Analysis
-
max time kernel
90s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2023, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
avast_setup_offline.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
avast_setup_offline.exe
Resource
win10v2004-20220812-en
General
-
Target
avast_setup_offline.exe
-
Size
698.1MB
-
MD5
9a20a05ff03f91145e826b0a778422d2
-
SHA1
8bbc9f4ff8a4e04afe41edb7287a9b2470864a42
-
SHA256
08e7454e5ed4466e82e148134e179c3aaa1062ffb3448c1d7240dfa5c36c2371
-
SHA512
8099169e868053f225742dbf855eafe76f0f81daf09726f166b561f79e01526f5438708dfac27c4168c3d3650869ffc260734ba90f6d2b5b11713f8274761b91
-
SSDEEP
12582912:fZYcu+AIJEfIub4XU723Ko1cqB6rSfuzpk0gF+s9PkZnNmTxh4XpV:fucZA1HbF723Ko1vjuzT2n6Ab4r
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 308 created 1452 308 svchost.exe 91 -
Executes dropped EXE 5 IoCs
pid Process 3708 instup.exe 4672 aswOfferTool.exe 4544 aswOfferTool.exe 1452 aswOfferTool.exe 1672 aswOfferTool.exe -
Loads dropped DLL 6 IoCs
pid Process 3708 instup.exe 3708 instup.exe 3708 instup.exe 3708 instup.exe 4544 aswOfferTool.exe 1672 aswOfferTool.exe -
Checks for any installed AV software in registry 1 TTPs 28 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\MovedFolder instup.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast instup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\JournalFolder instup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\properties instup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\Instup_IgnoredDownloadTypes instup.exe Key opened \Registry\MACHINE\SOFTWARE\Avast Software\Avast avast_setup_offline.exe Key created \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast instup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\ChestFolder instup.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast avast_setup_offline.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\DataFolder instup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\CrashGuardProcessWatcherExclusions instup.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira\Antivirus instup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast avast_setup_offline.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\ProgramFolder instup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\TempFolder instup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\LicenseFile instup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\CertificateFile instup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\properties\UseRegistry instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\properties instup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\LogFolder instup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\ShepherdDebug instup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast instup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\ReportFolder instup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\FwDataFolder instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\SetupLog = "C:\\ProgramData\\Avast Software\\Persistent Data\\Avast\\Logs\\Setup.log" instup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\properties\settings instup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\properties\burger_client instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast\properties\UseRegistry = "1" instup.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 avast_setup_offline.exe File opened for modification \??\PhysicalDrive0 instup.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz instup.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 avast_setup_offline.