Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
PO# ENQ8864.Pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO# ENQ8864.Pdf.exe
Resource
win10v2004-20250217-en
General
-
Target
PO# ENQ8864.Pdf.exe
-
Size
1.2MB
-
MD5
ce5d04c4d15b7ae968c0f2cd2a81387d
-
SHA1
4d7334d66cdff4a0f1c3ddce81db245a1e3469c2
-
SHA256
74feceb928f3cd0ca47312eac2718f4210bce399335fd341bdeb456b2a09a230
-
SHA512
4f2e621a18373f71fdcb583e4c0777be10913ec41647f12919efef5b54d762170199e2e84e347f84a447f388ba3f1b61336f0d1e607988a3b0b061645f58445e
-
SSDEEP
24576:K5xolYQY6Du6J33O0c+JY5UZ+XC0kGso6Faa1Bs3jWY3:dYSu0c++OCvkGs9FaavsSY3
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.frmontajes.com - Port:
25 - Username:
[email protected] - Password:
1Guelas+1986 - Email To:
[email protected]
https://api.telegram.org/bot7391124277:AAEAD7k2_c00owq0kQIitLTWNNPqqi9m41c/sendMessage?chat_id=7128988401
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 2784 po# enq8864.pdf.exe 2696 icsys.icn.exe 2648 explorer.exe 2656 spoolsv.exe 1972 svchost.exe 2372 spoolsv.exe -
Loads dropped DLL 11 IoCs
pid Process 2644 PO# ENQ8864.Pdf.exe 2644 PO# ENQ8864.Pdf.exe 2644 PO# ENQ8864.Pdf.exe 2696 icsys.icn.exe 2696 icsys.icn.exe 2648 explorer.exe 2648 explorer.exe 2656 spoolsv.exe 2656 spoolsv.exe 1972 svchost.exe 1972 svchost.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org 8 reallyfreegeoip.org 9 reallyfreegeoip.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00070000000193d9-9.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2784 set thread context of 2032 2784 po# enq8864.pdf.exe 38 -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO# ENQ8864.Pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language po# enq8864.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2696 icsys.icn.exe 2648 explorer.exe 1972 svchost.exe 1972 svchost.exe 2648 explorer.exe 2648 explorer.exe 1972 svchost.exe 2648 explorer.exe 1972 svchost.exe 2648 explorer.exe 1972 svchost.exe 2648 explorer.exe 1972 svchost.exe 2648 explorer.exe 2648 explorer.exe 1972 svchost.exe 1972 svchost.exe 2648 explorer.exe 1972 svchost.exe 2648 explorer.exe 2648 explorer.exe 1972 svchost.exe 1972 svchost.exe 2648 explorer.exe 2032 RegSvcs.exe 1972 svchost.exe 2648 explorer.exe 1972 svchost.exe 2648 explorer.exe 1972 svchost.exe 2648 explorer.exe 1972 svchost.exe 2648 explorer.exe 1972 svchost.exe 2648 explorer.exe 2648 explorer.exe 1972 svchost.exe 1972 svchost.exe 2648 explorer.exe 1972 svchost.exe 2648 explorer.exe 2648 explorer.exe 1972 svchost.exe 2648 explorer.exe 1972 svchost.exe 1972 svchost.exe 2648 explorer.exe 1972 svchost.exe 2648 explorer.exe 1972 svchost.exe 2648 explorer.exe 1972 svchost.exe 2648 explorer.exe 2648 explorer.exe 1972 svchost.exe 2648 explorer.exe 1972 svchost.exe 1972 svchost.exe 2648 explorer.exe 1972 svchost.exe 2648 explorer.exe 1972 svchost.exe 2648 explorer.exe 2648 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1972 svchost.exe 2648 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2784 po# enq8864.pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2032 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2784 po# enq8864.pdf.exe 2784 po# enq8864.pdf.