Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe
Resource
win10v2004-20240802-en
General
-
Target
df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe
-
Size
56KB
-
MD5
2565a933c9f2dcd7157e6860263d00e2
-
SHA1
d6c06d875cc84b43aa4641d7a564232c61d077ef
-
SHA256
df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3
-
SHA512
b0e59f6f68a4fca76545fa8361868ec05992f94878fa6de4a7ff64fd4ac104810b8aa431949a6e8165d72a6f5706e35140813ed22af0064031cf36859f8e8faf
-
SSDEEP
768:p4L16GVRu1yK9fMnJG2V9dHS8+L/QasvFEpYinAMxklal9qYi2lauAMxkEq:p4h3SHuJV9NqL/Uve7Hxaio7YZxG
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1572 Logo1_.exe 3020 df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\css\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\dev\libs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\si\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\jscripts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Views\Utilities\Styling\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\PilotshubApp.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app-api\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdate.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\sr-cyrl-cs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\core\dev\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.Resource\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\home-view\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\Tented\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\requests\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\collect_feedback\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files-select\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\policy\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe File created C:\Windows\Logo1_.exe df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe 1572 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 784 wrote to memory of 1180 784 df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe 84 PID 784 wrote to memory of 1180 784 df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe 84 PID 784 wrote to memory of 1180 784 df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe 84 PID 784 wrote to memory of 1572 784 df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe 85 PID 784 wrote to memory of 1572 784 df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe 85 PID 784 wrote to memory of 1572 784 df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe 85 PID 1572 wrote to memory of 3232 1572 Logo1_.exe 87 PID 1572 wrote to memory of 3232 1572 Logo1_.exe 87 PID 1572 wrote to memory of 3232 1572 Logo1_.exe 87 PID 3232 wrote to memory of 4304 3232 net.exe 89 PID 3232 wrote to memory of 4304 3232 net.exe 89 PID 3232 wrote to memory of 4304 3232 net.exe 89 PID 1180 wrote to memory of 3020 1180 cmd.exe 90 PID 1180 wrote to memory of 3020 1180 cmd.exe 90 PID 1180 wrote to memory of 3020 1180 cmd.exe 90 PID 1572 wrote to memory of 3428 1572 Logo1_.exe 56 PID 1572 wrote to memory of 3428 1572 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe"C:\Users\Admin\AppData\Local\Temp\df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a853D.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe"C:\Users\Admin\AppData\Local\Temp\df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3020
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:4304
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD52bbb688857ea3ecf37dd393e7a6e607d
SHA1e96f7a557c069bb63312923e6c68a6e7022e8175
SHA2567817893264c9be0cc43c58e100089576edeb237299679224f3435ff9e5facbef
SHA51211af1356f9fb4915db8ff2d3de99ccdece6ab64d4e985ba9f3b5fbf6fa9c52a5cef3d799319d10f09f28be3f6339c8e5abb56e6b8d04df99ec1927bc56030589
-
Filesize
428KB
MD53a88e9fc5aaafacc1238dd43f549fede
SHA174db1c546b4ba7df2ef08b514f80b44a8e30aeee
SHA2561da93851d8f3b3d68c04b939db52e0a2d66b4b049d828e006a7fbcee8bf8f5af
SHA51278eb39aef2ec17391adeb721862b5770296cfb26592d1c8d3b4707fa8d6b6925f5ec5f7829da8e41cf7f4ed45646582602f1742cff3ae8f920ffe3d6ecf116d2
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD58efae5b6bc316acae937b82d3ec92bc1
SHA162143e5a67682f2007901df0430ed088910644b5
SHA256050f08a8934043422a21d81dcfd400af7cebe76d2e1975f8777c0c6683394395
SHA51252f4cc11d4c7a375f9872cb3db8c56f340fad39251f953d13131561849b26234f345710a358e60ab39bed60cac99285feda9f18ed415b82d74afc2b4bc7218c4
-
Filesize
722B
MD592e06b41c3abbac2731588a7c3b7b43c
SHA18f59430d96bae82365cb0479db02f97db94d83ce
SHA2569ed785eff069626a694da1e4691c3ebbe832a57118a596a490c60c10a72a2136
SHA51266ac18b7bb186344ab8527f5be6c102d42da8fa811fa2aacabf376abdac4c600db6afbcbacd34151d682c7db12500de23759551bbd7fce222c0129ba404378cd
-
C:\Users\Admin\AppData\Local\Temp\df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe.exe
Filesize26KB
MD59e4d73e24d912baa6e20a98fa4f98df3
SHA1965fbbbaa4156dcb5c6391df4d245bbf94d62c0f
SHA25628c6ce3582292ca5df81b9f8996369e82d489cc894cba9ed6b3e6678e67fc7f1
SHA5120fc58e74c7a0773a6338c35656484f2e5682a55a9c6ca03bc479728c617afc99295a3dcb52d7d414d8f5cb9c37704886f54e26acf47a3d69ebb931ce2e3bd4f2
-
Filesize
29KB
MD580fb683ec1520da982b68ed12e571fd8
SHA1e6c98d2fb082b7f8c260463d7241dba097796b8e
SHA2569f4c161eaba3525f1e15ffb8a23799c4ce7f918a3ee3f97ee4d51e34b6aa30d0
SHA51212d3d4dcb7c1ae451376609e0e1d27649229a00b52e88b3fb6d920d994e792041e48cc0ad3107881af31b451b0396fef666b53c55a8708eeb647b69bd6f1b088
-
Filesize
9B
MD59810b812fea5407a7c6a6b912eab6de9
SHA1653710a103c34c6d87e85d547de48561b1579927
SHA256497dc92fb09ed6740a1e704ddf5f45daf1d330f0977aaf1142604be15753e7ef
SHA512a23126d1624a391a08931a8f98ec9c26bc5bbe75de0f111bcdbf17b5bbe9bc6e748ca58e52c96fb9ea80509d5ad1c90bf1d92e472b08b2532321106ba1aca2cd