Resubmissions
28/03/2025, 16:40
250328-t6ttcayvgx 1025/03/2025, 14:22
250325-rpte5s1lt4 1005/02/2025, 10:43
250205-msf7rssqgy 1013/12/2024, 20:44
241213-zjezkaznfp 10Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/03/2025, 14:22
Behavioral task
behavioral1
Sample
malware_005D0000.exe
Resource
win11-20250314-en
Behavioral task
behavioral2
Sample
malware_005D0000.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
malware_005D0000.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
malware_005D0000.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
malware_005D0000.exe
Resource
win11-20250314-en
General
-
Target
malware_005D0000.exe
-
Size
164KB
-
MD5
890a58f200dfff23165df9e1b088e58f
-
SHA1
74e3d82f7ee81109e150dc41112cf95b3a4b5307
-
SHA256
5f56d5748940e4039053f85978074bde16d64bd5ba97f6f0026ba8172cb29e93
-
SHA512
2ee3636833cd9b02f5e311401817b15514845d4c12c1416d7e345845f8084775bf8c5f8f32822066b75a6b627a93138a0b27deb99c8bbb1f8d640132a2d8de0d
-
SSDEEP
3072:Hp5SexkWi1Lbi4eTMlwDCnu/q2GB96W/y:JvGWwbnWJ/yB9
Malware Config
Extracted
C:\Program Files (x86)\yz888u9h03-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/98E04D9E4EC1EA16
http://decryptor.top/98E04D9E4EC1EA16
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: malware_005D0000.exe File opened (read-only) \??\M: malware_005D0000.exe File opened (read-only) \??\P: malware_005D0000.exe File opened (read-only) \??\X: malware_005D0000.exe File opened (read-only) \??\F: malware_005D0000.exe File opened (read-only) \??\A: malware_005D0000.exe File opened (read-only) \??\E: malware_005D0000.exe File opened (read-only) \??\G: malware_005D0000.exe File opened (read-only) \??\K: malware_005D0000.exe File opened (read-only) \??\L: malware_005D0000.exe File opened (read-only) \??\W: malware_005D0000.exe File opened (read-only) \??\Y: malware_005D0000.exe File opened (read-only) \??\B: malware_005D0000.exe File opened (read-only) \??\H: malware_005D0000.exe File opened (read-only) \??\O: malware_005D0000.exe File opened (read-only) \??\Q: malware_005D0000.exe File opened (read-only) \??\S: malware_005D0000.exe File opened (read-only) \??\T: malware_005D0000.exe File opened (read-only) \??\U: malware_005D0000.exe File opened (read-only) \??\D: malware_005D0000.exe File opened (read-only) \??\I: malware_005D0000.exe File opened (read-only) \??\N: malware_005D0000.exe File opened (read-only) \??\R: malware_005D0000.exe File opened (read-only) \??\V: malware_005D0000.exe File opened (read-only) \??\Z: malware_005D0000.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1678082226-3994841222-899489560-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6xs7.bmp" malware_005D0000.exe -
Drops file in Program Files directory 32 IoCs
description ioc Process File created \??\c:\program files (x86)\d60dff40.lock malware_005D0000.exe File opened for modification \??\c:\program files\BackupReceive.xlsm malware_005D0000.exe File opened for modification \??\c:\program files\ExportApprove.jpe malware_005D0000.exe File opened for modification \??\c:\program files\SetMove.tif malware_005D0000.exe File opened for modification \??\c:\program files\SuspendExit.vst malware_005D0000.exe File opened for modification \??\c:\program files\WatchRedo.odp malware_005D0000.exe File opened for modification \??\c:\program files\RenameImport.mp2v malware_005D0000.exe File opened for modification \??\c:\program files\SplitMove.temp malware_005D0000.exe File created \??\c:\program files\d60dff40.lock malware_005D0000.exe File opened for modification \??\c:\program files\EnterHide.m3u malware_005D0000.exe File opened for modification \??\c:\program files\TestEnter.doc malware_005D0000.exe File opened for modification \??\c:\program files\UseDisconnect.xls malware_005D0000.exe File opened for modification \??\c:\program files\WriteInitialize.wm malware_005D0000.exe File opened for modification \??\c:\program files\CompareRestore.AAC malware_005D0000.exe File opened for modification \??\c:\program files\ConvertFromRegister.pcx malware_005D0000.exe File opened for modification \??\c:\program files\SuspendWait.ex_ malware_005D0000.exe File opened for modification \??\c:\program files\EnterCheckpoint.wma malware_005D0000.exe File opened for modification \??\c:\program files\RemoveDisconnect.xps malware_005D0000.exe File opened for modification \??\c:\program files\RestorePublish.edrwx malware_005D0000.exe File opened for modification \??\c:\program files\StepResize.TTS malware_005D0000.exe File opened for modification \??\c:\program files\SyncSend.vbs malware_005D0000.exe File opened for modification \??\c:\program files\GrantTest.css malware_005D0000.exe File opened for modification \??\c:\program files\InvokeHide.docx malware_005D0000.exe File opened for modification \??\c:\program files\OptimizeSync.nfo malware_005D0000.exe File opened for modification \??\c:\program files\PingSave.htm malware_005D0000.exe File opened for modification \??