Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 14:06
Behavioral task
behavioral1
Sample
1af70c7e2f2c31d4d9f91e3e60d5dde3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1af70c7e2f2c31d4d9f91e3e60d5dde3.exe
Resource
win10v2004-20231215-en
General
-
Target
1af70c7e2f2c31d4d9f91e3e60d5dde3.exe
-
Size
188KB
-
MD5
1af70c7e2f2c31d4d9f91e3e60d5dde3
-
SHA1
97bda031c9a0166f808474614b18099ce8734319
-
SHA256
d388cb1615cf29a24749d1331e09ea4ea2837c3ba99decca3bf114c50b59cfe7
-
SHA512
b3d4ee199d298b1a1707b36bee31ed434b864be33cf46e3c3ac668c90657d31b68dcc892d5dd5ba52858ad85b84dd8a5922ffe4b4a9ae9673849b49d0855766a
-
SSDEEP
3072:mNuBD8urPQYRI2x/wxlmxCpOtyv6EnbcmVhRS33I/zB0voeW0Hqo+Ew3aUo+lL:mN2rFuA/wjqCpyySENDRz3epKo+Po
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2308 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2984 ygcua.exe -
Loads dropped DLL 2 IoCs
pid Process 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe -
resource yara_rule behavioral1/memory/1752-0-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral1/files/0x000a000000016c14-5.dat upx behavioral1/memory/1752-6-0x0000000000340000-0x0000000000380000-memory.dmp upx behavioral1/memory/2984-13-0x0000000000400000-0x0000000000440000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\{33F90BF9-C4BF-97F5-50E9-BCAD04C1346A} = "C:\\Users\\Admin\\AppData\\Roaming\\Loicef\\ygcua.exe" ygcua.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1752 set thread context of 2308 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe 30 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Privacy 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 ygcua.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 ygcua.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\5AE029F2-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe 2984 ygcua.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeSecurityPrivilege 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe Token: SeSecurityPrivilege 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe Token: SeSecurityPrivilege 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe Token: SeManageVolumePrivilege 2248 WinMail.exe Token: SeSecurityPrivilege 2308 cmd.exe Token: SeManageVolumePrivilege 524 WinMail.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2248 WinMail.exe 524 WinMail.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2248 WinMail.exe 524 WinMail.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2248 WinMail.exe 524 WinMail.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2984 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe 28 PID 1752 wrote to memory of 2984 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe 28 PID 1752 wrote to memory of 2984 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe 28 PID 1752 wrote to memory of 2984 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe 28 PID 2984 wrote to memory of 1120 2984 ygcua.exe 11 PID 2984 wrote to memory of 1120 2984 ygcua.exe 11 PID 2984 wrote to memory of 1120 2984 ygcua.exe 11 PID 2984 wrote to memory of 1120 2984 ygcua.exe 11 PID 2984 wrote to memory of 1120 2984 ygcua.exe 11 PID 2984 wrote to memory of 1188 2984 ygcua.exe 18 PID 2984 wrote to memory of 1188 2984 ygcua.exe 18 PID 2984 wrote to memory of 1188 2984 ygcua.exe 18 PID 2984 wrote to memory of 1188 2984 ygcua.exe 18 PID 2984 wrote to memory of 1188 2984 ygcua.exe 18 PID 2984 wrote to memory of 1248 