Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3RobloxInjector.exe
windows7-x64
10RobloxInjector.exe
windows10-2004-x64
10bin/d3dcom...43.dll
windows7-x64
3bin/d3dcom...43.dll
windows10-2004-x64
3bin/libEGL.dll
windows7-x64
1bin/libEGL.dll
windows10-2004-x64
1bin/libGLESv2.dll
windows7-x64
1bin/libGLESv2.dll
windows10-2004-x64
1bin/libcry...64.dll
windows7-x64
1bin/libcry...64.dll
windows10-2004-x64
1bin/natives_blob.js
windows7-x64
3bin/natives_blob.js
windows10-2004-x64
3bin/report...64.dll
windows7-x64
1bin/report...64.dll
windows10-2004-x64
1bin/report...em.dll
windows7-x64
1bin/report...em.dll
windows10-2004-x64
1bin/report...ew.dll
windows7-x64
1bin/report...ew.dll
windows10-2004-x64
1bin/report...er.dll
windows7-x64
1bin/report...er.dll
windows10-2004-x64
1bin/reports/cs2.exe
windows7-x64
1bin/reports/cs2.exe
windows10-2004-x64
1bin/report...47.dll
windows10-2004-x64
1bin/report...lp.dll
windows7-x64
1bin/report...lp.dll
windows10-2004-x64
1bin/report...e2.dll
windows7-x64
1bin/report...e2.dll
windows10-2004-x64
1bin/report...io.dll
windows7-x64
1bin/report...io.dll
windows10-2004-x64
1bin/report...64.dll
windows7-x64
1bin/report...64.dll
windows10-2004-x64
1bin/report...em.dll
windows7-x64
1Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29/11/2024, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
RobloxInjector.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
RobloxInjector.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
bin/d3dcompiler_43.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
bin/d3dcompiler_43.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
bin/libEGL.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
bin/libEGL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
bin/libGLESv2.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
bin/libGLESv2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
bin/libcrypto-1_1-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
bin/libcrypto-1_1-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
bin/natives_blob.js
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
bin/natives_blob.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
bin/reports/amd_ags_x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
bin/reports/amd_ags_x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
bin/reports/animationsystem.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
bin/reports/animationsystem.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
bin/reports/assetpreview.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
bin/reports/assetpreview.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
bin/reports/ati_compress_wrapper.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
bin/reports/ati_compress_wrapper.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
bin/reports/cs2.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
bin/reports/cs2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
bin/reports/d3dcompiler_47.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
bin/reports/dbghelp.dll
Resource
win7-20240708-en
Behavioral task
behavioral25
Sample
bin/reports/dbghelp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
bin/reports/engine2.dll
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
bin/reports/engine2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
bin/reports/filesystem_stdio.dll
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
bin/reports/filesystem_stdio.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
bin/reports/gfsdk_aftermath_lib.x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
bin/reports/gfsdk_aftermath_lib.x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral32
Sample
bin/reports/helpsystem.dll
Resource
win7-20241010-en
General
-
Target
RobloxInjector.exe
-
Size
643.6MB
-
MD5
a726fea7cdd1d2a92cbeac73348b421e
-
SHA1
a5f69df93108582acc64f6dd657ba8bbcf3f59a0
-
SHA256
e64730dd7dafd54e6c2071bd4ea593183bea7f13cb9565b49868b791c0038fc1
-
SHA512
08eea35ade0f717e8e4dd642d3d6d43ccd9961744ce88847f8f6550c95b5c3e4262cda5587041f40fcb3151acdfee21341c3de014e244c167c0167bb2dce47dd
-
SSDEEP
196608:SQMOi4kWU+f6zuiVkwzAqdyT+Qf+RLmN45Rk:SQMOddff6PVkwttQf+RLy45R
Malware Config
Extracted
meduza
45.130.145.152
-
anti_dbg
true
-
anti_vm
true
-
build_name
Work
-
extensions
.txt;.doc;.docx;.pdf;.xls;.xlsx;.log;.db;.sqlite
-
grabber_max_size
4.194304e+06
-
port
15666
-
self_destruct
false
Signatures
-
Meduza Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/2948-13-0x0000000001CF0000-0x0000000001E2E000-memory.dmp family_meduza behavioral1/memory/2948-17-0x0000000001CF0000-0x0000000001E2E000-memory.dmp family_meduza -
Meduza family
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\International\Geo\Nation 0e9c76bc-9a35-40b3-b7fd-73fe1b5dd4ee.exe -
Executes dropped EXE 1 IoCs
pid Process 2948 0e9c76bc-9a35-40b3-b7fd-73fe1b5dd4ee.exe -
