Analysis
-
max time kernel
202s -
max time network
267s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
14-05-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe
Resource
win10-20240404-en
General
-
Target
e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe
-
Size
681KB
-
MD5
59db7bd22d4ec503b768ece646205c27
-
SHA1
ff57cda4829978d8b6f7f1f31356f291b37acaa6
-
SHA256
e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757
-
SHA512
d35708f7d53998917fc66a74f5ec158cc3726fa9f3035c3e13fca4fa38c66a18839b156281f21ad80e92537e7ba052fb64ce6a6bda62f0d6e955db78191e522c
-
SSDEEP
12288:lMJYSP5VV3VG7rYyPT+p/VYXMJ8oD536bGIqs7GBvw0QygfmHp:lMVj3IXYETQV1XD5VIZ7GOg1J
Malware Config
Extracted
C:\Program Files (x86)\instructions_read_me.txt
blackbasta
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (9449) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 1 IoCs
Processes:
e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe -
Drops file in Program Files directory 64 IoCs
Processes:
e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_25.25.13009.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\GamesXboxHubSplashScreen.scale-125_contrast-white.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\msdaprsr.dll.mui e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\LiveTile\3px.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsWideTile.scale-125.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\JOURNAL\PREVIEW.GIF e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdateres_pt-PT.dll e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteNotebookWideTile.scale-125.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_neutral_split.scale-100_kzf8qxf38zg5c\SkypeApp\Assets\SkypeTile.scale-100.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File created C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\Contrast\contrast-white\instructions_read_me.txt e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\VBA7.1\1033\VBOB6.CHM e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\upsell.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files (x86)\Internet Explorer\it-IT\iexplore.exe.mui e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\1249_32x32x32.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\1033\msointl30.dll e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-96_altform-unplated.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft Help\MS.POWERPNT.16.1033.hxn e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\ShouldThrow.snippets.ps1xml e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\convertpdf-rna-tool-view.js e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files (x86)\Internet Explorer\SIGNUP\install.ins e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-environment-l1-1-0.dll e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1612.10312.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\InsiderHubAppList.scale-100_contrast-black.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\LargeTile.scale-100.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File created C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\instructions_read_me.txt e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\System.Data.Services.Design.dll e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\1033\DSMESSAGES.XML e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\3.jpg e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2iexp.dll e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\ads_casualgames_300x250.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\en-us\jscripts\wefgallery_strings.js e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annots.api e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Sticker_Planet.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\en\SpreadsheetCompare_col.hxt e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NPSPWRAP.DLL e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_x64__8wekyb3d8bbwe\Assets\starttile.scale-200.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\ReachFramework.resources.dll e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\vlc.mo e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\instructions_read_me.txt e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\themes\dark\rhp_world_icon_2x.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_25.25.13009.0_x64__8wekyb3d8bbwe\FacebookDialog.xbf e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\client-issuance-root.xrm-ms e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Retail-ul-oob.xrm-ms e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.OneConnect_2.1701.277.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\OneConnectStoreLogo.scale-125.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File created C:\Program Files\VideoLAN\VLC\locale\my\instructions_read_me.txt e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\README.md e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\Images\LayersControl\instructions_read_me.txt e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\VBA7.1\1033\VBHW6.CHM e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\eu-es\ui-strings.js e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nl-nl\ui-strings.js e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\sv-se\AppStore_icon.svg e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\goldbar.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\1250_20x20x32.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1702.333.0_x64__8wekyb3d8bbwe\Assets\AlarmsSplashScreen.scale-200.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File created C:\Program Files (x86)\Common Files\System\uk-UA\instructions_read_me.txt e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\mojo_core.dll e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Themes\themes_frame.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\vlc.mo e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\zh-tw\ui-strings.js e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sk-sk\instructions_read_me.txt e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\eu-es\ui-strings.js e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\zh-tw\instructions_read_me.txt e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_x64__8wekyb3d8bbwe\Assets\starttile.dualsim1.sad.small.scale-200.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1702.301.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\VoiceRecorderMedTile.scale-125.png e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ViewerPS.dll e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 4212 vssadmin.exe -
Modifies registry class 3 IoCs
Processes:
e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tcw9lnz6q\DefaultIcon e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tcw9lnz6q e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tcw9lnz6q\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid process 3996 notepad.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 236 vssvc.exe Token: SeRestorePrivilege 236 vssvc.exe Token: SeAuditPrivilege 236 vssvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.execmd.execmd.exedescription pid process target process PID 4944 wrote to memory of 4612 4944 e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe cmd.exe PID 4944 wrote to memory of 4612 4944 e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe cmd.exe PID 4944 wrote to memory of 4612 4944 e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe cmd.exe PID 4612 wrote to memory of 4212 4612 cmd.exe vssadmin.exe PID 4612 wrote to memory of 4212 4612 cmd.exe vssadmin.exe PID 4944 wrote to memory of 3456 4944 e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe cmd.exe PID 4944 wrote to memory of 3456 4944 e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe cmd.exe PID 4944 wrote to memory of 3456 4944 e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe cmd.exe PID 3456 wrote to memory of 3996 3456 cmd.exe notepad.exe PID 3456 wrote to memory of 3996 3456 cmd.exe notepad.exe PID 3456 wrote to memory of 3996 3456 cmd.exe notepad.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe"C:\Users\Admin\AppData\Local\Temp\e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\System32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4212
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /MAX notepad.exe c:\instructions_read_me.txt2⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\notepad.exenotepad.exe c:\instructions_read_me.txt3⤵
- Opens file in notepad (likely ransom note)
PID:3996
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56eeca8554c5aa30e98d49e968ec2dafc
SHA175c5e5da3954945846b098ea2ac994d480491096
SHA2569ea25a44f97ac86387c8b29a6a519c8e66250d826aa3cdffb8742e871106b319
SHA512562315532e831b4b7abe70ad05c09e4f0d4b6a5ded9d0285aa6342e7ad3c35085f8d62608e2a77fd44711c2cc5574047bfc90e4b3de41ea9d0b748f8800f0670