Analysis
-
max time kernel
130s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
build.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
build.exe
Resource
win10v2004-20241007-en
General
-
Target
build.exe
-
Size
1.6MB
-
MD5
0a8711fa1cb4189ab364c217db5f3620
-
SHA1
94ee709ab608d9d4ed6143a1deae85dd9fd812b3
-
SHA256
437c785b2093ffb955f17d63758cfb10e741509415cc55de8050e2d918716a4a
-
SHA512
8176f9534103704ef3b28ed2c5ab5f79cc7a19ee535017a763727b365d7825d3bb2ddf9a9fc3eae13eac4e3cfa95ce6887362d564db2c0440d0dab5cfdb1ebab
-
SSDEEP
24576:Y/WWf67etHLvLdh+dLNuK5imSFRWct3BfA59jACSr6ggTan9mTYdGvhH0WygS:Uf66tXdh+147YcXIfUCc6bG9DgS
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 956 created 3376 956 Defensive.pif 55 PID 956 created 3376 956 Defensive.pif 55 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation esrjzvdhf.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Defensive.pif -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MusesSync.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MusesSync.url cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2544 esrjzvdhf.exe 956 Defensive.pif -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QuickTextPaste = "C:\\Users\\Admin\\Pictures\\QuickTextPaste\\Bin\\QuickTextPaste.exe" build.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1412 tasklist.exe 2572 tasklist.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3236 set thread context of 1764 3236 build.exe 89 -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\AspnetPull esrjzvdhf.exe File opened for modification C:\Windows\BerlinEase esrjzvdhf.exe File opened for modification C:\Windows\MalesMotors esrjzvdhf.exe File opened for modification C:\Windows\BernardSamples esrjzvdhf.exe File opened for modification C:\Windows\EvaluationsVitamins esrjzvdhf.exe File opened for modification C:\Windows\LecturesGenerations esrjzvdhf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Defensive.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language esrjzvdhf.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings Defensive.pif -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1408 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1764 csc.exe Token: SeDebugPrivilege 1412 tasklist.exe Token: SeDebugPrivilege 2572 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 956 Defensive.pif 956 Defensive.pif 956 Defensive.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 956 Defensive.pif -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3236 wrote to memory of 1764 3236 build.exe 89 PID 3236 wrote to memory of 1764 3236 build.exe 89 PID 3236 wrote to memory of 1764 3236 build.exe 89 PID 3236 wrote to memory of 1764 3236 build.exe 89 PID 3236 wrote to memory of 1764 3236 build.exe 89 PID 2544 wrote to memory of 3284 2544 esrjzvdhf.exe 93 PID 2544 wrote to memory of 3284 2544 esrjzvdhf.exe 93 PID 2544 wrote to memory of 3284 2544 esrjzvdhf.exe 93 PID 3284 wrote to memory of 1412 3284 