292be86469b263262bfa066a0194c692bcf656a270da0614ca966b6ba530c1f0a0fd7ea596a7aa0dd39ab799ddf77a71c1327a03c49df
-
Filesize
257B
MD510e24b03bd076b929676baceb3cecfc5
SHA1a123133dd7468182763eaab250e19fee6672df6f
SHA25688f006339450ab6ab671dddde2225fa6bc9355cb264d8a1b5ea483cf04f29efa
SHA51256d9da79ae3dbf01f7d607c7da1c7a480aff711d68e33c3a8093130d31df784df64b34ee0fdc7591ef4ca962f9b27a8548307c51b8a59b70520fb4b344c27ce1
-
Filesize
6KB
MD5c5d60b033d1bb7445d2292eda8e19dce
SHA15530c9a6d1419ddde191233816d959d92c5e65ec
SHA256e3db1066d1224cbb91ed18bbd767b08a8f12e759fe966afcc9e92064c55a2873
SHA5128677909198c5218abd70c3928b2f1d19dfa1ecd1e8c4046b27b76536172271f676c058f1afc65db5a10a7c04dd5d783d0f3d25f7745729a9295c9bc063d2831c
-
Filesize
5KB
MD55a5505c795a24da8718a1d9128c2f3a9
SHA11f545fa91309d32f5c5af92925986c7c14bf40d2
SHA256824c24b0c996c8cf80b70595ec3a8afa611e7287417c151e3251895f7ddbaa6f
SHA51276a5d0d8ad225683ad2259d635e29d5ff55c45b0b9ea26608b22ef2497fa1a93ab67d9a93c331604f0c955c70907841540ed3f256dfbff3afa1dfc21d4f3d696
-
Filesize
6KB
MD5d00f5245cfb68d8d8fe44d95aacda828
SHA108a801f328cc1b865f7ac63cf295137388e96810
SHA25693ecb80b25d57683cee6fa5ab32b962b1d1e9e262cad137f786e8fa83f0975b5
SHA51239b73cbe474a59e69d486af4d3e6581ba5476661cf132036b507c10677e6d1ef5af256bf69372d5aa3f865657ac7a448a298363e750a374e0880009f7799be2c
-
Filesize
6KB
MD5657166f2b9959dfc3132a8e9f02e4818
SHA187095ce7079719a9ec16c81f82ff3370755f385f
SHA2561ef50420c0b1ca90d68a52ec8a0fd0829be7d3b9573dfb3bd87bb84a59092567
SHA512ee768d4f56f5be6e40d983b0a4f37265fd9f8e399e99ddf1fe7e1dd5cc37bc4bf3176e96051b3cc690c2cd1e3c42b838b9d95c12ea6da5ca00b82dea839d93fb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50eaa97cd3ebc5a186e08229b05e35900
SHA1de2f494dea5ef580c3ab11d8165bc936cf380fe5
SHA25631ae012d511d8a12a5b7412c1f7a90942e667cfcde96adc8151bccf3afa9b9b8
SHA512ea81dd7cbba9eb8663ba7ca4c5767ae55be7ca2b6721be03c5cb4cef265bfaf1b3621c26ed2da6b0ff7ab83273fe52d13a4c83fe0b2e416826c976bafcd1504e