Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 14:53
Static task
static1
Behavioral task
behavioral1
Sample
c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe
Resource
win7-20240903-en
General
-
Target
c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe
-
Size
72KB
-
MD5
5dd18ff4345abfe77af08f42d954cd63
-
SHA1
8a513783bc18aab4fa066e67718f638519144a1e
-
SHA256
c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a
-
SHA512
25413e9a76a1e77bedd62c3bf0b34cdcd016c5076f2bb53596d8d5fb83110ed19246fc61358bc2b1830afda74661e23d524e142136f7bf56ab2b25ea346f1906
-
SSDEEP
1536:8Ze+Zk7VJbwlYXjPrsqrZMYR5p8wUawuzXv4exFRKs9uhh:8Ze+azbRPrlr9RXFUawuzX+kuX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2228 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 2408 Logo1_.exe 2760 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe -
Loads dropped DLL 1 IoCs
pid Process 2228 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eo\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FREN\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\security\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe File created C:\Windows\Logo1_.exe c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe 2408 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2336 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 31 PID 2504 wrote to memory of 2336 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 31 PID 2504 wrote to memory of 2336 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 31 PID 2504 wrote to memory of 2336 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 31 PID 2336 wrote to memory of 2480 2336 net.exe 33 PID 2336 wrote to memory of 2480 2336 net.exe 33 PID 2336 wrote to memory of 2480 2336 net.exe 33 PID 2336 wrote to memory of 2480 2336 net.exe 33 PID 2504 wrote to memory of 2228 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 34 PID 2504 wrote to memory of 2228 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 34 PID 2504 wrote to memory of 2228 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 34 PID 2504 wrote to memory of 2228 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 34 PID 2504 wrote to memory of 2408 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 35 PID 2504 wrote to memory of 2408 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 35 PID 2504 wrote to memory of 2408 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 35 PID 2504 wrote to memory of 2408 2504 c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe 35 PID 2408 wrote to memory of 2736 2408 Logo1_.exe 37 PID 2408 wrote to memory of 2736 2408 Logo1_.exe 37 PID 2408 wrote to memory of 2736 2408 Logo1_.exe 37 PID 2408 wrote to memory of 2736 2408 Logo1_.exe 37 PID 2736 wrote to memory of 2972 2736 net.exe 39 PID 2736 wrote to memory of 2972 2736 net.exe 39 PID 2736 wrote to memory of 2972 2736 net.exe 39 PID 2736 wrote to memory of 2972 2736 net.exe 39 PID 2228 wrote to memory of 2760 2228 cmd.exe 40 PID 2228 wrote to memory of 2760 2228 cmd.exe 40 PID 2228 wrote to memory of 2760 2228 cmd.exe 40 PID 2228 wrote to memory of 2760 2228 cmd.exe 40 PID 2408 wrote to memory of 2244 2408 Logo1_.exe 41 PID 2408 wrote to memory of 2244 2408 Logo1_.exe 41 PID 2408 wrote to memory of 2244 2408 Logo1_.exe 41 PID 2408 wrote to memory of 2244 2408 Logo1_.exe 41 PID 2244 wrote to memory of 2700 2244 net.exe 43 PID 2244 wrote to memory of 2700 2244 net.exe 43 PID 2244 wrote to memory of 2700 2244 net.exe 43 PID 2244 wrote to memory of 2700 2244 net.exe 43 PID 2408 wrote to memory of 1184 2408 Logo1_.exe 21 PID 2408 wrote to memory of 1184 2408 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe"C:\Users\Admin\AppData\Local\Temp\c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:2480
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE0DD.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe"C:\Users\Admin\AppData\Local\Temp\c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe"4⤵
- Executes dropped EXE
PID:2760
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD51038a37911d8a59884082ac4626fbe00
SHA1967559027438b9df24825cda3c4b27c95c00240b
SHA2569d74986df799a28318be3bd2929d5f09cc271e529d3452740d394e6f6703bebb
SHA512b6bb6fa807698c1ba462135aee57b9e56ee0a5f09a13dc141767a9a1afe604cf6a493f1962fe7533f744f6c36a1cf9a16cad14d42f34a3b63edaf7e40c4f40b7
-
Filesize
484KB
MD5a803cec17e97a23f06f00bad17aa1236
SHA17a5c9795e740bbf318d745de0eb80adb7d74538d
SHA2562846d29686b5eef885188d8c5dc0ff71e19a25d497490f99f99e837959a7b7ff
SHA512ca0b62858ee4af691cd9dfa6c9325d4dbe1e2dd232c8f30e24156dc9560211666724e41e305467475760b80bdbed429887e2032191147c60504fb04e512ca620
-
Filesize
722B
MD5f6b7168988cc2cc10a4414e9d83b3042
SHA1f5af729a8fa4436c8c05a7fc0723b2f2cc6050bc
SHA2566819ec37ab4d30e9379975970cc5086db4cfd6f9a72b2fe3db330bb3bc7bd61e
SHA5125b4df180eceaca0ac66d8641036f499216c1db18427a9c7d57912ee495ccdaabdb2d83736ffecdc6809c918879add3ef98e0642167ae0f0676f92b2a349d42e0
-
C:\Users\Admin\AppData\Local\Temp\c16080fcc2b6c83e0092b93d46158da83c855920da62c6205b64035ba690500a.exe.exe
Filesize33KB
MD51af55e19c1bd264d635aa202f0b3e628
SHA1e7cc75ca40566fc257974340b611ba24ed09b3f3
SHA256e2bbf624927463534b2757974ef38f453faee9564736e4672e1481273f6cfc48
SHA512bb967372d392f4e320490212053fbb09637b472b3636443c7dfd1dde993ee91a7033a4c48ac9e25ebaf20d72c9f3dcb9d497d6b153ee7bdf65389caa81996f71
-
Filesize
39KB
MD5f35e32a3178395fde5c2c5e175b803d8
SHA1eccedf8d29589cd2ad9373d0aacac048ed606db9
SHA256058f3ceaaeee9cee06b5a049dd92851472f140dc5a634014242471698301d73e
SHA512f2edb5bd0899f34b6b2da7c115fea3b2d9e0812934ed71a183a8ca0a2a61a484d5213f54908148c309396fdabfc054af8fa9387997aa8cce991da927c33fb6f7
-
Filesize
8B
MD55d65d1288c9ecedfd5f28d17a01a30bc
SHA1e5bb89b8ad5c73516abf7e3baeaf1855154381dc
SHA2563501728ad227b52ce4d4f85ddd0e6d28dfa7acce977ae27f1e337be209825a5f
SHA5126177ce001dd535382c3bae5e8c3cfda85d8d8b76b68bce10fa8e5e1e748fd1512a531ffc93fef1316f2c27d93b5b4a5b60a6391f0e131ccc5cc0a65c2755868e