Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
78s -
max time network
87s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
Soar Installer.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Soar Installer.exe
Resource
win10v2004-20240709-en
General
-
Target
Soar Installer.exe
-
Size
76.3MB
-
MD5
4175b4ca85b0c2a70eec398354ac57e3
-
SHA1
2db6fb3a6b9cabb29dcdd8a91aca8ef9136fd436
-
SHA256
d3f8e7201ccb06225fe22fa19f5ab5c781ea34e66e120836066845711fe88f2e
-
SHA512
7fd55889ed25f4e8e537b157e3ddff61d2d83503b0a55c65df4a2e4d6349c0c408c66a860ba7441f33bc2f3cd1455b747ff176394daed42bba9d2b55e845e18a
-
SSDEEP
1572864:ypSi+t2/oOyCdG/cfCi8ivkRmqRpeZH5CCUWuEXDQIjHnHeydt4QO:YI2dxUcfCi8+kRJEZH5CCXXbjHHFdSQO
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2192 Soar Installer.tmp 2180 Soar Client.exe 824 javaw.exe 1600 javaw.exe -
Loads dropped DLL 63 IoCs
pid Process 2556 Soar Installer.exe 2192 Soar Installer.tmp 2180 Soar Client.exe 2180 Soar Client.exe 2180 Soar Client.exe 840 Process not Found 840 Process not Found 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 824 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2212 icacls.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2192 Soar Installer.tmp 2192 Soar Installer.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2192 Soar Installer.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 Soar Installer.tmp -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe 1600 javaw.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2192 2556 Soar Installer.exe 29 PID 2556 wrote to memory of 2192 2556 Soar Installer.exe 29 PID 2556 wrote to memory of 2192 2556 Soar Installer.exe 29 PID 2556 wrote to memory of 2192 2556 Soar Installer.exe 29 PID 2556 wrote to memory of 2192 2556 Soar Installer.exe 29 PID 2556 wrote to memory of 2192 2556 Soar Installer.exe 29 PID 2556 wrote to memory of 2192 2556 Soar Installer.exe 29 PID 2192 wrote to memory of 2180 2192 Soar Installer.tmp 31 PID 2192 wrote to memory of 2180 2192 Soar Installer.tmp 31 PID 2192 wrote to memory of 2180 2192 Soar Installer.tmp 31 PID 2192 wrote to memory of 2180 2192 Soar Installer.tmp 31 PID 2180 wrote to memory of 824 2180 Soar Client.exe 32 PID 2180 wrote to memory of 824 2180 Soar Client.exe 32 PID 2180 wrote to memory of 824 2180 Soar Client.exe 32 PID 2180 wrote to memory of 824 2180 Soar Client.exe 32 PID 824 wrote to memory of 2212 824 javaw.exe 33 PID 824 wrote to memory of 2212 824 javaw.exe 33 PID 824 wrote to memory of 2212 824 javaw.exe 33 PID 2180 wrote to memory of 1600 2180 Soar Client.exe 35 PID 2180 wrote to memory of 1600 2180 Soar Client.exe 35 PID 2180 wrote to memory of 1600 2180 Soar Client.exe 35 PID 2180 wrote to memory of 1600 2180 Soar Client.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Soar Installer.exe"C:\Users\Admin\AppData\Local\Temp\Soar Installer.