Analysis

  • max time kernel
    192s
  • max time network
    227s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    20-02-2022 05:29

General

  • Target

    7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe

  • Size

    200KB

  • MD5

    f137ba372038184053d680941a2da136

  • SHA1

    0ff2395df05c29dceeb23d6cce12798997b47b96

  • SHA256

    7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4

  • SHA512

    9669b187a8aa8f88954765c1fc1c9ad343bbbbda0455e0e15bd86697c23d7e2a649732498b9bd3fc8a0cdb455f57224c40374155b83031a386daec2ad88f5ab7

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html

Family

ryuk

Ransom Note
<html><body><p style="font-weight:bold;font-size:125%;top:0;left:0;"> [email protected] <br> </p><p style="position:absolute;bottom:0;right:1%;font-weight:bold;font-size:170%">balance of shadow universe</p><div style="font-size: 550%;font-weight:bold;width:50%;height:50%;overflow:auto;margin:auto;position:absolute;top:35%;left:40%;">Ryuk</div></body></html�������������������������������������������������������������������������������������������������������������������������������������������������������

Extracted

Path

C:\Users\Admin\AppData\Local\Adobe\Color\Profiles\RyukReadMe.html

Family

ryuk

Ransom Note
[email protected] balance of shadow universe Ryuk

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe
    "C:\Users\Admin\AppData\Local\Temp\7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Users\Admin\AppData\Local\Temp\lrZYmvq.exe
      "C:\Users\Admin\AppData\Local\Temp\lrZYmvq.exe" 8 LAN
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4256
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\*" /grant Everyone:F /T /C /Q
        3⤵
        • Modifies file permissions
        PID:4556
      • C:\Windows\SysWOW64\icacls.exe
        icacls "D:\*" /grant Everyone:F /T /C /Q
        3⤵
        • Modifies file permissions
        PID:4568
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c vssadmin.exe Delete Shadows /all /quiet
        3⤵
          PID:2828
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
          3⤵
            PID:3684
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "audioendpointbuilder" /y
              4⤵
                PID:2144
            • C:\Windows\SysWOW64\net.exe
              "C:\Windows\System32\net.exe" stop "samss" /y
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:3188
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "samss" /y
                4⤵
                  PID:1048
              • C:\Windows\SysWOW64\net.exe
                "C:\Windows\System32\net.exe" stop "samss" /y
                3⤵
                  PID:920
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "samss" /y
                    4⤵
                      PID:464
                • C:\Windows\SysWOW64\net.exe
                  "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4576
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                    3⤵
                      PID:3344
                  • C:\Windows\SysWOW64\net.exe
                    "C:\Windows\System32\net.exe" stop "samss" /y
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1580
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop "samss" /y
                      3⤵
                        PID:2044
                    • C:\Windows\SysWOW64\icacls.exe
                      icacls "C:\*" /grant Everyone:F /T /C /Q
                      2⤵
                      • Modifies file permissions
                      PID:4384
                    • C:\Windows\SysWOW64\icacls.exe
                      icacls "D:\*" /grant Everyone:F /T /C /Q
                      2⤵
                      • Modifies file permissions
                      PID:2812
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c vssadmin.exe Delete Shadows /all /quiet
                      2⤵
                        PID:3116
                      • C:\Windows\SysWOW64\net.exe
                        "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2152
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                          3⤵
                            PID:4452
                        • C:\Windows\SysWOW64\net.exe
                          "C:\Windows\System32\net.exe" stop "samss" /y
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4760
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop "samss" /y
                            3⤵
                              PID:1980
                          • C:\Windows\SysWOW64\net.exe
                            "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1532
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                              3⤵
                                PID:2004
                            • C:\Windows\SysWOW64\net.exe
                              "C:\Windows\System32\net.exe" stop "samss" /y
                              2⤵
                              • Suspicious use of WriteProcessMemory
                              PID:4108
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 stop "samss" /y
                                3⤵
                                  PID:1608
                              • C:\Windows\SysWOW64\net.exe
                                "C:\Windows\System32\net.exe" stop "samss" /y
                                2⤵
                                  PID:3716
                                  • C:\Windows\SysWOW64\net1.exe
                                    C:\Windows\system32\net1 stop "samss" /y
                                    3⤵
                                      PID:4436
                                  • C:\Windows\SysWOW64\net.exe
                                    "C:\Windows\System32\net.exe" stop "samss" /y
                                    2⤵
                                      PID:3680
                                      • C:\Windows\SysWOW64\net1.exe
                                        C:\Windows\system32\net1 stop "samss" /y
                                        3⤵
                                          PID:644

                                    Network

                                    MITRE ATT&CK Enterprise v6

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_e269d2c1-0edf-4391-ac7b-818b8e88b04f

