Analysis
-
max time kernel
190s -
max time network
221s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 05:38
Static task
static1
Behavioral task
behavioral1
Sample
4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exe
Resource
win10v2004-20220414-en
General
-
Target
4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exe
-
Size
424KB
-
MD5
5f92e7bb126bc5f30e6eded36c3b9d58
-
SHA1
db0564756e6033127acae86538b7a1590c33aea0
-
SHA256
4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a
-
SHA512
561b9d98f92805d0303b6ad4c7c88b2d2e8841af5fb902e2b06675bf258ec4d8cc552119342b09a7524465bc84707f5e743001d068ffa64156c0907ae7f4b6e1
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_RECoVERY_+cluii.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/B0F882ED77854BD9
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/B0F882ED77854BD9
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/B0F882ED77854BD9
http://xlowfznrg4wf7dli.ONION/B0F882ED77854BD9
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_RECoVERY_+cluii.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
rwyxyspkfbpl.exepid Process 1232 rwyxyspkfbpl.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2004 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
rwyxyspkfbpl.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run rwyxyspkfbpl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\huvacrbegtgd = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\rwyxyspkfbpl.exe\"" rwyxyspkfbpl.exe -
Drops file in Program Files directory 64 IoCs
Processes:
rwyxyspkfbpl.exedescription ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationUp_ButtonGraphic.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationRight_ButtonGraphic.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrome.7z rwyxyspkfbpl.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push_item.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\_RECoVERY_+cluii.txt rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\_RECoVERY_+cluii.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationRight_SelectionSubpicture.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\content-background.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\_RECoVERY_+cluii.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationLeft_ButtonGraphic.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\_RECoVERY_+cluii.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\_RECoVERY_+cluii.html rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationRight_SelectionSubpicture.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\_RECoVERY_+cluii.html rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\btn-next-static.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\whitevignette1047.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_RECoVERY_+cluii.html rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\16_9-frame-highlight.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\_RECoVERY_+cluii.txt rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\_RECoVERY_+cluii.txt rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\_RECoVERY_+cluii.html rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\_RECoVERY_+cluii.html rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\1047x576black.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\vintage.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\System\_RECoVERY_+cluii.txt rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\_RECoVERY_+cluii.html rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\_RECoVERY_+cluii.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\_RECoVERY_+cluii.txt rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsScenesBackground.wmv rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\_RECoVERY_+cluii.html rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\Passport.wmv rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\PreviousMenuButtonIconSubpi.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\_RECoVERY_+cluii.html rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\_RECoVERY_+cluii.html rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\_RECoVERY_+cluii.html rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\_RECoVERY_+cluii.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground_PAL.wmv rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\15x15dot.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\_RECoVERY_+cluii.txt rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\ShadesOfBlue.jpg rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\_RECoVERY_+cluii.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\7-Zip\Lang\_RECoVERY_+cluii.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\_RECoVERY_+cluii.html rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\System\it-IT\_RECoVERY_+cluii.html rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_RECoVERY_+cluii.txt rwyxyspkfbpl.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\_RECoVERY_+cluii.html rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\_RECoVERY_+cluii.txt rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\_RECoVERY_+cluii.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_uparrow.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationUp_SelectionSubpicture.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\203x8subpicture.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\System\it-IT\_RECoVERY_+cluii.txt rwyxyspkfbpl.exe File opened for modification C:\Program Files\Common Files\System\_RECoVERY_+cluii.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\_RECoVERY_+cluii.png rwyxyspkfbpl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_ButtonGraphic.png rwyxyspkfbpl.exe -
