Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 07:34
Static task
static1
Behavioral task
behavioral1
Sample
01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe
Resource
win7-20230831-en
General
-
Target
01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe
-
Size
1.6MB
-
MD5
69dd34b00bb9a8b722f860715adaeb92
-
SHA1
f751650fd9c5a115394f638ab6f02fd6845deff2
-
SHA256
01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c
-
SHA512
f079c7ad594bed5f31dd1f8342442404a2fd4fb977d4d8df9997564e8afe318b66bc6dd6bdb39749a31c20a30d5f91ef169cb5af99500f60f3daed277a9341e8
-
SSDEEP
24576:Rh7uCEZRy0OhbDfBKYGpLSCKPJwxom9DxKOeGyrM63x6HkKOitJ:X7uCky5KLSbRHaDxveGyrMScHLf
Malware Config
Signatures
-
Detect ZGRat V2 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2024-0-0x0000000000870000-0x0000000000A04000-memory.dmp family_zgrat_v2 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
Processes:
01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exedescription ioc Process File created C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\desktop.ini 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 ip-api.com 33 ip-api.com 71 ip-api.com 4 ip-api.com -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exepid Process 2024 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe 2024 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe 2024 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exedescription pid Process Token: SeDebugPrivilege 2024 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe -
outlook_office_path 1 IoCs
Processes:
01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe -
outlook_win_path 1 IoCs
Processes:
01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe"C:\Users\Admin\AppData\Local\Temp\01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe"1⤵
- Accesses Microsoft Outlook profiles
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5a0230d1f8d2f8343d96fd95aa797e931
SHA1549eca974fed946bc5a6a31960f3685f9ea53e32
SHA256aedbf792ea8af7f94d3b2b2df88375f32077dae327ff8adf00714f6bed0f615a
SHA51284f4595df8934f39b5728a25b073ea77b410d08130df08ccdef98fc04754884600441b6ef84afde1fa9740bde5ca98f617a8a4f24ca7d4c073ac4d70e737b5c6
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Clipboard.txt
Filesize56B
MD56a62b6c08be34b5cf03bdd09ab93af13
SHA14ef6885304c05dd230a65121c21f547fdaa65c50
SHA2561d3a06ca4feed11eff3b24b8fd6cfa35a904c0e7133f0a8922032e6eabb6cbb3
SHA512881199acf86264dab873160dbf1452474f744aea00393b868b2080462fba5d095e1bae70c1d8db1dc77b03a8249866d47199628cd291592464f88ded187e1774
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\EmailClients\Outlook\Outlook.txt
Filesize2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\BackupSkip.txt
Filesize476KB
MD571254ac93cb8967bbbf9bb1b7c97e8f8
SHA106aef2ebebd8b52f8531d644efc2f92461dafc70
SHA256c6ce8be7cc108b45629ff1f61a579e15ed97e7c1823cd06d91ce25559804d6f9
SHA512f36bd271f035c529b6edc780e56857ca983cf9de6e209a6d6399b7d61311749a4a00f8d822855db5a99107bbaa4107ea1642ca85754e028cc3d22eee86784a72
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\BlockDebug.ocx
Filesize359KB
MD5faff5b493e4a9fe866ab080695f9cd9d
SHA13657a1a19f0ed0deaabcbd2b29cfef8be6e77bf5
SHA2560385be8128837d332ca7db3a8c1c722bb1b7e9261399f396830ffbec74afaa16
SHA512468c286687d8b3e65a68e623e34d1bf85f64790bef279d1373f73bf1d380936d33d9f8e0a149c75f99c1653cec3a5d191d2641ede07e0ec2d9e613107db73039
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\CheckpointConvert.vssx
Filesize592KB
MD57cc50a39a6113805dc071a6826a2a1b5
SHA18af562de31dad2102157299544f7e89b79e0d162
SHA2566db3f574a31fdf20a29eb8b12983b6aba2baffd963c3090f5e0df9b4e02dfc0f
SHA512c3d8b985028ac6dbbc08d01dda5f75afe710a346e080c3dc4b3b8cff4e25afeed102f4598206935ebfeb8a6e3052b37f065ef7316ee4d0af6a6c9de69db30098
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\CompressSuspend.xlt
Filesize406KB
