Analysis
-
max time kernel
122s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 07:46
Static task
static1
Behavioral task
behavioral1
Sample
fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe
Resource
win10v2004-20231215-en
General
-
Target
fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe
-
Size
26KB
-
MD5
bfbdfc7eb7233d2a5ca073ad8e5cd371
-
SHA1
e6ada9aeebe98324457077c2c361c1379d6b8c3b
-
SHA256
fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102
-
SHA512
df3c51954f03f3d6b94acc96e3289fab1a22449d08e1bfff7b665bdbbb8eab2da9bacc61a57d82cce75496dfb1069cbae454df5b1109cb7d061c267ffd507d86
-
SSDEEP
768:L1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:hfgLdQAQfcfymN
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\I: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\G: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\Y: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\X: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\S: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\P: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\T: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\R: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\K: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\J: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\Z: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\W: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\V: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\U: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\H: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\E: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\O: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\N: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\M: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened (read-only) \??\L: fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\en-US\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files\Java\jre7\lib\zi\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\NETWORK\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\1033\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files\Windows Photo Viewer\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\de-DE\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files\VideoLAN\VLC\plugins\keystore\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1040\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files\Microsoft Games\Chess\fr-FR\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENFR\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\DVD Maker\Shared\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Java\jre7\bin\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\ja-JP\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files\Windows Defender\it-IT\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1036\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rundl132.exe fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2876 fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe 2876 fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe 2876 fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe 2876 fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe 2876 fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe 2876 fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe 2876 fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe 2876 fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe 2876 fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe 2876 fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2952 2876 fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe 18 PID 2876 wrote to memory of 2952 2876 fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe 18 PID 2876 wrote to memory of 2952 2876 fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe 18 PID 2876 wrote to memory of 2952 2876 fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe 18 PID 2952 wrote to memory of 2948 2952 net.exe 17 PID 2952 wrote to memory of 2948 2952 net.exe 17 PID 2952 wrote to memory of 2948 2952 net.exe 17 PID 2952 wrote to memory of 2948 2952 net.exe 17 PID 2876 wrote to memory of 1380 2876 fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe 8 PID 2876 wrote to memory of 1380 2876 fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe 8
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe"C:\Users\Admin\AppData\Local\Temp\fe1f55ff02bf2a55f30f28f7461a32e977d5a800df7b2b03d1edd9eab72bd102.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2952
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"1⤵PID:2948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5433d035ff5acbd8429947f51a00c8221
SHA12af87d32dc3f6ba8be7f7fd4a081ddad12e40416
SHA256f37c46e4a4d1eec74a16637666bd530c9da567771277658b27475dddfe0e4f6e
SHA512ad9e7221b8d863444cfe725ba767c118637d46bf65111632f76303b69b43d5710b673172c34d86ef159c01e0c0746b3a56809fab7077e880ef2919a8f863de0c
-
Filesize
873KB
MD534d3ac3b786364b39345f6270684a090
SHA114412112b3274ca90cf90db7f08c8053a637cff8
SHA256934e032fb34ee9b36c49e7379775635045c727b6b2c21961e8b63545826be33f
SHA512595eee1f4641beb2a92798013970f06012e4944031b23c77809e7e1f5c35376426f647a947f3df6a9698aae985cadf3904da149d61ae6a869eca5eec3e9ec2dc
-
Filesize
89KB
MD5c74d0680ec77b29d3b9b315b987c2014
SHA18599174e7675fd71bc5b0d1fd33347ede8ed8d78
SHA2567ee014bcbb1ac1766839ab9068cd0dc6604d8a5342e5cfbf5b2c4b7056cb6f43
SHA512bca99ba9a1da6990cec60af0c44dc212b58e0c127a512cbd1545104a5e060e72e0129b7f1119c87a60b372381d66f30b1c6bd90bcb22f84cc01ecfbdd1969f98
-
Filesize
10B
MD534c7bf8c1e8aa0e76a1cb36da6f3c07f
SHA193bff4db65fd067f94ca08ce2654a2675925b27d
SHA25689ee7da24a1550d124e7ac206a8d49733f819c098eebf27b8c7f28e931a09f53
SHA512ba8fa54ac2e6eafb524f14c7d286d9910afd808ec561c933af8b72a9cdb813e0e7777dc04a9dfdb6c985f27f123ac34a19782d6c0e734f8ab4e9860c9033139b