Analysis
-
max time kernel
160s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 12:52
Behavioral task
behavioral1
Sample
90428802a49f12a106b15e2bd21bdc35.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
90428802a49f12a106b15e2bd21bdc35.exe
Resource
win10v2004-20231215-en
General
-
Target
90428802a49f12a106b15e2bd21bdc35.exe
-
Size
2.6MB
-
MD5
90428802a49f12a106b15e2bd21bdc35
-
SHA1
4d701ff5725c177fd516c183e0f84a275a80adf5
-
SHA256
855369a144b1aa10dba06b6b5f12e866912f7f3dca6e905b822ee12aaea3b3f0
-
SHA512
cbaf18998859fc686c87e253c71c85ccdf85e34daf05f469d7d66b550f1458528b4f30678a9118ab2d9fee0b60934427d6313905927b857f44b0653f0450da12
-
SSDEEP
49152:tU/5M1X4Wl/YvzYCQR9RQs+C40yZpJaD99Gn:tKq4oEa9RQs+Cn4/UKn
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 90428802a49f12a106b15e2bd21bdc35.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 90428802a49f12a106b15e2bd21bdc35.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 90428802a49f12a106b15e2bd21bdc35.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe -
Executes dropped EXE 4 IoCs
pid Process 2784 explorer.exe 2728 spoolsv.exe 2768 svchost.exe 2528 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2624 90428802a49f12a106b15e2bd21bdc35.exe 2784 explorer.exe 2728 spoolsv.exe 2768 svchost.exe -
resource yara_rule behavioral1/memory/2624-0-0x0000000000400000-0x0000000000A17000-memory.dmp themida behavioral1/files/0x0035000000013397-7.dat themida behavioral1/files/0x0035000000013397-11.dat themida behavioral1/memory/2784-12-0x0000000000400000-0x0000000000A17000-memory.dmp themida behavioral1/files/0x0035000000013397-16.dat themida behavioral1/files/0x0009000000013524-19.dat themida behavioral1/files/0x0009000000013524-18.dat themida behavioral1/memory/2728-24-0x0000000000400000-0x0000000000A17000-memory.dmp themida behavioral1/files/0x0009000000013524-22.dat themida behavioral1/files/0x0009000000013524-28.dat themida behavioral1/files/0x000900000001399e-34.dat themida behavioral1/files/0x000900000001399e-31.dat themida behavioral1/memory/2768-36-0x0000000000400000-0x0000000000A17000-memory.dmp themida behavioral1/files/0x0009000000013524-41.dat themida behavioral1/files/0x000900000001399e-40.dat themida behavioral1/memory/2624-43-0x0000000000400000-0x0000000000A17000-memory.dmp themida behavioral1/files/0x0009000000013524-42.dat themida behavioral1/memory/2528-45-0x0000000000400000-0x0000000000A17000-memory.dmp themida behavioral1/memory/2728-51-0x0000000000400000-0x0000000000A17000-memory.dmp themida behavioral1/memory/2528-50-0x0000000000400000-0x0000000000A17000-memory.dmp themida behavioral1/memory/2784-49-0x0000000000400000-0x0000000000A17000-memory.dmp themida behavioral1/memory/2624-52-0x0000000000400000-0x0000000000A17000-memory.dmp themida behavioral1/memory/2768-54-0x0000000000400000-0x0000000000A17000-memory.dmp themida behavioral1/memory/2784-53-0x0000000000400000-0x0000000000A17000-memory.dmp themida behavioral1/memory/2768-61-0x0000000000400000-0x0000000000A17000-memory.dmp themida behavioral1/memory/2784-66-0x0000000000400000-0x0000000000A17000-memory.dmp themida behavioral1/memory/2784-72-0x0000000000400000-0x0000000000A17000-memory.dmp themida -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 90428802a49f12a106b15e2bd21bdc35.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2624 90428802a49f12a106b15e2bd21bdc35.exe 2784 explorer.exe 2728 spoolsv.exe 2768 svchost.exe 2528 spoolsv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 90428802a49f12a106b15e2bd21bdc35.