Loads dropped DLL 4 IoCs
pid Process 1640 RobloxInjector.exe 2872 WerFault.exe 2872 WerFault.exe 2872 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 64 IoCs
pid Process 1632 timeout.exe 1488 timeout.exe 1964 timeout.exe 548 timeout.exe 1376 timeout.exe 2648 timeout.exe 2992 timeout.exe 1844 timeout.exe 3012 timeout.exe 2988 timeout.exe 2240 timeout.exe 2784 timeout.exe 1560 timeout.exe 2356 timeout.exe 1788 timeout.exe 1416 timeout.exe 1744 timeout.exe 2792 timeout.exe 2608 timeout.exe 1216 timeout.exe 1796 timeout.exe 852 timeout.exe 2968 timeout.exe 1460 timeout.exe 1500 timeout.exe 828 timeout.exe 2832 timeout.exe 448 timeout.exe 2848 timeout.exe 3036 timeout.exe 3004 timeout.exe 1976 timeout.exe 2760 timeout.exe 1760 timeout.exe 1956 timeout.exe 1504 timeout.exe 268 timeout.exe 2828 timeout.exe 2868 timeout.exe 1916 timeout.exe 1696 timeout.exe 2660 timeout.exe 1240 timeout.exe 1104 timeout.exe 2592 timeout.exe 2380 timeout.exe 2000 timeout.exe 2288 timeout.exe 1100 timeout.exe 3032 timeout.exe 1512 timeout.exe 2068 timeout.exe 600 timeout.exe 1720 timeout.exe 1980 timeout.exe 2844 timeout.exe 2024 timeout.exe 1904 timeout.exe 1784 timeout.exe 2224 timeout.exe 664 timeout.exe 1496 timeout.exe 2228 timeout.exe 2836 timeout.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1640 RobloxInjector.exe Token: SeDebugPrivilege 2948 0e9c76bc-9a35-40b3-b7fd-73fe1b5dd4ee.exe Token: SeImpersonatePrivilege 2948 0e9c76bc-9a35-40b3-b7fd-73fe1b5dd4ee.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2948 1640 RobloxInjector.exe 31 PID 1640 wrote to memory of 2948 1640 RobloxInjector.exe 31 PID 1640 wrote to memory of 2948 1640 RobloxInjector.exe 31 PID 2948 wrote to memory of 2872 2948 0e9c76bc-9a35-40b3-b7fd-73fe1b5dd4ee.exe 32 PID 2948 wrote to memory of 2872 2948 0e9c76bc-9a35-40b3-b7fd-73fe1b5dd4ee.exe 32 PID 2948 wrote to memory of 2872 2948 0e9c76bc-9a35-40b3-b7fd-73fe1b5dd4ee.exe 32 PID 1640 wrote to memory of 536 1640 RobloxInjector.exe 33 PID 1640 wrote to memory of 536 1640 RobloxInjector.exe 33 PID 1640 wrote to memory of 536 1640 RobloxInjector.exe 33 PID 536 wrote to memory of 2784 536 cmd.exe 35 PID 536 wrote to memory of 2784 536 cmd.exe 35 PID 536 wrote to memory of 2784 536 cmd.exe 35 PID 536 wrote to memory of 2648 536 cmd.exe 36 PID 536 wrote to memory of 2648 536 cmd.exe 36 PID 536 wrote to memory of 2648 536 cmd.exe 36 PID 536 wrote to memory of 2968 536 cmd.exe 37 PID 536 wrote to memory of 2968 536 cmd.exe 37 PID 536 wrote to memory of 2968 536 cmd.exe 37 PID 536 wrote to memory of 2760 536 cmd.exe 38 PID 536 wrote to memory of 2760 536 cmd.exe 38 PID 536 wrote to memory of 2760 536 cmd.exe 38 PID 536 wrote to memory of 2792 536 cmd.exe 39 PID 536 wrote to memory of 2792 536 cmd.exe 39 PID 536 wrote to memory of 2792 536 cmd.exe 39 PID 536 wrote to memory of 1512 536 cmd.exe 42 PID 536 wrote to memory of 1512 536 cmd.exe 42 PID 536 wrote to memory of 1512 536 cmd.exe 42 PID 536 wrote to memory of 1904 536 cmd.exe 43 PID 536 wrote to memory of 1904 536 cmd.exe 43 PID 536 wrote to memory of 1904 536 cmd.exe 43 PID 536 wrote to memory of 1632 536 cmd.exe 44 PID 536 wrote to memory of 1632 536 cmd.exe 44 PID 536 wrote to memory of 1632 536 cmd.exe 44 PID 536 wrote to memory of 268 536 cmd.exe 45 PID 536 wrote to memory of 268 536 cmd.exe 45 PID 536 wrote to memory of 268 536 cmd.exe 45 PID 536 wrote to memory of 2000 536 cmd.exe 46 PID 536 wrote to memory of 2000 536 cmd.exe 46 PID 536 wrote to memory of 2000 536 cmd.exe 46 PID 536 wrote to memory of 2608 536 cmd.exe 47 PID 536 wrote to memory of 2608 536 cmd.exe 47 PID 536 wrote to memory of 2608 536 cmd.exe 47 PID 536 wrote to memory of 2868 536 cmd.exe 48 PID 536 wrote to memory of 2868 536 cmd.exe 48 PID 536 wrote to memory of 2868 536 cmd.exe 48 PID 536 wrote to memory of 2832 536 cmd.exe 49 PID 536 wrote to memory of 2832 536 cmd.exe 49 PID 536 wrote to memory of 2832 536 cmd.exe 49 PID 536 wrote to memory of 1916 536 cmd.exe 50 PID 536 wrote to memory of 1916 536 cmd.exe 50 PID 536 wrote to memory of 1916 536 cmd.exe 50 PID 536 wrote to memory of 1216 536 cmd.exe 51 PID 536 wrote to memory of 1216 536 cmd.exe 51 PID 536 wrote to memory of 1216 536 cmd.exe 51 PID 536 wrote to memory of 1504 536 cmd.exe 52 PID 536 wrote to memory of 1504 536 cmd.exe 52 PID 536 wrote to memory of 1504 536 cmd.exe 52 PID 536 wrote to memory of 1560 536 cmd.exe 53 PID 536 wrote to memory of 1560 536 cmd.exe 53 PID 536 wrote to memory of 1560 536 cmd.exe 53 PID 536 wrote to memory of 2356 536 cmd.exe 54 PID 536 wrote to memory of 2356 536 cmd.exe 54 PID 536 wrote to memory of 2356 536 cmd.exe 54 PID 536 wrote to memory of 1696 536 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\RobloxInjector.exe"C:\Users\Admin\AppData\Local\Temp\RobloxInjector.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\ec08d170-d41b-49be-90b9-815366357fc0\0e9c76bc-9a35-40b3-b7fd-73fe1b5dd4ee.exe"C:\Users\Admin\AppData\Local\Temp\ec08d170-d41b-49be-90b9-815366357fc0\0e9c76bc-9a35-40b3-b7fd-73fe1b5dd4ee.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2948 -s 6203⤵