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\is-VQHET.tmp\Soar Installer.tmp"C:\Users\Admin\AppData\Local\Temp\is-VQHET.tmp\Soar Installer.tmp" /SL5="$501AC,79072085,1088512,C:\Users\Admin\AppData\Local\Temp\Soar Installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\.soarclient\Soar Client.exe"C:\Users\Admin\AppData\Local\.soarclient\Soar Client.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\.soarclient\jre1.8.0_333\bin\javaw.exe"C:\Users\Admin\AppData\Local\.soarclient\jre1.8.0_333\bin\javaw.exe" -version4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M5⤵
- Modifies file permissions
PID:2212
-
-
-
C:\Users\Admin\AppData\Local\.soarclient\jre1.8.0_333\bin\javaw.exe"C:\Users\Admin\AppData\Local\.soarclient\jre1.8.0_333\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\.soarclient\Soar Client.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25.8MB
MD56ef37e591966538acfcb470d0fdb92a7
SHA1e2f49270c6bb8d9ecf32f80155805c15654d9189
SHA256db2845e42b24740e2cc3b048dc6810ff9c39bddcdf63ebdaef1d017afaf0c58e
SHA5120f529d947b024e8061d2695b5fa343764c9730a9e31953693b52aa33291c6f204b5627fe9186b454f7448b0191852cab19e1dd288515a96dad3e9306f198d228
-
Filesize
11KB
MD535bc1f1c6fbccec7eb8819178ef67664
SHA1bbcad0148ff008e984a75937aaddf1ef6fda5e0c
SHA2567a3c5167731238cf262f749aa46ab3bfb2ae1b22191b76e28e1d7499d28c24b7
SHA5129ab9b5b12215e57af5b3c588ed5003d978071dc591ed18c78c4563381a132edb7b2c508a8b75b4f1ed8823118d23c88eda453cd4b42b9020463416f8f6832a3d
-
Filesize
83KB
MD5eb34b0abcd15b7e41cf4006c082d71b7
SHA1471e74d6e0b48c878945574244c2075ed35dcbf1
SHA2562245c6bb65085f1f0ce6980a06af46916a82c63cbbb83fb34783ae4bd6da42f2
SHA512ae008698429be0d46108ab5a9dd9c854d3bce150ba63c6230471a8884b5950a3e5f3774b124b033a15e4828a6e5ec80cb487d58beb3a6c8957d9165070c0ea76
-
Filesize
634B
MD5499f2a4e0a25a41c1ff80df2d073e4fd
SHA1e2469cbe07e92d817637be4e889ebb74c3c46253
SHA25680847ed146dbc5a9f604b07ec887737fc266699abba266177b553149487ce9eb
SHA5127828f7b06d0f4309b9edd3aa71ae0bb7ee92d2f8df5642c13437bba2a3888e457dc9b24c16aa9e0f19231530cb44b8ccd955cbbdf5956ce8622cc208796b357d
-
Filesize
2.9MB
MD5f4cb41a6ae5faacbc8f4491314b95fac
SHA1c1ccfc571bfea9ce7495232a4ad175cb6523afcf
SHA256cf2254ebcf8498993b5829d96621a6ddab5e227cf94f4e562ac6f8fe3d694d27
SHA512738a678f6604447d1b55c2bd292b03149be414de15605f4d99b838355a5f3be956abf8eca2118865541d20309acc7260d6f64ed6c8764df390db7cc410777d2c
-
Filesize
153B
MD51e9d8f133a442da6b0c74d49bc84a341
SHA1259edc45b4569427e8319895a444f4295d54348f
SHA2561a1d3079d49583837662b84e11d8c0870698511d9110e710eb8e7eb20df7ae3b
SHA51263d6f70c8cab9735f0f857f5bf99e319f6ae98238dc7829dd706b7d6855c70be206e32e3e55df884402483cf8bebad00d139283af5c0b85dc1c5bf8f253acd37
-
Filesize
117KB
MD5781dc309ae8df17c7b14dac228bd6e5f
SHA1aeedfb043d8c8a735c2c23a32985e68717148c9d
SHA2566696d67667cec11385a10b1aecfb5e9c799e3cabb0e435a073487a9e688cc70f