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 364 schtasks.exe 2448 schtasks.exe 2380 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2624 90428802a49f12a106b15e2bd21bdc35.exe 2624 90428802a49f12a106b15e2bd21bdc35.exe 2624 90428802a49f12a106b15e2bd21bdc35.exe 2624 90428802a49f12a106b15e2bd21bdc35.exe 2624 90428802a49f12a106b15e2bd21bdc35.exe 2624 90428802a49f12a106b15e2bd21bdc35.exe 2624 90428802a49f12a106b15e2bd21bdc35.exe 2624 90428802a49f12a106b15e2bd21bdc35.exe 2624 90428802a49f12a106b15e2bd21bdc35.exe 2624 90428802a49f12a106b15e2bd21bdc35.exe 2624 90428802a49f12a106b15e2bd21bdc35.exe 2624 90428802a49f12a106b15e2bd21bdc35.exe 2624 90428802a49f12a106b15e2bd21bdc35.exe 2624 90428802a49f12a106b15e2bd21bdc35.exe 2624 90428802a49f12a106b15e2bd21bdc35.exe 2624 90428802a49f12a106b15e2bd21bdc35.exe 2624 90428802a49f12a106b15e2bd21bdc35.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe 2784 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2784 explorer.exe 2768 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2624 90428802a49f12a106b15e2bd21bdc35.exe 2624 90428802a49f12a106b15e2bd21bdc35.exe 2784 explorer.exe 2784 explorer.exe 2728 spoolsv.exe 2728 spoolsv.exe 2768 svchost.exe 2768 svchost.exe 2528 spoolsv.exe 2528 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2784 2624 90428802a49f12a106b15e2bd21bdc35.exe 28 PID 2624 wrote to memory of 2784 2624 90428802a49f12a106b15e2bd21bdc35.exe 28 PID 2624 wrote to memory of 2784 2624 90428802a49f12a106b15e2bd21bdc35.exe 28 PID 2624 wrote to memory of 2784 2624 90428802a49f12a106b15e2bd21bdc35.exe 28 PID 2784 wrote to memory of 2728 2784 explorer.exe 29 PID 2784 wrote to memory of 2728 2784 explorer.exe 29 PID 2784 wrote to memory of 2728 2784 explorer.exe 29 PID 2784 wrote to memory of 2728 2784 explorer.exe 29 PID 2728 wrote to memory of 2768 2728 spoolsv.exe 30 PID 2728 wrote to memory of 2768 2728 spoolsv.exe 30 PID 2728 wrote to memory of 2768 2728 spoolsv.exe 30 PID 2728 wrote to memory of 2768 2728 spoolsv.exe 30 PID 2768 wrote to memory of 2528 2768 svchost.exe 31 PID 2768 wrote to memory of 2528 2768 svchost.exe 31 PID 2768 wrote to memory of 2528 2768 svchost.exe 31 PID 2768 wrote to memory of 2528 2768 svchost.exe 31 PID 2784 wrote to memory of 2156 2784 explorer.exe 32 PID 2784 wrote to memory of 2156 2784 explorer.exe 32 PID 2784 wrote to memory of 2156 2784 explorer.exe 32 PID 2784 wrote to memory of 2156 2784 explorer.exe 32 PID 2768 wrote to memory of 364 2768 svchost.exe 33 PID 2768 wrote to memory of 364 2768 svchost.exe 33 PID 2768 wrote to memory of 364 2768 svchost.exe 33 PID 2768 wrote to memory of 364 2768 svchost.exe 33 PID 2768 wrote to memory of 2448 2768 svchost.exe 38 PID 2768 wrote to memory of 2448 2768 svchost.exe 38 PID 2768 wrote to memory of 2448 2768 svchost.exe 38 PID 2768 wrote to memory of 2448 2768 svchost.exe 38 PID 2768 wrote to memory of 2380 2768 svchost.exe 40 PID 2768 wrote to memory of 2380 2768 svchost.exe 40 PID 2768 wrote to memory of 2380 2768 svchost.exe 40 PID 2768 wrote to memory of 2380 2768 svchost.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\90428802a49f12a106b15e2bd21bdc35.exe"C:\Users\Admin\AppData\Local\Temp\90428802a49f12a106b15e2bd21bdc35.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2528
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 15:56 /f5⤵
- Creates scheduled task(s)
PID:364
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 15:57 /f5⤵
- Creates scheduled task(s)
PID:2448
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 15:58 /f5⤵
- Creates scheduled task(s)
PID:2380
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2156
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
402KB