MD5f021615afa1e0d25921f8e8951fca18e
SHA1cb7b2041944886fbf1632a068af8669ee34fc690
SHA2560197c64198cdffa4887f449c8a2e3473795b9d1905e01dc864d583d01ae2f45b
SHA512779530d3c5ef3a3e26143c1d7d058104f88a6689d4469466693f86bf2a77cf31804064190237778d5745d79c1524f7e18104fe3f7f8b2fa62f7cd1fd1dcadaaa
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\ExpandHide.pot
Filesize429KB
MD55adcb9a18e812d1a8fd020eb4c568f28
SHA1dba1e2f44dd7f65b91ad3ef98127770b63010815
SHA2567a114dd37677350966e3a9cf54c931ed6419ed3fd31d163724f2508df4963495
SHA5127f1c1a6dc630d9d47249baf4325c03a611ba074da2b695d461270913475c4912dc667932c33a7da82f2d9152704be5fccc057fe4ca64eb4d3e8d9644a8752d7a
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\FormatExpand.odt
Filesize952KB
MD5e8ec462debd20b445f145b4d880f2b53
SHA13f8f820525f305f33f451c60fbbcf09a9ebe1ec1
SHA256682b20ab3ef9e8f22b9114b790baa6485251c6bf62577a2fd28ed007edc16653
SHA5126eebd8f0c2f52580f4db0ebbb5b59f09d62e87673d1cfea23515bb18f80e543fba901e6f1215a26a62d21511afc18d6f21fb69db62fadce1d6a0b6e2a101743b
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\FormatSwitch.exe
Filesize313KB
MD5bdda53bcafe0aa66c184535f25280fc0
SHA143ca81611f6e3c259df2253519e3eb55523f8953
SHA256b319cd0edfeedbe41aec28527bee47c6bd09df741b01981c059d4349449ef67f
SHA512bcf50170157fa136dd204c704d3f28ca595a0fc82b99c173456338a8d910a6053ced76146f96d773b709cb32c3acd494ad538cc147528b39a473ba3efad74ce9
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\InstallCopy.docx
Filesize545KB
MD5045ca58030b27710456029c44073b72a
SHA14f10d6000713dd58568f48ab64b6f8206f04331d
SHA2563f89a11bd648b801e8263da1b1ab2e64b9eec8348a20b0fd2a56b33138c7c16f
SHA5121e54629b31246fa7c71c003476cc2c8109b03d2dd544c72e0dcef658cace129df4af3d8d0b0349283488dcf17fe8a5acc4820af1a81cf996fbd43e3a96d85799
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\OpenPublish.mp4
Filesize522KB
MD52a0157dd3a44c125c0a268b651616854
SHA1c1fc57db7a4688a0e768995c45dd13fbe0f3cf89
SHA2560a6645765a5d89f4dd9fda3fb2e6baae7ff9a25e3b1b3522b2aa19c92b0f0681
SHA512ad77366af2653e9b5fba1a2f9ea30de19bf8730d4f1ae939e41dd61a73ff535e1641fb6ea332ccb67d0bf33f4ba6261e6fa094c33ba08afc24c6a01e0fd2eb15
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\PublishUnlock.mp4v
Filesize452KB
MD55c4474a7fb597d6023bc8a888fb107a6
SHA16e3282eb897fa54f22d792b7b863974f112fade9
SHA256508e00d4e029b7ad2d24265a9143ee6efaca3bbdf0f2991575984bf185a0d785
SHA51254f7c8ebf5ccd96fa37aae306278aa4d30df133feb54041330d1a342a7155d67270171d64fbb1f022eb281844b283c01f12b18fdfc2204254e93aaf8ddd86e1d
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\RemoveRename.wdp
Filesize290KB
MD5b90db4f6d1a4ee435cb1ea376aab45f2
SHA1bdda7c2c505835715e23ce4488f255cff63fecf2
SHA256662572a1e70e5f89f06015c047dcde03f3aef2d637d2af07ddb8eddc827cd990
SHA512478fda29245c441556f3c270f0c175b82f6d38a972b1cc16b29e7dc5001b75417b11f8ea898ded4a164ca2cd280beb95086487812345e28f771a3bcdf7a8b2bd
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\RenameSplit.html
Filesize243KB
MD535cd451a4d7797a15dc59b67fe6e754f
SHA11efcbabc95347000a492932f7d70cf8e44e6322b
SHA256d948ce566d10fbaf3e2738dd1484001c6af4886ab5151b385b68dc6ded1f7d19
SHA512407f5afb1e3afcfc4f121712f8a13a14ef82b06add76a514145d43d4851cdb995070142cd2c1b0bb7d8a7f8e368bcc6e753d71cc1a079a3b2b5bab2d2ac97795
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\RevokeLimit.tiff
Filesize336KB
MD56dd9570b3891c7e471e4d554c44bf895
SHA19507e0c675048f5c76a69a47542ef62f02fca229
SHA25651c8133f678cd823848bfaa9d255bcbdc2e6b509deb83597251eab3a060c1258
SHA5123c9efa33e14c9fb2165a293fee629fd6c577eb5aef35284925de3b3f73c7ac2fcd7d5cfc84f44618e5490c99cd9972c41cbba3d33a930732e3cccca4d584ce81
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\SearchAdd.lock
Filesize615KB
MD525254acb5e6f61d62cc839220cbcb2bd
SHA1a19114a69f0896f003172de4baddb34ae900d4ce
SHA256435371bf45e7fcdc694fd53b78ee6a48d0b80c917bee05f1ec340f1d924d66e6
