Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 13:23
Static task
static1
General
-
Target
a134e5d51c7ed250a0c7b2c9d69c252f.exe
-
Size
3.5MB
-
MD5
a134e5d51c7ed250a0c7b2c9d69c252f
-
SHA1
49be67401c878ba338c18591ee4c0c75cfcdb69e
-
SHA256
77c347214ea12a755c535428c16f714e9b646d556774408f526f520827989e52
-
SHA512
2eabd3ebcb27703b9672136aeaac0a51b8dfe60c4d1873d0655084f0ae658ceb6bc411a8dac1e01a2f2e8916db19bf336be84590e92d801f9e69f938cbb297ac
-
SSDEEP
98304:xmrRByEHolHK9KDmKLVMKmRt9BqmhXUHbpBV4nO:xmrRMEIk9iJVlmR4mNm/V4O
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
vidar
40.3
706
https://lenko349.tumblr.com/
-
profile_id
706
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Extracted
redline
pab777
185.215.113.15:6043
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/3540-177-0x0000000003DD0000-0x0000000003DF6000-memory.dmp family_redline behavioral2/memory/3540-180-0x0000000006300000-0x0000000006324000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral2/memory/3540-177-0x0000000003DD0000-0x0000000003DF6000-memory.dmp family_sectoprat behavioral2/memory/3540-180-0x0000000006300000-0x0000000006324000-memory.dmp family_sectoprat behavioral2/memory/3440-202-0x00000000047F0000-0x0000000004800000-memory.dmp family_sectoprat -
Vidar Stealer 3 IoCs
resource yara_rule behavioral2/memory/4592-159-0x0000000004870000-0x0000000004943000-memory.dmp family_vidar behavioral2/memory/4592-168-0x0000000000400000-0x0000000002BB1000-memory.dmp family_vidar behavioral2/memory/4592-224-0x0000000000400000-0x0000000002BB1000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x0006000000023213-20.dat aspack_v212_v242 behavioral2/files/0x0006000000023213-22.dat aspack_v212_v242 behavioral2/files/0x0007000000023213-88.dat aspack_v212_v242 behavioral2/files/0x0007000000023213-85.dat aspack_v212_v242 behavioral2/files/0x0007000000023211-84.dat aspack_v212_v242 behavioral2/files/0x000700000002320e-81.dat aspack_v212_v242 behavioral2/files/0x000700000002320e-79.dat aspack_v212_v242 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2732 364 WerFault.exe 4428 4592 WerFault.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a134e5d51c7ed250a0c7b2c9d69c252f.exe"C:\Users\Admin\AppData\Local\Temp\a134e5d51c7ed250a0c7b2c9d69c252f.exe"1⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\7zS040D4177\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS040D4177\setup_install.exe"2⤵PID:5048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\0fe99f4886649ca.exe3⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\0fe99f4886649ca.exeC:\Users\Admin\AppData\Local\Temp\0fe99f4886649ca.exe4⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\7zS0D167717\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0D167717\setup_install.exe"5⤵PID:364
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0D167717\Thu12d53f7cb4630617.exeThu12d53f7cb4630617.exe1⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\7zS0D167717\Thu12d53f7cb4630617.exe"C:\Users\Admin\AppData\Local\Temp\7zS0D167717\Thu12d53f7cb4630617.exe" -u2⤵PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0D167717\Thu126a56dba03f85bc.exeThu126a56dba03f85bc.exe1⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\7zS0D167717\Thu12b206066db4b.exeThu12b206066db4b.exe1⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 10282⤵
- Program crash
