Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
3b9e9e130d52fe95c8be82aa4b8feb74.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3b9e9e130d52fe95c8be82aa4b8feb74.exe
Resource
win10v2004-20240226-en
General
-
Target
3b9e9e130d52fe95c8be82aa4b8feb74.exe
-
Size
811KB
-
MD5
3b9e9e130d52fe95c8be82aa4b8feb74
-
SHA1
1cad525ecc17fb320bd8256e9cd106b989f97354
-
SHA256
caeecccfee0962fbe3d4fb4ab336bf3d1230b12ad0821ff66f7a2cabc289c954
-
SHA512
bb360a72f52fcb1a26a8e94ab31c74092cbc8f2a2c12756f4f2b2c81a7d96bbdf440b0daad26fbd2593371794061bf0372989dc845333ff882f782280b609e25
-
SSDEEP
12288:k4s2A/R5gv2bJ4GECR556Y9JlObra93zWsiQJjXEymLAhYz9lw/WH4+6mHtAF:Ev/Re2qWZfnobU3as37Qz9lU+ru
Malware Config
Extracted
djvu
http://sajdfue.com/test2/get.php
-
extension
.looy
-
offline_id
1eSPzWRaNslCgtjBZfL5pzvovoiaVI4IZSnvAwt1
-
payload_url
http://sdfjhuz.com/dl/build2.exe
http://sajdfue.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1 Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0858PsawqS
Extracted
vidar
8.4
95002d0a9d65ffced363a8f35f42a529
https://steamcommunity.com/profiles/76561199654112719
https://t.me/r2d0s
-
profile_id_v2
95002d0a9d65ffced363a8f35f42a529
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0
Signatures
-
Detect Vidar Stealer 5 IoCs
resource yara_rule behavioral1/memory/2532-94-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral1/memory/2324-98-0x0000000000230000-0x0000000000261000-memory.dmp family_vidar_v7 behavioral1/memory/2532-99-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral1/memory/2532-100-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral1/memory/2532-232-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 -
Detected Djvu ransomware 14 IoCs
resource yara_rule behavioral1/memory/1160-2-0x00000000030D0000-0x00000000031EB000-memory.dmp family_djvu behavioral1/memory/2096-5-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2096-8-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2096-9-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2096-45-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2472-53-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2472-54-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2472-70-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2472-71-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2472-75-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2472-77-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2472-78-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2472-101-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2472-239-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2324 build2.exe 2532 build2.exe -
Loads dropped DLL 6 IoCs
pid Process 2472 3b9e9e130d52fe95c8be82aa4b8feb74.exe 2472 3b9e9e130d52fe95c8be82aa4b8feb74.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2672 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\8b5a767d-e5d0-4d9c-b744-8181876a3fa5\\3b9e9e130d52fe95c8be82aa4b8feb74.exe\" --AutoStart" 3b9e9e130d52fe95c8be82aa4b8feb74.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.2ip.ua 4 api.2ip.ua 16 api.2ip.ua -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1160 set thread context of 2096 1160 3b9e9e130d52fe95c8be82aa4b8feb74.exe 28 PID 2736 set thread context of 2472 2736 3b9e9e130d52fe95c8be82aa4b8feb74.exe 32 PID 2324 set thread context of 2532 2324 build2.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2064 2532 WerFault.exe 34 -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 3b9e9e130d52fe95c8be82aa4b8feb74.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 3b9e9e130d52fe95c8be82aa4b8feb74.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C 3b9e9e130d52fe95c8be82aa4b8feb74.