Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 07:31
Static task
static1
Behavioral task
behavioral1
Sample
01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe
Resource
win7-20230831-en
General
-
Target
01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe
-
Size
1.6MB
-
MD5
69dd34b00bb9a8b722f860715adaeb92
-
SHA1
f751650fd9c5a115394f638ab6f02fd6845deff2
-
SHA256
01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c
-
SHA512
f079c7ad594bed5f31dd1f8342442404a2fd4fb977d4d8df9997564e8afe318b66bc6dd6bdb39749a31c20a30d5f91ef169cb5af99500f60f3daed277a9341e8
-
SSDEEP
24576:Rh7uCEZRy0OhbDfBKYGpLSCKPJwxom9DxKOeGyrM63x6HkKOitJ:X7uCky5KLSbRHaDxveGyrMScHLf
Malware Config
Signatures
-
Detect ZGRat V2 1 IoCs
resource yara_rule behavioral1/memory/1488-0-0x0000000001090000-0x0000000001224000-memory.dmp family_zgrat_v2 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe Key opened \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe Key opened \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\desktop.ini 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com 29 ip-api.com -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1488 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe 1488 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe 1488 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1488 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe"C:\Users\Admin\AppData\Local\Temp\01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe"1⤵
- Accesses Microsoft Outlook profiles
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b76c3d4b160c1537dc77a0033e64bfe3
SHA1ec3082d6cbd52848ab94b4987b76b23a2b8ef581
SHA256d7b6e89094429edb4c45669c016732679d391a14af5426c70ff99a6f65d328bf
SHA5120d925ffbfcb2f8f197d83afaa3586c6736395326e109d419612476e0f11e53649df4e8af2cdd93e4fbcfb1def1c4ea9c269f7fe0f529a65787d43ca52f1fd6ce
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Clipboard.txt
Filesize56B
MD56a62b6c08be34b5cf03bdd09ab93af13
SHA14ef6885304c05dd230a65121c21f547fdaa65c50
SHA2561d3a06ca4feed11eff3b24b8fd6cfa35a904c0e7133f0a8922032e6eabb6cbb3
SHA512881199acf86264dab873160dbf1452474f744aea00393b868b2080462fba5d095e1bae70c1d8db1dc77b03a8249866d47199628cd291592464f88ded187e1774
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\EmailClients\Outlook\Outlook.txt
Filesize2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\AddInvoke.tiff
Filesize1.2MB
MD58bf2b9e16a21283cf49b7e951f546783
SHA1e28dd486f116a239342ed5a196e01863a25f5bf8
SHA2562e87c47be926ee670758393ea49c9856b74deaf4223525b94302e7cba805dc2a
SHA512834cffb5a2598d2730e0dc6739c451a3edaff8019c9df15fba8317a7e9f4aa3ac4ba28d9a146c33cac0bfa03b25285d4315670e47f5ae9bc9b5ae4fe4e6f1673
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\CompleteEnter.ADTS
Filesize316KB
MD509828678e875bde1729f21fc30ca8da5
SHA13850517b5f4b0e90e5c882a43e45828fcf3be9b8
SHA256c89166966f6feac0e908963648084094271e3102169327b541f8637468416ebe
SHA512747d7ce1eb588e0fcf1766098600824f9fc90d74b7ea098e2becb4e4ab974b302859368f597f39c12156866df91857cb75dc52ea519c7b4bdc3131efe1f64c75
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\CompressSuspend.aifc
Filesize860KB
MD550e6098ca74941d929ba26477b8b2a2c
SHA136deec566ec668d1f9152e46d13fb644fb67ce3e
SHA2565db396fe5d81a778770cb9806bafacb5fcb12a0d26e2d5244c71cd410290a78b
SHA5128fbc7733abefb3582a4fd9d28669b1a8c90fa2429cb097d055e83d4fc8282754f593f149cfbcdb8dcd0b2fd021b4e0f480140827aa893dc9ac1bd477b0f8cced
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\DenyCompress.nfo
Filesize618KB
MD5875b8cd324aeffee29a0d1a55e0b465d
SHA10acee86acc62442c1468ac6e012679e1774c35c0
SHA256620dd0131c30175bbdc428365df506867954da8e0388063c9a97abbc5ceaf47e
SHA5128a2904f8f44ad6850ac3234bc4ba79e021ac46dccbd41136bef8fddee319ed656fa2468f7fe00ce769f52dcf84c69051924983d946b8a38c948bdb4f1d8c7f79
