Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 23:27
Static task
static1
Behavioral task
behavioral1
Sample
7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe
Resource
win10v2004-20240802-en
General
-
Target
7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe
-
Size
2.4MB
-
MD5
92aab30246f595aae771e967f8781f64
-
SHA1
53e4b2876eed8bb5a664c48ed45cdfcae8eca3f8
-
SHA256
7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3
-
SHA512
4791b185ff8ee1b42def5a18294ac4fe31798af8c6a32b1464b9fb6c92ad04f01a59ab0c71396a9f4a4e264ae8c71e28c57e33539cd24537ae76d3de4db017e0
-
SSDEEP
24576:x2Jyxf4VR7of2SI8LUlFl5FpW2Jyxt4VR7of2SI8LUlFl5Fp800:Akpy5smcY/pk3y5smcY/m
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4800 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.tmp 2776 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.mm 4420 GOG.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\GOG = "C:\\Windows\\GOG.exe" 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.mm Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GOG = "C:\\Windows\\GOG.exe" 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.mm Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\GOG = "C:\\Windows\\GOG.exe" GOG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GOG = "C:\\Windows\\GOG.exe" GOG.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened (read-only) \??\B: 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\dotnet\dotnet.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\7-Zip\7z.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\GOG.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.mm File opened for modification C:\Windows\GOG.exe 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.mm File created C:\Windows\GOG.exe GOG.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.mm Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.tmp -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\legend of mir2 GOG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\legend of mir2\WinX = "1" GOG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\legend of mir2\NowCount = "0" GOG.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1512 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe 1512 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe 4420 GOG.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1512 wrote to memory of 4800 1512 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe 92 PID 1512 wrote to memory of 4800 1512 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe 92 PID 1512 wrote to memory of 4800 1512 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe 92 PID 1512 wrote to memory of 2776 1512 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe 94 PID 1512 wrote to memory of 2776 1512 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe 94 PID 1512 wrote to memory of 2776 1512 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe 94 PID 2776 wrote to memory of 4420 2776 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.mm 95 PID 2776 wrote to memory of 4420 2776 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.mm 95 PID 2776 wrote to memory of 4420 2776 7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.mm 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe"C:\Users\Admin\AppData\Local\Temp\7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.tmpC:\Users\Admin\AppData\Local\Temp\7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.tmp2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4800
-
-
C:\Users\Admin\AppData\Local\Temp\7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.mmC:\Users\Admin\AppData\Local\Temp\7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.mm /zhj2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\GOG.exeC:\Windows\GOG.exe /zhj3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1288,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=4380 /prefetch:81⤵PID:3156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.mm
Filesize2.3MB
MD5e200ef3d796a314842aace827e6c5c53
SHA1c176ca3a094ae0aeb6e0c38b8ba335d5d0922a0f
SHA256208506288f0a4353d3c34ccf09d3f89bcda03c91d45c0d9c8aa38735da5f004a
SHA51251f0da48a8cae9286d3e56f222e73af7b2b50cf27de13e9cb5394332b193f01a8f2b789904d2fdb9dc8984a1076e98174e84680b6a32262675954439506d4f0c
-
C:\Users\Admin\AppData\Local\Temp\7df0d4df0064b36d6638d22219267765ae38ed67a6408e56cc88f2fb5467d1c3.tmp
Filesize14KB
MD5ad782ffac62e14e2269bf1379bccbaae
SHA19539773b550e902a35764574a2be2d05bc0d8afc
SHA2561c8a77db924ebeb952052334dc95add388700c02b073b07973cd8fe0a0a360b8
SHA512a1e9d6316ffc55f4751090961733e98c93b2a391666ff50b50e9dea39783746e501d14127e7ee9343926976d7e3cd224f13736530354d8466ea995dab35c8dc2