Analysis
-
max time kernel
136s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
14-10-2022 09:49
Static task
static1
Behavioral task
behavioral1
Sample
43448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
43448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0.exe
Resource
win10v2004-20220812-en
General
-
Target
43448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0.exe
-
Size
84KB
-
MD5
635c6004617876cf727d30dfa4b0ff1f
-
SHA1
d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
-
SHA256
43448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
-
SHA512
451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
SSDEEP
1536:ZaZzWGJ33Ih0dT6oCoHzBAO2gNgZt1nHFLe7ie55wSU/DOcDuArClBbGCm/qROU:YJ35/Co1Atdb1nHFLzHSODOcDuArCRJ
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
pid Process 1680 xpiso.exe 1880 xpiso.exe 1764 xpiso.exe 2044 xpiso.exe 1612 xpiso.exe 1976 xpiso.exe 1816 xpiso.exe 1836 xpiso.exe 1068 xpiso.exe -
Loads dropped DLL 18 IoCs
pid Process 1696 43448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0.exe 1696 43448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0.exe 1680 xpiso.exe 1680 xpiso.exe 1880 xpiso.exe 1880 xpiso.exe 1764 xpiso.exe 1764 xpiso.exe 2044 xpiso.exe 2044 xpiso.exe 1612 xpiso.exe 1612 xpiso.exe 1976 xpiso.exe 1976 xpiso.exe 1816 xpiso.exe 1816 xpiso.exe 1836 xpiso.exe 1836 xpiso.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File created C:\Windows\SysWOW64\xpiso.exe xpiso.exe File created C:\Windows\SysWOW64\xpiso.exe 43448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0.exe File opened for modification C:\Windows\SysWOW64\xpiso.exe xpiso.exe File created C:\Windows\SysWOW64\xpiso.exe xpiso.exe File opened for modification C:\Windows\SysWOW64\xpiso.exe xpiso.exe File created C:\Windows\SysWOW64\xpiso.exe xpiso.exe File created C:\Windows\SysWOW64\xpiso.exe xpiso.exe File opened for modification C:\Windows\SysWOW64\xpiso.exe 43448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0.exe File created C:\Windows\SysWOW64\xpiso.exe xpiso.exe File opened for modification C:\Windows\SysWOW64\xpiso.exe xpiso.exe File created C:\Windows\SysWOW64\xpiso.exe xpiso.exe File opened for modification C:\Windows\SysWOW64\xpiso.exe xpiso.exe File created C:\Windows\SysWOW64\xpiso.exe xpiso.exe File created C:\Windows\SysWOW64\xpiso.exe xpiso.exe File opened for modification C:\Windows\SysWOW64\xpiso.exe xpiso.exe File opened for modification C:\Windows\SysWOW64\xpiso.exe xpiso.exe File opened for modification C:\Windows\SysWOW64\xpiso.exe xpiso.exe File opened for modification C:\Windows\SysWOW64\xpiso.exe xpiso.exe File created C:\Windows\SysWOW64\xpiso.exe xpiso.exe File opened for modification C:\Windows\SysWOW64\xpiso.exe xpiso.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1680 1696 43448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0.exe 27 PID 1696 wrote to memory of 1680 1696 43448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0.exe 27 PID 1696 wrote to memory of 1680 1696 43448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0.exe 27 PID 1696 wrote to memory of 1680 1696 43448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0.exe 27 PID 1680 wrote to memory of 1880 1680 xpiso.exe 28 PID 1680 wrote to memory of 1880 1680 xpiso.exe 28 PID 1680 wrote to memory of 1880 1680 xpiso.exe 28 PID 1680 wrote to memory of 1880 1680 xpiso.exe 28 PID 1880 wrote to memory of 1764 1880 xpiso.exe 29 PID 1880 wrote to memory of 1764 1880 xpiso.exe 29 PID 1880 wrote to memory of 1764 1880 xpiso.exe 29 PID 1880 wrote to memory of 1764 1880 xpiso.exe 29 PID 1764 wrote to memory of 2044 1764 xpiso.exe 30 PID 1764 wrote to memory of 2044 1764 xpiso.exe 30 PID 1764 wrote to memory of 2044 1764 xpiso.exe 30 PID 1764 wrote to memory of 2044 1764 xpiso.exe 30 PID 2044 wrote to memory of 1612 2044 xpiso.exe 31 PID 2044 wrote to memory of 1612 2044 xpiso.exe 31 PID 2044 wrote to memory of 1612 2044 xpiso.exe 31 PID 2044 wrote to memory of 1612 2044 xpiso.exe 31 PID 1612 wrote to memory of 1976 1612 xpiso.exe 32 PID 1612 wrote to memory of 1976 1612 xpiso.exe 32 PID 1612 wrote to memory of 1976 1612 xpiso.exe 32 PID 1612 wrote to memory of 1976 1612 xpiso.exe 32 PID 1976 wrote to memory of 1816 1976 xpiso.exe 33 PID 1976 wrote to memory of 1816 1976 xpiso.exe 33 PID 1976 wrote to memory of 1816 1976 xpiso.exe 33 PID 1976 wrote to memory of 1816 1976 xpiso.exe 33 PID 1816 wrote to memory of 1836 1816 xpiso.exe 34 PID 1816 wrote to memory of 1836 1816 xpiso.exe 34 PID 1816 wrote to memory of 1836 1816 xpiso.exe 34 PID 1816 wrote to memory of 1836 1816 xpiso.exe 34 PID 1836 wrote to memory of 1068 1836 xpiso.exe 35 PID 1836 wrote to memory of 1068 1836 xpiso.exe 35 PID 1836 wrote to memory of 1068 1836 xpiso.exe 35 PID 1836 wrote to memory of 1068 1836 xpiso.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\43448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0.exe"C:\Users\Admin\AppData\Local\Temp\43448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\xpiso.exeC:\Windows\system32\xpiso.exe 540 "C:\Users\Admin\AppData\Local\Temp\43448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\xpiso.exeC:\Windows\system32\xpiso.exe 528 "C:\Windows\SysWOW64\xpiso.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\xpiso.exeC:\Windows\system32\xpiso.exe 536 "C:\Windows\SysWOW64\xpiso.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\xpiso.exeC:\Windows\system32\xpiso.exe 548 "C:\Windows\SysWOW64\xpiso.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\xpiso.exeC:\Windows\system32\xpiso.exe 556 "C:\Windows\SysWOW64\xpiso.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\xpiso.exeC:\Windows\system32\xpiso.exe 552 "C:\Windows\SysWOW64\xpiso.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\xpiso.exeC:\Windows\system32\xpiso.exe 568 "C:\Windows\SysWOW64\xpiso.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\xpiso.exeC:\Windows\system32\xpiso.exe 564 "C:\Windows\SysWOW64\xpiso.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\xpiso.exeC:\Windows\system32\xpiso.exe 524 "C:\Windows\SysWOW64\xpiso.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1068
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e
-
Filesize
84KB
MD5635c6004617876cf727d30dfa4b0ff1f
SHA1d69cbb294c6aa6be7c5a25eb2f57711b77fd53c2
SHA25643448966a0e7d98ac922914669bb9e234aecb41d7524cb6fa58326511b5528d0
SHA512451f28ec7e9e7ce803ab7ea3c2cc2b0004b2f20fbda12aa3b52a20519109ad5dc0efd91a61489a661cd0951ed5ea66500ab9d74d06f6c05678a0d448e463db6e