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\DenyInstall.m1v
Filesize437KB
MD5dee7140d4843c6ba46d1143aa6c3c387
SHA10b2b24d550a7fcdd8fd95d4d33c613c55e27b66a
SHA256d8f71ca7361a4edcff65457254c9545ff4361085ddc97c1e69ab39da8899c8d5
SHA5123a7ade8cdea49d864de52ac352af9b2ed538d60c2fe3cbc1ac736f8208f8f4eb4e53914f3b7d03a81abe12e4174fdb2837672e74cf268c01309b414d2cbb5e8b
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\FindTest.mp3
Filesize769KB
MD55ee7bc0caebb6877caf5c258b1354bfa
SHA14768da99170f8e47d333ac66e9adb995f3e2cd5a
SHA25696f02ae188c657fac0fc34effb03434f5ac6194b7f16be65831ffc0491c43403
SHA512c4b9b6b02a0b9d4428f936719186b41b3b8b43cc721d8a8da61b7fca68381f8f98daf8f6304a3cccf292f53e9b0dba4d33d95a6bc9f3ca66079d68e05783814c
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\GroupExit.au3
Filesize528KB
MD524de95abae90b3a7c7e149a77b0276e8
SHA18e2baa440ad7c623c8196f378a1f57a32b121d90
SHA256e3b0816780385055a8f202665e6d7bbdb7b17e882d5d4f5cd79ba0d5cae7ad7c
SHA512b35c950b0807a1ca57a3deaae95dece5b9a12c0453970eb77abdb8b0c7b7b50b34c25ed37effd4232f3ef1386a90e66ff48e851b1a1543ba51d87670151ff021
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\MergeConvertFrom.m3u
Filesize799KB
MD539d26ba1f50e38d0a4653d81fa7af42d
SHA16810602c3df1ee33c43a8609a09af80e039a304b
SHA256664564184459cd3b5ef7b100f2c6bbd38c14b98f259eb15f547dda9f460b0806
SHA512a95c8d517ba6c9983687eed7c0167a99987b01ed07abc1a78213cdfcd3c7033d5c1811b5d974f43941f91b27a7568f7c56113a5b27712ba34cddbb777939a172
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\MergeDisable.vssm
Filesize830KB
MD5c43e45868b719e957b8311e0e84ce523
SHA1d9bbf5218953d30f621d544c19b3a917b6b0fd48
SHA25696d83b2b746d704576ef7faba14c202e4a2d568d36a0673239b668abcdb5eca4
SHA512fc3d0b8e22dc8288b1ba8f713acafceca1cdebb010f9e51c013905723066219af0002678b57747dce30c008e95f3816884c8707c78278af7075ab2245805c0f2
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\NewStart.mpg
Filesize739KB
MD539a573767d5bb8fc5bfe7c7f9cf05015
SHA1978670cf1a5d48df9fb0d6665b755c59a9d57ff6
SHA2565fe84789ceffa57c51fd0ce9faba71147030c950e9e58400d2379850c591e62a
SHA512c2116a5a828c6654474d6f3dfdb04333cb51a8a9ebc5ca561d7046ebbbcedfb83fc5fb0c0c650719bda6ddf9a3adf8e6f951c5920f19840b5256dbb39bbc5d02
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\PopCheckpoint.cfg
Filesize377KB
MD5ab6a24638950f6359f005f591865bddd
SHA10bffbbad502f60928190b021a6076abd44d956e4
SHA256f0c23126b2c3187e35a51b088392ffba065b055c6b87c5a24e3e5e31c257d602
SHA5120eeef9edcde2ec68de0913f7092561418bd14b20263fc917a48ee155ce18b2301d68079161576372b15d405253210a4533bd335301f697233d189d387ade9f92
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\RenameAdd.htm
Filesize407KB
MD5401519518e5d6a27144a2dfcec93640a
SHA1f832722eb1fb3fb92c307e21cb4cd8e9db24d02d
SHA256846c4b7a21ad865d1a67128e29610bafaf4f2b4f72e712a6bb3fd1fd653b4def
SHA5122671b0a652bcfe2db37f7203b2d1c3351686af6aace2292ed715c2e9ef98443fb356ea059c715a7890faccd7c4741387924d88ebe16935c31fb99ec29054b4a7
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\RestoreWatch.bmp
Filesize679KB
MD563d7c0b0746ffcda2ebdfa4b5c8e1d5b
SHA1ca5e4ec03001f8db35c0abf4732edcd78957c29d
SHA256ff82f474a28213e9a7ed27e232930869e9620d9e3b6490140b483bb70542b8a8
SHA512b22118f452b38895aa4a0b9e33774226ad7ec52856baf6697dd9b61fafead36e02b1b97f11707ab9d5feeeddc37daf81d0fa038e3626eb9a02d48b2f1b63becf
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\ShowUnregister.zip
Filesize648KB
MD521ced4a176b11e7f386083ee2bbd494d
SHA146c7630574f8cb546bc6026c11137f95a0ccd7ca
SHA256fa600c7876a969f4c1938368fb62d67fcc569f755aae1384b6172badd66c324f
SHA51220dc704f4548cd5c9ee8cb506e55d0530ca753ced04de25b958e3c5126946f768d87ca49baf86b33f97e7d75bdb9f2207917a95c43ac48c10c324a5a5f08ec7c