cmd.exe 95 PID 3284 wrote to memory of 1412 3284 cmd.exe 95 PID 3284 wrote to memory of 1412 3284 cmd.exe 95 PID 3284 wrote to memory of 1124 3284 cmd.exe 96 PID 3284 wrote to memory of 1124 3284 cmd.exe 96 PID 3284 wrote to memory of 1124 3284 cmd.exe 96 PID 3284 wrote to memory of 2572 3284 cmd.exe 97 PID 3284 wrote to memory of 2572 3284 cmd.exe 97 PID 3284 wrote to memory of 2572 3284 cmd.exe 97 PID 3284 wrote to memory of 1208 3284 cmd.exe 98 PID 3284 wrote to memory of 1208 3284 cmd.exe 98 PID 3284 wrote to memory of 1208 3284 cmd.exe 98 PID 3284 wrote to memory of 696 3284 cmd.exe 99 PID 3284 wrote to memory of 696 3284 cmd.exe 99 PID 3284 wrote to memory of 696 3284 cmd.exe 99 PID 3284 wrote to memory of 2804 3284 cmd.exe 100 PID 3284 wrote to memory of 2804 3284 cmd.exe 100 PID 3284 wrote to memory of 2804 3284 cmd.exe 100 PID 3284 wrote to memory of 4368 3284 cmd.exe 101 PID 3284 wrote to memory of 4368 3284 cmd.exe 101 PID 3284 wrote to memory of 4368 3284 cmd.exe 101 PID 3284 wrote to memory of 956 3284 cmd.exe 102 PID 3284 wrote to memory of 956 3284 cmd.exe 102 PID 3284 wrote to memory of 956 3284 cmd.exe 102 PID 3284 wrote to memory of 3128 3284 cmd.exe 103 PID 3284 wrote to memory of 3128 3284 cmd.exe 103 PID 3284 wrote to memory of 3128 3284 cmd.exe 103 PID 956 wrote to memory of 2200 956 Defensive.pif 104 PID 956 wrote to memory of 2200 956 Defensive.pif 104 PID 956 wrote to memory of 2200 956 Defensive.pif 104 PID 956 wrote to memory of 4352 956 Defensive.pif 106 PID 956 wrote to memory of 4352 956 Defensive.pif 106 PID 956 wrote to memory of 4352 956 Defensive.pif 106 PID 2200 wrote to memory of 1408 2200 cmd.exe 108 PID 2200 wrote to memory of 1408 2200 cmd.exe 108 PID 2200 wrote to memory of 1408 2200 cmd.exe 108 PID 956 wrote to memory of 3400 956 Defensive.pif 109 PID 956 wrote to memory of 3400 956 Defensive.pif 109 PID 956 wrote to memory of 3400 956 Defensive.pif 109
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Electronics" /tr "wscript //B 'C:\Users\Admin\AppData\Local\DataSync Dynamics\MusesSync.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Electronics" /tr "wscript //B 'C:\Users\Admin\AppData\Local\DataSync Dynamics\MusesSync.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1408
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MusesSync.url" & echo URL="C:\Users\Admin\AppData\Local\DataSync Dynamics\MusesSync.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MusesSync.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\esrjzvdhf.exeC:\Users\Admin\AppData\Local\Temp\esrjzvdhf.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Demo Demo.cmd & Demo.cmd2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"3⤵
- System Location Discovery: System Language Discovery
PID:1124
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"3⤵
- System Location Discovery: System Language Discovery
PID:1208
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 884733⤵