                                      MD5

                                      93a5aadeec082ffc1bca5aa27af70f52

                                      SHA1

                                      47a92aee3ea4d1c1954ed4da9f86dd79d9277d31

                                      SHA256

                                      a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294

                                      SHA512

                                      df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45

                                    • C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp.RYK

                                      MD5

                                      1a785c12981bd5fa2cdcb1e606f003a0

                                      SHA1

                                      5fb77ac50356ef45cdba80d07093e99f589880c7

                                      SHA256

                                      7af9232e62601fb5636e66b81c9bd6b8cbabb5765aba18c144cf0a454a7c7616

                                      SHA512

                                      766586b2bb41218b53b4774ae192e1ae5150b5340f77ce46d1753ea2ac10e35af8a8e791b1f38dff591431a876ec2acdccf540c86bff7ce614076b05c4c74f85

                                    • C:\Users\Admin\.oracle_jre_usage\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\3D Objects\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Adobe\Acrobat\DC\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents.RYK

                                      MD5

                                      5c8773c7f4dc6c6912911383a781db08

                                      SHA1

                                      176172d6ac4c6521689bb7ffd672326d61d806d1

                                      SHA256

                                      5e37df0a31320399ee449ab48b0ac965a8382078570c688697534efcfce645a0

                                      SHA512

                                      fea515af8ffa06c839508a4507fb0967709cc36d509eaff7832243e9bad9531456cc9b595cfe5d8db58f768f16e1c231056e7dcde710c580871f2f3b8972c06b

                                    • C:\Users\Admin\AppData\Local\Adobe\Acrobat\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Adobe\Color\ACECache11.lst.RYK

                                      MD5

                                      109016c4713c9a5fc7c7f5d724760ff2

                                      SHA1

                                      e691478b7a6ead08bbdc146c57e0380d639d1c67

                                      SHA256

                                      5efe7ed63033f00a7c9131b96b2c0e0f113ee43d1eb4ab23d484c2244842b7a9

                                      SHA512

                                      851a54adcae60cbc82ca92f33c427be142c89d1235e02c04a687067165aea395a83518b6cb301582c2288b58605ef0f465d64c98b9c69bb554d938cf379abc5e

                                    • C:\Users\Admin\AppData\Local\Adobe\Color\Profiles\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Adobe\Color\Profiles\wsRGB.icc

                                      MD5

                                      fdf730ca0931947eb7e95cd87431dffd

                                      SHA1

                                      0440d7110c331382a1fa1124116eed067c0daf43

                                      SHA256

                                      5035dcbb7e9b7da37c0bb6791dfe26c365c57a3f3046e0a3bd850b5ec72ddf36

                                      SHA512

                                      5a76e665a04232cdab6a91a5c760355846e381249307dd73150e55a0f7257e4a588839e85af78f9f09e037a4ca7674c282ed3ae80828560efc3010bb414743e1

                                    • C:\Users\Admin\AppData\Local\Adobe\Color\Profiles\wscRGB.icc.RYK

                                      MD5

                                      ff5f49740537a6a4fc56a8de1a8e5528

                                      SHA1

                                      43bff2080f37293c0190839161bdeb35b7dd1682

                                      SHA256

                                      a1d83a342b12828035334ad642c3c1ba1a80c1d8dc6466c8d74889c0ffec6b4b

                                      SHA512

                                      59f9652d77448d2bbdbc74535960b7028716729516315c1de1605727eaa8bc06017729fac3d543b71ac417be447f4226e18efc113952b80d1107e4b31942f710

                                    • C:\Users\Admin\AppData\Local\Adobe\Color\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Adobe\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Comms\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\USS.jcp

                                      MD5

                                      f27c00cf3468211808b0be3a8bcce717

                                      SHA1

                                      e25003e1955d57ffcda54ccbf291870cd0590fd9

                                      SHA256

                                      00d7e8aae818540b59c15bafbdb84cb55f79a16549b2f8a6a5f565e0771e3ab8

                                      SHA512

                                      65f9c6f366b83f89e9c9cef1107f9e6ab510a75436ce2039f2d1ac13fd533af8f95eb65ad9bfeaa8441a1fa27a89e7fbfcfbc1798efaa288feb306c93e1a6c6e

                                    • C:\Users\Admin\AppData\Local\Google\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\Credentials\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Favicons

                                      MD5

                                      70bdcf4a82632296241783f20cf49885

                                      SHA1

                                      8185a574b0a949ac0627ef0824810d9a2e0f78ed

                                      SHA256

                                      88671bffa2004a00c3dc5a2ef98d4cf4c867fd332b558c8093e28072a25f59e8

                                      SHA512

                                      46509ad2ed4745098736960de7ccdf162f4e33ab35f69d1d69a2d26c06620b25c795114d1d5e5894fe8dec8d70fb3d4a240d8580114d59cad8e54948200dc4ec