PID:4428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 364 -ip 3641⤵PID:1320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 364 -s 4961⤵
- Program crash
PID:2732
-
C:\Users\Admin\AppData\Local\Temp\is-VCQ6G.tmp\Thu12c7aa51872a08fa.tmp"C:\Users\Admin\AppData\Local\Temp\is-VCQ6G.tmp\Thu12c7aa51872a08fa.tmp" /SL5="$30200,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS0D167717\Thu12c7aa51872a08fa.exe"1⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\7zS0D167717\Thu1201a83e1b12c11c9.exeThu1201a83e1b12c11c9.exe1⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\7zS0D167717\Thu12c7d354bd127.exeThu12c7d354bd127.exe1⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\7zS0D167717\Thu12c7aa51872a08fa.exeThu12c7aa51872a08fa.exe1⤵PID:1480
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\7zS0D167717\Thu1233e7ee762d0c.exeThu1233e7ee762d0c.exe1⤵PID:2548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu12c7d354bd127.exe1⤵PID:3108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu12b206066db4b.exe1⤵PID:2736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1201a83e1b12c11c9.exe1⤵PID:2360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu126a56dba03f85bc.exe1⤵PID:3552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1233e7ee762d0c.exe1⤵PID:1592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu12c7aa51872a08fa.exe1⤵PID:3344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu12d53f7cb4630617.exe1⤵PID:4196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"1⤵PID:860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4592 -ip 45921⤵PID:4844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD56478b3c7dc7082eb2c5d1d5a2e54b7b9
SHA1dcd5d0b7eaa172794d29422ba31d6d5ed4e02a0f
SHA256a1bc219ea9fee8c4c1e41a5fb046885b1bc833b9ff71e619dcddd2bd7f6bbd55
SHA51223925668eda886e7c7aba8da808d2c59bd605dd69034cf6f72e079e76f9c62abb7281376b14412fbc8b6711e700e1bfb5e8c16915e358f466e889c68a4ed889d
-
Filesize
16KB
MD52f22607ad6a8a370e9bf49dd00ff57ed
SHA18fed29355b9113d2dc9a7eeb532e8a74952c543f
SHA256ebdb0f1d188bdcbd43c054d9faef5e593f98ffcb5ee9491341bf65b3bab34b29
SHA51202103dfe48cfe811e8f572af8b5bbc87f299da0d2aef2987ebb1e952aa7ffe9815a195b82cabb329214aa202722d9a7708193c1b53071d45b938e0672b055009
-
Filesize
19KB
MD583d9a863bda7bf67d795ab7160966830
SHA110152420f3aed73fd50f65eefc66517000d02e76
SHA256e5ab9d689be990173d758f6bbbad68c33b33889352342bb08f52a0e6dcee6e17
SHA5120d55ed8dab24ff4f6c55a958dc89ded8e60052e74fbe6eff8d55e51699b33d204daac1e2aa76ecce4c080a0417c1538525dc4591aadd1aa6365bb6cfe0ba66ea
-
Filesize
109KB
MD5e4b3783c76a6f731846abc29a1f2b73e
SHA10d51cf3e6f5070c27cae69525cd2dc3f7f08703f
SHA256c994975460c2648ba40426db60e85d41ccf6217789b875fac4ee7dfd72b70185
SHA512bc8fc17d61e99cc6250741d4a32b0dd847bd72506592b24744c42c7078fd7157f04b9802581ec800c0137792fce97e6d7d5b137ee0199ae3266f2310d223239e
-
Filesize
84KB
MD5af23b5cd0aa5c735c159c16c08c2b84c
SHA1503633fdee92681365811290023498a631e648e4
SHA256ac880ba83c4e644e9bffbb1a1aabb4f5fbe59610d7d09dfaf5aa8f5b2c4350f9
SHA5129f5042b6a08c8b200340a98e0fb42150e096e98ff0abdfae62ac56218fe97d6bf98321c0554daefc23152de7e6b5afac8864dbbb091c49504fa9c1afeadc568a
-
Filesize
412KB
MD50084817dc328a8d1ac76ef8d75d77426
SHA1088e17160ef6e2680f09401ec1addd3c9e792246
SHA2562d908a5eed2eec6827dd663aaff92a93fc2b7173c11d07a520757a314dad2c77
SHA51251c8acd1344edeb5d2e339b164d569b8b54dc5ca065f56d3a3982782ca76f9f37ffe06f56588d4b532f81f3ab0f39c6d7dc5b8fd5e717fd0c487304246f40be6
-
Filesize
