Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
14-10-2022 21:00
Static task
static1
Behavioral task
behavioral1
Sample
8ee36a6c15f6a406eaa75e38bcad95ad3a3d1ab17129ef04ad4be754e661f40e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8ee36a6c15f6a406eaa75e38bcad95ad3a3d1ab17129ef04ad4be754e661f40e.exe
Resource
win10v2004-20220812-en
General
-
Target
8ee36a6c15f6a406eaa75e38bcad95ad3a3d1ab17129ef04ad4be754e661f40e.exe
-
Size
159KB
-
MD5
116669c194c69dec2238a16c9794e99d
-
SHA1
a433dd9a553a583191ab6d170ae45e7f852981a1
-
SHA256
8ee36a6c15f6a406eaa75e38bcad95ad3a3d1ab17129ef04ad4be754e661f40e
-
SHA512
f8ec04190153b4b0d68133d35ec39862a3c2534bb9b7e8fdcf4774baf62a3c52826d7eedd74993725ae5b87f6538ae97f32e9a3f13d1cf31871a4f1843e92dab
-
SSDEEP
3072:+iFx+MrcRKO6ZWpY+38pa6XZNkPN9VBACgg7gy0J:+iFI7RKOj5gbXZNk9w4gZJ
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000b0000000122f9-60.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-61.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-63.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-68.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-70.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-75.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-77.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-82.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-84.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-89.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-91.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-99.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-101.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-106.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-108.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-113.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-115.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-120.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-122.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-127.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-129.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-135.dat aspack_v212_v242 behavioral1/files/0x000b0000000122f9-137.dat aspack_v212_v242 -
Executes dropped EXE 11 IoCs
pid Process 768 1.exe 892 1.exe 2000 1.exe 1532 1.exe 884 1.exe 1456 1.exe 1552 1.exe 1980 1.exe 1964 1.exe 588 1.exe 1528 1.exe -
Loads dropped DLL 11 IoCs
pid Process 984 cmd.exe 984 cmd.exe 984 cmd.exe 984 cmd.exe 984 cmd.exe 984 cmd.exe 984 cmd.exe 984 cmd.exe 984 cmd.exe 984 cmd.exe 984 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1656 PING.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1048 wrote to memory of 984 1048 8ee36a6c15f6a406eaa75e38bcad95ad3a3d1ab17129ef04ad4be754e661f40e.exe 27 PID 1048 wrote to memory of 984 1048 8ee36a6c15f6a406eaa75e38bcad95ad3a3d1ab17129ef04ad4be754e661f40e.exe 27 PID 1048 wrote to memory of 984 1048 8ee36a6c15f6a406eaa75e38bcad95ad3a3d1ab17129ef04ad4be754e661f40e.exe 27 PID 1048 wrote to memory of 984 1048 8ee36a6c15f6a406eaa75e38bcad95ad3a3d1ab17129ef04ad4be754e661f40e.exe 27 PID 1048 wrote to memory of 984 1048 8ee36a6c15f6a406eaa75e38bcad95ad3a3d1ab17129ef04ad4be754e661f40e.exe 27 PID 1048 wrote to memory of 984 1048 8ee36a6c15f6a406eaa75e38bcad95ad3a3d1ab17129ef04ad4be754e661f40e.exe 27 PID 1048 wrote to memory of 984 1048 8ee36a6c15f6a406eaa75e38bcad95ad3a3d1ab17129ef04ad4be754e661f40e.exe 27 PID 984 wrote to memory of 888 984 cmd.exe 29 PID 984 wrote to memory of 888 984 cmd.exe 29 PID 984 wrote to memory of 888 984 cmd.exe 29 PID 984 wrote to memory of 888 984 cmd.exe 29 PID 984 wrote to memory of 888 984 cmd.exe 29 PID 984 wrote to memory of 888 984 cmd.exe 29 PID 984 wrote to memory of 888 984 cmd.exe 29 PID 984 wrote to memory of 768 984 cmd.exe 30 PID 984 wrote to memory of 768 984 cmd.exe 30 PID 984 wrote to memory of 768 984 cmd.exe 30 PID 984 wrote to memory of 768 984 cmd.exe 30 PID 984 wrote to memory of 768 984 cmd.exe 30 PID 984 wrote to memory of 768 984 cmd.exe 30 PID 984 wrote to memory of 768 984 cmd.exe 30 PID 984 wrote to memory of 892 984 cmd.exe 31 PID 984 wrote to memory of 892 984 cmd.exe 31 PID 984 wrote to memory of 892 984 cmd.exe 31 PID 984 wrote to memory of 892 984 cmd.exe 