Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 21:16
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.2MB
-
MD5
33d51d690add76324156ada047e712d5
-
SHA1
299699eed564be165e7d54f0c03027e899c63a70
-
SHA256
e58a3f36c1ba8395971086aefaca5ea5df180baf106c20a067d2da9448a05ae1
-
SHA512
cf87597ce589c25dfe5226f0bd5acf388a6413557105951888a71582f3f85160aa967ec9d604bb452a4f374804c7ec37caf16c690ad7b4c57cbd8bf8cb3a8172
-
SSDEEP
24576:EyPnPYgfUFBlJsUbL1ekk6f6BfQtKkI5HfRp09U:T4gfURv1Z6lb5G
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1GA84AW6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1GA84AW6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1GA84AW6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1GA84AW6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1GA84AW6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1GA84AW6.exe -
Executes dropped EXE 5 IoCs
pid Process 2852 lj4NJ41.exe 1680 cF7iP09.exe 2120 gb5EU73.exe 2784 1GA84AW6.exe 2764 2dC6602.exe -
Loads dropped DLL 14 IoCs
pid Process 2196 file.exe 2852 lj4NJ41.exe 2852 lj4NJ41.exe 1680 cF7iP09.exe 1680 cF7iP09.exe 2120 gb5EU73.exe 2120 gb5EU73.exe 2784 1GA84AW6.exe 2120 gb5EU73.exe 2764 2dC6602.exe 2200 WerFault.exe 2200 WerFault.exe 2200 WerFault.exe 2200 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 1GA84AW6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1GA84AW6.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" lj4NJ41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" cF7iP09.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" gb5EU73.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2764 set thread context of 2620 2764 2dC6602.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 912 2620 WerFault.exe 33 2200 2764 WerFault.exe 32 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2784 1GA84AW6.exe 2784 1GA84AW6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2784 1GA84AW6.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2852 2196 file.exe 28 PID 2196 wrote to memory of 2852 2196 file.exe 28 PID 2196 wrote to memory of 2852 2196 file.exe 28 PID 2196 wrote to memory of 2852 2196 file.exe 28 PID 2196 wrote to memory of 2852 2196 file.exe 28 PID 2196 wrote to memory of 2852 2196 file.exe 28 PID 2196 wrote to memory of 2852 2196 file.exe 28 PID 2852 wrote to memory of 1680 2852 lj4NJ41.exe 29 PID 2852 wrote to memory of 1680 2852 lj4NJ41.exe 29 PID 2852 wrote to memory of 1680 2852 lj4NJ41.exe 29 PID 2852 wrote to memory of 1680 2852 lj4NJ41.exe 29 PID 2852 wrote to memory of 1680 2852 lj4NJ41.exe 29 PID 2852 wrote to memory of 1680 2852 lj4NJ41.exe 29 PID 2852 wrote to memory of 1680 2852 lj4NJ41.exe 29 PID 1680 wrote to memory of 2120 1680 cF7iP09.exe 30 PID 1680 wrote to memory of 2120 1680 cF7iP09.exe 30 PID 1680 wrote to memory of 2120 1680 cF7iP09.exe 30 PID 1680 wrote to memory of 2120 1680 cF7iP09.exe 30 PID 1680 wrote to memory of 2120 1680 cF7iP09.exe 30 PID 1680 wrote to memory of 2120 1680 cF7iP09.exe 30 PID 1680 wrote to memory of 2120 1680 cF7iP09.exe 30 PID 2120 wrote to