Analysis
-
max time kernel
167s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe
Resource
win10v2004-20230915-en
General
-
Target
eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe
-
Size
26KB
-
MD5
adbda036baea601655cfb79bf4de55c8
-
SHA1
3ce1f014f615ff65f8e9b2499104d26078a9264c
-
SHA256
eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0
-
SHA512
1784f2999256fa043ae247b6b677b9065bbb0259229e04ab8afd92433817c18c141f6a58a3052f6f5b6772b620f64ddb55b17eeb9069785dbf0017af1b3368ea
-
SSDEEP
768:z/8888xpDSh1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:zHgfgLdQAQfcfymN
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\P: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\M: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\J: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\G: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\W: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\S: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\I: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\H: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\V: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\T: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\Q: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\E: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\Z: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\X: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\R: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\O: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\N: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\L: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\K: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened (read-only) \??\Y: eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\STS2\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\en-US\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{F309B869-637B-40C6-906B-A67D257C4D4A}\chrome_installer.exe eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Kentucky\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proofing.en-us\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\Microsoft Games\More Games\en-US\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\GrayCheck\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\Microsoft Games\Chess\ja-JP\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\art\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\it-IT\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\ja-JP\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files (x86)\Google\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\1033\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe File opened for modification C:\Program Files\7-Zip\Lang\_desktop.ini eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rundl132.exe eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1888 eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe 1888 eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe 1888 eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe 1888 eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe 1888 eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe 1888 eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe 1888 eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe 1888 eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe 1888 eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe 1888 eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1888 wrote to memory of 1396 1888 eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe 27 PID 1888 wrote to memory of 1396 1888 eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe 27 PID 1888 wrote to memory of 1396 1888 eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe 27 PID 1888 wrote to memory of 1396 1888 eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe 27 PID 1396 wrote to memory of 2412 1396 net.exe 29 PID 1396 wrote to memory of 2412 1396 net.exe 29 PID 1396 wrote to memory of 2412 1396 net.exe 29 PID 1396 wrote to memory of 2412 1396 net.exe 29 PID 1888 wrote to memory of 1248 1888 eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe 15 PID 1888 wrote to memory of 1248 1888 eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe"C:\Users\Admin\AppData\Local\Temp\eb2e8cd43896f89cf3910a716b63cc64e5b4e630d810c1d2af8edb6722aba4b0.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2412
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5a0fd2582242469bd93e3ef7decb7e2ad
SHA19b47f097920de6129940eb59d0fe4324f1a8d4d7
SHA2567a137019ea29848edaa4a76fcbd775816b866a5955384b13794ea2fc78ffa9d1
SHA5120f41b17d1c106bcf7a7cd3a59d326a1aa018ee8a4dc0c077a65c510260d7c3b7bb39e7e48c3f1532425cb10a300e1ff9556a4b5903181b85992148bc01a6aa12
-
Filesize
484KB
MD5395dcf507db9ec7d63219fb7611ff4c6
SHA1e6722136281a1c0b58f3506d51f00a3970a6947f
SHA256f724cca2ea74f6673026707c18a18471b071a763f92aab081e06f5d6bac24d22
SHA5129aeff5ab0033969c7c9e7cdf8e5d0d9246559d336ca6dc6f78205bea07b44450a3af389f94ae6aac0e9d315d95832f0971a127710346ca9870f245c7cfe9b0bb
-
Filesize
10B
MD564a8745f77935c35c66f3aeeddf5d47d
SHA11214a584f661cb008b494ce6278289f8cf406810
SHA2567841de37b0bf8c995d0b903bef18bd4159f94d9c2a35c91b06dabe8198c6c63a
SHA512807b8f5512f868d0a2b1a10889164f787aa07b4309511326f4755d1121e666ec30dfb444a0565a5a7426cbd45b41d49d6429c9baf63a0bd3948b85b57841af3b