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History

                                      MD5

                                      576c98851c85b7674b666d2b7ce48d35

                                      SHA1

                                      1b23bc471e5887f36e76baa45dc6989973cd10fe

                                      SHA256

                                      79b3411ca5fcc9a5e7bafde68df200aa3c8efb5a8bd97a90e6b609e54cdeac37

                                      SHA512

                                      2e8360e00aad9c361df2843085e0877dea5b34d2403a26fc945ebc0aa53f4d3c3f76ff879173b0533657671ca0a0fd834e157cfaaf1a72974836c2f8f9ad64fd

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Login Data

                                      MD5

                                      bb09e7270ab9c6a8bd7ff6b5f3a7f88a

                                      SHA1

                                      e35109ab9ff6c6b896c5ae250f51dca7932da02b

                                      SHA256

                                      73177e39408b2d7adc9a151ac9ad2af96cd190f880aa404376a577c085bd0e57

                                      SHA512

                                      7b938ea99f19159ee3da8a022689b7473c02c4a4ef68947d12fc6fc32cb59f589e2ea0cade24ef143b8f6dedc59d6f818717a6377081ab7e2013d13245b90734

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\README.RYK

                                      MD5

                                      a673be8ffe8c57f0b6f1fc9ab24140b7

                                      SHA1

                                      85b506ebdb97e2c3375dd78274b0bde510d4100c

                                      SHA256

                                      60cbdd4dca783552b78d3f23a735d2234fc6b9112ca2a7557f89318b8fcd13d8

                                      SHA512

                                      55faa18d6fadaa1a1bd01d9b11406485bb9af08a3f30080899180c52cb73f34a96179aae3f9e6005c189d7b223acc68fb32c5c584ee6f75b362669053893f7f2

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Web Data

                                      MD5

                                      30900acf8b900a56743bedb7c75d98c6

                                      SHA1

                                      b8e5b7fda3416bfdc3b7a10e30745f99cfb0c20b

                                      SHA256

                                      8e40858510743513f7ac93a911b095e8ab12c308d607cc86e8eef555ef402b54

                                      SHA512

                                      a61fb627aa71d9f09acbdc72320dd6a3be91e6b45081ab2d113313141e357216de98bca2f88326cb1644f5d50d9362000509d03f62f04bfcf186dedaf538c113

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\Feeds\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\GameDVR\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\History\Low\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\History\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\af-ZA\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\ar-AE\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\ar-BH\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\ar-DZ\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\ar-EG\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\ar-IQ\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\ar-JO\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\ar-KW\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\ar-LB\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\ar-LY\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\ar-MA\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\ar-OM\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\ar-QA\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\ar-SA\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\ar-SY\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\ar-TN\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\ar-YE\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\az-Latn-AZ\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\bg-BG\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\bn-BD\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\ca-ES\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\cs-CZ\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\da-DK\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\de-AT\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\de-CH\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\de-DE\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Microsoft\input\de-LI\RyukReadMe.html

                                      MD5

                                      51b608055d70f58fd8b19a75dd21856a

                                      SHA1

                                      5ca8da66d460c9c4cc6886cd255f603d45f87d10

                                      SHA256

                                      6b8a72627d2eff4de9261d77334d9ec29ca1165b0bfe46ca8a6a63d2f57d14b7

                                      SHA512

                                      f7bef0a90e5aed9a39fc9b52bf41f75498f03041ad424fb668b29ff07d426cbef014c307ae0a725089da7df7f973de2ae17b28bef12d492f2c3b5497a36c3aac

                                    • C:\Users\Admin\AppData\Local\Temp\lrZYmvq.exe

                                      MD5

                                      f137ba372038184053d680941a2da136

                                      SHA1

                                      0ff2395df05c29dceeb23d6cce12798997b47b96

                                      SHA256

                                      7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4

                                      SHA512

                                      9669b187a8aa8f88954765c1fc1c9ad343bbbbda0455e0e15bd86697c23d7e2a649732498b9bd3fc8a0cdb455f57224c40374155b83031a386daec2ad88f5ab7

                                    • C:\Users\Admin\AppData\Local\Temp\lrZYmvq.exe

                                      MD5

                                      f137ba372038184053d680941a2da136

                                      SHA1

                                      0ff2395df05c29dceeb23d6cce12798997b47b96

                                      SHA256

                                      7a7e8077f4096cb5e45597ef6e8e7873a5f13db337383a312cb9e2da374599e4

                                      SHA512

                                      9669b187a8aa8f88954765c1fc1c9ad343bbbbda0455e0e15bd86697c23d7e2a649732498b9bd3fc8a0cdb455f57224c40374155b83031a386daec2ad88f5ab7