Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:01
Behavioral task
behavioral1
Sample
1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8N.exe
Resource
win10v2004-20241007-en
General
-
Target
1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8N.exe
-
Size
28KB
-
MD5
226f9c9285d3eeca1f618207796051f0
-
SHA1
649064cc6364a69bf7bdc2b35d2e7dddb5c5f1d3
-
SHA256
1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8
-
SHA512
76ffd6a79924fdb26b19f216155c0f73f29f3d68b2b13de5f2e8fbf018c1e89243bd35e04d8a7578e4f2bc631506a8137d33754a70de44a37e17797c37b9db6e
-
SSDEEP
384:2/mPAVyp+6srYYCk2gNPapIkFpOQGR9zos2clAKLHRN74u56/R9zZwu9f:J4quFCk2LtXOQ69zbjlAAX5e9zR
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 12 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6} {6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E604ACB1-D85C-430b-8AA7-401D6E5FCFBF} {19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{03B71A7E-D0E6-43a4-82D6-45BDEE778EE2} {7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}\stubpath = "C:\\Windows\\{6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}.exe" {77356039-6B1F-48fa-B4FD-435138B6243B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{77356039-6B1F-48fa-B4FD-435138B6243B}\stubpath = "C:\\Windows\\{77356039-6B1F-48fa-B4FD-435138B6243B}.exe" 1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F} {77356039-6B1F-48fa-B4FD-435138B6243B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}\stubpath = "C:\\Windows\\{19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}.exe" {6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}\stubpath = "C:\\Windows\\{E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}.exe" {19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7535A6AB-4B91-4278-B60B-0B9FEDEBE61E} {E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}\stubpath = "C:\\Windows\\{7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}.exe" {E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{03B71A7E-D0E6-43a4-82D6-45BDEE778EE2}\stubpath = "C:\\Windows\\{03B71A7E-D0E6-43a4-82D6-45BDEE778EE2}.exe" {7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{77356039-6B1F-48fa-B4FD-435138B6243B} 1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8N.exe -
Executes dropped EXE 6 IoCs
pid Process 3004 {77356039-6B1F-48fa-B4FD-435138B6243B}.exe 2640 {6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}.exe 2780 {19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}.exe 1876 {E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}.exe 1592 {7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}.exe 2404 {03B71A7E-D0E6-43a4-82D6-45BDEE778EE2}.exe -
resource yara_rule behavioral1/memory/1372-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/1372-1-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x0004000000004ed7-7.dat upx behavioral1/memory/1372-8-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x00090000000173e4-17.dat upx behavioral1/memory/2640-18-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/3004-19-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x0007000000017409-29.dat upx behavioral1/memory/2640-30-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/1876-41-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x000800000001747b-40.dat upx behavioral1/memory/2780-42-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/1876-48-0x0000000000450000-0x0000000000462000-memory.dmp upx behavioral1/files/0x00070000000174ac-52.dat upx behavioral1/memory/1592-53-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/1876-54-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x000700000001752f-64.dat upx behavioral1/memory/1592-65-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\{E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}.exe {19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}.exe File created C:\Windows\{7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}.exe {E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}.exe File created C:\Windows\{03B71A7E-D0E6-43a4-82D6-45BDEE778EE2}.exe {7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}.exe File created C:\Windows\{77356039-6B1F-48fa-B4FD-435138B6243B}.exe 1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8N.exe File created C:\Windows\{6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}.exe {77356039-6B1F-48fa-B4FD-435138B6243B}.exe File created C:\Windows\{19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}.exe {6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}.exe -