\c:\program files\SwitchCheckpoint.jpg malware_005D0000.exe File created \??\c:\program files\yz888u9h03-readme.txt malware_005D0000.exe File opened for modification \??\c:\program files\GroupSearch.dot malware_005D0000.exe File opened for modification \??\c:\program files\JoinDebug.rar malware_005D0000.exe File opened for modification \??\c:\program files\MoveComplete.svg malware_005D0000.exe File opened for modification \??\c:\program files\RedoFormat.7z malware_005D0000.exe File created \??\c:\program files (x86)\yz888u9h03-readme.txt malware_005D0000.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-m..ntmanager.resources_31bf3856ad364e35_10.0.22000.1_it-it_1ffb97990e3b0a80.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-p..ng-client-overrides_31bf3856ad364e35_10.0.22000.469_none_14dc986178475884_power.settings.sleep.ppkg_fc8ae8fd malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_networking-mpssvc-drv.resources_31bf3856ad364e35_10.0.22000.1_fr-fr_468abfca7d892bed.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-rpc-local_31bf3856ad364e35_10.0.22000.258_none_b99c0eb9feb3acd4.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-shacct-profile_31bf3856ad364e35_10.0.22000.1_none_0adc3ef607c4f231.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-etw-ese.resources_31bf3856ad364e35_10.0.22000.1_en-us_4a967699e4461c85_etweseproviderresources.dll.mui_242b0636 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.22000.1_fr-fr_afafc7e982ce31cc.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.22000.1_ru-ru_1e3caa373ebafd86.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-oem_31bf3856ad364e35_10.0.22000.1_none_53a7ba91b32fb1a9_vga950.fon_09ed4d3d malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-pshed_31bf3856ad364e35_10.0.22000.348_none_574a7a72b24b0bc4_pshed.dll_f6ac239e malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..em-extras.resources_31bf3856ad364e35_10.0.22000.1_ja-jp_e7db83e9fc899a27.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.22000.1_da-dk_0d1949a6fc7ed3f5.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-appid.resources_31bf3856ad364e35_10.0.22000.1_es-es_8c39838db1cac9de.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-appid.resources_31bf3856ad364e35_10.0.22000.1_fr-fr_2ef0f98ca49ce040.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.22000.1_nb-no_c7f99b2717b11bf7_memtest.efi.mui_71e15c22 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..ore-bootmanager-efi_31bf3856ad364e35_10.0.22000.469_none_82c3e25221a5a628_boot.stl_085cbba3 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-c..r-library.resources_31bf3856ad364e35_10.0.22000.1_ja-jp_590bf95ef01f0453.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-efs-service.resources_31bf3856ad364e35_10.0.22000.1_de-de_fa35d69f62bc9840_efssvc.dll.mui_03cc4e41 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-system_31bf3856ad364e35_10.0.22000.1_none_d99a6a8cfba83dcd.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-gdi_31bf3856ad364e35_10.0.22000.348_none_a52aaf9adfbcd9fc_fontsub.dll_367a1189 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-time-service.resources_31bf3856ad364e35_10.0.22000.1_es-es_a914c75c990da735.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-ui-xaml-phone_31bf3856ad364e35_10.0.22000.51_none_b2e5e8c4cbd7be63.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-usermodensi.resources_31bf3856ad364e35_10.0.22000.1_en-us_9294b3cee49c45ed_nsisvc.dll.mui_237a741f malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.22000.1_es-es_2ad688c4cc98c441_wmiutils.dll.mui_42583eaf malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.22000.1_fr-fr_cd8dfec3bf6adaa3_wmiapres.dll.mui_c1b8803f malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.22000.1_el-gr_3ccb302c970aa9d4_comctl32.dll.mui_0da4e682 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.22000.1_ru-ru_60a2b70d153ae767.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-uxtheme_31bf3856ad364e35_10.0.22000.120_none_ab9e7604c01ddcd5_uxtheme.dll_9f6cda06 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-gdi32_31bf3856ad364e35_10.0.22000.1_none_afc247a24e1a9edb.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-p..ne-client-overrides_31bf3856ad364e35_10.0.22000.376_none_2da5e7fba7bd3a98_power.energyestimationengine.mbb.ppkg_d678e4cb malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-profsvc_31bf3856ad364e35_10.0.22000.282_none_f6d7ab3db80962ec.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-shsvcs.resources_31bf3856ad364e35_10.0.22000.1_de-de_453f1a35f63369b4_shsvcs.dll.mui_b69fccab malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.22000.1_he-il_23c85317703b5600_comctl32.dll.mui_0da4e682 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.22000.1_zh-tw_cf0b25c8bd49c1d0_comctl32.dll.mui_0da4e682 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-user32.resources_31bf3856ad364e35_10.0.22000.1_es-es_9e619ca6646e011d_user32.dll.mui_14652dbb malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.22000.348_zh-cn_1e412fc8d9ebe021.