Analysis
-
max time kernel
159s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:54
Static task
static1
Behavioral task
behavioral1
Sample
c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe
Resource
win7-20220812-en
General
-
Target
c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe
-
Size
622KB
-
MD5
4541567d2434b2ae79d96ecfde2a7f10
-
SHA1
572a66d134fa40e4faad26f1fb5740b953758fdd
-
SHA256
c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0
-
SHA512
49fb5c7df2b862a4cb6b8376020d09e9f34a31b43c46309850b99f55496b50129a0506a703805c62dfcc31f38f9351627da6b39ebe3a91279f026fc1545b2eb2
-
SSDEEP
12288:E5NeIXRYHWGxG9tUp36sbMjZhc7besfAjmJhyt7BZ:E5AgRcpQ/UlbMjZKKsfcmvcD
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 3 IoCs
Processes:
elevation_service.exeelevation_service.exemaintenanceservice.exepid process 3884 elevation_service.exe 4276 elevation_service.exe 4228 maintenanceservice.exe -
Processes:
elevation_service.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-4060001867-1434967833-2212371794-1000 elevation_service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-4060001867-1434967833-2212371794-1000\EnableNotifications = "0" elevation_service.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
elevation_service.exedescription ioc process File opened (read-only) \??\P: elevation_service.exe File opened (read-only) \??\Z: elevation_service.exe File opened (read-only) \??\E: elevation_service.exe File opened (read-only) \??\H: elevation_service.exe File opened (read-only) \??\I: elevation_service.exe File opened (read-only) \??\J: elevation_service.exe File opened (read-only) \??\L: elevation_service.exe File opened (read-only) \??\U: elevation_service.exe File opened (read-only) \??\O: elevation_service.exe File opened (read-only) \??\Q: elevation_service.exe File opened (read-only) \??\Y: elevation_service.exe File opened (read-only) \??\F: elevation_service.exe File opened (read-only) \??\G: elevation_service.exe File opened (read-only) \??\K: elevation_service.exe File opened (read-only) \??\M: elevation_service.exe File opened (read-only) \??\V: elevation_service.exe File opened (read-only) \??\W: elevation_service.exe File opened (read-only) \??\X: elevation_service.exe File opened (read-only) \??\N: elevation_service.exe File opened (read-only) \??\R: elevation_service.exe File opened (read-only) \??\S: elevation_service.exe File opened (read-only) \??\T: elevation_service.exe -
Drops file in System32 directory 64 IoCs
Processes:
c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exeelevation_service.exedescription ioc process File opened for modification \??\c:\windows\system32\alg.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\SysWOW64\diagsvcs\diagnosticshub.standardcollector.service.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe elevation_service.exe File created \??\c:\windows\system32\omlaemno.tmp elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File created \??\c:\windows\SysWOW64\bedoobdj.tmp c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe elevation_service.exe File opened for modification \??\c:\windows\system32\lsass.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\svchost.exe elevation_service.exe File opened for modification \??\c:\windows\system32\locator.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\perfhost.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\SysWOW64\spectrum.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\spectrum.exe elevation_service.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\searchindexer.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe elevation_service.exe File created \??\c:\windows\system32\ohgdnqek.tmp elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\Agentservice.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File created \??\c:\windows\system32\kdlondan.tmp elevation_service.exe File opened for modification \??\c:\windows\system32\fxssvc.exe elevation_service.exe File opened for modification \??\c:\windows\system32\vds.exe elevation_service.exe File opened for modification \??\c:\windows\system32\searchindexer.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\svchost.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\alg.exe elevation_service.exe File opened for modification \??\c:\windows\system32\msdtc.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\lsass.exe elevation_service.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\openssh\ssh-agent.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File created \??\c:\windows\system32\fjggkfnb.tmp c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\SysWOW64\Appvclient.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\Appvclient.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File created \??\c:\windows\system32\lnlqiegc.tmp elevation_service.exe File created \??\c:\windows\system32\openssh\gaomklag.tmp elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe elevation_service.exe File opened for modification \??\c:\windows\system32\spectrum.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\vssvc.exe elevation_service.exe File opened for modification \??\c:\windows\system32\dllhost.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\fxssvc.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\dllhost.exe elevation_service.exe File opened for modification \??\c:\windows\system32\msdtc.exe elevation_service.exe File opened for modification \??\c:\windows\system32\msiexec.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\SysWOW64\sensordataservice.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\snmptrap.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\Agentservice.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\system32\wbengine.exe elevation_service.exe -
Drops file in Program Files directory 19 IoCs
Processes:
elevation_service.exec37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exemaintenanceservice.exedescription ioc process File created \??\c:\program files\common files\microsoft shared\source engine\jhpcmmnj.tmp elevation_service.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\program files\google\chrome\Application\89.0.4389.114\elevation_service.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File created \??\c:\program files\google\chrome\Application\89.0.4389.114\jmemhldm.tmp c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe elevation_service.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe elevation_service.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe elevation_service.exe File opened for modification C:\Program Files\7-Zip\7z.exe elevation_service.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File created \??\c:\program files (x86)\mozilla maintenance service\faojknmb.tmp c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File created C:\Program Files\7-Zip\jgpijieg.tmp elevation_service.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\hjldgpoi.tmp c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File created \??\c:\program files\windows media player\nbanpkkn.tmp elevation_service.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe elevation_service.exe -
Drops file in Windows directory 2 IoCs
Processes:
c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exeelevation_service.exedescription ioc process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe elevation_service.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
elevation_service.exepid process 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe 3884 elevation_service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 648 648 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exeelevation_service.exedescription pid process Token: SeTakeOwnershipPrivilege 1204 c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe Token: SeTakeOwnershipPrivilege 3884 elevation_service.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
elevation_service.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer elevation_service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" elevation_service.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe"C:\Users\Admin\AppData\Local\Temp\c37e69ab7e6bbf12ffda266080c90e42e99459e81225000b8b093a96f98a86d0.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3884
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4276
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4228
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5fbf637700414407ef9dc80b4f39e1c0d
SHA185ecf2a785d49857b23b3891a24d76561871efb5
SHA256d2ddb2f88660b14ec935ead841153a5fae77e1adf67a8cd55f6257f720679d22
SHA5128964e581e4eda90f210f7790c6d4132b07293112b3d4927a84579a2ff8a9c7747a19cdb50fcaec5811620196f906ae645d89a25dd4aaf12295c52baf2010eba7
-
Filesize
792KB
MD556fe7906f837de5c57250cd108c50d1a
SHA16076926b746df91274ffa0c04d391aee08b48756
SHA2560e579f92c26a773bd70e408ddddc3e1bad0ff1b87c0c20ad72a0a75d130e2474
SHA512ab643fce15d0dad35a8c2b5b25cb028a886d44be75bce522e49cff286bfa1e163d8709c1f27d645d25bfb5ed439d3e7ba147b3017a166afaf605a5dc74433320
-
Filesize
2.0MB
MD59a8c2cb7a7d71bc059963ccaa65613aa
SHA16890a773bfea1aab7dddd8294363501c0b189c7a
SHA2564565ec1dbf3b54d9aca61ce7b046d06cc063076f4b65db9c3d6de6afbd631159
SHA5120fde3c444d85c627aca4ef8cc411953e49015ab2a9995f26f2176b2874ac4210f3d9acc6dec001de38c1acadb104893b8e72b61f74bbed032145199eb87f6b53
-
Filesize
801KB
MD5fc1a27545086b6adf3ac983f1b4e7d7b
SHA1bf341abe3212f11d38a5498c07be04051b4ddbde
SHA25601715139003777cb92a25b1daee38e11ce2d325052499404fb48aa9fa1c55b0c
SHA5127b806614ca3dba025d605830ab3c093a29c23ee01a730a80424f6b12fc9acf0a1ca7d2ce4bdb9fd2eeae15c4a339827e011997f426d2bffd68603f2c65362104
-
Filesize
1.5MB
MD5b14d5872b5ff30fd3999687062cac9b3
SHA1fa7a58d886b5898b22aff9960f2320bb246d0525
SHA2562ad24e13a7cfd12965d54d96976a21252f71099b03add912e6ca3614919196fc
SHA512a2eb6473f733a9f636fe2a41e1c5faf2cf74ef08d1bff4b800d3cd31941707228e96fe5f0bf55ae1f88f2ef41c7ff8ba01e8ea3c2f4ace2854b908a533afb29f
-
Filesize
1.7MB
MD54dad42befc2829b2441f46be4aa0f7a6
SHA1b46c4c16dbe2587e617394bcc50390317796afed
SHA256384a906f688e9a2671ae49e38651d9c255d88a33acd4aac8a3d4269427ea92ae
SHA512712351d83b7ef3fa0d4164bae9a91998306cfbb70a2b1a403be3249747dbd0f5d64a69526aa86cfced8de9ec7905653fabd74aae32638b45aafd4a23c2f46f14
-
Filesize
1.3MB
MD5b4cf5951999ed0d430283df07a1b1bdf
SHA19e187b8db8cf40ca2526ee72c140371e0eb3a955
SHA256b19b60df8ee27d7a57f7944e70859c3bf1b7a1dca18e6c69053ac2078cab9744
SHA5122f4ea25a4f5841c60ace88471b6206d1afdd46ac505e72c015f31bee6135a4ccc04e62bc828d997c490aabcdda47cb9b81749e4c525c7469a85284a3c46b4a92
-
Filesize
1.2MB
MD56afc2a2c922714ff67460c62d4a9d539
SHA1835d899616e7657adf8b7e41823eaf1580916a01
SHA256b31a9b8bf815e1206fed31f66ca2ef5878fb7ad0593c6d9e2d59d8459ef042e5
SHA5128a1040221e03255acad19b14b476a256932391c47e2268663d0f735b3cb6ce0a60ad5acc9a0f1fa024ebe68964f90caeb8f0c44566a81ae164ef4fe9355c786b
-
Filesize
627KB
MD5ce7a6d6610537145cf65f90466001531
SHA1f6b31fb399c3c969ac679e9e6f3eb1b7a56ff8f8
SHA25650e5a4c7c5b654406912bbb514388a89a5858c1e694d73bbd0693585c3304803
SHA5120eb5d7f75f683ba5eb5029667331d94318e688920e5cda3c5f4dbf70bd012969c452ff27b0bc0d9c65de09ccbe4d5818939dc38c95fb2a954333440cd82305f1
-
Filesize
936KB
MD58da24adf0855a77961ef962f58d43c9e
SHA1de371bfc482557d8645981472e7f43fa56a9a89e
SHA2562f3b77dcecdc7f99a6562a5a0a382c17602e7243a66d4e2415586fa80e45b013
SHA512f1df733d5887246232e177603c5b942aa3a3016936d00667ed8281f5be56af49f728bb1a5c149d8bb88c341744166a71fe9d2c2dc9a899950957f99de1964a70
-
Filesize
2.1MB
MD55392eedcd00e5cd74403b459babf33f8
SHA1d2a38cd8cf8e00e42aa943bf07b72fd8bca90a8f
SHA25658e18a577cefef21f27af750f46134bc870b80840b56f20d177dba121380faba
SHA512696311eb5d661d905509f41c3c858e0a21a9448b1bb08986beecc7c9491fde1973365c039b5cf6140a13e25436fd77a332fec9788914137f2b1313ef59e214b6