Analysis
-
max time kernel
117s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
29-11-2023 05:05
Static task
static1
Behavioral task
behavioral1
Sample
755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe
Resource
win10v2004-20231127-en
General
-
Target
755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe
-
Size
2.7MB
-
MD5
d6364b4a7155dceb57075a6269b0e2e3
-
SHA1
05553d7e2b28199d2c69c79de9e615307a3c68e4
-
SHA256
755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e
-
SHA512
2b280f4cdac9872b3ba142e30237e5274b80d82dea6ec93f5927c193a5eb166d4f4b5665bc525ecec3acb216d81897b7a6abcd0bc912a1d4938293476d6e820f
-
SSDEEP
24576:chRb0i6yW2ekPl03eaYdsxIxZknqinYaFh678uL1cjioszjaD8LCJeM9G37Xvf:cHoL2e9urKyxyqS6Bcj6iVJVKf
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2444-6-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 4 IoCs
pid Process 2444 svchost.exe 2720 Q°ó²éѯ.exe 2696 Cwgatmx.exe 2576 Cwgatmx.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\P: svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Cwgatmx.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Cwgatmx.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Ssgkso\Cwgatmx.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Ssgkso\Cwgatmx.exe svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe 755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe File created C:\Windows\Q°ó²éѯ.exe 755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Cwgatmx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Cwgatmx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Cwgatmx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FAE0B999-1418-45F0-8E38-17D70B85112E} Cwgatmx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Cwgatmx.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-cb-a2-a0-34-a6\WpadDetectedUrl Cwgatmx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FAE0B999-1418-45F0-8E38-17D70B85112E}\WpadDecision = "0" Cwgatmx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Cwgatmx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FAE0B999-1418-45F0-8E38-17D70B85112E}\WpadDecisionReason = "1" Cwgatmx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-cb-a2-a0-34-a6\WpadDecisionTime = 80fcf0a38122da01 Cwgatmx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Cwgatmx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FAE0B999-1418-45F0-8E38-17D70B85112E}\WpadDecisionReason = "1" Cwgatmx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Cwgatmx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FAE0B999-1418-45F0-8E38-17D70B85112E}\WpadDecisionTime = 80fcf0a38122da01 Cwgatmx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FAE0B999-1418-45F0-8E38-17D70B85112E}\4e-cb-a2-a0-34-a6 Cwgatmx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-cb-a2-a0-34-a6\WpadDecision = "0" Cwgatmx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-cb-a2-a0-34-a6\WpadDecisionTime = 80fcf0a38122da01 Cwgatmx.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Cwgatmx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-cb-a2-a0-34-a6\WpadDecisionTime = c00fd5a88122da01 Cwgatmx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Cwgatmx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Cwgatmx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-cb-a2-a0-34-a6 Cwgatmx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Cwgatmx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FAE0B999-1418-45F0-8E38-17D70B85112E} Cwgatmx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Cwgatmx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Cwgatmx.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FAE0B999-1418-45F0-8E38-17D70B85112E}\WpadNetworkName = "Network 3" Cwgatmx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Cwgatmx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-cb-a2-a0-34-a6\WpadDecisionReason = "1" Cwgatmx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Cwgatmx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-cb-a2-a0-34-a6\WpadDecision = "0" Cwgatmx.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FAE0B999-1418-45F0-8E38-17D70B85112E}\WpadNetworkName = "Network 3" Cwgatmx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Cwgatmx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Cwgatmx.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Cwgatmx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Cwgatmx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Cwgatmx.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Cwgatmx.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Cwgatmx.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Cwgatmx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Cwgatmx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Cwgatmx.