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2784 po# enq8864.pdf.exe 2784 po# enq8864.pdf.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2644 PO# ENQ8864.Pdf.exe 2644 PO# ENQ8864.Pdf.exe 2696 icsys.icn.exe 2696 icsys.icn.exe 2648 explorer.exe 2648 explorer.exe 2656 spoolsv.exe 2656 spoolsv.exe 1972 svchost.exe 1972 svchost.exe 2372 spoolsv.exe 2372 spoolsv.exe 2648 explorer.exe 2648 explorer.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2784 2644 PO# ENQ8864.Pdf.exe 30 PID 2644 wrote to memory of 2784 2644 PO# ENQ8864.Pdf.exe 30 PID 2644 wrote to memory of 2784 2644 PO# ENQ8864.Pdf.exe 30 PID 2644 wrote to memory of 2784 2644 PO# ENQ8864.Pdf.exe 30 PID 2644 wrote to memory of 2696 2644 PO# ENQ8864.Pdf.exe 31 PID 2644 wrote to memory of 2696 2644 PO# ENQ8864.Pdf.exe 31 PID 2644 wrote to memory of 2696 2644 PO# ENQ8864.Pdf.exe 31 PID 2644 wrote to memory of 2696 2644 PO# ENQ8864.Pdf.exe 31 PID 2696 wrote to memory of 2648 2696 icsys.icn.exe 32 PID 2696 wrote to memory of 2648 2696 icsys.icn.exe 32 PID 2696 wrote to memory of 2648 2696 icsys.icn.exe 32 PID 2696 wrote to memory of 2648 2696 icsys.icn.exe 32 PID 2648 wrote to memory of 2656 2648 explorer.exe 33 PID 2648 wrote to memory of 2656 2648 explorer.exe 33 PID 2648 wrote to memory of 2656 2648 explorer.exe 33 PID 2648 wrote to memory of 2656 2648 explorer.exe 33 PID 2656 wrote to memory of 1972 2656 spoolsv.exe 34 PID 2656 wrote to memory of 1972 2656 spoolsv.exe 34 PID 2656 wrote to memory of 1972 2656 spoolsv.exe 34 PID 2656 wrote to memory of 1972 2656 spoolsv.exe 34 PID 1972 wrote to memory of 2372 1972 svchost.exe 35 PID 1972 wrote to memory of 2372 1972 svchost.exe 35 PID 1972 wrote to memory of 2372 1972 svchost.exe 35 PID 1972 wrote to memory of 2372 1972 svchost.exe 35 PID 1972 wrote to memory of 1484 1972 svchost.exe 36 PID 1972 wrote to memory of 1484 1972 svchost.exe 36 PID 1972 wrote to memory of 1484 1972 svchost.exe 36 PID 1972 wrote to memory of 1484 1972 svchost.exe 36 PID 2784 wrote to memory of 2032 2784 po# enq8864.pdf.exe 38 PID 2784 wrote to memory of 2032 2784 po# enq8864.pdf.exe 38 PID 2784 wrote to memory of 2032 2784 po# enq8864.pdf.exe 38 PID 2784 wrote to memory of 2032 2784 po# enq8864.pdf.exe 38 PID 2784 wrote to memory of 2032 2784 po# enq8864.pdf.exe 38 PID 2784 wrote to memory of 2032 2784 po# enq8864.pdf.exe 38 PID 2784 wrote to memory of 2032 2784 po# enq8864.pdf.exe 38 PID 2784 wrote to memory of 2032 2784 po# enq8864.pdf.exe 38 PID 1972 wrote to memory of 2836 1972 svchost.exe 39 PID 1972 wrote to memory of 2836 1972 svchost.exe 39 PID 1972 wrote to memory of 2836 1972 svchost.exe 39 PID 1972 wrote to memory of 2836 1972 svchost.exe 39 PID 1972 wrote to memory of 1768 1972 svchost.exe 42 PID 1972 wrote to memory of 1768 1972 svchost.exe 42 PID 1972 wrote to memory of 1768 1972 svchost.exe 42 PID 1972 wrote to memory of 1768 1972 svchost.exe 42 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO# ENQ8864.Pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO# ENQ8864.Pdf.