Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe
Resource
win7-20240704-en
General
-
Target
b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe
-
Size
67KB
-
MD5
622fd2902022c7d50411a2fc2dc0d35a
-
SHA1
69ec79e5fc41fa78f2484b2f68ac70ad1e6e64ad
-
SHA256
b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d
-
SHA512
b7785a0bf7e398baf421ef8d5f01bfe74175dd46ee4761a3522365f49ff66681136ff0c0dee7f901b83d659d23ed013672301d9aed5b02cbe09a648d06a67417
-
SSDEEP
1536:eocx1ae9n40g9i/qo6SKHDZoEV0JuRUFyMOaHQ1l:eofZQioJKek0JXXOeQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 2704 Logo1_.exe 2736 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe -
Loads dropped DLL 2 IoCs
pid Process 3052 cmd.exe 3052 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1041\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d9\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DW20.EXE Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Temp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe File created C:\Windows\Logo1_.exe b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe 2704 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2288 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 30 PID 1656 wrote to memory of 2288 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 30 PID 1656 wrote to memory of 2288 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 30 PID 1656 wrote to memory of 2288 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 30 PID 2288 wrote to memory of 3036 2288 net.exe 32 PID 2288 wrote to memory of 3036 2288 net.exe 32 PID 2288 wrote to memory of 3036 2288 net.exe 32 PID 2288 wrote to memory of 3036 2288 net.exe 32 PID 1656 wrote to memory of 3052 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 33 PID 1656 wrote to memory of 3052 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 33 PID 1656 wrote to memory of 3052 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 33 PID 1656 wrote to memory of 3052 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 33 PID 1656 wrote to memory of 2704 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 35 PID 1656 wrote to memory of 2704 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 35 PID 1656 wrote to memory of 2704 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 35 PID 1656 wrote to memory of 2704 1656 b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe 35 PID 2704 wrote to memory of 2820 2704 Logo1_.exe 36 PID 2704 wrote to memory of 2820 2704 Logo1_.exe 36 PID 2704 wrote to memory of 2820 2704 Logo1_.exe 36 PID 2704 wrote to memory of 2820 2704 Logo1_.exe 36 PID 2820 wrote to memory of 2732 2820 net.exe 38 PID 2820 wrote to memory of 2732 2820 net.exe 38 PID 2820 wrote to memory of 2732 2820 net.exe 38 PID 2820 wrote to memory of 2732 2820 net.exe 38 PID 3052 wrote to memory of 2736 3052 cmd.exe 39 PID 3052 wrote to memory of 2736 3052 cmd.exe 39 PID 3052 wrote to memory of 2736 3052 cmd.exe 39 PID 3052 wrote to memory of 2736 3052 cmd.exe 39 PID 2704 wrote to memory of 2720 2704 Logo1_.exe 40 PID 2704 wrote to memory of 2720 2704 Logo1_.exe 40 PID 2704 wrote to memory of 2720 2704 Logo1_.exe 40 PID 2704 wrote to memory of 2720 2704 Logo1_.exe 40 PID 2720 wrote to memory of 2668 2720 net.exe 42 PID 2720 wrote to memory of 2668 2720 net.exe 42 PID 2720 wrote to memory of 2668 2720 net.exe 42 PID 2720 wrote to memory of 2668 2720 net.exe 42 PID 2704 wrote to memory of 1184 2704 Logo1_.exe 21 PID 2704 wrote to memory of 1184 2704 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe"C:\Users\Admin\AppData\Local\Temp\b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:3036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a9000.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe"C:\Users\Admin\AppData\Local\Temp\b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe"4⤵
- Executes dropped EXE
PID:2736
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2732
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2668
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5b7bb6fde5070f22c2892f8ffa90e21ab
SHA199b915a961b74560ec71e48bab9140ebf0ff8828
SHA25622241fd7d48785774c50055f9fe6796818868706fbfbbaa47db9abbdf7e58909
SHA512a6b96e2379c22911039024570edca5aba589210683a653b1b06225492972d8a6616b9a85b77a9a77cd05d3279efbdc2894594ebc936b5acd786a08749313aa89
-
Filesize
478KB
MD579d96b6a2771e7783309bf05ebe7b5c1
SHA1b19da11278224b17598d5b6de189892a83196708
SHA256eb38a47ec49f3f376f53aff58def8c3a0e095bad67e2887d3f58bb4a3c71a19e
SHA51272e30060fd922fc37662d762bc647bf85938986d810057926fe86a1622e1b05fc841bab9ee06ee7855071ed27da3d8fe20d41f03ae68c4c76cc720a7e56d4d68
-
Filesize
722B
MD52e54d6e798d0c9a8212040a0d23d713f
SHA1c310ca2bb15e82959fe14b6e01b78c3d9293b5b5
SHA25658ffb0dd5c76bb63463c4f1458e6f17c6865a611353a038a628371ca79485c0e
SHA512b1d302e4b7d7b66dfa157c9ee365bdaa55b3fea226e9d1dbed46c5baf43e41658a1984c8d4b4f8dc85fa3c71bd3d1539f6a06fa0877fb564ea142bdf044d25f6
-
C:\Users\Admin\AppData\Local\Temp\b3ee3f79cdbf4345aba8e4a5e4e5e3d4ea51c0f67c579a025ae79d7e8fbc0b8d.exe.exe
Filesize33KB
MD569b16c7b7746ba5c642fc05b3561fc73
SHA183d80d668dca76b899e1bf662ddee0e0c18ac791
SHA2560deceb6b1b7a2dd1f13133ac7328ff420dad4610cee1fa7466e8e0f6baa39116
SHA5126b8eebcfe5b04141640047fe468371ad02bb115ee9ef00260c0b33cfd56b142c2e01b3b1c6f07281aa57b1f3b9fdb1f1082fe5620f88a57b92d8f547267ef154
-
Filesize
33KB
MD52a82d5208360158b3c993c811395e0a6
SHA17b0769ce4994359e329fd2c93a8d4c7f6a311084
SHA2569c8ff7750281ee54d8fdf3990659d7652c663fb986e029a791f8f051e3bf40f9
SHA512381ab7e6f07b427f2a5a2b9cd5c5914fa45a5edaf70e622969156d7a1deed8c3cab70b55084799d4055ce73324cbdc3acad6b45b83cfcebb25f62354d732b51b
-
Filesize
9B
MD52efce5174bcf8d378a924333f75e26ad
SHA14fe6e1d729b55d42eb9d74aca11b36a94402de14
SHA25604ccb9bec2864153c72852867d8e65dca07eca4e5edcfb4beb62cb364dcd91fa
SHA51224684969632fb0562a3a7a5fec91d869d627730d8e9d83a2b17e326d7047e3fbff205eec207914e42ecd50fef68a212c19f3599ded271c00e66acc22f1f04c16