- System Location Discovery: System Language Discovery
PID:696
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "partitionhansenincorporatemichigan" Classics3⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Mat + ..\Customize + ..\Downloadcom + ..\Damn + ..\Stylus + ..\Guarantees + ..\Directories + ..\Alice + ..\Pros + ..\Graham T3⤵
- System Location Discovery: System Language Discovery
PID:4368
-
-
C:\Users\Admin\AppData\Local\Temp\88473\Defensive.pifDefensive.pif T3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\luqfyjuuhgl.vbs"4⤵
- System Location Discovery: System Language Discovery
PID:3400
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:3128
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD54d0d6dd480c91bdec5002e212ca244a6
SHA1176c3afde39aa7752e0ee6134d5b6a936351e261
SHA25668399665297a0cf6f751edfb2e6316243098c67399707edc4af61be73d3710da
SHA5124c4889a39051451e58447e12db5695b864612b19eeac674b0b953afa9966089b58012ddc7df842b98db160aa7678a5d4b3180b15d829c58f7c3d791332f48326
-
Filesize
921KB
MD578ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
Filesize
705KB
MD5c07a747a9552773a0bdff8375d948b57
SHA1228d0f5dbde64fc497174b1c176d4f0ec662b6a1
SHA25600123d49066976c9216b71f21f3c95741aa07106b2dc466f019b88b260abcdca
SHA5123b7e79c101b091a71773f92cddd8fc974f6b3126b6f3ae0a97960c3f4172cae8d0a5ecd5625710d23a2e20095113491d3de8bc28ccbec3f227c274f4effebab9
-
Filesize
51KB
MD552843c2df6d700e0aba1d0df9f202fb9
SHA1a27e94dfd46b2f549ad3cd7197412ea927dd7ec5
SHA2564c647629a430738de5ea001349ae0bef7959d1092c15b817986e434511e861e5
SHA512921e39e597a696752c8f05c3fc0d77d45b3112fe0d17423b2a38fbbb9679eb9e1ac57984d0fd29f83899f72fad709782411a753b14c881b72c1df2957bfe407a
-
Filesize
902KB
MD5944015392b1ef8ea2364f1d913a8d367
SHA195316236e809a9359a706039204023bb2597f393
SHA2567c0923d0ed5c9e3001a50af389917fb68668a7623d38f24d0b1971a8356b7cf5
SHA512636900c5965a2cf9ad1b20015781291e6b2a6be6ad0e365b265d7bae169071cc3190996aa0c1ebf523a5df70c8de13294ca16152370455cd8708e4c6238fbfd4
-
Filesize
18KB
MD56eee642c2a3a260e5b43d2a8fcc02aba
SHA15cfdf735055bfc8c277cf17fa093fb4d405cc13a
SHA256861fdb83e5ed3364badbce2c7bfef06539b33b06322d5173ccacf7499af0277c
SHA512a8fda3e8cc7abc9655dd78b1a77b9f01357020c1d8c16722c2aa7bc4dfda3281150c164944f5b1ec5dd351f2060ab99c307d8d7fa0068bd473cce8e6af2142ae
-
Filesize
69KB
MD50a4dc3ca733d59e7496db826225b536e
SHA1c32be7d49f3f3304d85bbbbc5b9f80569dc47b6b
SHA25694b64a54b5ca33595336ab26e7f9ef202bad80dd032adbcab1cdd9a61fdb77f0
SHA512b57588f88aa5c03fc9f9410ef1b48f2ed48b5348f2f4fb51e8fea140e510ddd5bcfc357174f6c4bfe5e263277717bb0e6f68f60c8693fc6e90616f5412b07046
-
Filesize
86KB
MD564639f96913ff071951cab604e88e681
SHA19b6939623303d88974e05279bce0797a7931b58b
SHA256d311891a25ee2b52b14475b774d42313965fc112b81fd3b85d9a38c9d9368b8c
SHA512192acb4c34353baae70ba5681e0a1c7517ed0c36a52231a16478e3249e34ac9f064ada34c8ee3ce6f818330bf134867fb5c0a048745218702d783c266e62a63f
-
Filesize
7KB
MD5595a2fefa8bf265ad9f21ec518957c65