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 3b9e9e130d52fe95c8be82aa4b8feb74.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C 3b9e9e130d52fe95c8be82aa4b8feb74.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2096 3b9e9e130d52fe95c8be82aa4b8feb74.exe 2472 3b9e9e130d52fe95c8be82aa4b8feb74.exe 2472 3b9e9e130d52fe95c8be82aa4b8feb74.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1160 wrote to memory of 2096 1160 3b9e9e130d52fe95c8be82aa4b8feb74.exe 28 PID 1160 wrote to memory of 2096 1160 3b9e9e130d52fe95c8be82aa4b8feb74.exe 28 PID 1160 wrote to memory of 2096 1160 3b9e9e130d52fe95c8be82aa4b8feb74.exe 28 PID 1160 wrote to memory of 2096 1160 3b9e9e130d52fe95c8be82aa4b8feb74.exe 28 PID 1160 wrote to memory of 2096 1160 3b9e9e130d52fe95c8be82aa4b8feb74.exe 28 PID 1160 wrote to memory of 2096 1160 3b9e9e130d52fe95c8be82aa4b8feb74.exe 28 PID 1160 wrote to memory of 2096 1160 3b9e9e130d52fe95c8be82aa4b8feb74.exe 28 PID 1160 wrote to memory of 2096 1160 3b9e9e130d52fe95c8be82aa4b8feb74.exe 28 PID 1160 wrote to memory of 2096 1160 3b9e9e130d52fe95c8be82aa4b8feb74.exe 28 PID 1160 wrote to memory of 2096 1160 3b9e9e130d52fe95c8be82aa4b8feb74.exe 28 PID 1160 wrote to memory of 2096 1160 3b9e9e130d52fe95c8be82aa4b8feb74.exe 28 PID 2096 wrote to memory of 2672 2096 3b9e9e130d52fe95c8be82aa4b8feb74.exe 29 PID 2096 wrote to memory of 2672 2096 3b9e9e130d52fe95c8be82aa4b8feb74.exe 29 PID 2096 wrote to memory of 2672 2096 3b9e9e130d52fe95c8be82aa4b8feb74.exe 29 PID 2096 wrote to memory of 2672 2096 3b9e9e130d52fe95c8be82aa4b8feb74.exe 29 PID 2096 wrote to memory of 2736 2096 3b9e9e130d52fe95c8be82aa4b8feb74.exe 31 PID 2096 wrote to memory of 2736 2096 3b9e9e130d52fe95c8be82aa4b8feb74.exe 31 PID 2096 wrote to memory of 2736 2096 3b9e9e130d52fe95c8be82aa4b8feb74.exe 31 PID 2096 wrote to memory of 2736 2096 3b9e9e130d52fe95c8be82aa4b8feb74.exe 31 PID 2736 wrote to memory of 2472 2736 3b9e9e130d52fe95c8be82aa4b8feb74.exe 32 PID 2736 wrote to memory of 2472 2736 3b9e9e130d52fe95c8be82aa4b8feb74.exe 32 PID 2736 wrote to memory of 2472 2736 3b9e9e130d52fe95c8be82aa4b8feb74.exe 32 PID 2736 wrote to memory of 2472 2736 3b9e9e130d52fe95c8be82aa4b8feb74.exe 32 PID 2736 wrote to memory of 2472 2736 3b9e9e130d52fe95c8be82aa4b8feb74.exe 32 PID 2736 wrote to memory of 2472 2736 3b9e9e130d52fe95c8be82aa4b8feb74.exe 32 PID 2736 wrote to memory of 2472 2736 3b9e9e130d52fe95c8be82aa4b8feb74.exe 32 PID 2736 wrote to memory of 2472 2736 3b9e9e130d52fe95c8be82aa4b8feb74.exe 32 PID 2736 wrote to memory of 2472 2736 3b9e9e130d52fe95c8be82aa4b8feb74.exe 32 PID 2736 wrote to memory of 2472 2736 3b9e9e130d52fe95c8be82aa4b8feb74.exe 32 PID 2736 wrote to memory of 2472 2736 3b9e9e130d52fe95c8be82aa4b8feb74.exe 32 PID 2472 wrote to memory of 2324 2472 3b9e9e130d52fe95c8be82aa4b8feb74.exe 33 PID 2472 wrote to memory of 2324 2472 3b9e9e130d52fe95c8be82aa4b8feb74.exe 33 PID 2472 wrote to memory of 2324 2472 3b9e9e130d52fe95c8be82aa4b8feb74.exe 33 PID 2472 wrote to memory of 2324 2472 3b9e9e130d52fe95c8be82aa4b8feb74.exe 33 PID 2324 wrote to memory of 2532 2324 build2.exe 34 PID 2324 wrote to memory of 2532 2324 build2.exe 34 PID 2324 wrote to memory of 2532 2324 build2.exe 34 PID 2324 wrote to memory of 2532 2324 build2.exe 34 PID 2324 wrote to memory of 2532 2324 build2.exe 34 PID 2324 wrote to memory of 2532 2324 build2.exe 34 PID 2324 wrote to memory of 2532 2324 build2.exe 34 PID 2324 wrote to memory of 2532 2324 build2.exe 34 PID 2324 wrote to memory of 2532 2324 build2.exe 34 PID 2324 wrote to memory of 2532 2324 build2.exe 34 PID 2324 wrote to memory of 2532 2324 build2.exe 34 PID 2532 wrote to memory of 2064 2532 build2.exe 36 PID 2532 wrote to memory of 2064 2532 build2.exe 36 PID 2532 wrote to memory of 2064 2532 build2.exe 36 PID 2532 wrote to memory of 2064 2532 build2.