Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/04/2024, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe
Resource
win7-20240221-en
General
-
Target
577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe
-
Size
48KB
-
MD5
01b6d7a32917e448f5030b937210f372
-
SHA1
9f4645587abb30bbec12f2824ccb3859ecbd852c
-
SHA256
577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8
-
SHA512
06b188acd7da4d1af68bfb363f3af32d9c09741b5a2cf0cec1c9fdcd22b698073098e0cd3495b63dfb3616022a1a44513d49f8919b224b4122765dd3558a720d
-
SSDEEP
1536:2dKFaYzMXqtGNttyeiZnZLYm1pHqaNrFd:2kFaY46tGNttyeQLYm1gaNpd
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Deletes itself 1 IoCs
pid Process 2664 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2684 Logo1_.exe 2928 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe -
Loads dropped DLL 1 IoCs
pid Process 2664 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FREN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\security\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{5CF72A45-AD68-472B-BBFF-38A947BD74EE}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe 2684 Logo1_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2928 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2004 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 28 PID 2156 wrote to memory of 2004 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 28 PID 2156 wrote to memory of 2004 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 28 PID 2156 wrote to memory of 2004 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 28 PID 2004 wrote to memory of 2228 2004 net.exe 30 PID 2004 wrote to memory of 2228 2004 net.exe 30 PID 2004 wrote to memory of 2228 2004 net.exe 30 PID 2004 wrote to memory of 2228 2004 net.exe 30 PID 2156 wrote to memory of 2664 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 31 PID 2156 wrote to memory of 2664 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 31 PID 2156 wrote to memory of 2664 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 31 PID 2156 wrote to memory of 2664 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 31 PID 2156 wrote to memory of 2684 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 32 PID 2156 wrote to memory of 2684 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 32 PID 2156 wrote to memory of 2684 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 32 PID 2156 wrote to memory of 2684 2156 577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe 32 PID 2684 wrote to memory of 2708 2684 Logo1_.exe 34 PID 2684 wrote to memory of 2708 2684 Logo1_.exe 34 PID 2684 wrote to memory of 2708 2684 Logo1_.exe 34 PID 2684 wrote to memory of 2708 2684 Logo1_.exe 34 PID 2708 wrote to memory of 2412 2708 net.exe 36 PID 2708 wrote to memory of 2412 2708 net.exe 36 PID 2708 wrote to memory of 2412 2708 net.exe 36 PID 2708 wrote to memory of 2412 2708 net.exe 36 PID 2664 wrote to memory of 2928 2664 cmd.exe 37 PID 2664 wrote to memory of 2928 2664 cmd.exe 37 PID 2664 wrote to memory of 2928 2664 cmd.exe 37 PID 2664 wrote to memory of 2928 2664 cmd.exe 37 PID 2664 wrote to memory of 2928 2664 cmd.exe 37 PID 2664 wrote to memory of 2928 2664 cmd.exe 37 PID 2664 wrote to memory of 2928 2664 cmd.exe 37 PID 2684 wrote to memory of 2440 2684 Logo1_.exe 38 PID 2684 wrote to memory of 2440 2684 Logo1_.exe 38 PID 2684 wrote to memory of 2440 2684 Logo1_.exe 38 PID 2684 wrote to memory of 2440 2684 Logo1_.exe 38 PID 2440 wrote to memory of 2396 2440 net.exe 40 PID 2440 wrote to memory of 2396 2440 net.exe 40 PID 2440 wrote to memory of 2396 2440 net.exe 40 PID 2440 wrote to memory of 2396 2440 net.exe 40 PID 2684 wrote to memory of 1172 2684 Logo1_.exe 21 PID 2684 wrote to memory of 1172 2684 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe"C:\Users\Admin\AppData\Local\Temp\577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2228
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2FD7.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe"C:\Users\Admin\AppData\Local\Temp\577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2928
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2412
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2396
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD551ed9ab4efc7af69072f0b0cb33c7d4a
SHA1bf7c12afe6f8eb95355d92485debb16a073f8aab
SHA256532277e916d51a2e40e8f87b54298b6353873329b42e2d944c47457b1c415df0
SHA51201973dcd43cd0f1c1765db75c7c6ea533e2bf47bae1001f43b3f5fb46f6f3d80af6e299d082e46e753c237cd5961d8e67a11f1c056768db75e4c3106c20fe4fc
-
Filesize
478KB
MD50a2f7bc5d2f3b1abbf852f12ac72d39f
SHA13ed5d15e03f4a79247638844b8e938794445bfde
SHA256c2eadf7bc1b2c55782d5307c4bfdc59f4c900494b9a624e199c675b582a13d7c
SHA5128c47195b5c79359b6e7c5088d1a2c757ce6a1f16dd61c4c4d0bb7baafba4135c7a64541ce7a3af55b65f83af3df2677ff6f63f9c80fdfb1f7696d54c4609d63d
-
Filesize
722B
MD5c3dad5fa494fd31ba7813e4554376e4f
SHA18cc311dbaed6d902d63267a031ba4c63613ff8df
SHA256fe6490f24e506f55d072c6c7a2c63aa0780b77661fbd56a1f724e7501707f430
SHA5120942033f608f1d85f8ba503f48338bb6afe021b9ee841a19c00520dab914b1a61a3d4cdc622b2ba546be9f106396a934b24f75b6536272ed6e3fa0d5302f287b
-
C:\Users\Admin\AppData\Local\Temp\577d279233966a02e9138dca03af6f91490609153583d16286f4d1bcc9b4dbb8.exe.exe
Filesize14KB
MD5ad782ffac62e14e2269bf1379bccbaae
SHA19539773b550e902a35764574a2be2d05bc0d8afc
SHA2561c8a77db924ebeb952052334dc95add388700c02b073b07973cd8fe0a0a360b8
SHA512a1e9d6316ffc55f4751090961733e98c93b2a391666ff50b50e9dea39783746e501d14127e7ee9343926976d7e3cd224f13736530354d8466ea995dab35c8dc2
-
Filesize
33KB
MD5190cfb52ec885264fac6f6fa82efa51e
SHA1a2557e755b37d73f39dc8de59ca7ae37e9e7efee
SHA256e8c435b1a8b093137bc740c8dbf3cf4c7e2e647d7d5d5b7637700349c74bfc09
SHA512df39c740cb59f101d20f6e6b1e50e74345d68a5bc1afe6cb1ff2951559fae570e1ee0926862c8eaf91f92f5e3c32179b19760942c1a39f3df20e9778745f8b8c
-
Filesize
832B
MD57e3a0edd0c6cd8316f4b6c159d5167a1
SHA1753428b4736ffb2c9e3eb50f89255b212768c55a
SHA2561965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA5129c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f
-
Filesize
9B
MD55e45e0c42537212b4bfef35112ec91ba
SHA110c59c091fd35facc82bbc96938f118ce5a60546
SHA2569f6b7a83161db36757e96dc40936aec1e5a9a41f9fca089f9cf5a4d695dd5ed5
SHA512ee964e08687daa53fdc8e063402791acb104bd59f5d0f8a6d11d3e889db476315641c38032ade4177cd794b060f9fc4e6fd161989e452aae828c875c747e4bfb