memory of 2784 2120 gb5EU73.exe 31 PID 2120 wrote to memory of 2784 2120 gb5EU73.exe 31 PID 2120 wrote to memory of 2784 2120 gb5EU73.exe 31 PID 2120 wrote to memory of 2784 2120 gb5EU73.exe 31 PID 2120 wrote to memory of 2784 2120 gb5EU73.exe 31 PID 2120 wrote to memory of 2784 2120 gb5EU73.exe 31 PID 2120 wrote to memory of 2784 2120 gb5EU73.exe 31 PID 2120 wrote to memory of 2764 2120 gb5EU73.exe 32 PID 2120 wrote to memory of 2764 2120 gb5EU73.exe 32 PID 2120 wrote to memory of 2764 2120 gb5EU73.exe 32 PID 2120 wrote to memory of 2764 2120 gb5EU73.exe 32 PID 2120 wrote to memory of 2764 2120 gb5EU73.exe 32 PID 2120 wrote to memory of 2764 2120 gb5EU73.exe 32 PID 2120 wrote to memory of 2764 2120 gb5EU73.exe 32 PID 2764 wrote to memory of 2620 2764 2dC6602.exe 33 PID 2764 wrote to memory of 2620 2764 2dC6602.exe 33 PID 2764 wrote to memory of 2620 2764 2dC6602.exe 33 PID 2764 wrote to memory of 2620 2764 2dC6602.exe 33 PID 2764 wrote to memory of 2620 2764 2dC6602.exe 33 PID 2764 wrote to memory of 2620 2764 2dC6602.exe 33 PID 2764 wrote to memory of 2620 2764 2dC6602.exe 33 PID 2764 wrote to memory of 2620 2764 2dC6602.exe 33 PID 2764 wrote to memory of 2620 2764 2dC6602.exe 33 PID 2764 wrote to memory of 2620 2764 2dC6602.exe 33 PID 2764 wrote to memory of 2620 2764 2dC6602.exe 33 PID 2764 wrote to memory of 2620 2764 2dC6602.exe 33 PID 2764 wrote to memory of 2620 2764 2dC6602.exe 33 PID 2764 wrote to memory of 2620 2764 2dC6602.exe 33 PID 2764 wrote to memory of 2200 2764 2dC6602.exe 35 PID 2764 wrote to memory of 2200 2764 2dC6602.exe 35 PID 2764 wrote to memory of 2200 2764 2dC6602.exe 35 PID 2764 wrote to memory of 2200 2764 2dC6602.exe 35 PID 2764 wrote to memory of 2200 2764 2dC6602.exe 35 PID 2764 wrote to memory of 2200 2764 2dC6602.exe 35 PID 2764 wrote to memory of 2200 2764 2dC6602.exe 35 PID 2620 wrote to memory of 912 2620 AppLaunch.exe 34 PID 2620 wrote to memory of 912 2620 AppLaunch.exe 34 PID 2620 wrote to memory of 912 2620 AppLaunch.exe 34 PID 2620 wrote to memory of 912 2620 AppLaunch.exe 34 PID 2620 wrote to memory of 912 2620 AppLaunch.exe 34 PID 2620 wrote to memory of 912 2620 AppLaunch.exe 34 PID 2620 wrote to memory of 912 2620 AppLaunch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lj4NJ41.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lj4NJ41.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cF7iP09.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cF7iP09.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gb5EU73.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gb5EU73.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1GA84AW6.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1GA84AW6.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2dC6602.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2dC6602.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 2687⤵
- Program crash
PID:912
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:2200
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5a39abf6030c0d1a294b0786022416c9a