2984 ygcua.exe 17 PID 2984 wrote to memory of 1248 2984 ygcua.exe 17 PID 2984 wrote to memory of 1248 2984 ygcua.exe 17 PID 2984 wrote to memory of 1248 2984 ygcua.exe 17 PID 2984 wrote to memory of 1248 2984 ygcua.exe 17 PID 2984 wrote to memory of 2040 2984 ygcua.exe 16 PID 2984 wrote to memory of 2040 2984 ygcua.exe 16 PID 2984 wrote to memory of 2040 2984 ygcua.exe 16 PID 2984 wrote to memory of 2040 2984 ygcua.exe 16 PID 2984 wrote to memory of 2040 2984 ygcua.exe 16 PID 2984 wrote to memory of 1752 2984 ygcua.exe 27 PID 2984 wrote to memory of 1752 2984 ygcua.exe 27 PID 2984 wrote to memory of 1752 2984 ygcua.exe 27 PID 2984 wrote to memory of 1752 2984 ygcua.exe 27 PID 2984 wrote to memory of 1752 2984 ygcua.exe 27 PID 2984 wrote to memory of 2248 2984 ygcua.exe 29 PID 2984 wrote to memory of 2248 2984 ygcua.exe 29 PID 2984 wrote to memory of 2248 2984 ygcua.exe 29 PID 2984 wrote to memory of 2248 2984 ygcua.exe 29 PID 2984 wrote to memory of 2248 2984 ygcua.exe 29 PID 1752 wrote to memory of 2308 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe 30 PID 1752 wrote to memory of 2308 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe 30 PID 1752 wrote to memory of 2308 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe 30 PID 1752 wrote to memory of 2308 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe 30 PID 1752 wrote to memory of 2308 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe 30 PID 1752 wrote to memory of 2308 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe 30 PID 1752 wrote to memory of 2308 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe 30 PID 1752 wrote to memory of 2308 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe 30 PID 1752 wrote to memory of 2308 1752 1af70c7e2f2c31d4d9f91e3e60d5dde3.exe 30 PID 2984 wrote to memory of 1884 2984 ygcua.exe 31 PID 2984 wrote to memory of 1884 2984 ygcua.exe 31 PID 2984 wrote to memory of 1884 2984 ygcua.exe 31 PID 2984 wrote to memory of 1884 2984 ygcua.exe 31 PID 2984 wrote to memory of 1884 2984 ygcua.exe 31 PID 2984 wrote to memory of 1052 2984 ygcua.exe 32 PID 2984 wrote to memory of 1052 2984 ygcua.exe 32 PID 2984 wrote to memory of 1052 2984 ygcua.exe 32 PID 2984 wrote to memory of 1052 2984 ygcua.exe 32 PID 2984 wrote to memory of 1052 2984 ygcua.exe 32 PID 2984 wrote to memory of 2944 2984 ygcua.exe 33 PID 2984 wrote to memory of 2944 2984 ygcua.exe 33 PID 2984 wrote to memory of 2944 2984 ygcua.exe 33 PID 2984 wrote to memory of 2944 2984 ygcua.exe 33 PID 2984 wrote to memory of 2944 2984 ygcua.exe 33
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2040
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\1af70c7e2f2c31d4d9f91e3e60d5dde3.exe"C:\Users\Admin\AppData\Local\Temp\1af70c7e2f2c31d4d9f91e3e60d5dde3.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Roaming\Loicef\ygcua.exe"C:\Users\Admin\AppData\Roaming\Loicef\ygcua.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2984
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpaa22d686.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2248
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1759180980-1981033504934869992082136498-279674860-1274481935-176343631563792561"1⤵PID:1884
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1052
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2944
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558B
MD53cc0012f96f8f44164c18d7de05023d9