26KB
MD588f24aa5b6195d2007ea24bb7fc5ca48
SHA10d46cb142cafe2f597fde7a1dffd7bd61a19c600
SHA2562f7dd63e985911b9ce27fb51f9c8317f6f0545aa061d7566763f623101ac66b5
SHA512837f9b7abcb300a6b333d2327d450eb877892fe19bba12bd12184598ebaba0564df212f79878cbadd4c56e3535b4ebd6b3b3727e300cb6ab56ffe85f2b6da713
-
Filesize
73KB
MD5c7d4d685a0af2a09cbc21cb474358595
SHA1b784599c82bb90d5267fd70aaa42acc0c614b5d2
SHA256e96b397b499d9eaa3f52eaf496ca8941e80c0ad1544879ccadf02bf2c6a1ecfc
SHA512fed2c126a499fae6215e0ef7d76aeec45b60417ed11c7732379d1e92c87e27355fe8753efed86af4f58d52ea695494ef674538192fac1e8a2a114467061a108b
-
Filesize
282KB
MD55fdf9a01c917d3168de85563695a59e8
SHA1b3a0a5bd8cc3b1963caa5f65e45c7e1386648e3d
SHA25674ea23df11dbd58f19cfe13e3729757709090b023ecc077a13bc564ffd7ff158
SHA5121eece8dd3e88521ccb6719900740068a8e93bc21fca3f024351110a9a80d572cd9309a5b14a4a224ee94da3a83ce0151ee6d67d68a28062f1d734ff320dda4fe
-
Filesize
190KB
MD5090ca86318daf76979b30b1f871e1ada
SHA167a83f33fba0177e0710f0bd2131878acbb5e4df
SHA2567a4d81c62dd6d5a56d6678f086897a38f4f61aed9ee4f530fcb53a266f04d583
SHA512c286eb8a8c6cfde7f0627fa688f39733b639664ddbc7c56a71cb235f2c951d4ae77804c86135dc9e47f443b0a74aea86951830b0270a58b6ae4f9341ed937b33
-
Filesize
137KB
MD5b3c97b6c5ca91ddd6b39543554116ee4
SHA1579718f0385e2d90d60a89d51066efeb50804fea
SHA256f997f6576a9d62c594855b72546632fad7ecba4cbb5867cfe79bb189ef83eb4f
SHA512d8fd12b5b07aa5ebf472900e9088cd7e2de748950bd127674d13bf2daf1cefe74135870701d7d2da9fd5f6cfe9498abede3b9ae33d640588c2e7c9715e20fc20
-
Filesize
8KB
MD5f0cddb85d1f6e01372db9988700b1849
SHA1b561eab96075434a5405459cf2cd947c9cda78fa
SHA25613492a113107ae59e2fe02f3c3b9afa411a39caa73b78ea06dec0fb9a970f7a2
SHA512940af94daedf84a927052b2e4e22f5f5c8b60c07e584dae2ac7cc30fdbbc2002ad657eaa899d0b61b70ebb5a0f6562595d0134ea1f43d0fe0aa01ab13b7748ae
-
Filesize
17KB
MD5692f42494959202b0cb41b06bdcb3b45
SHA1e830d78a0a4e1fb049cc8dc53e33cfa95c9288fc
SHA2563410798de36b5197482965a1441afdbce3dc0d65a9564eb5e08fc80837bf025a
SHA5122349a0ca2d26f2d333ccd94b6fb8d7ffc681ba32dbf1404d65ab0829c81f96b34ba146cb3b2bed77ebbfb94b89eaba7f28a052bf077978b2d58d04a9a9613ea3
-
Filesize
208KB
MD53871ff4bd74e42eb4430d3227a9d1e40
SHA147036cc62906fd8a8d2bf73da569db522c128d47
SHA25604d4a949c6f05c83974ba4cff2104c400e7f17de63d1e48c893cc1b4958cff11
SHA5120efe301fd1c3dda574b46fa008d3c562fd06624aa00125e41fd9c3e38021720022555775e0ca3954bf7da867db81464fe9aaf2525a0d48fb4bd26972929805d4
-
Filesize
330KB
MD5259ed8ce91b4b34ae998394052dda875
SHA1c23ecb7be342d31b1a555ea1406964f4d707ec90
SHA256a8689feabfae673c42f196837d4ae84dd9140a8f60efe3c661e0dce65894cbea
SHA512ef5efde6fd01827f1e2bf617abf7b2915eb228d6321dbdedcb07b19b5da60f3e7e081aef89f9533aa843694a139cc4f4318ccf8a852a72eb1af35ad6c0d3cf6e
-
Filesize
84KB
MD57c037fb1221cb3adb8b0400d5b27056a
SHA1137163df128438d01098315e49a469188bc47652
SHA2561059630b031a2bea87a769f4ea0ab7eabc77b3705403deb8895d3e5415f96d8e
SHA512f2d2491d47151a00511cbaed136629ab5800595cc4e5b99bf7d79fe46b74db6ac905cce96da2b056331be911e90defbd34b03253fad7ee091d25f5a21c96c894
-
Filesize
74KB
MD5fa25a3f03b2d5e54f6271ad61cf66261
SHA1a8ac270e6523778480cd95c3ac158275c0647abb
SHA25694cb13cec47608b96f9f5804b6b8a179f695aa34ad0c9bcecc4df5ddf558fde9
SHA512ddd4c2d524f5cdf4df8c55a7689adb1e1f582682fa0968b251169b12dd030cb39ceb8d945e3d8538e224d8a855acab26a27d1c043bfbc5d5378e097e12e43971
-
Filesize
98KB
MD577f477bf6e41160479680f4f45012b23
SHA153aa6844c50c645f49b5716d1c0ee71cd0a450e3
