Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
General
-
Target
file.exe
-
Size
1.2MB
-
MD5
152f0b49b6473d2e5d5d9ceafcf52cfa
-
SHA1
468316f0c9931d5f57adf40b59b701c520a78aee
-
SHA256
33e5530c16791ccc645a517ba18a83659c4941dd61a7d67ba3a329a8242c7a78
-
SHA512
a90d5178b94fee83b855d6ed805c062207a8b212d2e8a6199b233f4b47213faf8d923f5825aaf3ade7c446dd54b8094f32e0193bb0567b0f3bc1467d2b8fb040
-
SSDEEP
24576:Ky54/a6qL/Gjm9Cim0b85R+oHPYO9/Xi69BDl:RIa6qL/1sim5HvYO9/XiCBD
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1rK35dO1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1rK35dO1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1rK35dO1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1rK35dO1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1rK35dO1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1rK35dO1.exe -
Executes dropped EXE 5 IoCs
pid Process 2188 cn7Aj43.exe 2764 BR4Qe64.exe 2616 Ny5Eh67.exe 2620 1rK35dO1.exe 2500 2Bt7899.exe -
Loads dropped DLL 14 IoCs
pid Process 2972 file.exe 2188 cn7Aj43.exe 2188 cn7Aj43.exe 2764 BR4Qe64.exe 2764 BR4Qe64.exe 2616 Ny5Eh67.exe 2616 Ny5Eh67.exe 2620 1rK35dO1.exe 2616 Ny5Eh67.exe 2500 2Bt7899.exe 1920 WerFault.exe 1920 WerFault.exe 1920 WerFault.exe 1920 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 1rK35dO1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1rK35dO1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" cn7Aj43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" BR4Qe64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Ny5Eh67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2500 set thread context of 2988 2500 2Bt7899.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 1920 2500 WerFault.exe 32 2756 2988 WerFault.exe 33 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2620 1rK35dO1.exe 2620 1rK35dO1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2620 1rK35dO1.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2188 2972 file.exe 28 PID 2972 wrote to memory of 2188 2972 file.exe 28 PID 2972 wrote to memory of 2188 2972 file.exe 28 PID 2972 wrote to memory of 2188 2972 file.exe 28 PID 2972 wrote to memory of 2188 2972 file.exe 28 PID 2972 wrote to memory of 2188 2972 file.exe 28 PID 2972 wrote to memory of 2188 2972 file.exe 28 PID 2188 wrote to memory of 2764 2188 cn7Aj43.exe 29 PID 2188 wrote to memory of 2764 2188 cn7Aj43.exe 29 PID 2188 wrote to memory of 2764 2188 cn7Aj43.exe 29 PID 2188 wrote to memory of 2764 2188 cn7Aj43.exe 29 PID 2188 wrote to memory of 2764 2188 cn7Aj43.exe 29 PID 2188 wrote to memory of 2764 2188 cn7Aj43.exe 29 PID 2188 wrote to memory of 2764 2188 cn7Aj43.exe 29 PID 2764 wrote to memory of 2616 2764 BR4Qe64.exe 30 PID 2764 wrote to memory of 2616 2764 BR4Qe64.exe 30 PID 2764 wrote to memory of 2616 2764 BR4Qe64.exe 30 PID 2764 wrote to memory of 2616 2764 BR4Qe64.exe 30 PID 2764 wrote to memory of 2616 2764 BR4Qe64.exe 30 PID 2764 wrote to memory of 2616 2764 BR4Qe64.exe 30 PID 2764 wrote to memory of 2616 2764 BR4Qe64.exe 30 PID 2616 wrote to memory of 2620 2616 