SHA11fe555aa3f33349559334d0595d3d49260cd2271
SHA256e02c24634e369ea286fec4faa74a68d33f90097d323c342ff8ea693f93a3e1a5
SHA512a0c880fdac16353bfe652ff9101a7f6e50f6288bfdc6fc83917d78d1c05d7c8fa9525a5de8795d883eb2b5f855eeaa65cb80b865d415099dd36480fa11caaa89
-
Filesize
1.0MB
MD5a39abf6030c0d1a294b0786022416c9a
SHA11fe555aa3f33349559334d0595d3d49260cd2271
SHA256e02c24634e369ea286fec4faa74a68d33f90097d323c342ff8ea693f93a3e1a5
SHA512a0c880fdac16353bfe652ff9101a7f6e50f6288bfdc6fc83917d78d1c05d7c8fa9525a5de8795d883eb2b5f855eeaa65cb80b865d415099dd36480fa11caaa89
-
Filesize
743KB
MD5c85b6e8a72c22d7d7a1a69e74dfddad6
SHA134d06d7f38e384ebe1ff790ae0d194c522451df3
SHA2561faa0f0f80574901d24426dec8e8f08d4a195a92e3a983fbaf9a22cde1214af8
SHA512ec4162e545ec9f7968ab48490880a91e9474893e779a244b15ed43f146d061b8e990d6132ac3cb23acf2d85967c16eafb0a2290a86620a72bf9c2b5fa531bfa5
-
Filesize
743KB
MD5c85b6e8a72c22d7d7a1a69e74dfddad6
SHA134d06d7f38e384ebe1ff790ae0d194c522451df3
SHA2561faa0f0f80574901d24426dec8e8f08d4a195a92e3a983fbaf9a22cde1214af8
SHA512ec4162e545ec9f7968ab48490880a91e9474893e779a244b15ed43f146d061b8e990d6132ac3cb23acf2d85967c16eafb0a2290a86620a72bf9c2b5fa531bfa5
-
Filesize
492KB
MD566bae0ef21d1bbd9a2bb7bfe89c9e762
SHA184c2260357973638e919917e1948bb3694b604d1
SHA256356274664ea311d0eb99f9ab5442483542ca964d0e7a9249900267d26e0f63aa
SHA5124e4dda5bce7a50a12fcebc0de9d85417cfe7f4f8e6c039f4e7b1127e059b4b0a1b425bcf91082c5dc61fe724ac69a9d29b5471ff03ae71a04fd36e7173a2d7dd
-
Filesize
492KB
MD566bae0ef21d1bbd9a2bb7bfe89c9e762
SHA184c2260357973638e919917e1948bb3694b604d1
SHA256356274664ea311d0eb99f9ab5442483542ca964d0e7a9249900267d26e0f63aa
SHA5124e4dda5bce7a50a12fcebc0de9d85417cfe7f4f8e6c039f4e7b1127e059b4b0a1b425bcf91082c5dc61fe724ac69a9d29b5471ff03ae71a04fd36e7173a2d7dd
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
446KB
MD5da0eee39485725d0adaa5678f4d1b681
SHA11bd7d3989821d2c92f40a682d6d08a567f5e6da2
SHA256497b29333dcded5d2521b809843febe11b43ee3b6d74588210084deb27a70e70
SHA512a316344340632f4c1391e912e97b747ca648ca3171b259ae24730c68db4d325eafb8eb0c1c8470c058a68099cbc5b702185b738d23a67aa1206484489179eba4
-
Filesize
446KB
MD5da0eee39485725d0adaa5678f4d1b681
SHA11bd7d3989821d2c92f40a682d6d08a567f5e6da2
SHA256497b29333dcded5d2521b809843febe11b43ee3b6d74588210084deb27a70e70
SHA512a316344340632f4c1391e912e97b747ca648ca3171b259ae24730c68db4d325eafb8eb0c1c8470c058a68099cbc5b702185b738d23a67aa1206484489179eba4
-
Filesize
1.0MB
MD5a39abf6030c0d1a294b0786022416c9a
SHA11fe555aa3f33349559334d0595d3d49260cd2271
SHA256e02c24634e369ea286fec4faa74a68d33f90097d323c342ff8ea693f93a3e1a5
SHA512a0c880fdac16353bfe652ff9101a7f6e50f6288bfdc6fc83917d78d1c05d7c8fa9525a5de8795d883eb2b5f855eeaa65cb80b865d415099dd36480fa11caaa89
-
Filesize
1.0MB
MD5a39abf6030c0d1a294b0786022416c9a
SHA11fe555aa3f33349559334d0595d3d49260cd2271
SHA256e02c24634e369ea286fec4faa74a68d33f90097d323c342ff8ea693f93a3e1a5
SHA512a0c880fdac16353bfe652ff9101a7f6e50f6288bfdc6fc83917d78d1c05d7c8fa9525a5de8795d883eb2b5f855eeaa65cb80b865d415099dd36480fa11caaa89
-
Filesize
743KB
