Analysis
-
max time kernel
69s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 00:51
Behavioral task
behavioral1
Sample
976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe
Resource
win10v2004-20221111-en
General
-
Target
976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe
-
Size
298KB
-
MD5
7fb28a19ee289df3e6fb3140c6eaa1ba
-
SHA1
0d94a5163134a18f64d9afb97b940b736662b3d1
-
SHA256
976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb
-
SHA512
8d5a1dac7fcd48ed36e251a0b598346b627bf820dc8d978dc8c2eb5f5a54f101c3acb1143045b4e1e49e03e679af3475b84c8f43b445795a43ccc7c824fb699f
-
SSDEEP
6144:2yHzI4LhBgjCvJwPNtkdtRSO4Z0zFQrwtQHxw9sAD:R7g6J6NO4O4UFQHHxLAD
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\LogonHours\Parameters\ServiceDll = "C:\\Windows\\system32\\LogonHours.dll" 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\helpsvc\Parameters\ServiceDll = "C:\\Windows\\system32\\helpsvc.dll" 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\PCAudit\Parameters\ServiceDll = "C:\\Windows\\system32\\PCAudit.dll" 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\uploadmgr\Parameters\ServiceDll = "C:\\Windows\\system32\\uploadmgr.dll" 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe -
resource yara_rule behavioral1/memory/1344-55-0x00000000002D0000-0x000000000031D000-memory.dmp upx behavioral1/files/0x000a000000013445-57.dat upx behavioral1/files/0x000a000000013445-58.dat upx behavioral1/memory/1740-60-0x0000000074820000-0x000000007486D000-memory.dmp upx behavioral1/files/0x000a0000000135a6-62.dat upx behavioral1/files/0x000a0000000135a6-63.dat upx behavioral1/memory/1944-65-0x00000000742D0000-0x000000007431D000-memory.dmp upx behavioral1/files/0x00080000000139e4-66.dat upx behavioral1/files/0x00080000000139e4-67.dat upx behavioral1/files/0x0007000000013aad-71.dat upx behavioral1/files/0x0007000000013aad-70.dat upx behavioral1/files/0x00060000000140fd-73.dat upx behavioral1/files/0x00060000000140fd-74.dat upx behavioral1/files/0x0006000000014112-76.dat upx behavioral1/files/0x0006000000014112-77.dat upx behavioral1/files/0x000600000001411b-79.dat upx behavioral1/files/0x000600000001411b-80.dat upx behavioral1/files/0x00070000000141af-82.dat upx behavioral1/files/0x00070000000141af-83.dat upx behavioral1/files/0x00060000000141f2-85.dat upx behavioral1/files/0x00060000000141f2-86.dat upx behavioral1/files/0x0006000000014209-88.dat upx behavioral1/files/0x0006000000014209-89.dat upx behavioral1/files/0x0006000000014294-91.dat upx behavioral1/files/0x0006000000014294-92.dat upx behavioral1/files/0x000600000001429e-94.dat upx behavioral1/files/0x000600000001429e-95.dat upx behavioral1/memory/1344-97-0x00000000002D0000-0x000000000031D000-memory.dmp upx -
Loads dropped DLL 12 IoCs
pid Process 1740 svchost.exe 1944 svchost.exe 1820 svchost.exe 1044 svchost.exe 1028 svchost.exe 916 svchost.exe 1156 svchost.exe 1748 svchost.exe 336 svchost.exe 1180 svchost.exe 1560 svchost.exe 728 svchost.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe File opened for modification C:\Windows\SysWOW64\Ias.dll 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe File opened for modification C:\Windows\SysWOW64\PCAudit.dll 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe File opened for modification C:\Windows\SysWOW64\Wmi.dll 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe File opened for modification C:\Windows\SysWOW64\LogonHours.dll 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe File opened for modification C:\Windows\SysWOW64\helpsvc.dll 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe File opened for modification C:\Windows\SysWOW64\uploadmgr.dll 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe File opened for modification C:\Windows\SysWOW64\Nla.dll 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe File opened for modification C:\Windows\SysWOW64\SRService.dll 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1344 976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe"C:\Users\Admin\AppData\Local\Temp\976163a074492950d1ab0d3d6b0b779a8d8a253660292cd3b8bf4ab87de738fb.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1740
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1944
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1820
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1044
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1028
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:916
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1156
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵PID:1688
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1748
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:336
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1180
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1560
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6
-
Filesize
298KB
MD500210157fc12852f233498c9607c6d86
SHA1f3e42f203043357035543897fe78de7de8af6d5f
SHA2562327dfe7566d3e4cc8e093ae57941d187e44b2f18ed2e9b021307cad9bce546e
SHA512feb668a8d13e8829654f7b12dcc153fe87db0d82ac1113848336dcfa684efe1c633476dc2aa82629dcc6f51de417bc0b4fcaa7d30b7d232a8a08230ab7fb20b6