Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 02:42
Static task
static1
Behavioral task
behavioral1
Sample
4d20d23691948dafc95270c5d3d979b6.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d20d23691948dafc95270c5d3d979b6.html
Resource
win10v2004-20231215-en
General
-
Target
4d20d23691948dafc95270c5d3d979b6.html
-
Size
86KB
-
MD5
4d20d23691948dafc95270c5d3d979b6
-
SHA1
9543970f94df35271ba3fcf435c19815d9c72b34
-
SHA256
73147c3997d6f1663e760275466b3bfa33781687327dfefe7e41b1205a11e4e2
-
SHA512
80993d890b1139a3b2b619f27e5bf9b477ba74bb6a417ec994ccce61f13b8dc6d5b0bd4d1ca0143fd30e922874d15c681bc48a95d9db9d76a8ff7c25f6cbda46
-
SSDEEP
384:P61ndM9KCuV/x4e4xkJir0rZ0iS4D8dpe1XuJu5+chaix9aO+u/qTDAxkJir0rZa:PC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD45BBF1-AE98-11EE-BF15-464D43A133DD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd769173341890000000002000000000010660000000100002000000027ca96afac834a2ac17521880c40aa52fd77dd61cd4bf095484645612ed36861000000000e8000000002000020000000545bd62b7930602651895d7ca933b649cd8851e70e82ce829b7b241d678458fb200000004d70127cd70ec94fba3c6c76f63261f6d56b117c9b5e76defb13eba3f150d99540000000bf0777cff38a6bb564b1a13bec97639ccf7c4e07e3f190d9c7ea82ac9104bbab8a907807ed6364953421b5a11795bc3fa0a94830294719165e2a0b9830f123ff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd76917334189000000000200000000001066000000010000200000006e0fc5b335ccc184ab83e9030b3241bd2ce1a8e30b95972ee23778ee99cbed48000000000e80000000020000200000008e0b9c4086753a92e0d36368c14ebda92b6e33c1f7db81600a312f18acdbd0eb90000000c832f59b4faec10f128993226aad109a1603182882c42a603d81e53255f59d82cafe3d87bf984dd1d6ceb9f5dac999ed7f547dc1a8896b2da6c6640fb00770a689df7107793933703fe4459f31d13cb449099f647a271319844a3acdaf404f4b6c116ac69fcc1e2b37c4a0823be516c682c3e233ccafb63c1ca766d2ffc881f2a08bd6ff72605a1d1e13951ee945c1fb4000000067964d1ba46cf7ce4176b9679ccc26c4835a3e8559c87a590c450a09e70d67549eb649a61d00eded4527857e264340af571b66d18b14acafe92acb5aa1f5b134 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410930034" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4085e1a8a542da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1752 iexplore.exe 1752 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2712 1752 iexplore.exe 19 PID 1752 wrote to memory of 2712 1752 iexplore.exe 19 PID 1752 wrote to memory of 2712 1752 iexplore.exe 19 PID 1752 wrote to memory of 2712 1752 iexplore.exe 19
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4d20d23691948dafc95270c5d3d979b6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b306b47356d284072d59d950811013e7
SHA1c990ec849ed45865c46928b878a6e658e25c34b6
SHA2567785afb7f1b3408acb4c536ff239027c53afdbbdeb45376a96a0e00bb2c4069c
SHA512438863e8a59f0ccc5a95582a4dce07395893e14741ae4554e7cef12342d6b5c6453e386cb12ddcecb7b54dde9d56b248ac920c33d4bc4329642081c26898f602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea0df1c4e9a35442e75180d1310ed924
SHA1f6c9a74a8dfff444dbcf559821a2e43bc884b517
SHA2568ce2ad9b79b6863fd1e34ea43a41ebdddf84674afb7b9a2c63d172605a21c836
SHA512f69d9c886f2217693da6d8b3e795031309b14db496e0058264f1b770140d2cb4a11a4daf876b015d555cdc5881f96821eb98ed15003fc2498e2cbf6c96e640d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c516cffef3597dcf3627c2da694bbe0
SHA1fe8c7dc8c9994562fc88409bfa92dfd93878c276
SHA2563df51d523bad8e7294a6a07816dfc13798f0af36dc642806ddf2dd896f4a88f9
SHA5125262622fe86de44f2fbc42a32e17610596bc4d9c0413b91e1394b875951e5d56fbc6cc215c36371166db9dabd78ac348fd1881e2b93ebf4b224afda48e521f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b97354c1a36ce1feb68087133875cbf2
SHA1b9573921d9820609d502a054713df1bd179cba76
SHA256c6c28e12cb263255552bcaff833ae003020720e1c9e14a26dda302228162acd0
SHA512054db4375c2ac941f867c13a03275c9c21b7c8888169bd0f8105eb8c3ddcd6158e81e30a226ec3556454c60f796222cc640cea984c5341f2f1490ad1d1a247e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535809736832fab7ca2e31c7161737e94
SHA100f425079f8ac6dffb975a9a0bcee1cdbb90834f
SHA256e4cc369961f34d235188fb471a1d8910935b9f221397e9451a8f17602c635a8a
SHA5127f38c8d9ac1e4611230fa0976a3076f6d62262ff6c0389120d1a657ab9316facd1af803cfc7496bcaac6b757b384854e6623d5513ae37538dded62ae4ac95559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cb1997993ff8745e4e714161859a7fc
SHA186c352f3500f1a89dee95c6a0612c62349b59de3
SHA2563d6d3ce161b037ad6fb54f966f629a0cad5f396c805002872fb80270bbc55c4c