SHA1c8feb560d751fe720c8bdb53f5e78aa92abb9a9e
SHA2562654c273c211ae1afc60a7736153a853142e3db028417206948576d1d57bf5d5
SHA512626746176663e2460b18f1eb245306107060c172c4e65ad710dd75ec0b348d8f000342c0dd2f7ea3bb2e0796f61e1ddd2cd77c312d6a177ff2e70a10b68cc6af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5509cc0223745b2d14840f42f6bf25e9c
SHA1f5f559304967c992de920a939b9e3c1b2c8e8f6f
SHA256c5e9aba0648b34359be892beec2695691a0606246b9861e08527bda65c471f73
SHA51268eda78dc05e5a751c7c28213e5bebb5e479c8ea2457b059c0d5c0c763617b059894cb89d3bf011dd3d23a18d08402087ab08d7b754b35fd94a320c3be028aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E6024EAC88E6B6165D49FE3C95ADD735
Filesize232B
MD5b15b6fa556198a36e10de9c2adb411ac
SHA1a80d03b7bf8d034006dba2c9895338d5cdb7098e
SHA2561b2f3b1fa5f83963298eac8c2ca4348b63debec1858b296a05378e78e3f663c1
SHA5120c67b1f336291760fbe49e4ffc67e93bd0668537973edbab98d8b45e0621f0fa0f3815eebccaaa018c2c9b0a86b0c874bd517c3eb0bb8129373d8d3d33e72018
-
Filesize
2.0MB
MD5ec114f7a90719e737aa322c6077dd99d
SHA1951ea1a1cf17c5b06499e89c726e3fd6305d7779
SHA256e2c16769d049bb50c69f71ab016e8c8d37da1913b1cb74b76159117b070612d5
SHA512d9bd7becd54a27967711a6ea4396123039d97b3ae16e61458b9a80d80dabfc5eeb6c438ab7a2075079de12f6430768a7dec57932318ef25b790509a43dc521df
-
Filesize
8KB
MD5a1cd20c43d2d01db347d0ea451f13425
SHA19fe1ca7547478a0da45501a573d4185659e802b4
SHA256d39c38cf8034a1b1b9090328fd503a256327bb270b17db83dde19cb155f125ad
SHA5126a3fc3d5e0de4f70c14db4c55f2a9f7decc7b5430335936f08c8b8cd078afa6d3f235f7b27e936151ab64e60162997d7beda10dbcb0909b686947b75dc498580
-
Filesize
2.0MB
MD5b01a0ebe648925380d50c8d17a1ad06f
SHA1643c2bb44df8b03cea93932d58977eb5e64d5aa3
SHA256c2c995d0deda985d0d24431348ef674f7ade915cb41545a4d198689f9ceb7b0e
SHA51278532a6c514958595609bd7ec95fb48b3f791752429a12b5e96e9b37df321bcd7255807c1349080ac286e7799c6d7349c4c3c062b74eda30dd9039beefe6983d
-
Filesize
1.6MB
MD58dbf1feead310a0564718f29e75c0a6c
SHA1d33f793f76d06d99beb10d6a719085709e181951
SHA2563da65347335a2166b6eb4fa09b31addbec3ebe43d39c66c2df94767d2bfe74b2
SHA5128afe3335865720fda3454d926b705765988046d61cb14e32a8ed35f5027224f729f0e1225b3cbf35e7b3f5262ed9fba6358f45224df1bc61158605e183ce4aeb
-
Filesize
1.3MB
MD50341ee8a352f9bdafb0c8e20344bde95
SHA1710682c2ec67d088f0553ab287fdbaeef4a7e2d1
SHA2569e0d8abda6d277e2601048c2a097e7ce59ea9fdfb0e25cbcb64139386e109237
SHA51276fb65fccb310a83253d430fe48b7c3e50d5873d7504f0fb46506cdf78872c8fd1167d8d46c79925c40de9bfce1e7c64b8683a2a5d71ef6089905a7ea1a6fa4f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
243B
MD5962de1c068ac15cccad37c1f994e1917
SHA1495e6154f5265a49909611e08d376da3b353c5b7
SHA256e1087d33a21d11f7661f94ab5e302ece724d64ae88b1f4186e02fa5dee5b24cb
SHA512ca71fb9e913384a708fb2a5aade7b82c3c680f6b1a3abf11c3a0d86f8d7118887ffb4308552e688ad9ba4a58f3a3d7ad3238bc49376556635de3a575b40c10eb
-
Filesize
366B
MD5336958606651be4ce976590f70e52f2a
SHA10903f36217b80d337a2663b5626e269a92a67896
SHA25672d715e2e774c6c43fbd912be3a90fe607225c1d26920f105a5aef3720998cf3
SHA51246d0cc6057f1a2abded21231f963e8f20825d95e0efd49e8b35302171707537b56867d988f0aa5b737e7d8cb73d4727840072e2aa4a7d0b001bbf173d56ccd48
-
Filesize
188KB
MD5f4ff6bc5b32c3e7da64493d0f22e5e40
SHA13bc580245abc839269b281cc1b22f7fc40e11581
SHA256dae30c3047b88da57b9d3eaf3ee65962442f577fb1128232b273a7f5b89ee59d
SHA51239aa34e88e2532e43cfe7548276c1b9de3affcc423076134d0faefdd69620ad5b0ab393b4d819ce87cc277bbaef55c09c5d8bbd07d9b6ca1bacd63a53c574a04