Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2023, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe
Resource
win10v2004-20230703-en
General
-
Target
5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe
-
Size
2.9MB
-
MD5
52bc91a3e3cdca45c9a53865933eb9f0
-
SHA1
9fffaa8d0db6e3716eccd27a7c03ffc36f777c28
-
SHA256
5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e
-
SHA512
f69b11c7b7dd65ab12e4905b98cc5e32964be159ec422ca04348dbd5b9a54dd6d036060d17547ef561f4bb089247912f64be71b1f825ff60480b798d04ff658c
-
SSDEEP
49152:/77X1F9Xcx6mVu6K5aMPY4u9GxpAAKMzqTJxmpieu5kL/VBQ4g4/KodCx1rb+66+:XljaJVu8MPY4XxpA7hzmgkVJdCx1Ohh6
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4920 Logo1_.exe 4860 5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_2019.305.632.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\is-IS\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00.UWPDesktop_14.0.27629.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\plugins\rhp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_GB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\hi-IN\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\Tented\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Resources\Fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe File created C:\Windows\Logo1_.exe 5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe 4920 Logo1_.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4860 5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe 4860 5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2960 2584 5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe 81 PID 2584 wrote to memory of 2960 2584 5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe 81 PID 2584 wrote to memory of 2960 2584 5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe 81 PID 2584 wrote to memory of 4920 2584 5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe 82 PID 2584 wrote to memory of 4920 2584 5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe 82 PID 2584 wrote to memory of 4920 2584 5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe 82 PID 4920 wrote to memory of 5072 4920 Logo1_.exe 83 PID 4920 wrote to memory of 5072 4920 Logo1_.exe 83 PID 4920 wrote to memory of 5072 4920 Logo1_.exe 83 PID 5072 wrote to memory of 1332 5072 net.exe 86 PID 5072 wrote to memory of 1332 5072 net.exe 86 PID 5072 wrote to memory of 1332 5072 net.exe 86 PID 2960 wrote to memory of 4860 2960 cmd.exe 87 PID 2960 wrote to memory of 4860 2960 cmd.exe 87 PID 2960 wrote to memory of 4860 2960 cmd.exe 87 PID 4920 wrote to memory of 3176 4920 Logo1_.exe 59 PID 4920 wrote to memory of 3176 4920 Logo1_.exe 59
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe"C:\Users\Admin\AppData\Local\Temp\5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6987.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe"C:\Users\Admin\AppData\Local\Temp\5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4860
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1332
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5cbab5a0529694ab9e25c40f025e996ac
SHA13561d6ab26622a85ec76b86a471169eb5cf3c2dc
SHA2565cf5186b719867ed6312f471e8961478cc167a31c9ac5aae16ea0d624602043f
SHA512098fae04e9e299cba09cbb657c7ea06a84ad9b57feb36af435e51e936b41823a9f68ee7adae399419db9b32da32b230babad80f254042c2915d85c170cafa958
-
Filesize
484KB
MD5343e5057d4c48bfae311691776fa5080
SHA12d5ccbdc2449bc0b03bc87bf92ffbc39bf9acb99
SHA256d145886ab6b4a8edfca6fc5ebef9a929e690a25767b88fea29b41f7461170625
SHA512f0aee378754f95fbecab359829daaba5c0c09f336e9ef9dc087aff45ac3484d772fe129d68486ebfe7467f3ea672f1970c33916eec0d9f7671a8623d85e7ab07
-
Filesize
722B
MD51dd069343cd47074b49780f0dc7a752f
SHA1153ca81e7731713059e56b3d3859ed60d3d359aa
SHA256955245cd673ba73c7df3e01f3af9800cd8d386aa8b6b504a182a8aa2665c376e
SHA512b9bd090ea30915f0ce24f7bdc1ed10cb0e15dcbe6d983e50491d959582d41bf7164bdba8c43551566a9f8529c3d1ed3a5ce3567f0552310207aa45215dc7a096
-
C:\Users\Admin\AppData\Local\Temp\5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe
Filesize2.9MB
MD542c5eb41b0e812b0bd546e8afae1b1e6
SHA1b8ed9f64595d5195950b980583abf5ab94b0c9b7
SHA256ac8b9abba373955771cf7b4f8de260b4e01cb2a91a03ae1f67edf64381e9b218
SHA512f1dfa865ab0bfd65cac4fe7cd67600baaf6a32e27c73afab5094432f6cbe7d70b958224dc631daaf77bf4646462c37c785ef883cbd5368f3236adfc164ef7d51
-
C:\Users\Admin\AppData\Local\Temp\5be3223ac35d25405184ad22fb72988d3e9b3c5d3230e5ccce807a362e49a99e.exe.exe
Filesize2.9MB
MD542c5eb41b0e812b0bd546e8afae1b1e6
SHA1b8ed9f64595d5195950b980583abf5ab94b0c9b7
SHA256ac8b9abba373955771cf7b4f8de260b4e01cb2a91a03ae1f67edf64381e9b218
SHA512f1dfa865ab0bfd65cac4fe7cd67600baaf6a32e27c73afab5094432f6cbe7d70b958224dc631daaf77bf4646462c37c785ef883cbd5368f3236adfc164ef7d51
-
Filesize
26KB
MD54fbbf499b230779c948970bce5086eac
SHA1c7ac6348e552fb31a652b253140932ee02c57afd
SHA256025af9d35ec75cb5b09fbf4ecadeb34567b8b51a3acc2662c2c6ecec37d561ef
SHA51253b4f5b22b2e2f22a89f114858229c3c20d314f193623ae34496c0e2d90019616cd05358d817be7ecdbf2bc954ab17034fbae622fd76f659518f3df5764b6fd5
-
Filesize
26KB
MD54fbbf499b230779c948970bce5086eac
SHA1c7ac6348e552fb31a652b253140932ee02c57afd
SHA256025af9d35ec75cb5b09fbf4ecadeb34567b8b51a3acc2662c2c6ecec37d561ef
SHA51253b4f5b22b2e2f22a89f114858229c3c20d314f193623ae34496c0e2d90019616cd05358d817be7ecdbf2bc954ab17034fbae622fd76f659518f3df5764b6fd5
-
Filesize
26KB
MD54fbbf499b230779c948970bce5086eac
SHA1c7ac6348e552fb31a652b253140932ee02c57afd
SHA256025af9d35ec75cb5b09fbf4ecadeb34567b8b51a3acc2662c2c6ecec37d561ef
SHA51253b4f5b22b2e2f22a89f114858229c3c20d314f193623ae34496c0e2d90019616cd05358d817be7ecdbf2bc954ab17034fbae622fd76f659518f3df5764b6fd5
-
Filesize
9B
MD5f69e51f788b9591cc1a5c32b5d8555e0
SHA18690c2639d514f6a56d096f7729496ef0e7dbccf
SHA2569c946a7ed190442c6c3cab3b0c1324cee605d4e233e75fc2192f4cff06c92c28
SHA5122db2a58e8a4bb5db019f8a378abf6e12526810029bd9540474ff68cca7e9dc6705f4de550106bfd7f4ba33308da7722c641bb3d5d1b13a2d972609fbb3fb8c34