SHA25618431f56dd3365b3f25df1000af2adab7c1eda3a005ceb77d0fef13d15e59022
SHA512688533c530f34de4c185b2f70eb8d158666464766c329627a8dc78622d92b1630b67d5206c642f4baf946971199603abc2cbfe02ff89994052c46d294c7ada7b
-
Filesize
99KB
MD5030234b17d0a169c7db533413d772bfb
SHA17276a6ba1834b935a3e5c5c32ffba11b2c7370a8
SHA256cf50eb23361fe4eba129a7cf638010d7ec322ea9b0f09dce8dc5f868c974d945
SHA5120980984d3b0ca85b738ad5c5070ae0f7e9898dd2a5e33de73c836565f4d728e0329c2e4ef948f09434c71b596ebe1313ca238a19bc4a42955136899f417d50f0
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
161KB
MD5d501b14871803cf7cbb9287f58233f6d
SHA1dcbbfe15aed5267acecaca91685dfc3a6164fa31
SHA2562fc43f5df14451c5b327afef04c3d634348df415c0830800633c38f5dc015806
SHA512cbc0184bcc49608ab1234e7285ba91166ed53cae101b4cc51353995b5f503f8fa253a9dde6fe371c2ce85a5a59f33c03c5ddd67e23698bf39934373280d44bcd
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
92KB
MD50107bd3bb69a8c0a549323d6deedbe18
SHA154947c6feca0e946e647972accc57e010abff744
SHA256e540d7aadbc4779810308ab4ceac65be0763fabc0c8cb49c2953fee95bdd2942
SHA51267083c585e57479843878a544f5f97d1e84d06eb27496cd2d4c58107801a496a0c2066caa7bae985cf505f1e2397190af10762fb19bfa59e873337c6bfbdec43
-
Filesize
254KB
MD57228dd5e176ef529c2eb0b8e86c7ff21
SHA13f91fc40b488099576f6aae84316971cf3537948
SHA256eb4d2bef05e13d494999240dbc1c22b2db2f2fa61d5eb4ecca7e976ee54febe7
SHA5127a81b50898e058e7670f42452cffa75722aa4562660ef63b6db0cccc3ee5acb114cfddbe8ad571757f895e2f32b83c671826cf6f34e6d24d5c2a74bf6ed583c8
-
Filesize
274KB
MD5458c2c09432596184b8a3fb83bfcf1b4
SHA1a7973aa23f49ee070f620e1aedb47aa88effb85b
SHA2562197d85a611a56ee7d3a848321a6d2505561acc3974f2b522c2afe9afb3f5ad2
SHA512f99dae334749f98061df8f79a0bc92bdf3fd84006c8880470e1ed151bb699c75ff29a2103577b560094c846a4f79aaa0c96b22320106df16eb43e0abc1c47e44
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
57KB
MD5204ca8df4aacddf53a7a0f868ab16728
SHA12d9720bfbe71434a455b8f2c186f444d9f8b4122
SHA2560c8012798e542a806c594b03875d490d4378ea4873d7b9f3a2f3702a7d4db1a2
SHA51272bd432522bf700c16e7f059ef80a131ca0a73edd6268a89cd0d4c1de85ecf472ee4ece8cad94d199fa29acb4da73f1095273bf4d8062e0f309b7e43dd6948ef
-
Filesize
57KB
MD5c337166afe407020bc4440404264d704
SHA1489172fde98e16232cf0e46fd88d47d8f60cb705
SHA256a74304d0b12de665e1729f98b7e053fe532cc8d3f1f89a660b1dcbb9d3c65c74
SHA5122404433af71f452750d553f88c411bd0462cb802db89ceb95ee401547f24efca5b82fad35283b54ae6e2a6fb0bca583b3fad8c792f54cc3178b6f04238518326
-
Filesize
379KB
MD537cc559f0d2fc41b2b7d772299aebc25
SHA143e10260141c5678477ad5c884600d84528f15ea
SHA2563174d8d4cffc9699779f62e74c57cb0b3bff7f453b6e03bf9f6fcfadd8d73802
SHA512020cc542f4dcb5962d56c54b24b384b76c50531604c9b2c6f4755461437839055d0e778f0303190003f56dabcd3ee5567eee46023925a6fe54c3c136a193e11f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5899fdd10efed2e4cd8ae7289ee862616
SHA119b2a144cf48595de90bfa444e3796eb00ce5338
SHA25616b9220837c2d6f7abba228e1afad7c0d39e5a5399a6b2702723e0b44bbf4587
SHA512d9cd8b71db6c5bf51bb0c0dc5af331faed8753011649e91a0f30c1ba724437a142ff15f5ef1248bc1328cfa5c0abf390827a297edd26bdb78655698576c84402
-
Filesize
187KB
MD5b025050058191df2dbad2fd351c9e5db
SHA1115d4b1426cc3adaf24adda96ede462df5d16de4
SHA25641446ed111da7dd59975d4ea99195ffcae52831767d01857bf508f2ee5c57ae4
SHA512256da1664e634409170ae96b3b88470217080faad756d1144a4a0531b9423e029fcf29df73b3977860356b7826afb94c21fa5deeba53783af0d6f0cd76aca80d