SHA512250d27e317d102d0b6cd96cd5c5dc1d24c4cd668cc3d5656991a2a90a202fe1c2c7e705952ddb3d9454eaca7850d2786dd90848ffa0011f4016715c839be1d85
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\SendUnblock.wmv
Filesize638KB
MD5243b70e6e5ba37c3afee7ee17823d3dd
SHA19880fb8c53cb25b5aed32a54155b545d4e556c92
SHA256105aeb4a39d5e1bca6dd905edd14fe3d28086cb7005fda6f90d293bcfe28411f
SHA5124555a15bf63af787ca81af940133d168c8934b602e859b999c8780ad337d30043c37f7832baf12255187728f2973436991e459c7a68037555ebe2db81ccb0aec
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\SplitDebug.dll
Filesize267KB
MD50331a95814d66570e8c5d3d327c9298c
SHA1803409a0ae664612dc0227045fb769f8af0c08da
SHA2561d24886b5d31aacb748c82ee2dd63002b9914ca4ab6b91d9e59c3ac792c54c2a
SHA5129fd1328d05f87aba58fe7537ee25a25afb8a37d6f52c6f3ae04d8b9cb91f8b8a0d3aec87050e47a4e4a47ab90b211a9e60b84b2131d95096cac565c7f8ee227a
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\SwitchFind.bmp
Filesize499KB
MD56831656191bff4734e708331ca1be641
SHA1121cb09cb552b7fd78d930ce74e80faca66adee4
SHA256e5a3cb92164aac6de63e9c6567790b7255df6948c398d65932dd6cb6f4076c1f
SHA512eeca9ce53a92b9d1e48c7448c4e4b1229f7ced874b610b03ac0ed8a4593cef2abeec5eb9b5a9c320c274154a3318b74fa402b931de9d909ed167194c59e1c034
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\UndoReset.pptm
Filesize684KB
MD5823094f447f758c2bc588cda26655533
SHA1826640217aa7423281c769135a683e7ff933d7e3
SHA25675d9d4ec8cc5addf1884bf7d668f8464b27d342a264d2ef80739bc578b30bba8
SHA5127557a0478d5fa3dbfa4db4d31de803a5aff15ec5fe1e92932706a987c737110426821ee36ab1f15617f92033134dffa42e55c3b37e6503bc0b56b9138cc7024b
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\UnpublishRepair.aifc
Filesize661KB
MD5ce846ae72ae37568a4dc4e51a4a05dfe
SHA1f9ec786105dedb6c46c741572e64ed43fcc1c24e
SHA2562febe71cac29e60afbb953b0b898907ac28586085708a3cd288a9afbb9e8f192
SHA512bb71b902cd338d92394669d20054a4934c5edf78d861190c1dac262b6f9e46024b71d84c0c1964e907df08a960614466550d8af65c466c4af04e16fa5bc1dcd7
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\UnregisterInstall.WTV
Filesize568KB
MD538710423e57e429ba0772eafcab20afd
SHA163ed9d2dc938edd475c73fa609710d6fb3371955
SHA256638ae46499f7287663f0563cddef859d8b0e7f04c5b9e1e5930f0f0f8288a545
SHA512d97069d7c081f5880534c4d5aa5d9226b52090d314441046876a6ac8e2797f80b07288f25566c001eb0016024a0e2f59188e99e55ae5d55bdf26b24858549d19
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\UnregisterSelect.sys
Filesize383KB
MD53679bba08b0aa9b50a59169ee0e0d526
SHA14eec25f1f08b2676e4b7de208c8754524999f2fc
SHA2566c233322c5f9c0c4b103cd1d3e78959b9c8fe2b446b0aadb14c7695f56d4682a
SHA51211cf73ff5262246308613b8e8c488f4d792fde4f22e32942e435640c08036c142f0bbb18b453914cda64481cbcf07b3d3cd174e937a3f4b84a217563f9fe0179
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Info.txt
Filesize373B
MD545e2b9ce52af9cbe5e186a724833cf88
SHA1bd8ecf552d6206c61f2f0d08f323426acc453fe2
SHA256e0289fa194298de794be714ead4c402914be34452738ce91e471d41208adb764
SHA512e3da7cc4c6cc78dce7728dc74f147c1836c1db792b78a296e28f7a97bada6fe8daf2d2ab3289eb8c8463fac9a9cc225b95f1b64390fb6b9553304368529dfb1f
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Processes.txt
Filesize302B
MD5ea44cf625dc23987dac6c904bcfb0a9b
SHA1da5abecfcac2c2e93227a09663b72a057b49bf94
SHA256099058803e6497a9473ef21896954a6282c4297f6e0899f1adab1d2f7673e9c8
SHA5127b136fbd3c5ea78403947ecc1ab0ac72527533904bdfecd4351226a34c8eafc4d08dbd0143d8e92f574eb44b3ae0781ec62b83088fc5f481106e7dd9d716d689
-
C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Programms.txt
Filesize893B
MD54c0873f2172f682a32a885673460ad14
SHA1122867f604535bc98a90bd9b12290863b66e79c3
SHA256bd34455f68b6fe235a4bc2447b3f18fed09456063e85dfded9161c17735ce06d
SHA51292fb9da4a34c9c95ba77b8f462c401f48008e2ccb59c1acfa01ade725e23c9b16259ac12d03394ed41232600df6b31d466b10f5f040fe73397dec8a724510495