Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15/10/2023, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
Resource
win10v2004-20230915-en
General
-
Target
646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
-
Size
2.7MB
-
MD5
e2fe292a8e565e5cd70e0464cf4d448f
-
SHA1
f1bce048971b051983fd2b19d12de642b72be3a0
-
SHA256
646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714
-
SHA512
413df4d0679467f47c2f366a792d09103476a92e2290141488d104055b01201754405ea9e30c21ba464a9700d965d08c817cf9532c4c645ad3fef528a4110d6b
-
SSDEEP
49152:Ax0zsq3OZnoNGg8pmEdJBSfFc+cZh80ydKsagsd2bQmBBxzaCzwmM:rsqUcdQmBBNLz6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2136 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2808 Logo1_.exe 2624 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 2824 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe -
Loads dropped DLL 2 IoCs
pid Process 2136 cmd.exe 2624 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\logger\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\deploy\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\requests\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2808 Logo1_.exe 2808 Logo1_.exe 2808 Logo1_.exe 2808 Logo1_.exe 2808 Logo1_.exe 2808 Logo1_.exe 2808 Logo1_.exe 2808 Logo1_.exe 2808 Logo1_.exe 2808 Logo1_.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2136 2112 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 28 PID 2112 wrote to memory of 2136 2112 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 28 PID 2112 wrote to memory of 2136 2112 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 28 PID 2112 wrote to memory of 2136 2112 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 28 PID 2112 wrote to memory of 2808 2112 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 30 PID 2112 wrote to memory of 2808 2112 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 30 PID 2112 wrote to memory of 2808 2112 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 30 PID 2112 wrote to memory of 2808 2112 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 30 PID 2808 wrote to memory of 2640 2808 Logo1_.exe 31 PID 2808 wrote to memory of 2640 2808 Logo1_.exe 31 PID 2808 wrote to memory of 2640 2808 Logo1_.exe 31 PID 2808 wrote to memory of 2640 2808 Logo1_.exe 31 PID 2640 wrote to memory of 2732 2640 net.exe 33 PID 2640 wrote to memory of 2732 2640 net.exe 33 PID 2640 wrote to memory of 2732 2640 net.exe 33 PID 2640 wrote to memory of 2732 2640 net.exe 33 PID 2136 wrote to memory of 2624 2136 cmd.exe 34 PID 2136 wrote to memory of 2624 2136 cmd.exe 34 PID 2136 wrote to memory of 2624 2136 cmd.exe 34 PID 2136 wrote to memory of 2624 2136 cmd.exe 34 PID 2624 wrote to memory of 2824 2624 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 35 PID 2624 wrote to memory of 2824 2624 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 35 PID 2624 wrote to memory of 2824 2624 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 35 PID 2808 wrote to memory of 1208 2808 Logo1_.exe 10 PID 2808 wrote to memory of 1208 2808 Logo1_.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe"C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a5B1B.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe"C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exeC:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --no-rate-limit --no-upload-gzip "--database=C:\Users\Admin\AppData\Local\123Browser\User Data\Crashpad" --url=https://123llq.com/dump/upload/ --annotation=plat=Win64 --annotation=prod=123Browser --annotation=ver=2.1.28.3 --initial-client-data=0x12c,0x130,0x134,0x100,0x138,0x14000bbc0,0x14000bbd0,0x14000bbe05⤵
- Executes dropped EXE
PID:2824
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2732
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD546d257189456a843b95ce8e0495e4f46
SHA1c195cf3eba6cc318095d32737d755dc75cc7c3de
SHA2561f0e44c1d9bfd09a2f912cf5a5b14c4d0b2f937fd6b50c6b537bbd80e6e33a7d