SHA51223f8e4154e2745b85cdef8b8a9824dd0919c0fd11178ee8dc85cef728dccd4ec705961e7ac3c2fdea8ba8a67846b37aa623b613da634344b7b2c0aacffbb980c
-
Filesize
559KB
MD5e9e8b656d73513d45d5b042368c0f77c
SHA1e5b51233e08a1c37fde4cb54a42a814f62937ccf
SHA256ac5e1dcb727e19ec1d549d6011d2a80695f4e233f6b5f511d0b11818c1c6f324
SHA512b72ba451abe1277f5bbb66c2a4dd8323e6048042bcd75f3f6e27636fa2e3caefa2352a0504477c7d6d1fbce720514012cf3356110999137cf695db1d47aa2d31
-
Filesize
1.7MB
MD5989dccca127aa4760d091c1c4c71d1ee
SHA104de3c4d0aeac4c698429aa9a11b2a10ba235ff0
SHA256b5ac0fe4e10a61fac2cb32afed644e78ce284aff214c905a380969761558421f
SHA512239bd95c12408a595a94f91a23340d88e19896b6bf7f6c27d3f04fe7c25c216e040e60d1a6eb0536c8f9b1ad315336be8aefe845ec974bd1ff468225818e881d
-
Filesize
3.4MB
MD52aff0487ac3afeec87a90752654ade0d
SHA1770c8c99d6d93f680338cc8e234d0f8766cce836
SHA256ed9f7a1288929464e9ff645371cec95a5b89ac89378485d1b47ddda53d28b95e
SHA512b732dac84b352d2cccec59ac57e73ad0d6928cd11b7c0c0a131ebaba3c8d7e11215c843116c4262f3aa42508802ab8f6cf22799f72b53a85018d55cb4040f5d6
-
Filesize
484KB
MD50580d279ea1497d2e7a499c9fdcc2293
SHA1441763565f855644c715e1adfe6f7ede4bfebe26
SHA2566856d496708ef44499c3be8f0ad347af64c84d07a84e3d0612ec4e645c5fc245
SHA51262d9400c5a9b6da634ad28cb6de10c8860fa5a10558dea507cc4741c411c6272e0d03a9ecf99af2e4e76a45ace26537426706a6462f3d6141c8388f28da90877
-
Filesize
465KB
MD5c01cdc2b62193d2626e15e6bf42fa620
SHA12a78383cdda7062a6a7fea9acaf0b1f3dcdf8577
SHA2564cab9ece5a2c7ec73a4ddb1c6980c5acb337aeccc470858c632bc23bfb26a698
SHA5124dd91559b2a1ed18bd41006e74fb2a8ae9e7a9a8b5a6575c00bd914f8fac4570571028a9b9ad3ad450de8c854733da57f401f88e1372fdcc99902cdb883d57cf
-
Filesize
11KB
MD53bf4406de02aa148f460e5d709f4f67d
SHA189b28107c39bb216da00507ffd8adb7838d883f6
SHA256349a79fa1572e3538dfbb942610d8c47d03e8a41b98897bc02ec7e897d05237e
SHA5125ff6e8ad602d9e31ac88e06a6fbb54303c57d011c388f46d957aee8cd3b7d7cced8b6bfa821ff347ade62f7359acb1fba9ee181527f349c03d295bdb74efbace
-
Filesize
13KB
MD58acb83d102dabd9a5017a94239a2b0c6
SHA19b43a40a7b498e02f96107e1524fe2f4112d36ae
SHA256059cb23fdcf4d80b92e3da29e9ef4c322edf6fba9a1837978fd983e9bdfc7413
SHA512b7ecf60e20098ea509b76b1cc308a954a6ede8d836bf709790ce7d4bd1b85b84cf5f3aedf55af225d2d21fbd3065d01aa201dae6c131b8e1e3aa80ed6fc910a4
-
Filesize
11KB
MD59c9b50b204fcb84265810ef1f3c5d70a
SHA10913ab720bd692abcdb18a2609df6a7f85d96db3
SHA25625a99bdf8bf4d16077dc30dd9ffef7bb5a2ceaf9afcee7cf52ad408355239d40
SHA512ea2d22234e587ad9fa255d9f57907cc14327ead917fdede8b0a38516e7c7a08c4172349c8a7479ec55d1976a37e520628006f5c362f6a3ec76ec87978c4469cd
-
Filesize
11KB
MD543e1ae2e432eb99aa4427bb68f8826bb
SHA1eee1747b3ade5a9b985467512215caf7e0d4cb9b
SHA2563d798b9c345a507e142e8dacd7fb6c17528cc1453abfef2ffa9710d2fa9e032c
SHA51240ec0482f668bde71aeb4520a0709d3e84f093062bfbd05285e2cc09b19b7492cb96cdd6056281c213ab0560f87bd485ee4d2aeefa0b285d2d005634c1f3af0b
-
Filesize
15KB