Ny5Eh67.exe 31 PID 2616 wrote to memory of 2620 2616 Ny5Eh67.exe 31 PID 2616 wrote to memory of 2620 2616 Ny5Eh67.exe 31 PID 2616 wrote to memory of 2620 2616 Ny5Eh67.exe 31 PID 2616 wrote to memory of 2620 2616 Ny5Eh67.exe 31 PID 2616 wrote to memory of 2620 2616 Ny5Eh67.exe 31 PID 2616 wrote to memory of 2620 2616 Ny5Eh67.exe 31 PID 2616 wrote to memory of 2500 2616 Ny5Eh67.exe 32 PID 2616 wrote to memory of 2500 2616 Ny5Eh67.exe 32 PID 2616 wrote to memory of 2500 2616 Ny5Eh67.exe 32 PID 2616 wrote to memory of 2500 2616 Ny5Eh67.exe 32 PID 2616 wrote to memory of 2500 2616 Ny5Eh67.exe 32 PID 2616 wrote to memory of 2500 2616 Ny5Eh67.exe 32 PID 2616 wrote to memory of 2500 2616 Ny5Eh67.exe 32 PID 2500 wrote to memory of 2988 2500 2Bt7899.exe 33 PID 2500 wrote to memory of 2988 2500 2Bt7899.exe 33 PID 2500 wrote to memory of 2988 2500 2Bt7899.exe 33 PID 2500 wrote to memory of 2988 2500 2Bt7899.exe 33 PID 2500 wrote to memory of 2988 2500 2Bt7899.exe 33 PID 2500 wrote to memory of 2988 2500 2Bt7899.exe 33 PID 2500 wrote to memory of 2988 2500 2Bt7899.exe 33 PID 2500 wrote to memory of 2988 2500 2Bt7899.exe 33 PID 2500 wrote to memory of 2988 2500 2Bt7899.exe 33 PID 2500 wrote to memory of 2988 2500 2Bt7899.exe 33 PID 2500 wrote to memory of 2988 2500 2Bt7899.exe 33 PID 2500 wrote to memory of 2988 2500 2Bt7899.exe 33 PID 2500 wrote to memory of 2988 2500 2Bt7899.exe 33 PID 2500 wrote to memory of 2988 2500 2Bt7899.exe 33 PID 2500 wrote to memory of 1920 2500 2Bt7899.exe 34 PID 2500 wrote to memory of 1920 2500 2Bt7899.exe 34 PID 2500 wrote to memory of 1920 2500 2Bt7899.exe 34 PID 2500 wrote to memory of 1920 2500 2Bt7899.exe 34 PID 2500 wrote to memory of 1920 2500 2Bt7899.exe 34 PID 2500 wrote to memory of 1920 2500 2Bt7899.exe 34 PID 2500 wrote to memory of 1920 2500 2Bt7899.exe 34 PID 2988 wrote to memory of 2756 2988 AppLaunch.exe 35 PID 2988 wrote to memory of 2756 2988 AppLaunch.exe 35 PID 2988 wrote to memory of 2756 2988 AppLaunch.exe 35 PID 2988 wrote to memory of 2756 2988 AppLaunch.exe 35 PID 2988 wrote to memory of 2756 2988 AppLaunch.exe 35 PID 2988 wrote to memory of 2756 2988 AppLaunch.exe 35 PID 2988 wrote to memory of 2756 2988 AppLaunch.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cn7Aj43.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cn7Aj43.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BR4Qe64.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BR4Qe64.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ny5Eh67.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ny5Eh67.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1rK35dO1.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1rK35dO1.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Bt7899.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Bt7899.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 2687⤵
- Program crash
PID:2756
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:1920
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5715ed93677164198f4de73e2fc155df1
