Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
3x64 beta/A...ss.dll
windows7-x64
1x64 beta/A...ss.dll
windows10-2004-x64
1x64 beta/beta.exe
windows7-x64
7x64 beta/beta.exe
windows10-2004-x64
7$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1beta.exe
windows7-x64
7beta.exe
windows10-2004-x64
7d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1resources/elevate.exe
windows7-x64
1resources/elevate.exe
windows10-2004-x64
1swiftshade...GL.dll
windows7-x64
1swiftshade...GL.dll
windows10-2004-x64
1swiftshade...v2.dll
windows7-x64
1swiftshade...v2.dll
windows10-2004-x64
1vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
1vulkan-1.dll
windows10-2004-x64
1$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3x64 beta/d...h..bat
windows7-x64
8Analysis
-
max time kernel
154s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
x64 beta/AntiBypass.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
x64 beta/AntiBypass.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
x64 beta/beta.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
x64 beta/beta.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
LICENSES.chromium.html
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
LICENSES.chromium.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
beta.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
beta.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
d3dcompiler_47.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral14
Sample
ffmpeg.dll
Resource
win7-20231215-en
Behavioral task
behavioral15
Sample
ffmpeg.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
libEGL.dll
Resource
win7-20231215-en
Behavioral task
behavioral17
Sample
libEGL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral18
Sample
libGLESv2.dll
Resource
win7-20231215-en
Behavioral task
behavioral19
Sample
libGLESv2.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral20
Sample
resources/elevate.exe
Resource
win7-20231215-en
Behavioral task
behavioral21
Sample
resources/elevate.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral22
Sample
swiftshader/libEGL.dll
Resource
win7-20231215-en
Behavioral task
behavioral23
Sample
swiftshader/libEGL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral24
Sample
swiftshader/libGLESv2.dll
Resource
win7-20231215-en
Behavioral task
behavioral25
Sample
swiftshader/libGLESv2.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral26
Sample
vk_swiftshader.dll
Resource
win7-20231215-en
Behavioral task
behavioral27
Sample
vk_swiftshader.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral28
Sample
vulkan-1.dll
Resource
win7-20231215-en
Behavioral task
behavioral29
Sample
vulkan-1.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20231215-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20231215-en
General
-
Target
beta.exe
-
Size
139.5MB
-
MD5
809ca215de4598350eaeddb5a94ebbba
-
SHA1
caccfadb6b96dc6155696f6309c3ea492078bb5c
-
SHA256
0f702f8ac538e810649808f0d9b6000e1aa4360849633c0ed76ec36e2cfc8332
-
SHA512
1521a30cf760277a24ed1446d29eb71af297582ac2d8b4546a322ec9690a8094963a194d7f2fdec65e2e59673c8f912557182e673af8d46cd29bd20989cdae36
-
SSDEEP
786432:f14w5ThzHwQBgmoLWv+K18nCzKdo5DTdvfMQr6SSmPuvh8tSIW68:f14kpHwQjCWv+K18CedmVvEQEpcJW
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2980 beta.exe 2980 beta.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io 4 ipinfo.io 6 ipinfo.io -
Collects information from the system 1 TTPs 1 IoCs
Uses WMIC.exe to find detailed system information.