MD5c85b6e8a72c22d7d7a1a69e74dfddad6
SHA134d06d7f38e384ebe1ff790ae0d194c522451df3
SHA2561faa0f0f80574901d24426dec8e8f08d4a195a92e3a983fbaf9a22cde1214af8
SHA512ec4162e545ec9f7968ab48490880a91e9474893e779a244b15ed43f146d061b8e990d6132ac3cb23acf2d85967c16eafb0a2290a86620a72bf9c2b5fa531bfa5
-
Filesize
743KB
MD5c85b6e8a72c22d7d7a1a69e74dfddad6
SHA134d06d7f38e384ebe1ff790ae0d194c522451df3
SHA2561faa0f0f80574901d24426dec8e8f08d4a195a92e3a983fbaf9a22cde1214af8
SHA512ec4162e545ec9f7968ab48490880a91e9474893e779a244b15ed43f146d061b8e990d6132ac3cb23acf2d85967c16eafb0a2290a86620a72bf9c2b5fa531bfa5
-
Filesize
492KB
MD566bae0ef21d1bbd9a2bb7bfe89c9e762
SHA184c2260357973638e919917e1948bb3694b604d1
SHA256356274664ea311d0eb99f9ab5442483542ca964d0e7a9249900267d26e0f63aa
SHA5124e4dda5bce7a50a12fcebc0de9d85417cfe7f4f8e6c039f4e7b1127e059b4b0a1b425bcf91082c5dc61fe724ac69a9d29b5471ff03ae71a04fd36e7173a2d7dd
-
Filesize
492KB
MD566bae0ef21d1bbd9a2bb7bfe89c9e762
SHA184c2260357973638e919917e1948bb3694b604d1
SHA256356274664ea311d0eb99f9ab5442483542ca964d0e7a9249900267d26e0f63aa
SHA5124e4dda5bce7a50a12fcebc0de9d85417cfe7f4f8e6c039f4e7b1127e059b4b0a1b425bcf91082c5dc61fe724ac69a9d29b5471ff03ae71a04fd36e7173a2d7dd
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
446KB
MD5da0eee39485725d0adaa5678f4d1b681
SHA11bd7d3989821d2c92f40a682d6d08a567f5e6da2
SHA256497b29333dcded5d2521b809843febe11b43ee3b6d74588210084deb27a70e70
SHA512a316344340632f4c1391e912e97b747ca648ca3171b259ae24730c68db4d325eafb8eb0c1c8470c058a68099cbc5b702185b738d23a67aa1206484489179eba4
-
Filesize
446KB
MD5da0eee39485725d0adaa5678f4d1b681
SHA11bd7d3989821d2c92f40a682d6d08a567f5e6da2
SHA256497b29333dcded5d2521b809843febe11b43ee3b6d74588210084deb27a70e70
SHA512a316344340632f4c1391e912e97b747ca648ca3171b259ae24730c68db4d325eafb8eb0c1c8470c058a68099cbc5b702185b738d23a67aa1206484489179eba4
-
Filesize
446KB
MD5da0eee39485725d0adaa5678f4d1b681
SHA11bd7d3989821d2c92f40a682d6d08a567f5e6da2
SHA256497b29333dcded5d2521b809843febe11b43ee3b6d74588210084deb27a70e70
SHA512a316344340632f4c1391e912e97b747ca648ca3171b259ae24730c68db4d325eafb8eb0c1c8470c058a68099cbc5b702185b738d23a67aa1206484489179eba4
-
Filesize
446KB
MD5da0eee39485725d0adaa5678f4d1b681
SHA11bd7d3989821d2c92f40a682d6d08a567f5e6da2
SHA256497b29333dcded5d2521b809843febe11b43ee3b6d74588210084deb27a70e70
SHA512a316344340632f4c1391e912e97b747ca648ca3171b259ae24730c68db4d325eafb8eb0c1c8470c058a68099cbc5b702185b738d23a67aa1206484489179eba4
-
Filesize
446KB
MD5da0eee39485725d0adaa5678f4d1b681
SHA11bd7d3989821d2c92f40a682d6d08a567f5e6da2
SHA256497b29333dcded5d2521b809843febe11b43ee3b6d74588210084deb27a70e70
SHA512a316344340632f4c1391e912e97b747ca648ca3171b259ae24730c68db4d325eafb8eb0c1c8470c058a68099cbc5b702185b738d23a67aa1206484489179eba4
-
Filesize
446KB
MD5da0eee39485725d0adaa5678f4d1b681
SHA11bd7d3989821d2c92f40a682d6d08a567f5e6da2
SHA256497b29333dcded5d2521b809843febe11b43ee3b6d74588210084deb27a70e70
SHA512a316344340632f4c1391e912e97b747ca648ca3171b259ae24730c68db4d325eafb8eb0c1c8470c058a68099cbc5b702185b738d23a67aa1206484489179eba4