SHA103aa1ce832ab090c71e0dae4561f3179385078e1
SHA256449184a655c412b1678211fa0619f2d1192d3a7cc4ce19af0024de0f95b03b36
SHA51297e680077b231c3786aff9e05bed9516d6f1e28b308a96faeea7c8cad50c2118b7884350884752554be93d6a1e5343f24708ff81cea67f348e76a0ce2c2ef9fe
-
Filesize
1.0MB
MD5715ed93677164198f4de73e2fc155df1
SHA103aa1ce832ab090c71e0dae4561f3179385078e1
SHA256449184a655c412b1678211fa0619f2d1192d3a7cc4ce19af0024de0f95b03b36
SHA51297e680077b231c3786aff9e05bed9516d6f1e28b308a96faeea7c8cad50c2118b7884350884752554be93d6a1e5343f24708ff81cea67f348e76a0ce2c2ef9fe
-
Filesize
746KB
MD5f5923b2de6539b0e4f1e97b20e06738f
SHA1ade0c5d6fb44283b9fe052e55e3b3a1eb827a181
SHA256fd6e0596b01459bb66f1befbfec819c872488e5907be44b3209afbdfc9ffeb1e
SHA512fda31d708ff0e9dd6aa180f0c6cc6697ba27142bc18e1b6ba2260fd7d026acf03670830d31d5e27352ac109c5486c037c12901f3f0fd0e451261507754836051
-
Filesize
746KB
MD5f5923b2de6539b0e4f1e97b20e06738f
SHA1ade0c5d6fb44283b9fe052e55e3b3a1eb827a181
SHA256fd6e0596b01459bb66f1befbfec819c872488e5907be44b3209afbdfc9ffeb1e
SHA512fda31d708ff0e9dd6aa180f0c6cc6697ba27142bc18e1b6ba2260fd7d026acf03670830d31d5e27352ac109c5486c037c12901f3f0fd0e451261507754836051
-
Filesize
494KB
MD51275d76701513b3fb6ed0d75e5ef1fdc
SHA19cea7ce8df0581362a1b1ebe2d633137651af39e
SHA2562d135b6dae6ab88e06ad3e79520c760da76ce8ae4338c8c9263c08e18cbaa416
SHA5127e8e6eda50f479715c0d0f2affc0b14b78147d9f5c06386b7c5a10cf5b2dd7c70b258739fb86d276d8695432716610423c5605a158f58d63717a7e8143662b10
-
Filesize
494KB
MD51275d76701513b3fb6ed0d75e5ef1fdc
SHA19cea7ce8df0581362a1b1ebe2d633137651af39e
SHA2562d135b6dae6ab88e06ad3e79520c760da76ce8ae4338c8c9263c08e18cbaa416
SHA5127e8e6eda50f479715c0d0f2affc0b14b78147d9f5c06386b7c5a10cf5b2dd7c70b258739fb86d276d8695432716610423c5605a158f58d63717a7e8143662b10
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
448KB
MD52705851eb743862f645b76b2782075bf
SHA1e9c0ceac45433d7ba092dfea70101c290ba6cda4
SHA2560bfc25269b69d08788516b31ae70d9130892b536d953395dd633343cff80608c
SHA512a3830d590e6175f839d57f64ea04aba292dc01b49ad45d77f532ae4d8e74c729a5363cdcf27419adee95319c8a9287ec4330e2ef69b1ea0bca51280a50500742
-
Filesize
448KB
MD52705851eb743862f645b76b2782075bf
SHA1e9c0ceac45433d7ba092dfea70101c290ba6cda4
SHA2560bfc25269b69d08788516b31ae70d9130892b536d953395dd633343cff80608c
SHA512a3830d590e6175f839d57f64ea04aba292dc01b49ad45d77f532ae4d8e74c729a5363cdcf27419adee95319c8a9287ec4330e2ef69b1ea0bca51280a50500742
-
Filesize
1.0MB
MD5715ed93677164198f4de73e2fc155df1
SHA103aa1ce832ab090c71e0dae4561f3179385078e1
SHA256449184a655c412b1678211fa0619f2d1192d3a7cc4ce19af0024de0f95b03b36
SHA51297e680077b231c3786aff9e05bed9516d6f1e28b308a96faeea7c8cad50c2118b7884350884752554be93d6a1e5343f24708ff81cea67f348e76a0ce2c2ef9fe
-
Filesize
1.0MB
MD5715ed93677164198f4de73e2fc155df1
SHA103aa1ce832ab090c71e0dae4561f3179385078e1
SHA256449184a655c412b1678211fa0619f2d1192d3a7cc4ce19af0024de0f95b03b36
SHA51297e680077b231c3786aff9e05bed9516d6f1e28b308a96faeea7c8cad50c2118b7884350884752554be93d6a1e5343f24708ff81cea67f348e76a0ce2c2ef9fe
-
Filesize
746KB