pid Process 2800 WMIC.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 940 WMIC.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2400 tasklist.exe 1952 tasklist.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2980 beta.exe 2980 beta.exe 832 beta.exe 1692 powershell.exe 2980 beta.exe 2980 beta.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2400 tasklist.exe Token: SeIncreaseQuotaPrivilege 2656 WMIC.exe Token: SeSecurityPrivilege 2656 WMIC.exe Token: SeTakeOwnershipPrivilege 2656 WMIC.exe Token: SeLoadDriverPrivilege 2656 WMIC.exe Token: SeSystemProfilePrivilege 2656 WMIC.exe Token: SeSystemtimePrivilege 2656 WMIC.exe Token: SeProfSingleProcessPrivilege 2656 WMIC.exe Token: SeIncBasePriorityPrivilege 2656 WMIC.exe Token: SeCreatePagefilePrivilege 2656 WMIC.exe Token: SeBackupPrivilege 2656 WMIC.exe Token: SeRestorePrivilege 2656 WMIC.exe Token: SeShutdownPrivilege 2656 WMIC.exe Token: SeDebugPrivilege 2656 WMIC.exe Token: SeSystemEnvironmentPrivilege 2656 WMIC.exe Token: SeRemoteShutdownPrivilege 2656 WMIC.exe Token: SeUndockPrivilege 2656 WMIC.exe Token: SeManageVolumePrivilege 2656 WMIC.exe Token: 33 2656 WMIC.exe Token: 34 2656 WMIC.exe Token: 35 2656 WMIC.exe Token: SeIncreaseQuotaPrivilege 2656 WMIC.exe Token: SeSecurityPrivilege 2656 WMIC.exe Token: SeTakeOwnershipPrivilege 2656 WMIC.exe Token: SeLoadDriverPrivilege 2656 WMIC.exe Token: SeSystemProfilePrivilege 2656 WMIC.exe Token: SeSystemtimePrivilege 2656 WMIC.exe Token: SeProfSingleProcessPrivilege 2656 WMIC.exe Token: SeIncBasePriorityPrivilege 2656 WMIC.exe Token: SeCreatePagefilePrivilege 2656 WMIC.exe Token: SeBackupPrivilege 2656 WMIC.exe Token: SeRestorePrivilege 2656 WMIC.exe Token: SeShutdownPrivilege 2656 WMIC.exe Token: SeDebugPrivilege 2656 WMIC.exe Token: SeSystemEnvironmentPrivilege 2656 WMIC.exe Token: SeRemoteShutdownPrivilege 2656 WMIC.exe Token: SeUndockPrivilege 2656 WMIC.exe Token: SeManageVolumePrivilege 2656 WMIC.exe Token: 33 2656 WMIC.exe Token: 34 2656 WMIC.exe Token: 35 2656 WMIC.exe Token: SeShutdownPrivilege 2980 beta.exe Token: SeShutdownPrivilege 2980 beta.exe Token: SeDebugPrivilege 1952 tasklist.exe Token: SeShutdownPrivilege 2980 beta.exe Token: SeShutdownPrivilege 2980 beta.exe Token: SeIncreaseQuotaPrivilege 2800 WMIC.exe Token: SeSecurityPrivilege 2800 WMIC.exe Token: SeTakeOwnershipPrivilege 2800 WMIC.exe Token: SeLoadDriverPrivilege 2800 WMIC.exe Token: SeSystemProfilePrivilege 2800 WMIC.exe Token: SeSystemtimePrivilege 2800 WMIC.exe Token: SeProfSingleProcessPrivilege 2800 WMIC.exe Token: SeIncBasePriorityPrivilege 2800 WMIC.exe Token: SeCreatePagefilePrivilege 2800 WMIC.exe Token: SeBackupPrivilege 2800 WMIC.exe Token: SeRestorePrivilege 2800 WMIC.exe Token: SeShutdownPrivilege 2800 WMIC.exe Token: SeDebugPrivilege 2800 WMIC.exe Token: SeSystemEnvironmentPrivilege 2800 WMIC.exe Token: SeRemoteShutdownPrivilege 2800 WMIC.exe Token: SeUndockPrivilege 2800 WMIC.exe Token: SeManageVolumePrivilege 2800 WMIC.exe Token: 33 2800 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2660 2980 beta.exe 28 PID 2980 wrote to memory of 2660 2980 beta.exe 28 PID 2980 wrote to memory of 2660 2980 beta.exe 28 PID 2660 wrote to memory of 2400 2660 cmd.exe 30 PID 2660 wrote to memory of 2400 2660 cmd.exe 30 PID 2660 wrote to memory of 2400 2660 cmd.exe 30 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2688 2980 beta.exe 31 PID 2980 wrote to memory of 2600 2980 beta.exe 33 PID 2980 wrote to memory of 2600 2980 beta.exe 33 PID 2980 wrote to memory of 2600 2980 beta.exe 33 PID 2600 wrote to memory of 2656 2600 cmd.exe 35 PID 2600 wrote to memory of 2656 2600 cmd.exe 35 PID 2600 wrote to memory of 2656 2600 cmd.exe 35 PID 2980 wrote to memory of 456 2980 beta.exe 36 PID 2980 wrote to memory of 456 2980 beta.exe 36 PID 2980 wrote to memory of 456 2980 beta.exe 36 PID 2980 wrote to memory of 1964 2980 beta.exe 37 PID 2980 wrote to memory of 1964 2980 beta.exe 37 PID 2980 wrote to memory of 1964 2980 beta.exe 37 PID 2980 wrote to memory of 1656 2980 beta.exe 39 PID 2980 wrote to memory of 1656 2980 beta.exe 39 PID 2980 wrote to memory of 1656 2980 beta.exe 39 PID 2980 wrote to memory of 1656 2980 beta.exe 39 PID 2980 wrote to memory of 1656 2980 beta.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\beta.exe"C:\Users\Admin\AppData\Local\Temp\beta.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
