Overview
overview
10Static
static
8Exela-V2.0-main.rar
windows7-x64
1Exela-V2.0-main.rar
windows10-2004-x64
1Exela-V2.0...on.txt
windows7-x64
1Exela-V2.0...on.txt
windows10-2004-x64
1Exela-V2.0...ela.py
windows7-x64
3Exela-V2.0...ela.py
windows10-2004-x64
3Exela-V2.0...ICENSE
windows7-x64
1Exela-V2.0...ICENSE
windows10-2004-x64
1Exela-V2.0...obf.py
windows7-x64
3Exela-V2.0...obf.py
windows10-2004-x64
3Exela-V2.0...ej.exe
windows7-x64
7Exela-V2.0...ej.exe
windows10-2004-x64
10Stub.pyc
windows7-x64
3Stub.pyc
windows10-2004-x64
3Exela-V2.0...E.html
windows7-x64
3Exela-V2.0...E.html
windows10-2004-x64
3Exela-V2.0...px.exe
windows7-x64
5Exela-V2.0...px.exe
windows10-2004-x64
5out.exe
windows7-x64
out.exe
windows10-2004-x64
Exela-V2.0...der.py
windows7-x64
3Exela-V2.0...der.py
windows10-2004-x64
3Exela-V2.0...ll.bat
windows7-x64
1Exela-V2.0...ll.bat
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 21:08
Behavioral task
behavioral1
Sample
Exela-V2.0-main.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Exela-V2.0-main.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Exela-V2.0-main/AssemblyFile/version.txt
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Exela-V2.0-main/AssemblyFile/version.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Exela-V2.0-main/Exela.py
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Exela-V2.0-main/Exela.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Exela-V2.0-main/LICENSE
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Exela-V2.0-main/LICENSE
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Exela-V2.0-main/Obfuscator/obf.py
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Exela-V2.0-main/Obfuscator/obf.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Exela-V2.0-main/Pavica je okej.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
Exela-V2.0-main/Pavica je okej.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Stub.pyc
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Stub.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Exela-V2.0-main/README.html
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Exela-V2.0-main/README.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Exela-V2.0-main/UPX/upx.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Exela-V2.0-main/UPX/upx.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
out.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
out.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Exela-V2.0-main/builder.py
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Exela-V2.0-main/builder.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Exela-V2.0-main/install.bat
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Exela-V2.0-main/install.bat
Resource
win10v2004-20241007-en
General
-
Target
Exela-V2.0-main/README.html
-
Size
7KB
-
MD5
5a9c53cab4888a16488776dabaa8ffa0
-
SHA1
819665cd8bf93032d177243a8c88a0414a5f67de
-
SHA256
862c3d6ddfa842f83fc5106366c8e761edda554dcb6e1d8c54b7078995c49e31
-
SHA512
f3cc668d6994c2877bb3ba86f1a49d2535656f030c25aae4a1ec101cf0ab7b4e78414ef00a0b0c820a9870145fc297ae4072c7711ccefcc1057435194a3ed274
-
SSDEEP
192:vSWDPtBfIaR6kBxowZq3THlWmpBwBOXoslY705N:vSWDVBfIaRBxowZGTHlWmIUXTYAj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1444 msedge.exe 1444 msedge.exe 5072 msedge.exe 5072 msedge.exe 2052 identity_helper.exe 2052 identity_helper.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 2092 5072 msedge.exe 83 PID 5072 wrote to memory of 2092 5072 msedge.exe 83 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 3372 5072 msedge.exe 84 PID 5072 wrote to memory of 1444 5072 msedge.exe 85 PID 5072 wrote to memory of 1444 5072 msedge.exe 85 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86 PID 5072 wrote to memory of 3180 5072 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\Exela-V2.0-main\README.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf10046f8,0x7ffdf1004708,0x7ffdf10047182⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,6648110445440988607,6607415335322178266,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,6648110445440988607,6607415335322178266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,6648110445440988607,6607415335322178266,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,6648110445440988607,6607415335322178266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,6648110445440988607,6607415335322178266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,6648110445440988607,6607415335322178266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,6648110445440988607,6607415335322178266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,6648110445440988607,6607415335322178266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,6648110445440988607,6607415335322178266,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,6648110445440988607,6607415335322178266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,6648110445440988607,6607415335322178266,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,6648110445440988607,6607415335322178266,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
184B
MD5ba8c04fc774f982147151c0bcfcdc522
SHA18d914e214ff4997c755f8359f9a3aaed8c6c0a1e
SHA2560d7e4e9d535c38baf3e877a492ee1e547e7cf724dba5755516ec16083bb67117
SHA51204f77280e86c66f5ed5132f34dc4a21f1a481297c0838459f72429ebdc2fc0ac7c348d033cee93d10dae8306e38ec6680fd296f757ef361dd2112a5b58918d7c
-
Filesize
5KB
MD5e8047e90184576f2360a0ca6f0e0cf97
SHA1bf6ea0875dd97bc02d142e1a62e0a76a8df87ecf
SHA256e15970a06fb7727d558fb29b7ca6b16834527a8832a29ddd9392bf324da2d67d
SHA5122961c7f8aa368fe502ab90cb90a93e7a415e85b0d4d34ba252471a548cd0dde4d0c3cac6f6c8614ac8ab5fd6e8621b3d645a3e4c62dc19418aee413ca0cf058b
-
Filesize
6KB
MD51ca35b42b2137192438877a09807ad2d
SHA1ad945d43c5aadfcda9d185e0e9e0e9195ff0a5e9
SHA2563e662b4ce620c2e27891aa2c396f43c12004e688dc46b8a8c543d461c39fdc46
SHA512f68b00f94028e90fd519341374e6633d587f3f90d12bff3c82d223e3e8be24627319834a1ff448b40ddf3bfb3f457561604a746242a5a2779b963a323a96f405
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD524afb1c057c0cc79856324747d8dbd39
SHA10e504883d4ad0b8a2aa7f647c7a801c9e0d86452
SHA2560eddf5c03d6c68aa36f7c3d5fb23345f0f8a312c047bbfb5848a83a66c418c28
SHA512e530f75eea4c2a6631af33a06728dadc116c0f835188c3c3874fd01fa72d9668eaa42de9403e2ff69476fb76a8010758c0dd23b9c549db5310452f8c32e9e0c7