Analysis
-
max time kernel
150s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
ececb8cf9b9572194d177dfcf04bacc1.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ececb8cf9b9572194d177dfcf04bacc1.exe
Resource
win10v2004-20240508-en
General
-
Target
ececb8cf9b9572194d177dfcf04bacc1.exe
-
Size
17.4MB
-
MD5
2e35c910027a4efcb1133d3247b146e4
-
SHA1
badabb1d85624d6b8380d1b2c7bfd0f47aa29610
-
SHA256
e20a540b3319728685a2209c51aaeee663ee6b73268e024d0b73325bc2f53325
-
SHA512
4d1d502fde4fcfb5bcac0f2d902e7f558f67c44c47557fbbce7861e1d0cd78891699ec0823620bfe422a82df89cfd20b5720dbdc4ff8635eff1bfb5fed08345e
-
SSDEEP
393216:4d196AAUJxsQ2EqcfKRBV7bmglq+xEKD7lguFkzsfYDjuowte:yfDJ2CKHVJPBga/YDX
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1840 ececb8cf9b9572194d177dfcf04bacc1.exe 1840 ececb8cf9b9572194d177dfcf04bacc1.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1840 ececb8cf9b9572194d177dfcf04bacc1.exe 1840 ececb8cf9b9572194d177dfcf04bacc1.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 4252 msedge.exe 4252 msedge.exe 956 msedge.exe 956 msedge.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 208 identity_helper.exe 208 identity_helper.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2312 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2312 taskmgr.exe Token: SeSystemProfilePrivilege 2312 taskmgr.exe Token: SeCreateGlobalPrivilege 2312 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 956 msedge.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe 2312 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 956 wrote to memory of 3936 956 msedge.exe 89 PID 956 wrote to memory of 3936 956 msedge.exe 89 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 1908 956 msedge.exe 90 PID 956 wrote to memory of 4252 956 msedge.exe 91 PID 956 wrote to memory of 4252 956 msedge.exe 91 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92 PID 956 wrote to memory of 2184 956 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ececb8cf9b9572194d177dfcf04bacc1.exe"C:\Users\Admin\AppData\Local\Temp\ececb8cf9b9572194d177dfcf04bacc1.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2312
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.bing.com/search?q=rpvymf.exe rpvymf.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8009846f8,0x7ff800984708,0x7ff8009847182⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,16165805559635745987,5393477418440636652,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,16165805559635745987,5393477418440636652,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,16165805559635745987,5393477418440636652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,16165805559635745987,5393477418440636652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,16165805559635745987,5393477418440636652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,16165805559635745987,5393477418440636652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,16165805559635745987,5393477418440636652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3800 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,16165805559635745987,5393477418440636652,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,16165805559635745987,5393477418440636652,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4572
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
5KB
MD53e3f135f56d1ba6b5135fadc8a91d919
SHA15b4a6afb9f727509a20d95c88cf41992b1be303e
SHA256b9038b1bb5e15fdf1768a6cc3a95d3c13873dee4cafa8e6a99c8a2648150011a
SHA5125b6e39b9d6480d17be6b5e9daceebe9da26e4434dd792cf7801c19b2d8c8ec909939c076dd4634b673e0bdd39a8f621336415d37f6ff440233fe3672918082c3
-
Filesize
6KB
MD54754b1bfb8d7ad833ca77a1bc289d5e1
SHA13fc3a1bf1ca879b8a551ee9a54fa6029a367ccd6
SHA256813179cf0995500f9b2f291f30270c58a800ed25682054dc06469eb32fdafc04
SHA512b38685725345cf3ea949a6d1ed91758b05acb813b81a23c8a8b4fbbf5f51679daa3ee006edb97b37c357c68bc1b468ef73424ae4bf4d0c105b92bc51db4a406e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD54459a6fb3dfeaf5e48b484182f281459
SHA19d8ae9dec1b5eda7d556f5403740b5475583e72c
SHA256cc6c3a81c8764e086ca2a8fdb582f5a4461e95dca6f89f8ba47e3dd94d268038
SHA5121d651d08d8cf7df710dd3ce89787910aa8e5fed50e817db6d2eabefae6ff7c9c9414bbcf29cb24d98138d845e1642732bb8bacf3bd057b7736edfe0b74065ee7
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58