MD5f5923b2de6539b0e4f1e97b20e06738f
SHA1ade0c5d6fb44283b9fe052e55e3b3a1eb827a181
SHA256fd6e0596b01459bb66f1befbfec819c872488e5907be44b3209afbdfc9ffeb1e
SHA512fda31d708ff0e9dd6aa180f0c6cc6697ba27142bc18e1b6ba2260fd7d026acf03670830d31d5e27352ac109c5486c037c12901f3f0fd0e451261507754836051
-
Filesize
746KB
MD5f5923b2de6539b0e4f1e97b20e06738f
SHA1ade0c5d6fb44283b9fe052e55e3b3a1eb827a181
SHA256fd6e0596b01459bb66f1befbfec819c872488e5907be44b3209afbdfc9ffeb1e
SHA512fda31d708ff0e9dd6aa180f0c6cc6697ba27142bc18e1b6ba2260fd7d026acf03670830d31d5e27352ac109c5486c037c12901f3f0fd0e451261507754836051
-
Filesize
494KB
MD51275d76701513b3fb6ed0d75e5ef1fdc
SHA19cea7ce8df0581362a1b1ebe2d633137651af39e
SHA2562d135b6dae6ab88e06ad3e79520c760da76ce8ae4338c8c9263c08e18cbaa416
SHA5127e8e6eda50f479715c0d0f2affc0b14b78147d9f5c06386b7c5a10cf5b2dd7c70b258739fb86d276d8695432716610423c5605a158f58d63717a7e8143662b10
-
Filesize
494KB
MD51275d76701513b3fb6ed0d75e5ef1fdc
SHA19cea7ce8df0581362a1b1ebe2d633137651af39e
SHA2562d135b6dae6ab88e06ad3e79520c760da76ce8ae4338c8c9263c08e18cbaa416
SHA5127e8e6eda50f479715c0d0f2affc0b14b78147d9f5c06386b7c5a10cf5b2dd7c70b258739fb86d276d8695432716610423c5605a158f58d63717a7e8143662b10
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
448KB
MD52705851eb743862f645b76b2782075bf
SHA1e9c0ceac45433d7ba092dfea70101c290ba6cda4
SHA2560bfc25269b69d08788516b31ae70d9130892b536d953395dd633343cff80608c
SHA512a3830d590e6175f839d57f64ea04aba292dc01b49ad45d77f532ae4d8e74c729a5363cdcf27419adee95319c8a9287ec4330e2ef69b1ea0bca51280a50500742
-
Filesize
448KB
MD52705851eb743862f645b76b2782075bf
SHA1e9c0ceac45433d7ba092dfea70101c290ba6cda4
SHA2560bfc25269b69d08788516b31ae70d9130892b536d953395dd633343cff80608c
SHA512a3830d590e6175f839d57f64ea04aba292dc01b49ad45d77f532ae4d8e74c729a5363cdcf27419adee95319c8a9287ec4330e2ef69b1ea0bca51280a50500742
-
Filesize
448KB
MD52705851eb743862f645b76b2782075bf
SHA1e9c0ceac45433d7ba092dfea70101c290ba6cda4
SHA2560bfc25269b69d08788516b31ae70d9130892b536d953395dd633343cff80608c
SHA512a3830d590e6175f839d57f64ea04aba292dc01b49ad45d77f532ae4d8e74c729a5363cdcf27419adee95319c8a9287ec4330e2ef69b1ea0bca51280a50500742
-
Filesize
448KB
MD52705851eb743862f645b76b2782075bf
SHA1e9c0ceac45433d7ba092dfea70101c290ba6cda4
SHA2560bfc25269b69d08788516b31ae70d9130892b536d953395dd633343cff80608c
SHA512a3830d590e6175f839d57f64ea04aba292dc01b49ad45d77f532ae4d8e74c729a5363cdcf27419adee95319c8a9287ec4330e2ef69b1ea0bca51280a50500742
-
Filesize
448KB
MD52705851eb743862f645b76b2782075bf
SHA1e9c0ceac45433d7ba092dfea70101c290ba6cda4
SHA2560bfc25269b69d08788516b31ae70d9130892b536d953395dd633343cff80608c
SHA512a3830d590e6175f839d57f64ea04aba292dc01b49ad45d77f532ae4d8e74c729a5363cdcf27419adee95319c8a9287ec4330e2ef69b1ea0bca51280a50500742
-
Filesize
448KB
MD52705851eb743862f645b76b2782075bf
SHA1e9c0ceac45433d7ba092dfea70101c290ba6cda4
SHA2560bfc25269b69d08788516b31ae70d9130892b536d953395dd633343cff80608c
SHA512a3830d590e6175f839d57f64ea04aba292dc01b49ad45d77f532ae4d8e74c729a5363cdcf27419adee95319c8a9287ec4330e2ef69b1ea0bca51280a50500742