Program crash 6 IoCs
pid pid_target Process procid_target 2896 1372 WerFault.exe 30 2832 3004 WerFault.exe 31 2552 2640 WerFault.exe 33 568 2780 WerFault.exe 35 2040 1876 WerFault.exe 37 2836 1592 WerFault.exe 40 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {03B71A7E-D0E6-43a4-82D6-45BDEE778EE2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {77356039-6B1F-48fa-B4FD-435138B6243B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1372 wrote to memory of 3004 1372 1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8N.exe 31 PID 1372 wrote to memory of 3004 1372 1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8N.exe 31 PID 1372 wrote to memory of 3004 1372 1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8N.exe 31 PID 1372 wrote to memory of 3004 1372 1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8N.exe 31 PID 1372 wrote to memory of 2896 1372 1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8N.exe 32 PID 1372 wrote to memory of 2896 1372 1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8N.exe 32 PID 1372 wrote to memory of 2896 1372 1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8N.exe 32 PID 1372 wrote to memory of 2896 1372 1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8N.exe 32 PID 3004 wrote to memory of 2640 3004 {77356039-6B1F-48fa-B4FD-435138B6243B}.exe 33 PID 3004 wrote to memory of 2640 3004 {77356039-6B1F-48fa-B4FD-435138B6243B}.exe 33 PID 3004 wrote to memory of 2640 3004 {77356039-6B1F-48fa-B4FD-435138B6243B}.exe 33 PID 3004 wrote to memory of 2640 3004 {77356039-6B1F-48fa-B4FD-435138B6243B}.exe 33 PID 3004 wrote to memory of 2832 3004 {77356039-6B1F-48fa-B4FD-435138B6243B}.exe 34 PID 3004 wrote to memory of 2832 3004 {77356039-6B1F-48fa-B4FD-435138B6243B}.exe 34 PID 3004 wrote to memory of 2832 3004 {77356039-6B1F-48fa-B4FD-435138B6243B}.exe 34 PID 3004 wrote to memory of 2832 3004 {77356039-6B1F-48fa-B4FD-435138B6243B}.exe 34 PID 2640 wrote to memory of 2780 2640 {6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}.exe 35 PID 2640 wrote to memory of 2780 2640 {6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}.exe 35 PID 2640 wrote to memory of 2780 2640 {6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}.exe 35 PID 2640 wrote to memory of 2780 2640 {6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}.exe 35 PID 2640 wrote to memory of 2552 2640 {6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}.exe 36 PID 2640 wrote to memory of 2552 2640 {6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}.exe 36 PID 2640 wrote to memory of 2552 2640 {6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}.exe 36 PID 2640 wrote to memory of 2552 2640 {6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}.exe 36 PID 2780 wrote to memory of 1876 2780 {19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}.exe 37 PID 2780 wrote to memory of 1876 2780 {19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}.exe 37 PID 2780 wrote to memory of 1876 2780 {19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}.exe 37 PID 2780 wrote to memory of 1876 2780 {19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}.exe 37 PID 2780 wrote to memory of 568 2780 {19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}.exe 38 PID 2780 wrote to memory of 568 2780 {19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}.exe 38 PID 2780 wrote to memory of 568 2780 {19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}.exe 38 PID 2780 wrote to memory of 568 2780 {19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}.exe 38 PID 1876 wrote to memory of 1592 1876 {E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}.exe 40 PID 1876 wrote to memory of 1592 1876 {E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}.exe 40 PID 1876 wrote to memory of 1592 1876 {E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}.exe 40 PID 1876 wrote to memory of 1592 1876 {E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}.exe 40 PID 1876 wrote to memory of 2040 1876 {E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}.exe 41 PID 1876 wrote to memory of 2040 1876 {E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}.exe 41 PID 1876 wrote to memory of 2040 1876 {E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}.exe 41 PID 1876 wrote to memory of 2040 1876 {E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}.exe 41 PID 1592 wrote to memory of 2404 1592 {7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}.exe 42 PID 1592 wrote to memory of 2404 1592 {7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}.exe 42 PID 1592 wrote to memory of 2404 1592 {7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}.exe 42 PID 1592 wrote to memory of 2404 1592 {7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}.exe 42 PID 1592 wrote to memory of 2836 1592 {7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}.exe 43 PID 1592 wrote to memory of 2836 1592 {7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}.exe 43 PID 1592 wrote to memory of 2836 1592 {7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}.exe 43 PID 1592 wrote to memory of 2836 1592 {7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8N.exe"C:\Users\Admin\AppData\Local\Temp\1612300ca20b531ebef8b105a75cce1774c4b6a93a68cb186f36ac3b97a059f8N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\{77356039-6B1F-48fa-B4FD-435138B6243B}.exeC:\Windows\{77356039-6B1F-48fa-B4FD-435138B6243B}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\{6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}.exeC:\Windows\{6D0749C0-D75F-4928-9A1B-2C6BF1A78D5F}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\{19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}.exeC:\Windows\{19AE3F3F-57CD-4ea9-8A9A-2B0908C8EDC6}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\{E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}.exeC:\Windows\{E604ACB1-D85C-430b-8AA7-401D6E5FCFBF}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\{7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}.exeC:\Windows\{7535A6AB-4B91-4278-B60B-0B9FEDEBE61E}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\{03B71A7E-D0E6-43a4-82D6-45BDEE778EE2}.exeC:\Windows\{03B71A7E-D0E6-43a4-82D6-45BDEE778EE2}.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 2527⤵
- Program crash
PID:2836
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 2526⤵
- Program crash
PID:2040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 2525⤵
- Program crash
PID:568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 2524⤵
- Program crash
PID:2552
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 2523⤵
- Program crash
PID:2832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 2522⤵
- Program crash
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5ec219cf4e22193c104e90f7f200cd811
SHA17bdeb07b9236593e8d90fe778ab765a0dc7e694f
SHA2567a118b0ebc02a115ba628329378e6bf282b341d3ac17feee6d457f4d31632584
SHA5122a3bac5ae09cb69ca33c1494930c3dd9ac3882959512059cffda11abc1644fbac6cf044a755fb103d49f3095d00ee29d32d44726585484a9b0a2aceaa35f149b
-
Filesize
28KB
MD5ffe2a68b2071d2e8ad3cb9a8e346e1fa
SHA1ce67986a881313fed9529d644ea5003060df900f
SHA2562fe3a12a3b58bc4499e481916035faa80911b4698d1ef225b4af1957ae0ac463
SHA512a64ba3f5fc615dd6dd611203da5a7dd753959cd7a00cd7f9b12bb26ba5444afd4d38a44eaa4edab5020f475d4f53fe686e506c8cd7a57bef1af26b0c2def3e4a
-
Filesize
28KB
MD5ca561f202d28d3de741fc61c3c7ec926
SHA16abb084aa27166ae9c9921d62c26cdef33ce968a
SHA2568e64765fb27a7c681e8232afbc3e948edeb4b24ef2f32c980e18d8c0f92b4b59
SHA5123194c03e098be6465a524ab0e3da0fe0eea23171be09971d5653add314d47c4a9214f4d5aa318212e7be2fd8a2002055e12feacc16e6abe772b8ab7f4c5b0f1a
-
Filesize
28KB
MD5d52692b1fcbc8e45ab96ef58f1307372
SHA145333d7eb16cfe1b1789dc0be3a62b520eb260fc
SHA2566c5df9c0c8eb2b20a58a211039d91bb031ee04345b53bb9d9fa0c94e279ef008
SHA512a3c0e04e9f77d9b1ad3d19e1d4bdbb5fa7147f85a795d0ca1930cb9635bd038a0bb2fdea85a47984ff97b773bd2bc2c98fc07ccf082d3981a7588997f3259582
-
Filesize
28KB
MD515ae5c9702b3bd648c90d27974794984
SHA12886778ea97829e2cbae8940e4ae65812b847647
SHA256cd944173c865ee94cd211d3bc47655bfe2306a74078f6cfc7ac016d4940151e1
SHA512e9addbb588563fa003e4ce8748b0a44580f37522e7d9cb71c27a3ce5a66cca228821abd5d6c71f4ed5fbbd8fa9e123e9738130094b71d5ee496fa22901a5412b
-
Filesize
28KB
MD50ede80e0490b32697b956f4b68f464e9
SHA167057a4132671a0fd49371bd8dcc01fc9e535cf7
SHA2563cff750db05ed82d2dae6a8b0c84bd445444252412c56808266c2b1d3cc7a69d
SHA512835cdb947b45a0bd5fb0d68cf24a4e89b554ca255806d99142fb38869a2915ac857528e20592e6ea40354c6f3d7d78dfce0d207410c09e5845094b1ded1f2984