MD5285dcd72d73559678cfd3ed39f81ddad
SHA1df22928e43ea6a9a41c1b2b5bfcab5ba58d2a83a
SHA2566c008be766c44bf968c9e91cddc5b472110beffee3106a99532e68c605c78d44
SHA51284ef0a843798fd6bd6246e1d40924be42550d3ef239dab6db4d423b142fa8f691c6f0603687901f1c52898554bf4f48d18d3aebd47de935560cde4906798c39a
-
Filesize
11KB
MD55cce7a5ed4c2ebaf9243b324f6618c0e
SHA1fdb5954ee91583a5a4cbb0054fb8b3bf6235eed3
SHA256aa3e3e99964d7f9b89f288dbe30ff18cbc960ee5add533ec1b8326fe63787aa3
SHA512fc85a3be23621145b8dc067290bd66416b6b1566001a799975bf99f0f526935e41a2c8861625e7cfb8539ca0621ed9f46343c04b6c41db812f58412be9c8a0de
-
Filesize
13KB
MD541fbbb054af69f0141e8fc7480d7f122
SHA13613a572b462845d6478a92a94769885da0843af
SHA256974af1f1a38c02869073b4e7ec4b2a47a6ce8339fa62c549da6b20668de6798c
SHA51297fb0a19227887d55905c2d622fbf5451921567f145be7855f72909eb3027f48a57d8c4d76e98305121b1b0cc1f5f2667ef6109c59a83ea1b3e266934b2eb33c
-
Filesize
12KB
MD5212d58cefb2347bd694b214a27828c83
SHA1f0e98e2d594054e8a836bd9c6f68c3fe5048f870
SHA2568166321f14d5804ce76f172f290a6f39ce81373257887d9897a6cf3925d47989
SHA512637c215ed3e781f824ae93a0e04a7b6c0a6b1694d489e9058203630dcfc0b8152f2eb452177ea9fd2872a8a1f29c539f85a2f2824cf50b1d7496fa3febe27dfe
-
Filesize
11KB
MD5242829c7be4190564becee51c7a43a7e
SHA1663154c1437acf66480518068fbc756f5cabb72f
SHA256edc1699e9995f98826df06d2c45beb9e02aa7817bae3e61373096ae7f6fa06e0
SHA5123529fde428affc3663c5c69baee60367a083841b49583080f0c4c7e72eaa63cabbf8b9da8ccfc473b3c552a0453405a4a68fcd7888d143529d53e5eec9a91a34
-
Filesize
20KB
MD5fb79420ec05aa715fe76d9b89111f3e2
SHA115c6d65837c9979af7ec143e034923884c3b0dbd
SHA256f6a93fe6b57a54aac46229f2ed14a0a979bf60416adb2b2cfc672386ccb2b42e
SHA512c40884c80f7921addced37b1bf282bb5cb47608e53d4f4127ef1c6ce7e6bb9a4adc7401389bc8504bf24751c402342693b11cef8d06862677a63159a04da544e
-
Filesize
15KB
MD5883120f9c25633b6c688577d024efd12
SHA1e4fa6254623a2b4cdea61712cdfa9c91aa905f18
SHA2564390c389bbbf9ec7215d12d22723efd77beb4cd83311c75ffe215725ecfd55dc
SHA512f17d3b667cc8002f4b6e6b96b630913fa1cb4083d855db5b7269518f6ff6eebf835544fa3b737f4fc0eb46ccb368778c4ae8b11ebcf9274ce1e5a0ba331a0e2f
-
Filesize
17KB
MD529680d7b1105171116a137450c8bb452
SHA1492bb8c231aae9d5f5af565abb208a706fb2b130
SHA2566f6f6e857b347f70ecc669b4df73c32e42199b834fe009641d7b41a0b1c210af
SHA51287dcf131e21041b06ed84c3a510fe360048de46f1975155b4b12e4bbf120f2dd0cb74ccd2e8691a39eee0da7f82ad39bc65c81f530fc0572a726f0a6661524f5
-
Filesize
17KB
MD5f816666e3fc087cd24828943cb15f260
SHA1eae814c9c41e3d333f43890ed7dafa3575e4c50e
SHA25645e0835b1d3b446fe2c347bd87922c53cfb6dd826499e19a1d977bf4c11b0e4a
SHA5126860abe8ab5220efb88f68b80e6c6e95fe35b4029f46b59bc467e3850fe671bda1c7c1c7b035b287bdfed5daeac879ee481d35330b153ea7ef2532970f62c581
-
Filesize
13KB
MD5143a735134cd8c889ec7d7b85298705b
SHA1906ac1f3a933dd57798ae826bbefa3096c20d424
SHA256b48310b0837027f756d62c37ea91af988baa403cbcbd01cb26b6fdae21ea96a2