-
C:\Users\Admin\AppData\Local\Temp\beta.exe"C:\Users\Admin\AppData\Local\Temp\beta.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\script" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1064 --field-trial-handle=1172,12297190215503712724,16299863361032233907,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵PID:2688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic process where processid=2980 get ExecutablePath"2⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\System32\Wbem\WMIC.exewmic process where processid=2980 get ExecutablePath3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵PID:456
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "net session"2⤵PID:1964
-
C:\Windows\system32\net.exenet session3⤵PID:1960
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session4⤵PID:668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\beta.exe"C:\Users\Admin\AppData\Local\Temp\beta.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\script" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1428 --field-trial-handle=1172,12297190215503712724,16299863361032233907,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵PID:1656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic computersystem get totalphysicalmemory | more +1"2⤵PID:544
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory3⤵PID:880
-
-
C:\Windows\system32\more.commore +13⤵PID:1752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"2⤵PID:556
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵PID:2452
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic OS get caption, osarchitecture | more +1"2⤵PID:312
-
C:\Windows\system32\more.commore +13⤵PID:2364
-
-
C:\Windows\System32\Wbem\WMIC.exewmic OS get caption, osarchitecture3⤵PID:2756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "echo %NUMBER_OF_PROCESSORS%"2⤵PID:1180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic logicaldisk get size"2⤵PID:1216
-
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk get size3⤵
- Collects information from the system
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic cpu get name | more +1"2⤵PID:2956
-
C:\Windows\System32\Wbem\WMIC.exewmic cpu get name3⤵PID:2476
-
-
C:\Windows\system32\more.commore +13⤵PID:688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic PATH Win32_VideoController get name | more +1"2⤵PID:1748
-
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController get name3⤵
- Detects videocard installed
PID:940
-
-
C:\Windows\system32\more.commore +13⤵PID:1160
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"2⤵PID:1904
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
-
C:\Users\Admin\AppData\Local\Temp\beta.exe"C:\Users\Admin\AppData\Local\Temp\beta.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\script" --mojo-platform-channel-handle=1576 --field-trial-handle=1172,12297190215503712724,16299863361032233907,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:832
-
-
C:\Users\Admin\AppData\Local\Temp\beta.exe"C:\Users\Admin\AppData\Local\Temp\beta.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\script" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1232 --field-trial-handle=1172,12297190215503712724,16299863361032233907,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
656KB
MD5788a631f0fa606ca6b1332febad3cdce
SHA161283245cc3d46bd65e0965cfaf890eec4c1e944
SHA2564f6924ce99fe122590302d42d9b818a09758c88a5e17e82afa0cf5de3485aefe
SHA512b84d5355e7ef4e471c772a94c17d93efa2d62545bb8cf19cacf28f679083f1619acbb98a5f185ea50e5fa659020b583a2a4b23b671d0464c30f7770c73320421
-
Filesize
1.8MB
MD53072b68e3c226aff39e6782d025f25a8
SHA1cf559196d74fa490ac8ce192db222c9f5c5a006a
SHA2567fb52b781709b065c240b6b81394be6e72e53fe11d7c8e0f7b49dd417eb78a01
SHA51261ebc72c20195e99244d95af1ab44fa06201a1aee2b5da04490fdc4312e8324a40b0e15a7b42fab5179753d767c1d08ae1a7a56ac71a6e100e63f83db849ee61