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision instup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature avast_setup_offline.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision avast_setup_offline.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AvastPersistentStorage avast_setup_offline.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvastPersistentStorage\SfxInstProgress = "0" avast_setup_offline.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AvastPersistentStorage instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvastPersistentStorage\InstupProgress_Description = "Checking install conditions" instup.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1680 avast_setup_offline.exe 1680 avast_setup_offline.exe 3708 instup.exe 3708 instup.exe 3708 instup.exe 3708 instup.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: 32 1680 avast_setup_offline.exe Token: 32 3708 instup.exe Token: SeDebugPrivilege 3708 instup.exe Token: SeDebugPrivilege 1452 aswOfferTool.exe Token: SeImpersonatePrivilege 1452 aswOfferTool.exe Token: SeTcbPrivilege 308 svchost.exe Token: SeTcbPrivilege 308 svchost.exe Token: SeBackupPrivilege 308 svchost.exe Token: SeRestorePrivilege 308 svchost.exe Token: SeBackupPrivilege 308 svchost.exe Token: SeRestorePrivilege 308 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3708 instup.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1680 wrote to memory of 3708 1680 avast_setup_offline.exe 84 PID 1680 wrote to memory of 3708 1680 avast_setup_offline.exe 84 PID 1680 wrote to memory of 3708 1680 avast_setup_offline.exe 84 PID 3708 wrote to memory of 4672 3708 instup.exe 89 PID 3708 wrote to memory of 4672 3708 instup.exe 89 PID 3708 wrote to memory of 4672 3708 instup.exe 89 PID 3708 wrote to memory of 4544 3708 instup.exe 90 PID 3708 wrote to memory of 4544 3708 instup.exe 90 PID 3708 wrote to memory of 4544 3708 instup.exe 90 PID 3708 wrote to memory of 1452 3708 instup.exe 91 PID 3708 wrote to memory of 1452 3708 instup.exe 91 PID 3708 wrote to memory of 1452 3708 instup.exe 91 PID 308 wrote to memory of 1672 308 svchost.exe 93 PID 308 wrote to memory of 1672 308 svchost.exe 93 PID 308 wrote to memory of 1672 308 svchost.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\avast_setup_offline.exe"C:\Users\Admin\AppData\Local\Temp\avast_setup_offline.exe"1⤵
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\Temp\asw.088a5eec5a3a608c\instup.exe"C:\Windows\Temp\asw.088a5eec5a3a608c\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.088a5eec5a3a608c /edition:12 /prod:ais /guid:3f6e3ff6-5a54-4403-90ba-a9ecea7329c1 /ga_clientid:58103e65-2eb7-4103-9b38-fcd3d2893bbc2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\Temp\asw.088a5eec5a3a608c\aswOfferTool.exe"C:\Windows\Temp\asw.088a5eec5a3a608c\aswOfferTool.exe" -checkGToolbar -elevated3⤵
- Executes dropped EXE
PID:4672
-
-
C:\Windows\Temp\asw.088a5eec5a3a608c\aswOfferTool.exe"C:\Windows\Temp\asw.088a5eec5a3a608c\aswOfferTool.exe" -checkChrome -elevated3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4544
-
-
C:\Windows\Temp\asw.088a5eec5a3a608c\aswOfferTool.exe"C:\Windows\Temp\asw.088a5eec5a3a608c\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AVFC3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1452 -
C:\Users\Public\Documents\aswOfferTool.exe"C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AVFC4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5da43f286a682b57bfa5c42a4592dd439
SHA12ba0085d50329e7d1d18bc85da93f8b0a091e5af
SHA256ea596aea5d72c240be9ede7ea1ec96806daa51f461ab1d5fba3f377c5f2e7edd
SHA51228d304bf96f1d942f365e7b184ffed01a4081745d0cdb6264617b8023b83da489865255abead7faf1935e9b77c30e59e3d4d802c972ef1af9b46d2356f0527d9