SHA1a2f91c896bd2fadbb240aa1f72ae2543c5bc3444
SHA2562b9d14702f75f3712a4224c45ae3356dfca5c6814b7963b45d3fd0153f82535a
SHA51249f0af57f7665ad80a1bbac54bbc84a274fce94d0847181e1e19b348a0a09d5fd2147ac725395f4fc039ffa1c6c05a3b29140fab7950172b3afe6dc3eef75279
-
Filesize
67KB
MD5ac59c10a1ea58112f67d9199bceffcc6
SHA12bd97cd63741ae92ee14c58f2de8aef371345076
SHA2567db329a128907cc4fae0136382e6565b4b93af333464a26b73a73ce14bb0afa4
SHA512cd99a3b217ee6c752184d81b7cee377746e0cd7476bc5e300bbeaca1552d02cc8d07b802001332f465f4e2e32934c844e31660d9bc77d54ba6f76dcedfda51d4
-
Filesize
83KB
MD54866b5d6ac3d74c8eebc7c6ff7c26a03
SHA1ce12149d7709fd0034413cd4c98d11e682734996
SHA256d7cb3ed23589aa6d4dfcf7379d3fb72b338ab1b27c18a1a80851a4e8eb61b8b8
SHA5126d1e85d8e200d35f597d0640c00c9a5fbed34e755eccbc78dce928c0b356a9eaeec16b8f40172408f539adf5dbf9dc542b1b48d5bbc9feb6edbe10f8dd26e6c8
-
Filesize
62KB
MD58d5698baf31358d4a2093b7b8de7af12
SHA1de9cf768ac00a6e3296a0f1e5a9f357d3a94abbf
SHA256d074272cda941ae39748b778802a0077db27db94b36b6c1646b29a865485c921
SHA5126fad82c67bfe5f7e6015fd1121ae56ef0baf0db237587cb5cf6e8b38c5fcd3ea045956840016df5d8d6cae26e2ca3d9cff3a68790929776c51baf012d916e345
-
Filesize
74KB
MD5ac78f4295147dd78728b3cd885994601
SHA102ad7e59305d597d2d124aadb0114a54d9e93131
SHA2560068dd4901e587275a2f8212baecc921105727c2a7172f9c34fd374bf1d28aca
SHA512a5e8c1bc1ddea9976c2e783c23f4b012fd4424226f79a09c5a85e5cf47834e54d4adf55c25bc1dc67295880546fa88cc205f2d97f87c3cfe4f7cd962f2b8f710
-
Filesize
64KB
MD5b9db27b33ba9766e06f74ba1f1cb6bf5
SHA1cce86321f146261b8346f1b733a404fc0056bd42
SHA256819ee9026d354cb095977ed0dbb712ef57defd58b7049479f2d510021fee2f72
SHA51250ecfe14d5660c8e48963920678e41d0d7cd7059acd39221a3922b24164586bdb56c43fe263180beda6f568c4be7675d8228a4af7e3d0413e4a693a629203ee1
-
Filesize
92KB
MD5ebf80a135ff0e39e78e85797d890b97b
SHA19ed47495858f2b7c11f5fb0586f4f4209cddab85
SHA256b99898ed2f34a33a84b235ce4b8c6c260814c3b3b547b38400f82bfe6c89262b
SHA5126a1960cd692d9ea90c3de0964c592ad6d4a6b5597869f748174760feb69d73f51e2e19177083139e339acd961bd3b7c78eaa9fa871db6c519eb90e724a8d5869
-
Filesize
57KB
MD5b8a70405aeb003272ebe394ef1eb4a7d
SHA1edd8ec3d3fe6b6c99ac5c7e98ef260e1301fa54b
SHA256c972fc290924db797196796c434f5a24ede99fdf80e551a5dc3a06e3975057ab
SHA512129df6a35b6bcbbbedcbb34c422138bd0b1d989ccbbf32a0166930e382ea38123ee4c311f199e909c8bf884891c0bd8f817d89d3e587b35e2635588364bd4ceb
-
Filesize
1.2MB
MD58b55759c053ec89dc1eae85d043441a9
SHA1af350e100dc7178de3bc1c166599e99ae29268ee
SHA256b66989ce2388271f471e38dd4f8cca5da3a47663dcb253e77e464ac7328c1a32
SHA512c4815afd42a620201c34aa7dae33990ae085fd76ce181a9e2b1bd2fbdb7e9841495f96b56f03a5bba818f95df61df8d809fe25aa623274257ce14da78d2b627a
-
Filesize
532B
MD57d3ed13274eb9a14df3c4388cb931249
SHA148e534277a02f681ed7362dec2f5d82f4240dbae
SHA25697780177771721edb454802e051c5cf38ad9d52f46f5f993c7980d07d6a10f23
SHA512790c9977c4da94bc6936885b825c1d1fac46ca028654fba5637e2e16ca657a552aa6f7ae50da1dc731bcb0de74b709fc3fb01cf334544010f8d396a44e916b73