Analysis
-
max time kernel
115s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2025, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe
Resource
win7-20240903-en
General
-
Target
620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe
-
Size
2.0MB
-
MD5
10ff87f8fabc6154f9a370f7fd17f928
-
SHA1
8dcfbb5f1793861d917c38d77b241f2c73f7344b
-
SHA256
620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051
-
SHA512
e7ca4a43bf8eb6fd06d180d7d4befb42887020f626c088616627f35362fb549689594a0425deb86a778067ae102219cb299677d6802ddcc8d555da9032a9bf9e
-
SSDEEP
24576:YIWvTgWtxIEUy/N3VfEj2kiGJrgnhU66dtZyXSt1Q65bNAJO4f6/NJmlEUDAS9gm:YIWTxhVG7ohU665Y0JbNm8mkjYLyu
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3744 2260 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1472 2260 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2728 2260 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4984 2260 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3000 2260 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 216 2260 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1232 2260 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3664 2260 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 112 2260 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2724 2260 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2928 2260 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2128 2260 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 2260 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4324 2260 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3172 2260 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3708 2260 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4564 2260 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3552 2260 schtasks.exe 82 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe -
Executes dropped EXE 1 IoCs
pid Process 744 spoolsv.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Windows NT\spoolsv.exe 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe File created C:\Program Files (x86)\Windows NT\f3b6ecef712a24 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\L2Schemas\System.exe 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe File opened for modification C:\Windows\L2Schemas\System.exe 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe File created C:\Windows\L2Schemas\27d1bcfc3c54e0 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe File created C:\Windows\PolicyDefinitions\it-IT\sihost.exe 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe File created C:\Windows\PolicyDefinitions\it-IT\66fc9ff0ee96c2 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe File created C:\Windows\System\unsecapp.exe 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe File created C:\Windows\System\29c1c3cc0f7685 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2612 PING.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2612 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4324 schtasks.exe 4564 schtasks.exe 3552 schtasks.exe 3744 schtasks.exe 3000 schtasks.exe 112 schtasks.exe 2128 schtasks.exe 2736 schtasks.exe 2724 schtasks.exe 3708 schtasks.exe 1472 schtasks.exe 216 schtasks.exe 3664 schtasks.exe 2928 schtasks.exe 3172 schtasks.exe 2728 schtasks.exe 4984 schtasks.exe 1232 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe Token: SeDebugPrivilege 744 spoolsv.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3332 wrote to memory of 4680 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 101 PID 3332 wrote to memory of 4680 3332 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 101 PID 4680 wrote to memory of 440 4680 cmd.exe 103 PID 4680 wrote to memory of 440 4680 cmd.exe 103 PID 4680 wrote to memory of 2612 4680 cmd.exe 104 PID 4680 wrote to memory of 2612 4680 cmd.exe 104 PID 4680 wrote to memory of 744 4680 cmd.exe 105 PID 4680 wrote to memory of 744 4680 cmd.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe"C:\Users\Admin\AppData\Local\Temp\620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qQl0OSbWT6.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:440
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2612
-
-
C:\Program Files (x86)\Windows NT\spoolsv.exe"C:\Program Files (x86)\Windows NT\spoolsv.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:744
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 7 /tr "'C:\Windows\System\unsecapp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Windows\System\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 5 /tr "'C:\Windows\System\unsecapp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows NT\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows NT\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Default\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Windows\PolicyDefinitions\it-IT\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\PolicyDefinitions\it-IT\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 6 /tr "'C:\Windows\PolicyDefinitions\it-IT\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Windows\L2Schemas\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\L2Schemas\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Windows\L2Schemas\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d10516" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\AppData\Local\Temp\620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d10516" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\AppData\Local\Temp\620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3552
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173B
MD50ed5d56d8584504519579d98dc554462
SHA1b3af7b167c5d611ffef2d0a098e77dbc9c4afa00
SHA256e6f37b3cbfe39a0ced8e9bd667e4af9de33fd60dc9ff490625d801498d11e564
SHA512a4508c3c10b5c9df5c11530e2738f480bcea4532aaf656246df5875d8e398e7013d324b6dd49139de695ceffc35753a82412fb33357cbacf396ae4777d247848
-
Filesize
2.0MB
MD510ff87f8fabc6154f9a370f7fd17f928
SHA18dcfbb5f1793861d917c38d77b241f2c73f7344b
SHA256620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051
SHA512e7ca4a43bf8eb6fd06d180d7d4befb42887020f626c088616627f35362fb549689594a0425deb86a778067ae102219cb299677d6802ddcc8d555da9032a9bf9e