SHA512c9abe209508afae2d1776391f73b658c9a25628876724344023e0fc8a790ecb7dbce75fddae267158d08a8237f83336b1d2bd5b5ce0a8eed7dd41cbe0c031d48
-
Filesize
11KB
MD56f1a1dfb2761228ccc7d07b8b190054c
SHA1117d66360c84a0088626e22d8b3b4b685cb70d56
SHA256c81c4bba4e5f205359ad145963f6fbd074879047c66569f52b6d66711108e1ed
SHA512480b4f9179d5da56010fa90e1937fe3a232f2f8682596c16eeaed08f57cf8cffeaa506060429501764f695cb6c5b3e56b0037de948c4d0e3933f022a0b4103d2
-
Filesize
161KB
MD523dc9ea08f4599c59d681f1c771c744c
SHA101cf00446982ff6843f7bed429f875091fc80715
SHA25629659ce10aa5ceb1af089dea04ea482d13bb227905912e88c4090b2cb57b137f
SHA51266f461d1c5753c8bd9e51aa316dae90e8545e91ca3040ff7fb13f427dc9ca7fdcc1f9544fb55d3e62c6e3748d5452860f524c609d7c359fa832d67699e8c25bd
-
Filesize
271KB
MD56231e89239bd86005fc2fb353a8526b4
SHA13a107bd11ae514e15045899bde8785cdb6581aad
SHA25680a21c722e3b66dec5ba055ffdc676a60df9e51920df87989c4c4e17a86c1362
SHA5128abe107670bd857885b1051f825ae5b5e05d72ee856282d569a505edfccdb5f78461e5363f74e91022129478ecec5febdcf11d3abbb86818883ac72e45aca095
-
Filesize
613KB
MD5c1b066f9e3e2f3a6785161a8c7e0346a
SHA18b3b943e79c40bc81fdac1e038a276d034bbe812
SHA25699e3e25cda404283fbd96b25b7683a8d213e7954674adefa2279123a8d0701fd
SHA51236f9e6c86afbd80375295238b67e4f472eb86fcb84a590d8dba928d4e7a502d4f903971827fdc331353e5b3d06616664450759432fdc8d304a56e7dacb84b728
-
Filesize
8.2MB
MD5942d98b1501f8c9785ee31abc189b1d1
SHA179a3db289778c0b56ebbf3200dcc6c3438da00c4
SHA2561909bab49e71b939c7c83264222b336037f812ea9facf8528d1f888d395b1e1a
SHA5123c0e0ce6e8aa3c91ef1ef1d5cf5327eaa9613986cb46995cd154b292c6c827aa3e4f4703571f21007fd1c295bb8c3b49b609c7e49352ce467d426f5153d512f9
-
Filesize
987KB
MD561eb0ad4c285b60732353a0cb5c9b2ab
SHA121a1bea01f6ca7e9828a522c696853706d0a457b
SHA25610521fe73fe05f2ba95d40757d9f676f2091e2ed578da9d5cdef352f986f3bcd
SHA51244cd871f48b5193abb3b9664dbea8cdad19e72c47b6967c685cf1cc803bc9abb48a8a93009c972ef4936e7f78e3c92110828790aa0a9d26b80e6a523bbcd830d
-
Filesize
83KB
MD51453290db80241683288f33e6dd5e80e
SHA129fb9af50458df43ef40bfc8f0f516d0c0a106fd
SHA2562b7602cc1521101d116995e3e2ddfe0943349806378a0d40add81ba64e359b6c
SHA5124ea48a11e29ea7ac3957dcab1a7912f83fd1c922c43d7b7d78523178fe236b4418729455b78ac672bb5632ecd5400746179802c6a9690adb025270b0ade84e91
-
Filesize
52KB
MD5e2cc910caccde3ddea08b9d2c4dc8b71
SHA1ab308c687668fe0026160232f69e21b74bbe572d
SHA256fc55cbdaabcbde5cb41901a83d781bcfac03c0c4065e5c0c10b146365bbdd528
SHA512d334a9ffbb88e2b30ea620917728b6fca32636fa2c44ca0e3d88eca6de5ba149f9de1bbf796bdca447101d89e16aaf469f23f49a1f34b7c15528430606b904b3
-
Filesize
3.3MB
MD512f82197a0231c9c3ce864008b421869
SHA11f460c14e6b31cfdd79456023933aa8cd5088905
SHA25618a287987ef5c733faef4b8837fb4590ed189f3b9a6f47ca8ab7c30e861d3f42
SHA512133949c9b18a4ad9d42eb7be2b56e97e263494c5d14c561b0a705c10ab194c1a97bd837b568fe22a65abd74e1945f47277ed32dbe359849ae97ba2ae03952c67