MD579bb4adefb21a66b3c1529164f8ec92d
SHA1a59707c8a4fc322b70da9abbc7ab60594239a862
SHA256a284a0bf63663da80fc404318af28e3c39c400b17b1722f622a7d87d924197cd
SHA51246b46ced8fd3def33a46989dd21523df8fb3de506d053e27d228b2b7da9b712ec5e46df2c3b43a7bc4eb99805e60332c83ec7176c1b8d4aa84b0a71363bb1f21
-
Filesize
207KB
MD5f924c145ab85604bf5e5146ecd73cb18
SHA1487cefc33deb1030a4f856c5a716cb1b5b2cecef
SHA2566e5474905c77b85acb3400b04eecc31c8165e7e210a34ffe0f48e732351ade6b
SHA5120db0bf53f5b804281eb2d26c6be5841b51631000a8e4bc66d211c07775b867eac6e2643b5a4b19b0289cdf40ffbdb3ab9df220f9c3b8a2ffb77ed06b80195479
-
Filesize
85KB
MD57136e5cfc2093de4220b9aa34b67120f
SHA10e01d1ae86240c8d3575d96c4171bf8a0bbb437e
SHA256104755f9810693cfda618a99a0cfe4d0b12ec781bcbfac5c2dff4df6c91078b2
SHA5128b947c540f1a6a841e64e45778df715c54cc6b8e0946465c979819edb1b4377d512ebae3e3248c5323c979ea0152d0c948e4e01bbf7f40e931fcbf176dd70614
-
Filesize
118KB
MD5fe2f93030fb2d1b7a170edc752c56121
SHA1a17d26f4fb9ae62e008179025054c1a82abdcf66
SHA2561731bbb44b3f92af56beb79c64b78d4d775ff3b436ef1e0015549d58c77b8e3b
SHA512c1971e244b6990d7e11f6cbb8446d20c74b72e624c8f88ab8395ef607e275a3fc645f30eaa7f823b7bc2b31463fe70192e7ae101691c960bb6b5483dc70cf252
-
Filesize
33KB
MD5d28504a84be3fce822a508ca606dfe12
SHA1953d2141375dce6abd612deeb4c28486d6ce08b0
SHA2566634511b076be72199c2c6da12ff0f3d7112379c2c0bf368642dc19e59c8fa00
SHA51274262b2cfe24263ff5799dc105e2acb71004b81388b13279d359571fb7c03f68693f5c06eef2a2a5636a2f5e37d86034d5075ce5d592c2443da146ef675b3f3c
-
Filesize
62KB
MD5d52e7700e8657229b2d10510f76598e6
SHA19387db4a8c090bf8206d3b52c5ba7de53c3cb7af
SHA25601e9d449c286abe4241a681228d6df79c632b377fdc53f5cd552a292da90b06f
SHA512d8ef65d673f246c006286f25a0f214663d097f61912cb3a4ffb97ad32459e0484fc1a3684ce806eeb0ca9764ab768244656ab71688fbdd430fed322038fca547
-
Filesize
130KB
MD5f185537cd595335b0ffe9d4764396717
SHA1093a2e809427f5a7549a1d885067589a648d5040
SHA25604ed24dbf7d78b2931b3c78de93fdaa6a9b43f006d31504eddcdb626fb5fe94d
SHA512f3f7d4f64f1f60c75c7ff28d75da81009a41a3503d7563a27c986618e79f6a6eef8129843d5d61b3cf3434a2f2a9f3644d984ff7022ca57b286fee079dc26320
-
Filesize
314KB
MD553822b7b1f789f1891687716e1427e22
SHA1e47d8cf8f3fe3268fe53f9c07738a3c290901cdd
SHA25641fe535c3cf255386d65d6070e969206aa597d8bdc94681b611eabb1935b84ca
SHA512f355c619c4859e3a17aefb1302cfc88e49a2cb70049356df0a8df7632c0e87b488f0083ff09c2e9fad8e1e81ba21b197a941525541e3402ceebe827a7236fb7c
-
Filesize
711KB
MD5d1aa5a0aaac853842c118a0dfe45df14
SHA1b5ee74fd151a173e420eddb80aae2c53eddd6e74
SHA2563937a45f09196b3db1b7c090a5a520ff4b85238cd7030f35aaf57df1716f2fd3
SHA512d25fb49e7a4d1544b695ac54cf52cf2cfd6be4f21750e3f9f7e6f3315b221a765da8495c2706283383763868cc5dcac366e7bcf144f91db0553e7ce5182924aa
-
Filesize
241KB
MD50d0a5e2d6874ed0caaab3af51c7e4c1a
SHA19380eb15bb9ade3c115de636b31046243fc9b17c
SHA25682c68dd97070d50f0d185cb27c14501e4c14bd1014e3df60f5bf5ab3f64e6901
SHA512aa135f8f3c563c91950d0b68e82511cb58ca1f6e751f2d2a299ba763b3330d65b4b6ca3f68deb17563aa9d23a5351c21257a54fce2a3597704d9e7eaacee424a
-
Filesize
235KB
MD5be190efeff8820f979b05dfcde421d66
SHA14380f7287e9af3f7313a7fdf6a040608895ebfa2
SHA2561876d9235fe6c60280f9791867ecfe5e2b2480884d9cc22e4fb1c348225277b9
SHA51245169f8099dadcaab8ddf9fc376abaa5fd371bae38a81eab8c0584c4b20c87ac664b9afcd2f4f751ce9f45acdd9cd6b2884a30f1942c0ac2d96c8743d50fb634
-
Filesize
65KB
MD5cfcccee83447bc35709cefe089c5df84
SHA1cc0c5538ef32665dc5a78908febc6377cfec1815
SHA25634d7911ded92ec407453ee3fbec914d8b541791d7d5b209d7487557dcc3a0795
SHA512786e787b61d77f1a0c607e1fa5d418dc02e4e00604c0a47a0a680fe51fd8f6d137c0f40b321e73d9356057cd701a9840f3dd4c975ea01c138ba8082f8422cfcb