SHA5126e87388192bd314ab3acfd181a95fc1475ed4361bab98f143a6f157415cabfa579bd98c1fdff9a1c0d72c217461c7640b2ec1f09a920c6fd33e20db4c30a2b4a
-
Filesize
722B
MD5d0f2ee98d6f64db15ff5d49d2ec6b00b
SHA184b1aaaf7cdfab67403e70e09f48a6baa5392a2f
SHA256d6523ff93e904b8abf287fa0fb002ab2d60f2bf31543704d35ddecb140178b2e
SHA5129530ef802550f051110bd353a04652936b1f9a56fda3050a24581bc9d9cd1b050fe46ec34210fefa774aad59ca982323f2e9c6a1a32b9999d2385e7cec555bbd
-
Filesize
722B
MD5d0f2ee98d6f64db15ff5d49d2ec6b00b
SHA184b1aaaf7cdfab67403e70e09f48a6baa5392a2f
SHA256d6523ff93e904b8abf287fa0fb002ab2d60f2bf31543704d35ddecb140178b2e
SHA5129530ef802550f051110bd353a04652936b1f9a56fda3050a24581bc9d9cd1b050fe46ec34210fefa774aad59ca982323f2e9c6a1a32b9999d2385e7cec555bbd
-
C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
Filesize2.7MB
MD560ab0daed9d1aabc9dddbe1ff9ce19ca
SHA173eaf43a6a935feed8bf6a89471ff116c41e9688
SHA256a01a6190b778982a7225c2a50325d9063f9eed8bbaeda410472610643bfb2f0a
SHA5120dd9f8c1676ffb4df5bc7e5448dd3bd70df6589aac338c865cf888d4ecb01c96d6a3078e03bcc4678cdb673b71ea8ca2a64e5cf720bed68845fed22485945283
-
C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
Filesize2.7MB
MD560ab0daed9d1aabc9dddbe1ff9ce19ca
SHA173eaf43a6a935feed8bf6a89471ff116c41e9688
SHA256a01a6190b778982a7225c2a50325d9063f9eed8bbaeda410472610643bfb2f0a
SHA5120dd9f8c1676ffb4df5bc7e5448dd3bd70df6589aac338c865cf888d4ecb01c96d6a3078e03bcc4678cdb673b71ea8ca2a64e5cf720bed68845fed22485945283
-
C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe.exe
Filesize2.7MB
MD560ab0daed9d1aabc9dddbe1ff9ce19ca
SHA173eaf43a6a935feed8bf6a89471ff116c41e9688
SHA256a01a6190b778982a7225c2a50325d9063f9eed8bbaeda410472610643bfb2f0a
SHA5120dd9f8c1676ffb4df5bc7e5448dd3bd70df6589aac338c865cf888d4ecb01c96d6a3078e03bcc4678cdb673b71ea8ca2a64e5cf720bed68845fed22485945283
-
Filesize
26KB
MD5ef3256717d6b0edc9776e10d8a519313
SHA1c7629324ead6c72e3aaec3c4715ecafb752e305c
SHA25671fdb7e7308c8cc0b0287ab175de70c1110bc506198983a7ee341951f07328a5
SHA512eeb5fc7cb46ffb4d261da3c1626a83da7a10d8a0b51147e74e594341d5c0b383d5dc2ae43133c28656dfc63f1ea98c513ceaf622c9036a206716509d14748c77
-
Filesize
26KB
MD5ef3256717d6b0edc9776e10d8a519313
SHA1c7629324ead6c72e3aaec3c4715ecafb752e305c
SHA25671fdb7e7308c8cc0b0287ab175de70c1110bc506198983a7ee341951f07328a5
SHA512eeb5fc7cb46ffb4d261da3c1626a83da7a10d8a0b51147e74e594341d5c0b383d5dc2ae43133c28656dfc63f1ea98c513ceaf622c9036a206716509d14748c77
-
Filesize
26KB
MD5ef3256717d6b0edc9776e10d8a519313
SHA1c7629324ead6c72e3aaec3c4715ecafb752e305c
SHA25671fdb7e7308c8cc0b0287ab175de70c1110bc506198983a7ee341951f07328a5
SHA512eeb5fc7cb46ffb4d261da3c1626a83da7a10d8a0b51147e74e594341d5c0b383d5dc2ae43133c28656dfc63f1ea98c513ceaf622c9036a206716509d14748c77
-
Filesize
26KB
MD5ef3256717d6b0edc9776e10d8a519313
SHA1c7629324ead6c72e3aaec3c4715ecafb752e305c
SHA25671fdb7e7308c8cc0b0287ab175de70c1110bc506198983a7ee341951f07328a5
SHA512eeb5fc7cb46ffb4d261da3c1626a83da7a10d8a0b51147e74e594341d5c0b383d5dc2ae43133c28656dfc63f1ea98c513ceaf622c9036a206716509d14748c77
-
Filesize
10B
MD53fa5f43b227b96d6334e4649982d21b7
SHA1aaca225fe44f532099d2d7d7b00d80ebc3dd003b
SHA256d8fdb800da5ad9cc8b64df32df8c6006127fb46c590ee39f84bfd8b4f8912358
SHA5122bf18238a4b94cb61fdd22c61007bc5cbb7fc712b69685cc03efc548622dc365f07159a6599192b1aed0c2ffa9911fbeb321323f7bf24c8706d52adff07e432e
-
\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
Filesize2.7MB
MD560ab0daed9d1aabc9dddbe1ff9ce19ca
SHA173eaf43a6a935feed8bf6a89471ff116c41e9688
SHA256a01a6190b778982a7225c2a50325d9063f9eed8bbaeda410472610643bfb2f0a
SHA5120dd9f8c1676ffb4df5bc7e5448dd3bd70df6589aac338c865cf888d4ecb01c96d6a3078e03bcc4678cdb673b71ea8ca2a64e5cf720bed68845fed22485945283
-
\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
Filesize2.7MB
MD560ab0daed9d1aabc9dddbe1ff9ce19ca
SHA173eaf43a6a935feed8bf6a89471ff116c41e9688
SHA256a01a6190b778982a7225c2a50325d9063f9eed8bbaeda410472610643bfb2f0a
SHA5120dd9f8c1676ffb4df5bc7e5448dd3bd70df6589aac338c865cf888d4ecb01c96d6a3078e03bcc4678cdb673b71ea8ca2a64e5cf720bed68845fed22485945283