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\SkipWatch.shtml
Filesize588KB
MD5b93a941eb859a5dd10e6625f4af2bf82
SHA1d8ca4c4cf4441039de431e45b68896e6ea4f1181
SHA256b07fdd155d8eac0d6d6b79bb20fc025bb38c38997d167b8cdbfbd851978b65e9
SHA512719ef0e2c62f67d9aa30f0a438e30b492c6aac3a8ec4ae19c1a9aad2e7b2343ceedba75f50e7f7a8f63c66c6cc6932ad773d7412df9c453628cc19dc8738b619
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\StepConvertTo.mpv2
Filesize890KB
MD5fdd2311a874179764cd8cef6aef624e4
SHA149ce32674ccc8f3b583302866111d5423e898eb7
SHA256e02ac6ee05299f1b555673bdf2affcf2326b5ea3347aac9c9edea0c56385e9ec
SHA512dc93985a906597ff45d56038c0663f3340a1949161feb0048b6f2d323501822e844daf93d4281957b8f1687e7b0b2b4ab1327122d8298ea582c9c7ef250a7abd
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\TraceGet.wvx
Filesize347KB
MD509a1c4ffdcb189293c350aba868e100e
SHA1579f491c86da54b60082269c6c109e89ca64dcbb
SHA256093c5c5ba1dd908b9f23848b8a6a5b96915c9ea0fe133eae2bc0432d63b97198
SHA5129b6ae1730018d985145ccb5cee41671c066e9cac29d7d1f3c2d64c35674bc20bb5b06d4f2d5cd76b8f8660063de6a161d431e0f42f8d3f0aeb83ad40461684f2
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\UndoRemove.css
Filesize709KB
MD5e31d2007f308067acf8777d212f1da11
SHA18c860f9c26046ca5035e3a3ab58e315ab0b18292
SHA2567ecda0e63a728e9754910117a79d377a694f7a8ca49034227d5b02e0ec16256d
SHA512e8927a862be5833d8c92a812b9026092a70977cc0e5cf69293777569bdedc9f61d2d90f6ab5f019d58348313d772d57f0da7e9834725dcfe292f695f00bb2861
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\UnlockRemove.mpv2
Filesize558KB
MD55371e889fb8ab674f5be6040bb4a867b
SHA1e58123fcbe9d9d9f3303f5e3ffc0cee47e5ea646
SHA25679782e91e29733b471309082d37b209926a10359b345c9e355277b59ec3801a6
SHA5126787d30a08a2355d9f195862e7d1ce9472bade6a473a5c0a44d13871d47c277adcd9a458ad8cbeecf59527d3fd2db3fbeb89fa3a2a2757fbe30740ffe1733083
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\UpdateSplit.wax
Filesize467KB
MD5c60d31935df7478a1200b82837961908
SHA1f2166d49c3cc744a7426f8859eaa13bb72000848
SHA256d99942fbeaa1c9c5e795b0678b22a4e1ac34df991a4a349dc0741a0ea990a5ec
SHA51263fa0df2da26654a2bb7f9741a35d050937a895f928d3fee301ed4c1ce753e9903d534d3d13101841e14da3cb7cbafdcf086fb7bad15d735db7b48b37a4fb473
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Files\WriteImport.au3
Filesize498KB
MD54be9380e28d4524d2c8051117152358c
SHA1105944901850eed2ed12d73eb4ac33edca2dfe2b
SHA256b15520166bd92041881c30be2df11eb2ca5a41b3eed5286f33dbb4aca0355c10
SHA512bd95bcdbdd2dda80663c1899235a94be64f44ef8289b481df4c392144c7639b88ef2b0d59d69aa26b75bbfea8589d24c1dd7589a9c9bc2083d9b4bb948c8ed0d
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Info.txt
Filesize373B
MD51249f1f623304472584e115da9b96e8c
SHA101de6ab43291c069452008e4e13c1fcf87b88b60
SHA25602b8cd8a5ae23d2818e9b612d497adac62d26bd4df26dd307586130c1390e68b
SHA512cc4af2ae536058c3fa153bea5c3825d060d38bcc3a2bb10690212bb57985f146808db71e7fc91045b5915d95bc252d4b4dfaa4384c921fa887aa5661c0b78b7e
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Processes.txt
Filesize283B
MD53edab761054b782f4654bc0a621cb1d2
SHA10ee22ec91cd4fc28eba4b87969d2fa0ad0578673
SHA256c9e8676601e2fdd33cf4bd6300362829883e969886d3b703a75024471b3580ff
SHA512d5fc025c7db6ad976cb800ffad72fc0b863e87cc01e345a4c2fb6e22342313ca72e542df7dd4f014f09573d2081b4bad5a38f502490d6b8df3c10a8b732637b5
-
C:\Users\Admin\AppData\Roaming\FDJPTHLXLTBZLTwNVPRJZZJ078BFBFF000306D2C8E3CE5833\18078BFBFF000306D2C8E3CE58JZ\Programms.txt
Filesize893B
MD54c0873f2172f682a32a885673460ad14
SHA1122867f604535bc98a90bd9b12290863b66e79c3
SHA256bd34455f68b6fe235a4bc2447b3f18fed09456063e85dfded9161c17735ce06d
SHA51292fb9da4a34c9c95ba77b8f462c401f48008e2ccb59c1acfa01ade725e23c9b16259ac12d03394ed41232600df6b31d466b10f5f040fe73397dec8a724510495