-
Filesize
1.5MB
MD504f85d7d55b83ba1e6ff2ff47c010447
SHA1374c39f45a6f5a9ea2d90671a521bb55c5fadf87
SHA256b7aed41a15ac9aea0d22faec15f14b7b15dd9c6af19ebaa0f33948141267e875
SHA512b6e2accf39c95c1b28f5222c98b4811bc7d72e2c4ee681872d62d7c0389ed471a2a17a63677cf3f766dfbd0238b76ed6cd652058f5c0437ba5b9f046c8bc571d
-
Filesize
867KB
MD53ead47f44293e18d66fb32259904197a
SHA1e61e88bd81c05d4678aeb2d62c75dee35a25d16b
SHA256e0d08b9da7e502ad8c75f8be52e9a08a6bcd0c5f98d360704173be33777e4905
SHA512927a134bdaec1c7c13d11e4044b30f7c45bbb23d5caf1756c2beada6507a69df0a2e6252ec28a913861e4924d1c766704f1036d7fc39c6ddb22e5eb81f3007f0
-
Filesize
3.3MB
MD571ae4a2caf76d4413c43bd78c7a642b1
SHA1cd1a0f3654911aa0208353327377238e553f391d
SHA2563848c53d372858740b4c6f2d6bfba7b4f5c1a9d113fb500f5ea827bce798ca0b
SHA5124764e27ac2ce6a6a0d4306f4cf140d6c537fe2ee93b065a590c2273bcfa02409db10db62cb6e840d722988840f4a5376f75fec5175e1511ad9d894a45f642aa8
-
Filesize
3.3MB
MD571ae4a2caf76d4413c43bd78c7a642b1
SHA1cd1a0f3654911aa0208353327377238e553f391d
SHA2563848c53d372858740b4c6f2d6bfba7b4f5c1a9d113fb500f5ea827bce798ca0b
SHA5124764e27ac2ce6a6a0d4306f4cf140d6c537fe2ee93b065a590c2273bcfa02409db10db62cb6e840d722988840f4a5376f75fec5175e1511ad9d894a45f642aa8
-
Filesize
3.3MB
MD571ae4a2caf76d4413c43bd78c7a642b1
SHA1cd1a0f3654911aa0208353327377238e553f391d
SHA2563848c53d372858740b4c6f2d6bfba7b4f5c1a9d113fb500f5ea827bce798ca0b
SHA5124764e27ac2ce6a6a0d4306f4cf140d6c537fe2ee93b065a590c2273bcfa02409db10db62cb6e840d722988840f4a5376f75fec5175e1511ad9d894a45f642aa8
-
Filesize
19.1MB
MD55687b20720d7df8837c070f13b33fdf3
SHA1d26d59e82904922594e301b2be0a6ed74e930047
SHA25602d5be79de645a40bc81df9dd04ec07b1bbca0a0209ec3afb0e1360c0a464092
SHA5120a9b961677421852745e5885f44bdb6fbceb7700328b609efaa858ddc6fb9f5aa0f7ffa322245d1a56076d151740f05e404dbddf21dcd598c6c627f3a976b421
-
Filesize
19.1MB
MD55687b20720d7df8837c070f13b33fdf3
SHA1d26d59e82904922594e301b2be0a6ed74e930047
SHA25602d5be79de645a40bc81df9dd04ec07b1bbca0a0209ec3afb0e1360c0a464092
SHA5120a9b961677421852745e5885f44bdb6fbceb7700328b609efaa858ddc6fb9f5aa0f7ffa322245d1a56076d151740f05e404dbddf21dcd598c6c627f3a976b421
-
Filesize
3.1MB
MD57010b5c01c247efa439f6aba9f5c7ef5
SHA15ede7a7d9d8c6a854d4bb97c3e65ca0f32980967
SHA256ba17eabc4e0bd2bb10e44a4a2822922285f1cb787abc1e58a5029a409b56a04c
SHA5123844d99e6768448bde1e305b4b7ab635b3824e50f49d579590b0bd0c10683c46c37bdb76ba104e71398383720915be9a86f694c1e2e4c8ef8e2f1ec32ecf61a8
-
Filesize
1.5MB
MD504f85d7d55b83ba1e6ff2ff47c010447
SHA1374c39f45a6f5a9ea2d90671a521bb55c5fadf87
SHA256b7aed41a15ac9aea0d22faec15f14b7b15dd9c6af19ebaa0f33948141267e875
SHA512b6e2accf39c95c1b28f5222c98b4811bc7d72e2c4ee681872d62d7c0389ed471a2a17a63677cf3f766dfbd0238b76ed6cd652058f5c0437ba5b9f046c8bc571d
-
Filesize
1.5MB
MD504f85d7d55b83ba1e6ff2ff47c010447
SHA1374c39f45a6f5a9ea2d90671a521bb55c5fadf87
SHA256b7aed41a15ac9aea0d22faec15f14b7b15dd9c6af19ebaa0f33948141267e875
SHA512b6e2accf39c95c1b28f5222c98b4811bc7d72e2c4ee681872d62d7c0389ed471a2a17a63677cf3f766dfbd0238b76ed6cd652058f5c0437ba5b9f046c8bc571d
-
Filesize
1.5MB
MD504f85d7d55b83ba1e6ff2ff47c010447
SHA1374c39f45a6f5a9ea2d90671a521bb55c5fadf87
SHA256b7aed41a15ac9aea0d22faec15f14b7b15dd9c6af19ebaa0f33948141267e875
SHA512b6e2accf39c95c1b28f5222c98b4811bc7d72e2c4ee681872d62d7c0389ed471a2a17a63677cf3f766dfbd0238b76ed6cd652058f5c0437ba5b9f046c8bc571d
-
Filesize
1.5MB
MD504f85d7d55b83ba1e6ff2ff47c010447
SHA1374c39f45a6f5a9ea2d90671a521bb55c5fadf87
SHA256b7aed41a15ac9aea0d22faec15f14b7b15dd9c6af19ebaa0f33948141267e875
SHA512b6e2accf39c95c1b28f5222c98b4811bc7d72e2c4ee681872d62d7c0389ed471a2a17a63677cf3f766dfbd0238b76ed6cd652058f5c0437ba5b9f046c8bc571d