- Loads dropped DLL
PID:2872
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ec08d170-d41b-49be-90b9-815366357fc0\cleanup.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2784
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2648
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2968
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2760
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2792
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1512
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1904
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1632
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:268
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2000
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2608
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2868
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2832
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1916
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1216
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1504
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1560
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2356
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1696
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2848
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2288
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1488
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1788
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1760
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1964
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1416
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1980
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1796
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2988
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:3012
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2836
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:3036
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2992
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:3004
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2844
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2828
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:548
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2660
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1240
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2024
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1784
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1460
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1956
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:852
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2224
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:448
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1100
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2240
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2068
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:3032
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1500
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1976
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:600
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:664
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1376
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1844
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1104
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2592
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1744
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1496
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1720
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:828
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2380
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2228
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
379B
MD5e0d6a376d14a655dc3c72ddab179662f
SHA12dda72cd473894a32388ec2f309b72fad3e62e04
SHA256001c74fbe12b266e468ca37c57f04445ab7246135f58ac350f07243542734878
SHA5122cf279e22710673c979876c5d86c0f38f8209f39e3e23b71e3ec0c7d2c0953181f3a9e8a9eb6a5cb23c14e8fb352879ea3198b9e527ccddb36fda4b7199cb237
-
\Users\Admin\AppData\Local\Temp\ec08d170-d41b-49be-90b9-815366357fc0\0e9c76bc-9a35-40b3-b7fd-73fe1b5dd4ee.exe
Filesize3.2MB
MD5814a59368670f8d35ad8eb71ab874666
SHA1ca386125774e35b84c16bacfbe52919a354434ac
SHA25698d8aa77d46e09b79c04b5f4556b1d389c6f62549a5ac0f961a6d8f2961fa55d
SHA51257c30c5838a59f7d82343d40cbb539a1405485f51ceaf6350c52b27b1e54d5a9c9e2b8e08a8a73644e1ddd2733135128b1339c53676ba770a3bd0d69f33c192f