Drops file in Windows directory 2 IoCs
Processes:
4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exedescription ioc Process File created C:\Windows\rwyxyspkfbpl.exe 4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exe File opened for modification C:\Windows\rwyxyspkfbpl.exe 4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
rwyxyspkfbpl.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 rwyxyspkfbpl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 rwyxyspkfbpl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 rwyxyspkfbpl.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rwyxyspkfbpl.exepid Process 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe 1232 rwyxyspkfbpl.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exerwyxyspkfbpl.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 1656 4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exe Token: SeDebugPrivilege 1232 rwyxyspkfbpl.exe Token: SeIncreaseQuotaPrivilege 1288 WMIC.exe Token: SeSecurityPrivilege 1288 WMIC.exe Token: SeTakeOwnershipPrivilege 1288 WMIC.exe Token: SeLoadDriverPrivilege 1288 WMIC.exe Token: SeSystemProfilePrivilege 1288 WMIC.exe Token: SeSystemtimePrivilege 1288 WMIC.exe Token: SeProfSingleProcessPrivilege 1288 WMIC.exe Token: SeIncBasePriorityPrivilege 1288 WMIC.exe Token: SeCreatePagefilePrivilege 1288 WMIC.exe Token: SeBackupPrivilege 1288 WMIC.exe Token: SeRestorePrivilege 1288 WMIC.exe Token: SeShutdownPrivilege 1288 WMIC.exe Token: SeDebugPrivilege 1288 WMIC.exe Token: SeSystemEnvironmentPrivilege 1288 WMIC.exe Token: SeRemoteShutdownPrivilege 1288 WMIC.exe Token: SeUndockPrivilege 1288 WMIC.exe Token: SeManageVolumePrivilege 1288 WMIC.exe Token: 33 1288 WMIC.exe Token: 34 1288 WMIC.exe Token: 35 1288 WMIC.exe Token: SeIncreaseQuotaPrivilege 1288 WMIC.exe Token: SeSecurityPrivilege 1288 WMIC.exe Token: SeTakeOwnershipPrivilege 1288 WMIC.exe Token: SeLoadDriverPrivilege 1288 WMIC.exe Token: SeSystemProfilePrivilege 1288 WMIC.exe Token: SeSystemtimePrivilege 1288 WMIC.exe Token: SeProfSingleProcessPrivilege 1288 WMIC.exe Token: SeIncBasePriorityPrivilege 1288 WMIC.exe Token: SeCreatePagefilePrivilege 1288 WMIC.exe Token: SeBackupPrivilege 1288 WMIC.exe Token: SeRestorePrivilege 1288 WMIC.exe Token: SeShutdownPrivilege 1288 WMIC.exe Token: SeDebugPrivilege 1288 WMIC.exe Token: SeSystemEnvironmentPrivilege 1288 WMIC.exe Token: SeRemoteShutdownPrivilege 1288 WMIC.exe Token: SeUndockPrivilege 1288 WMIC.exe Token: SeManageVolumePrivilege 1288 WMIC.exe Token: 33 1288 WMIC.exe Token: 34 1288 WMIC.exe Token: 35 1288 WMIC.exe Token: SeBackupPrivilege 1152 vssvc.exe Token: SeRestorePrivilege 1152 vssvc.exe Token: SeAuditPrivilege 1152 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exerwyxyspkfbpl.exedescription pid Process procid_target PID 1656 wrote to memory of 1232 1656 4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exe 28 PID 1656 wrote to memory of 1232 1656 4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exe 28 PID 1656 wrote to memory of 1232 1656 4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exe 28 PID 1656 wrote to memory of 1232 1656 4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exe 28 PID 1656 wrote to memory of 2004 1656 4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exe 29 PID 1656 wrote to memory of 2004 1656 4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exe 29 PID 1656 wrote to memory of 2004 1656 4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exe 29 PID 1656 wrote to memory of 2004 1656 4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exe 29 PID 1232 wrote to memory of 1288 1232 rwyxyspkfbpl.exe 31 PID 1232 wrote to memory of 1288 1232 rwyxyspkfbpl.exe 31 PID 1232 wrote to memory of 1288 1232 rwyxyspkfbpl.exe 31 PID 1232 wrote to memory of 1288 1232 rwyxyspkfbpl.exe 31 -
System policy modification 1 TTPs 2 IoCs
Processes:
rwyxyspkfbpl.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" rwyxyspkfbpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System rwyxyspkfbpl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exe"C:\Users\Admin\AppData\Local\Temp\4177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\rwyxyspkfbpl.exeC:\Windows\rwyxyspkfbpl.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1232 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\4177A9~1.EXE2⤵
- Deletes itself
PID:2004
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD55f92e7bb126bc5f30e6eded36c3b9d58
SHA1db0564756e6033127acae86538b7a1590c33aea0
SHA2564177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a
SHA512561b9d98f92805d0303b6ad4c7c88b2d2e8841af5fb902e2b06675bf258ec4d8cc552119342b09a7524465bc84707f5e743001d068ffa64156c0907ae7f4b6e1
-
Filesize
424KB
MD55f92e7bb126bc5f30e6eded36c3b9d58
SHA1db0564756e6033127acae86538b7a1590c33aea0
SHA2564177a97be49eb1e528048056c23904d3d3e1efc693fc967875b84071f58f9b2a
SHA512561b9d98f92805d0303b6ad4c7c88b2d2e8841af5fb902e2b06675bf258ec4d8cc552119342b09a7524465bc84707f5e743001d068ffa64156c0907ae7f4b6e1