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\users\admin\appdata\local\temp\po# enq8864.pdf.exe"c:\users\admin\appdata\local\temp\po# enq8864.pdf.exe "2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"c:\users\admin\appdata\local\temp\po# enq8864.pdf.exe "3⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2032
-
-
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe5⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2372
-
-
C:\Windows\SysWOW64\at.exeat 08:20 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵
- System Location Discovery: System Language Discovery
PID:1484
-
-
C:\Windows\SysWOW64\at.exeat 08:21 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\SysWOW64\at.exeat 08:22 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵
- System Location Discovery: System Language Discovery
PID:1768
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
990KB
MD509116ff12f2338350afa3daa9456fd82
SHA12dee1fc92e2c16b7ae08df60c20b009535a934c8
SHA256a2348624313de5d142fb8bea25335b37aa7ce22515e55d63093830b23d8aee75
SHA5127e8dbd9791163ff7dfbb3a31abf32cfc69794e6b7e8d0b0ff454895e7d2e060decdd13a79ba96beb8400120c4952b8e96287dbda9b56696bd1c379a5ebed2138
-
Filesize
274KB
MD524a924dc08b89e69e1319e9489a65614
SHA16e8b3b374ab5ec6f1e282151a002b35ed0f200e4
SHA25667eb69b20adc8794c6e7fce09ca2366e086f3421c081cff6711df1a8bd9c03b6
SHA512c1b7fce1e07b967bddd806f024278d7aee950ebeff5e03e9fd219baff10b2ae28de15c47327feef4cc1057a9187866f5bae1e7b35b3d1236971ffcedca4a9665
-
Filesize
274KB
MD553880e59d27ac62017cbaa04e6c2aa67
SHA18c1087b15464f9f9908bccb051474b325f4bc2f8
SHA25697f0aea4354b574b985f8719d194e5e5bacd3d80306e16643df859ece881a893
SHA5125e3608a62c2cafe8b4bc5f3d50ad98f943ce1ad21024f80bbe9712c40feed1da10beb78e9d7bb0df98f72cfac3c3cab633a783aafa0d01c497e71d2d464e06cd
-
Filesize
274KB
MD50f3d5e4a4cae2fdd615bda1281830018
SHA1b83175152e4ffa7f10ae4a93ccd1273da98c01cb
SHA256edd246995b8a0663aecb5050eb3ba8e55f72000d938d7aa0cfea4dba2d1236c9
SHA51220503e98369945af4e3d88a596e41b304d1fd348694de80fe5d9592479829158f964330bbf77de90bdcc3670929adef3a2d63ed44da5d41ed36be66b3fc1d399
-
Filesize
274KB
MD58bec4b94a2f7f5ec2bec4192ae7f901e
SHA1d49ab48c31f2e310ce924b6d35d162bc142c5684
SHA25616e2b3123bd83c54e7558611378b5782d301a15e3bbcb2cc8e6f39581b847e5e
SHA5128192fe662534fa2a0e8848208539b438035681e7f11e890e0dfc7a0720d3a7c6987f2b128a8f21516a16181a13bd01991d3ab86b269a471279e0c89406f37c3c
-
Filesize
274KB
MD5fd4da5f4996466a5ba13215067ca6494
SHA170df09588e4a3fc12a45fa552f0a7698ebb37299
SHA256d3e6532ccb977a5a5bc1ca7acd04bba0ad881fac7caa71157658bd69014fdfe3
SHA512f1a75ffc0c233def0f3f331d8cad627480002cf9f8236580e40eb6ad26e7cb7feca8e3ef5c168fae9823b9885f56d6003b2c1af43cd15820da81c7babb75df76