SHA51275090d126d159a9ab9725f66cc24f74a0dfd75af6212968fc9629f782473d459b6f1090ffb56299877c29ad97529207a224634c6bc4433e1106a5a0a668dfaae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5379800289630a0dea86856391a512899
SHA15d586287068b994e887d36707a73d689b65d6418
SHA256ba92120082873b392c9e14fc34a9685d143d4df6e75813daacba947c0523cb73
SHA51217eaca967a4838989750016e4348f037c541bf414af74f888fa6c2540a244bbf8704ef4b26261943c9612f4bca7747aeaa214fbce715363dffd851f0480d9f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7f34d3cb6973d12a7cfc8aaad09cfde
SHA1ad37692ad7c4b9d1574e84789d9f57229e8c7f11
SHA25691b99aa9ece0d45192f217bcc498839f21188c6ba2ef11f264506eed23459262
SHA512f3e144548835c12d4bb2e672b6f16ec6c4e17e6ff6b66c2f8a9624bcb9cd232705bebadeb520f2057837620673953480fa5a0a29c758664a3ed68594a1d77ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdafbc89595414b7fe77aede5bbad94b
SHA151b5c5872e7ad4359714a6579e237d1d569729fc
SHA2567cae2c7d714b366e7a50a2412ebd34048debb0daee4660df78035dd11ca3fc62
SHA5128b8cae6ce93d9f2587b34cef9889f6d7647198536084d354042052d1c53ad20706fb38eb94845e9d7e89a555158a814516ee0063f8af045522895d620538db15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db1fb53c6c93f8bdb375e431d0485ab8
SHA1f7cb39224d37a2b6672b2c60efa91674ec588844
SHA2568b8cec05f2a15ca6c83f6a99bafdf7d65ec2f0e0e37eda795831527fe3d7da80
SHA51232d79bce387662b8694fe884e87cefabe8d022a08540a691e1071deb683ea5891bbc20a4316b844cd563d8494c4a62f24ad931439ca96c170caff48f24a4b32d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dab7718626d20612cecf9a6a4aa348a8
SHA1a2c6a2ac42fce1123f346656ab9d8bff11365df5
SHA256b881f1c07de6f8d969693f4abd08945e2dd330b501d28d70ca6cf92e4bc16147
SHA512f7c02ab59ea8a3996b27f8dc87f19859bf472a222d02eb00cff0c5e0606ad8618e1acb50872e1a67d4869af785bec13baa5c86890317ece84d15b867f069d4e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5792408d8b5d782cc1bddf85675130263
SHA17fbdafd69b361841cbcf56d53201236a19271b06
SHA25683752efdb233ebb00e519e26f39fc8387c585af0a0d39062239eae98e457fbc9
SHA5122a508ebf8a87b9c5bdce0fa5f954ddeeeee639ed89d84479d1039107a81542af4bd167ace38bf48a4beb5084f8c87c7993d11fcb51de7d7892e514d34a0893a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f89e13fc4d0c1ecd1d05f469ad1a25b
SHA1a69c8fdb13989c9883e504e3bd4c9c4470a9df8e
SHA256b773c9856aabc2e5e2ee551b9649adc42c702df0dc152310bbea3c500d19490d
SHA5125180f73cc8778ea2948132462da6f9b64f8d51858f069305c0d0e53df94d02c002017cb1c9b98b9838a75159ef7861f1be0ac1cfbba84a3c17f823121241673d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1ceb1b5ac3f76c75dbf358bafd205e0
SHA1be041b0980a482a2adb0c7f950005782cc839bb5
SHA256a738e26a60156ac0de6da11dc500aa83cf76478bc64fa4eda8f70f4d43e39e0c
SHA512e48c1572d32c536bb8b542723f9999c608812c563ccee8c973a84de92140fb20720aceb3b2e18fb6e7ef2d9925bea61465db1843ea52e4c91b2456974c7a84c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0ad2909f0978e3824c0f1b47de23860
SHA1ef004eb91aed5baad6bf180ca606a8d13dc1bf89
SHA2566fa6a7cc46973fe5e20a4332f171d076e205187b0d869fb8bbdbc6002a3d8d68
SHA512f0bac48e03a10ba6a7858199934aa6c38fe838c45cee289ee53103ad9d14411e4930f78891ebe42bd931f6aca4dd2574d7098b6ec202e70efc1505d189432ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575f9f215be4e4f7ba97ef2f902293928
SHA12a03867965a194bf77a8019d0588d689157f7776
SHA256e0ac52a903a06f534ef1fc10a2dd2000a010ae3090f2d746730251f39c29cfbf
SHA512d2205380ea36ed97592132702f68c1a7f2f3385b24132671d0b238d0f2f92d4f9c7b1bd06e5d809b6af7e02061cbf9e107206f5b9184e88227f1bffdb21d3699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550bf732305efcff64dcf308915b7207c
SHA154acae35f12a89d4ad3b113e8400ab4c71cef1cc
SHA256875284e7f40a68c11e68b5c22e354491f986aaa4e34d047650171d5a3d838832
SHA512275936bec5bd7c497e16f514ff0c12b67724e5c1f25fb41189bb6962cf1255061b56cc5ffd29529e98ee28a65eb2805a819c736bea59fb686fb14c8c32f7c109
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D0I6KXNQ\errorPageStrings[1]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LAJVCBJI\httpErrorPagesScripts[1]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\dnserrordiagoff[1]
Filesize1KB
MD547f581b112d58eda23ea8b2e08cf0ff0
SHA16ec1df5eaec1439573aef0fb96dabfc953305e5b
SHA256b1c947d00db5fce43314c56c663dbeae0ffa13407c9c16225c17ccefc3afa928
SHA512187383eef3d646091e9f68eff680a11c7947b3d9b54a78cc6de4a04629d7037e9c97673ac054a6f1cf591235c110ca181a6b69ecba0e5032168f56f4486fff92
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06