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Cwgatmx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Cwgatmx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-cb-a2-a0-34-a6 Cwgatmx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FAE0B999-1418-45F0-8E38-17D70B85112E}\4e-cb-a2-a0-34-a6 Cwgatmx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-cb-a2-a0-34-a6\WpadDecisionReason = "1" Cwgatmx.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FAE0B999-1418-45F0-8E38-17D70B85112E}\WpadDecisionTime = c00fd5a88122da01 Cwgatmx.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FAE0B999-1418-45F0-8E38-17D70B85112E}\WpadDecision = "0" Cwgatmx.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2444 svchost.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1816 755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe 1816 755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe 2444 svchost.exe 2720 Q°ó²éѯ.exe 2720 Q°ó²éѯ.exe 2696 Cwgatmx.exe 2576 Cwgatmx.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1816 wrote to memory of 2444 1816 755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe 28 PID 1816 wrote to memory of 2444 1816 755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe 28 PID 1816 wrote to memory of 2444 1816 755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe 28 PID 1816 wrote to memory of 2444 1816 755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe 28 PID 1816 wrote to memory of 2720 1816 755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe 29 PID 1816 wrote to memory of 2720 1816 755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe 29 PID 1816 wrote to memory of 2720 1816 755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe 29 PID 1816 wrote to memory of 2720 1816 755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe 29 PID 2696 wrote to memory of 2576 2696 Cwgatmx.exe 32 PID 2696 wrote to memory of 2576 2696 Cwgatmx.exe 32 PID 2696 wrote to memory of 2576 2696 Cwgatmx.exe 32 PID 2696 wrote to memory of 2576 2696 Cwgatmx.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe"C:\Users\Admin\AppData\Local\Temp\755ca0a783514a0b3c4f0b11390e56946934fc72bca8a42bc3f9f48ba8d7b52e.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\svchost.exeC:\Windows\\svchost.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2444
-
-
C:\Windows\Q°ó²éѯ.exeC:\Windows\\Q°ó²éѯ.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
C:\Program Files (x86)\Microsoft Ssgkso\Cwgatmx.exe"C:\Program Files (x86)\Microsoft Ssgkso\Cwgatmx.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Microsoft Ssgkso\Cwgatmx.exe"C:\Program Files (x86)\Microsoft Ssgkso\Cwgatmx.exe" Win72⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD573349ed24f69e51ed4e2fde785962152
SHA184ae9257a9aa06aa222bc46cf8fd56f93b8d1631
SHA256b6a7688e126a36caed944a58bd2be541f4f04a155ea49992eb5aaf45c3752f50
SHA512c0c6c1d2213be36430a4d84e795edea7c18b782a6e2d7dfaf2995e7a84f0816876b44b4cc87b2128a337db45221b7bfc511bf25c1153e4fe8e0cf21210c8a8cd
-
Filesize
1.0MB
MD573349ed24f69e51ed4e2fde785962152
SHA184ae9257a9aa06aa222bc46cf8fd56f93b8d1631
SHA256b6a7688e126a36caed944a58bd2be541f4f04a155ea49992eb5aaf45c3752f50
SHA512c0c6c1d2213be36430a4d84e795edea7c18b782a6e2d7dfaf2995e7a84f0816876b44b4cc87b2128a337db45221b7bfc511bf25c1153e4fe8e0cf21210c8a8cd
-
Filesize
1.0MB
MD573349ed24f69e51ed4e2fde785962152
SHA184ae9257a9aa06aa222bc46cf8fd56f93b8d1631
SHA256b6a7688e126a36caed944a58bd2be541f4f04a155ea49992eb5aaf45c3752f50
SHA512c0c6c1d2213be36430a4d84e795edea7c18b782a6e2d7dfaf2995e7a84f0816876b44b4cc87b2128a337db45221b7bfc511bf25c1153e4fe8e0cf21210c8a8cd
-
Filesize
1.1MB
MD51cc84bbe1f55896062505ec3fa9baef0
SHA1db42dbd174297b24ae80ed55b5a0691fb009930a
SHA256c941f71def1ee067f809131c181a82c02c7660e6794b47792530bb2f91a2206a
SHA512fbd97be82815f71b51b0a3d94e19ddbb78bad81f7ec1f10ddb9fe2abba6a925f7229141c5ac061c3c6a421056f5a5b8f10e5c2cddac2a29367c312efb5d1188d
-
Filesize
1.1MB
MD51cc84bbe1f55896062505ec3fa9baef0
SHA1db42dbd174297b24ae80ed55b5a0691fb009930a
SHA256c941f71def1ee067f809131c181a82c02c7660e6794b47792530bb2f91a2206a
SHA512fbd97be82815f71b51b0a3d94e19ddbb78bad81f7ec1f10ddb9fe2abba6a925f7229141c5ac061c3c6a421056f5a5b8f10e5c2cddac2a29367c312efb5d1188d
-
Filesize
1.0MB
MD573349ed24f69e51ed4e2fde785962152
SHA184ae9257a9aa06aa222bc46cf8fd56f93b8d1631
SHA256b6a7688e126a36caed944a58bd2be541f4f04a155ea49992eb5aaf45c3752f50
SHA512c0c6c1d2213be36430a4d84e795edea7c18b782a6e2d7dfaf2995e7a84f0816876b44b4cc87b2128a337db45221b7bfc511bf25c1153e4fe8e0cf21210c8a8cd
-
Filesize
1.0MB
MD573349ed24f69e51ed4e2fde785962152
SHA184ae9257a9aa06aa222bc46cf8fd56f93b8d1631
SHA256b6a7688e126a36caed944a58bd2be541f4f04a155ea49992eb5aaf45c3752f50
SHA512c0c6c1d2213be36430a4d84e795edea7c18b782a6e2d7dfaf2995e7a84f0816876b44b4cc87b2128a337db45221b7bfc511bf25c1153e4fe8e0cf21210c8a8cd
-
Filesize
1.0MB
MD573349ed24f69e51ed4e2fde785962152
SHA184ae9257a9aa06aa222bc46cf8fd56f93b8d1631
SHA256b6a7688e126a36caed944a58bd2be541f4f04a155ea49992eb5aaf45c3752f50
SHA512c0c6c1d2213be36430a4d84e795edea7c18b782a6e2d7dfaf2995e7a84f0816876b44b4cc87b2128a337db45221b7bfc511bf25c1153e4fe8e0cf21210c8a8cd