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b9e9e130d52fe95c8be82aa4b8feb74.exe"C:\Users\Admin\AppData\Local\Temp\3b9e9e130d52fe95c8be82aa4b8feb74.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\3b9e9e130d52fe95c8be82aa4b8feb74.exe"C:\Users\Admin\AppData\Local\Temp\3b9e9e130d52fe95c8be82aa4b8feb74.exe"2⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\8b5a767d-e5d0-4d9c-b744-8181876a3fa5" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\3b9e9e130d52fe95c8be82aa4b8feb74.exe"C:\Users\Admin\AppData\Local\Temp\3b9e9e130d52fe95c8be82aa4b8feb74.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\3b9e9e130d52fe95c8be82aa4b8feb74.exe"C:\Users\Admin\AppData\Local\Temp\3b9e9e130d52fe95c8be82aa4b8feb74.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\ab3d8a1f-1855-455c-a7c6-78dd824e7e71\build2.exe"C:\Users\Admin\AppData\Local\ab3d8a1f-1855-455c-a7c6-78dd824e7e71\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\ab3d8a1f-1855-455c-a7c6-78dd824e7e71\build2.exe"C:\Users\Admin\AppData\Local\ab3d8a1f-1855-455c-a7c6-78dd824e7e71\build2.exe"6⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 14407⤵
- Loads dropped DLL
- Program crash
PID:2064
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD556d79b1038102a5d57d2d6b86dadfcd3
SHA1ec07c37245db9432a81ddbb7a3cb492c04d9a20d
SHA2560690e09d1fd988e1b9cf868ff5537e0a595afe675918238f485302cdb453028b
SHA5128e3d6bca43a569eb651f4cf2e1424956a963a91a760cdb4bd6185bd14c753c1726aeed1fa37c5ef2d302ce804249505e71313fab1b175d603306b56a3ac7e3f5
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD58c34362373c3162ab3478ebe31d22165
SHA1afe3821a1048787c46059549d85b8381ae96b699
SHA25692f09e0c76cb11c2949e84e5b40e3d30e914ee9f8f7291b4d6f8c42342769a49
SHA51274129b1a723bba0c5b52bc5b6f84aa08eec314cbea09e55981ba27d09ceab178be1842ec85e85d4016236e5b617427267ef89aef1f8f64a82f89d665db3cfcf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb5370d5f151a9a4186eafae51dcdfda
SHA1faab9bdbafa391bcfa53e7001ac8b09dc44c7f53
SHA2563b9596485175fb5279cb545c9517626c9c45775db2da06bbd5df381460109e7b
SHA512317accdeb6deb031ef015679797d74d9ac567dffed4e8cd8f248f7cf020c8266e59436082597cf7e9d581fe0938671e2fd9fce2938ee164df90c74c0d3064abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD562761d1f997cac490ee29f857885e117
SHA12318e2e840ea48cd32b82ed9f6e7cc87559e23c9
SHA256133d9bf56c9a32a78aeca940e4b522331797b2b04b3e6417e9a0a3208e315da5
SHA5127ce054ce5cd0a90644941780ec08c0e82b1ffb44fdfd6b04e2a75627312f9b9c05f31e4ff56c353e516e02158cbf7193d498c57de3cd0b6004e62e7e1807c5a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5997ce6aadced464d435304988b675997
SHA125a1be1d87a538cadcf7ac9a1cdb663f6d3906b4
SHA2567b7108e6b3875b73eaa8e2eb843f143ae66e7ec1724160f88aa4e90108ce263a
SHA512b78459a38aa546b3eae7bacfed4322551394ddd9286f638b11d0b7943f9aa1a780c568780517ea3f037d2223ac876d062e7acac500dd7d7febe1bdba9dfb2fc1
-
C:\Users\Admin\AppData\Local\8b5a767d-e5d0-4d9c-b744-8181876a3fa5\3b9e9e130d52fe95c8be82aa4b8feb74.exe
Filesize811KB
MD53b9e9e130d52fe95c8be82aa4b8feb74
SHA11cad525ecc17fb320bd8256e9cd106b989f97354
SHA256caeecccfee0962fbe3d4fb4ab336bf3d1230b12ad0821ff66f7a2cabc289c954
SHA512bb360a72f52fcb1a26a8e94ab31c74092cbc8f2a2c12756f4f2b2c81a7d96bbdf440b0daad26fbd2593371794061bf0372989dc845333ff882f782280b609e25
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
342KB
MD526544ec9adc1864de80222fb0b38e6dc
SHA12ca52374bb468a8e2c10d39b64d1e4e9d7d0adee
SHA25603b38ccf2c3145839d5ea7c5ccec609de3a67a7e435e94ca05c8c080d9df4411
SHA512f7eb99db8eb4df15ac252bd4523a407b32089d22c435303499bc3813ecdf1ffbc8483417bb97e901fba3e3f36c6e9e47eb30fa78b7c461d3f78f5d5899fae730