Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe
Resource
win10v2004-20240508-en
General
-
Target
e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe
-
Size
1.6MB
-
MD5
00299d55cfd77172abf8cc55a13ae031
-
SHA1
5bc6cac294012f318d5aec6ed9165b758413b540
-
SHA256
e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9
-
SHA512
3146d9bbce99233824bd9e9d7b32ae56f9af3bedf9a5a7abc73facf39a67789fbc35464a74e44a5b04b057132f152437be8776bdd7695bec3d05767f18781bc1
-
SSDEEP
49152:69VTJHyRQCRsuk/JISsG0VJKSmvhQtNwnZHJgXyGOdg:6URQ7DBISsG0VMSmpQTwtaL7
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1440 Logo1_.exe 3268 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Views\Utilities\Styling\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.Telemetry\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\124.0.2478.80\Trust Protection Lists\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\EBWebView\x64\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\swidtag\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\TextConv\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\ResiliencyLinks\Extensions\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\identity_proxy\win11\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\en-GB\View3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\124.0.2478.80\MicrosoftEdge_X64_124.0.2478.80.exe Logo1_.exe File created C:\Program Files (x86)\Windows Multimedia Platform\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre8\lib\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ar-ae\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe File created C:\Windows\Logo1_.exe e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe 1440 Logo1_.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3268 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 3268 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 3268 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 3268 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3268 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 3268 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 3268 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 3268 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3268 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 3268 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2232 wrote to memory of 544 2232 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 90 PID 2232 wrote to memory of 544 2232 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 90 PID 2232 wrote to memory of 544 2232 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 90 PID 2232 wrote to memory of 1440 2232 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 91 PID 2232 wrote to memory of 1440 2232 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 91 PID 2232 wrote to memory of 1440 2232 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 91 PID 1440 wrote to memory of 1868 1440 Logo1_.exe 93 PID 1440 wrote to memory of 1868 1440 Logo1_.exe 93 PID 1440 wrote to memory of 1868 1440 Logo1_.exe 93 PID 1868 wrote to memory of 3204 1868 net.exe 95 PID 1868 wrote to memory of 3204 1868 net.exe 95 PID 1868 wrote to memory of 3204 1868 net.exe 95 PID 544 wrote to memory of 3268 544 cmd.exe 96 PID 544 wrote to memory of 3268 544 cmd.exe 96 PID 544 wrote to memory of 3268 544 cmd.exe 96 PID 1440 wrote to memory of 3512 1440 Logo1_.exe 56 PID 1440 wrote to memory of 3512 1440 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe"C:\Users\Admin\AppData\Local\Temp\e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aE61A.bat3⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe"C:\Users\Admin\AppData\Local\Temp\e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3268
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3204
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3756,i,7012731823941922179,12386606396608877869,262144 --variations-seed-version --mojo-platform-channel-handle=4396 /prefetch:81⤵PID:1580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5c2313644c3961c77fb35668603775f6b
SHA134857a41ad8b6ce8f1458615465a73c8ef5b5e49
SHA256fd99eadf4c8d7924770f0969d9f847d74e965cac870b846ed737eff514b7fd64
SHA512272443283ed7073bf9ce4fac0b94ff80fdbe92cd70c310904b81306d555abb0c71f712488fa49c58a0c95f7510ede226c4f40f7a7214d4c99e37fdd8a4bc0f9d
-
Filesize
573KB
MD5a06069cc78a8a8c6746ca51d2afeb512
SHA184302e33fd58fb81f0d7c6d81e7112261ff93e31
SHA25625103245c72961f72cfa496ee1ca7c5d42a01d72ff1b3a28cb5f6a8a514794b7
SHA512a9e49319491c76b024830ec324811e799c2e569a5a9fd65ffb425d5289b94ecee09640c77671eef1efc46c80a8442dc5bd6031ef88f97909a2637aa1f8770732
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD5c8d281da4c32df16eef470c27c8cb459
SHA100efc9f6844bfaa37c264b6452c6a7356638ab10
SHA256058c81e5a07f2c6c33cf28dff71d07ad8f179046108d945159957e891bfd9c62
SHA512e3c79e19f620068f668d4ebaa5097f1a95a30dabb8dce75f3787171dddbea9f684fc7ce8d1011a398f38084d7af96dd1ff9a02d25906aab9b13861b8363d24bb
-
Filesize
722B
MD5646fc5c00fe428efef66815d1bc2feed
SHA1c07a112d0631bef29431f250509c5ec8f937fb68
SHA2565e47e84dbdf4bdd3a0bda51c8f1928f659fc2c1448bc67f69c1cc82fe3617b5f
SHA5122d44fe75fc68ff8aee5375889423248c314bab8b779dca91d800b6dcebffa94acf6205b39ee7ea68134ba0b2b816ad096e7270ac221b820c90c211320ff28b0f
-
C:\Users\Admin\AppData\Local\Temp\e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe.exe
Filesize1.6MB
MD5ada617b0cdf2bcd08558a99814d465c4
SHA1cc098290554d4e9bd1bd1009f2474cc06866cff6
SHA2565f2b689531b9eda96489442b000cf3203af38838c71fc10229db9b375e3c1055
SHA512b5b49f41258e5e6c8254bd4204a550a26b447de15d1ba78b7fd24f99938e3b4778037264ac6e2e5c0c45c59efa5b87ccfc68f05f70ec6ad0e329d5bede8bbcdf
-
Filesize
29KB
MD5599a7881ecc7bdb52e885c2f88f39623
SHA1f1e4628628939c353e3f51e46dd638c844db0588
SHA256e54026cfa7a56a1cdbe7c78228b9d123e8e7f8f1044609385e1990bc4091872d
SHA51268542351fa49e3ace39596d63e89b24ae31f3cb6a27f315bd7922aa8ff17601da5663e3c25e802154d5e97bcfdb569365372ad32cb2459485373d574fe1809ba
-
Filesize
9B
MD5626b7ac8db42922bd5ad061459a997cd
SHA11d94c0679bc448cde1fc2da8cea39b910af74f3b
SHA256ec459940188be916789d5d79bd7826fecb6ad8f47d606e862d95946998d36208
SHA512cff25aa56e8d7d33dddf326fe1fdc1fc11e4269e0b03caa2f8baa637a549b1e0878ea933333cc82c03fb3930d0ae1b8735bfdbf1337e696b5bd062b693847f20