-
Filesize
26KB
MD56ff6d647e600e13cb86cfdf6a539dc2a
SHA1bb8bf38631c43076ddfd32c1bd951d2cbaf6d010
SHA2562f651dbe61f358553962af658b4f9a8f0f5bf245f7698523941fe4302f8ff1e8
SHA5125a14a75713368f5284fc7ce5c01c3b024a72e30356098eb20999bc75b918f6f014732ba7cd52aa02634ecbe9c766305d84651ea0b631c07c15a635b18200b88d
-
Filesize
867KB
MD53ead47f44293e18d66fb32259904197a
SHA1e61e88bd81c05d4678aeb2d62c75dee35a25d16b
SHA256e0d08b9da7e502ad8c75f8be52e9a08a6bcd0c5f98d360704173be33777e4905
SHA512927a134bdaec1c7c13d11e4044b30f7c45bbb23d5caf1756c2beada6507a69df0a2e6252ec28a913861e4924d1c766704f1036d7fc39c6ddb22e5eb81f3007f0
-
Filesize
867KB
MD53ead47f44293e18d66fb32259904197a
SHA1e61e88bd81c05d4678aeb2d62c75dee35a25d16b
SHA256e0d08b9da7e502ad8c75f8be52e9a08a6bcd0c5f98d360704173be33777e4905
SHA512927a134bdaec1c7c13d11e4044b30f7c45bbb23d5caf1756c2beada6507a69df0a2e6252ec28a913861e4924d1c766704f1036d7fc39c6ddb22e5eb81f3007f0
-
Filesize
693B
MD51d400d8fab6fb9510c3e77472f3c2e9c
SHA1bcf7a9c0696b51de55a95edb54fa8ea21588f33f
SHA2566ecc1ef6215ae69f41e58a038ac758512d140cee8124feedc89383c1c44b0e11
SHA512d524ff31c7db612eb8f3e447a380b58aee08c02b56212ce060315815a8ed52b11c39b6cf304bbe0f4ca6fe051d7f11bd6d2c51e24391744e2e097eb54fae526d
-
Filesize
74KB
MD5dcf004e9a6414d60dc6f28508f1fece4
SHA1b3597fd85ba325324250291b822bbacfedf4c83f
SHA256ca86d2aadd789a6507fc0bce556de484283cd6aa8c9f4aba6c77955fb7fb1e27
SHA5129334f2d305ca87126e18f4fc33988b0f35514ad33a2e2f56809711a8fcb98371d2e7178926926acc174d00ae8ad73542373471cacc841a14caced17935d694af
-
Filesize
4KB
MD58d357eb29f0bd46f0467b2a86bf1a420
SHA1615feb0b16c52771716db03259162df69939f44d
SHA256ba5c100a41693b4c149b869671ec9cf69dd4a060f9cd67a2bdda1f735647db3f
SHA5120e94815a0bda2c9ba48651be70ed1befa2dbab95cfcde1fb33c84e69192250085bde38d4f330e98f657441fe6ba34ccbace57ebb51f039307208412465dcfcdc
-
Filesize
11KB
MD5fe8bdc494231d7852aa23561f93f7428
SHA16f2329349e787645de5dbfa1ef3f963c71e70eba
SHA2568856a2d910d3416abb0368eab221c8afcede5e35b6c3ddeeb91107849b2c07d5
SHA512216d0a337d1ffb324d0c0ce72cb40d0edc54d58858468f260e799367ae9367dfae871ef401c60474fcbf8b07696c47f4a027326bc9c63f6c766a968f8b357844
-
Filesize
572B
MD5f7a67d80534fa08b6046fc98c11605f4
SHA125089b04321fdf333f4d4f0e5d114fe6b192ba15
SHA256c6be5bc1f5ba21be1f01ebf8bd8efb7942f2ae57b0bd6b04c4da814f4677c88c
SHA512bc7f5f2ec0f98b33d7a80951795e77026b4841bb2388ce54f8d7308d44880f2e38627f0fe9f5d950f32a4c71b1aafc980ad5f037ee258ab5204fcdf7bae8b802
-
Filesize
343B
MD5caac0b94e3110f7dee1b06f57bd82c97
SHA135a1f0fdeb3a202b32a5c278defa3363c0c299c0
SHA25698289d81c24e1697ef1e39758737c989d3a3497aa8eb241b7c776b1451b208b7
SHA5122009a7d2be5b46e5f17a9414a2f5da206544d2fe6e5022f580509c5e6cf0acc5ffcb53b0a59ff95b3157577a34542e8a9cc174256a5c4152b64644dca9361935
-
Filesize
29KB
MD537b34b427232c4a50016a8172716e9eb
SHA1f44aca572ebc264d4398c1ebb01e7ff46f50b716
SHA2567e1da0647af38594f942cb800219705867b731fe9b0243417c6cb61a20151757
SHA51297ed09a9cc72ae7d1636bdc8251ee74bcc12c9385e62e816ef7a2ec882bf2a518075ecabe4c8714f4454b4aa23f16f670dc8ff009c52bda4ba6afebe2f2bb390
-
Filesize
26KB
MD5af25e2083815dd908d9def2f75fc22f0
SHA1c27f5d8566e8468adbc4bfcd4ff33ea820375357
SHA2561b408c68012e7116e6be65c94aa7afdef0fc05852fe8741e79f0f4bd3f16cf22
SHA512ef89deb565045797dd7fa8928267214b9ec200ed097220d18ad6461017f56fc45d633b7147b23340c65bff8613eb7672e732fbe28ba309a0bbfe21672427e45d
-
Filesize
15KB
MD57961e923b0ccbb430658ea7cb3fd6d55
SHA19a4fd01cb23395759e96260c960683dc352fdd4b
SHA2562b79386a6dd8cbefe18bfeb41215d1c71db52d52bc1fc438d7e1cc8edc3c25b4
SHA512a62d062661e9dd9acf405a76468f3d30a5277d2b224ff62af7f9cc645914f1f7a80c0821207d886544881129d208a0db71f9a66d6b9a1aa32cb0eefe2e1d59d8