Analysis
-
max time kernel
150s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe
Resource
win7-20240903-en
General
-
Target
4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe
-
Size
666KB
-
MD5
559cab5a1192442f55e1781108fa5c37
-
SHA1
d731456f790d1224dc5e51612d144d0951714ee9
-
SHA256
4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4
-
SHA512
35631f524f4d7b1c612484f979caa9c28b1029333360d32320eb0d028cd35cd62c6abbcd5367d69ccd2734b71b71ab628c7651c3d712a7dd6aacb39bd12a78e2
-
SSDEEP
6144:9+aX36IC9LRU0ySj14WH+JPb7uL8zRMnJjNhAp7SO8zRMnJjNhAp7S8FRcdEKFVg:9+aQPFlTz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2776 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 2552 Logo1_.exe 2592 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe -
Loads dropped DLL 1 IoCs
pid Process 2776 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\PROOF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\IRIS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe Logo1_.exe File created C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\art\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\PublicAssemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1036\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Skins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1049\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\_desktop.ini Logo1_.exe File created C:\Program Files\Internet Explorer\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es_MX\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe File created C:\Windows\Logo1_.exe 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2924 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 30 PID 2656 wrote to memory of 2924 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 30 PID 2656 wrote to memory of 2924 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 30 PID 2656 wrote to memory of 2924 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 30 PID 2924 wrote to memory of 2800 2924 net.exe 32 PID 2924 wrote to memory of 2800 2924 net.exe 32 PID 2924 wrote to memory of 2800 2924 net.exe 32 PID 2924 wrote to memory of 2800 2924 net.exe 32 PID 2656 wrote to memory of 2776 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 33 PID 2656 wrote to memory of 2776 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 33 PID 2656 wrote to memory of 2776 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 33 PID 2656 wrote to memory of 2776 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 33 PID 2656 wrote to memory of 2552 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 35 PID 2656 wrote to memory of 2552 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 35 PID 2656 wrote to memory of 2552 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 35 PID 2656 wrote to memory of 2552 2656 4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe 35 PID 2552 wrote to memory of 2820 2552 Logo1_.exe 36 PID 2552 wrote to memory of 2820 2552 Logo1_.exe 36 PID 2552 wrote to memory of 2820 2552 Logo1_.exe 36 PID 2552 wrote to memory of 2820 2552 Logo1_.exe 36 PID 2776 wrote to memory of 2592 2776 cmd.exe 38 PID 2776 wrote to memory of 2592 2776 cmd.exe 38 PID 2776 wrote to memory of 2592 2776 cmd.exe 38 PID 2776 wrote to memory of 2592 2776 cmd.exe 38 PID 2820 wrote to memory of 2544 2820 net.exe 39 PID 2820 wrote to memory of 2544 2820 net.exe 39 PID 2820 wrote to memory of 2544 2820 net.exe 39 PID 2820 wrote to memory of 2544 2820 net.exe 39 PID 2552 wrote to memory of 1516 2552 Logo1_.exe 40 PID 2552 wrote to memory of 1516 2552 Logo1_.exe 40 PID 2552 wrote to memory of 1516 2552 Logo1_.exe 40 PID 2552 wrote to memory of 1516 2552 Logo1_.exe 40 PID 1516 wrote to memory of 1844 1516 net.exe 42 PID 1516 wrote to memory of 1844 1516 net.exe 42 PID 1516 wrote to memory of 1844 1516 net.exe 42 PID 1516 wrote to memory of 1844 1516 net.exe 42 PID 2552 wrote to memory of 1236 2552 Logo1_.exe 21 PID 2552 wrote to memory of 1236 2552 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe"C:\Users\Admin\AppData\Local\Temp\4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a5B2B.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe"C:\Users\Admin\AppData\Local\Temp\4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe"4⤵
- Executes dropped EXE
PID:2592
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2544
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:1844
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD53dc7d30c27a581e9d524214c0142ea4c
SHA1b610c2fcba0a638926caf130cecca2f495a6b758
SHA2561172b41a581efa3c42f4f276d12c3ba0f6bf12d44a10ef908730405ac34d8017
SHA51233e40a51281741cb9ca398d18e3ccdde022149f99414cf0e41767ef99275a5171b78e33e7f716ff615c93f62ab2dfb02fb839010dcc103c2639e731a4a550bc3
-
Filesize
722B
MD5f8eaf8b163e1c41cafbd202c7d500f6b
SHA10bca627107ce5c3660a53a67a5f97723d977dcdd
SHA256d4b8d518a5e05da27eed246453ff3c26c47377f073c6cd522de95a5208437a57
SHA5120f1b8f15115c4a0fc89197373d06ec709afb756d2316fc878ea2b589c803ce03bead416184401e86ebb7c27612b0d3628742f90d50f6142c50ad0a2441c344da
-
C:\Users\Admin\AppData\Local\Temp\4f365ad51a22c19542a1f41c80da061b5b38b3d9b1d44c3182f18adbb82017a4.exe.exe
Filesize633KB
MD52e0d056ad62b6ef87a091003714fd512
SHA173150bddb5671c36413d9fbc94a668f132a2edc5
SHA256cb83f04591cc1d602e650dd5c12f4470cf21b04328477bd6a52081f37c04bd7c
SHA512b8e920f8b7547aec6f5771e3e6119b01157e5e36a92c67142b0d73ffe0d501d933581e1fc752e5bba9ce819e3897be9c146bebfc0018e91318b0c99d188a2580
-
Filesize
33KB
MD5a2755236f492703b1085347ba4d3e29f
SHA1d0a1c52f785f1a6ed70033b9a907640b77333409
SHA256c388f834183f45915331318a81106b4bcb3383be08ebce9aa766191f91b15f01
SHA51203c33ec7f65c401b4fb98a77d3e6909057e5665ab304723ba1450950c409710e81a0d0065b7d1f815f70488ba1461139e411457bd6cd7415c7ebced20cd32425
-
Filesize
9B
MD50065cefd7e2e73322fc2b3eccc06be61
SHA1fe37ea5ea5fff8019af1550a1f48b685c586850b
SHA2567719e33d2deb48297f917eda88efb3ff75cd90107afdb025073133980fc963a2
SHA512a92e665443eccd9f549741a8c2e17a317ce50818f14b2d8b471bdb1815718c4859607796e3bd26d7b2c5e052144098c77066dcfc91d2e72f1b7ef5db21d3486b