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-a..structure.resources_31bf3856ad364e35_10.0.22000.1_en-us_4e6be64c9b69e5dc_apphelp.dll.mui_59096153 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-c..r-library.resources_31bf3856ad364e35_10.0.22000.1_it-it_b6e67a51fd03f278.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-g..licy-base.resources_31bf3856ad364e35_10.0.22000.1_it-it_a423026b3fda30a7_gpsvc.dll.mui_0c160ac2 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-n..-domain-clients-svc_31bf3856ad364e35_10.0.22000.1_none_9a521577f0ce51dc_ipsecsvc.mof_713662d2 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-onecore-ras-base-vpn_31bf3856ad364e35_10.0.22000.348_none_17b4eba7635d4b09_prxyqry.dll_8001cf73 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-profsvc.resources_31bf3856ad364e35_10.0.22000.1_ja-jp_ebcff9bec682f78a.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasserver.resources_31bf3856ad364e35_10.0.22000.1_es-es_d1500ecfc12b60e5_mprdim.dll.mui_11b5ef08 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.i..utomation.proxystub_6595b64144ccf1df_1.0.22000.1_none_ff5cb20bf269f1f7_sxsoaps.dll_7db29e61 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-d..ient-core.resources_31bf3856ad364e35_10.0.22000.1_fr-fr_10097706f8ff39a3.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-eventlog_31bf3856ad364e35_10.0.22000.469_none_d8075594981efa94_wevtsvc.dll_add42ce6 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-f..type-yugothicmedium_31bf3856ad364e35_10.0.22000.1_none_baa796476982b076_yugothm.ttc_98e07dba malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..ertificates-utility_31bf3856ad364e35_10.0.22000.1_none_df4149d82f72eeee_fvecerts.dll_cca35228 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-tdi-driver_31bf3856ad364e35_10.0.22000.1_none_bd31e6323abf8c9a_tdi.sys_d1537112 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wbiosrvc.resources_31bf3856ad364e35_10.0.22000.1_fr-fr_e45611d027dbfe39.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-rasrtutils_31bf3856ad364e35_10.0.22000.132_none_12c69fe9a40f1fff.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.22000.348_zh-cn_1e412fc8d9ebe021_bootmgr.exe.mui_c434701f malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-client-li..m-service.resources_31bf3856ad364e35_10.0.22000.1_fr-fr_3b1634e5e13716ef.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-a..llservice.resources_31bf3856ad364e35_10.0.22000.1_fr-fr_569482aa9af3639f_axinstui.exe.mui_aea34130 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.22000.348_sv-se_5f4b8e28b6517121_bootmgfw.efi.mui_a6e78cfa malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-crypt32-dll_31bf3856ad364e35_10.0.22000.348_none_56c758fe630a438a_crypt32.dll_9c3ccf73 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.22000.1_el-gr_9d0ae54e63c0d935.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wininit.resources_31bf3856ad364e35_10.0.22000.1_uk-ua_c5b25d833d6b8756_wininit.exe.mui_997435f5 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.22000.1_es-es_6b53dae8d8ddfcf3.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.22000.1_el-gr_84786703ab86d2da_comctl32.dll.mui_0da4e682 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-client-li..se-platform-service_31bf3856ad364e35_10.0.22000.51_none_b7276a675fe68d9e.manifest malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-axinstallservice_31bf3856ad364e35_10.0.22000.120_none_d26a7fc3f61aca1f_axinstsv.dll_ebc2b91e malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-commonlog.resources_31bf3856ad364e35_10.0.22000.1_es-es_6867b5b4ff714193_clfs.sys.mui_1310ba12 malware_005D0000.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-f..etype-lucidaconsole_31bf3856ad364e35_10.0.22000.1_none_558a8fdf7d83e20c.manifest malware_005D0000.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language malware_005D0000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4544 malware_005D0000.exe 4544 malware_005D0000.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4544 wrote to memory of 2400 4544 malware_005D0000.exe 78 PID 4544 wrote to memory of 2400 4544 malware_005D0000.exe 78 PID 4544 wrote to memory of 2400 4544 malware_005D0000.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exeC:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe bcdedit /set shutdown /r /f /t 21⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- System Location Discovery: System Language Discovery
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5ac8b58a75823e58f14840b18bc0a3a66
SHA1723c75913ea9229f52c8d05e1a44d9bbb17c839e
SHA2562ffe1268d2d1fed0b0d956ca67415dc718d8c6b0e0c2cb53303c8cbf9ac8ef5a
SHA512d231a6cd4419db517e5f3ba6f560a29744d8a3eee92003e589f7c5b135b3cf1de8a09d572ef5a7a215f1daad410c6271ad7adbb36c3bd9dfdfdb14bd44414825