31 PID 984 wrote to memory of 892 984 cmd.exe 31 PID 984 wrote to memory of 892 984 cmd.exe 31 PID 984 wrote to memory of 892 984 cmd.exe 31 PID 984 wrote to memory of 2000 984 cmd.exe 32 PID 984 wrote to memory of 2000 984 cmd.exe 32 PID 984 wrote to memory of 2000 984 cmd.exe 32 PID 984 wrote to memory of 2000 984 cmd.exe 32 PID 984 wrote to memory of 2000 984 cmd.exe 32 PID 984 wrote to memory of 2000 984 cmd.exe 32 PID 984 wrote to memory of 2000 984 cmd.exe 32 PID 984 wrote to memory of 1532 984 cmd.exe 33 PID 984 wrote to memory of 1532 984 cmd.exe 33 PID 984 wrote to memory of 1532 984 cmd.exe 33 PID 984 wrote to memory of 1532 984 cmd.exe 33 PID 984 wrote to memory of 1532 984 cmd.exe 33 PID 984 wrote to memory of 1532 984 cmd.exe 33 PID 984 wrote to memory of 1532 984 cmd.exe 33 PID 984 wrote to memory of 884 984 cmd.exe 34 PID 984 wrote to memory of 884 984 cmd.exe 34 PID 984 wrote to memory of 884 984 cmd.exe 34 PID 984 wrote to memory of 884 984 cmd.exe 34 PID 984 wrote to memory of 884 984 cmd.exe 34 PID 984 wrote to memory of 884 984 cmd.exe 34 PID 984 wrote to memory of 884 984 cmd.exe 34 PID 984 wrote to memory of 1456 984 cmd.exe 35 PID 984 wrote to memory of 1456 984 cmd.exe 35 PID 984 wrote to memory of 1456 984 cmd.exe 35 PID 984 wrote to memory of 1456 984 cmd.exe 35 PID 984 wrote to memory of 1456 984 cmd.exe 35 PID 984 wrote to memory of 1456 984 cmd.exe 35 PID 984 wrote to memory of 1456 984 cmd.exe 35 PID 984 wrote to memory of 1552 984 cmd.exe 36 PID 984 wrote to memory of 1552 984 cmd.exe 36 PID 984 wrote to memory of 1552 984 cmd.exe 36 PID 984 wrote to memory of 1552 984 cmd.exe 36 PID 984 wrote to memory of 1552 984 cmd.exe 36 PID 984 wrote to memory of 1552 984 cmd.exe 36 PID 984 wrote to memory of 1552 984 cmd.exe 36 PID 984 wrote to memory of 1980 984 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ee36a6c15f6a406eaa75e38bcad95ad3a3d1ab17129ef04ad4be754e661f40e.exe"C:\Users\Admin\AppData\Local\Temp\8ee36a6c15f6a406eaa75e38bcad95ad3a3d1ab17129ef04ad4be754e661f40e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\0.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir /s /b "*.doc" "*.xls" "*.txt" "*.ppt" "*.docx" "*.xlsx" "*.pptx" "*.pdf" "*.mlf" "*.jpg" "*.png" "*.bmp"3⤵PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\dd_NDP472-KB4054530-x86-x64-AllOS-ENU_decompression_log.txt"3⤵
- Executes dropped EXE
PID:768
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\dd_SetupUtility.txt"3⤵
- Executes dropped EXE
PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI640E.txt"3⤵
- Executes dropped EXE
PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI6476.txt"3⤵
- Executes dropped EXE
PID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI640E.txt"3⤵
- Executes dropped EXE
PID:884
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI6476.txt"3⤵
- Executes dropped EXE
PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\dd_wcf_CA_smci_20220901_133527_258.txt"3⤵
- Executes dropped EXE
PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\dd_wcf_CA_smci_20220901_133528_724.txt"3⤵
- Executes dropped EXE
PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\FXSAPIDebugLogFile.txt"3⤵
- Executes dropped EXE
PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\Microsoft .NET Framework 4.7.2 Setup_20220901_133503561-MSI_netfx_Full_x64.msi.txt"3⤵
- Executes dropped EXE
PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\Admin.bmp"3⤵
- Executes dropped EXE
PID:1528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir /s /b "*_*.doc" "*.xls" "*_*.txt" "*_*.ppt" "*_*.docx" "*_*.xlsx" "*_*.pptx" "*_*.pdf" "*_*.mlf" "*_*.jpg" "*_*.png" "*_*.bmp"3⤵PID:1524
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.0.0.13⤵
- Runs ping.exe
PID:1656
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51495442e7e355dc5241fb2fafa936db6
SHA14ebf68683fedda6b969b6f772fc2eb5abd2ae8dd
SHA256d434dc558dd8a797c26f86a6743e4072f48d822664a9d340f1525545792ec795
SHA512d57976738592f03756925bb0dae102f383b267d1b94517fb493e29d22b5b56fd0ee9839f0279030d834d15950c07e0d73145467350205a56e5a73ba8b1f7368d
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
Filesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6