Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
5b1d4bce6e758979a479a9a4b7340b19.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5b1d4bce6e758979a479a9a4b7340b19.html
Resource
win10v2004-20231215-en
General
-
Target
5b1d4bce6e758979a479a9a4b7340b19.html
-
Size
6KB
-
MD5
5b1d4bce6e758979a479a9a4b7340b19
-
SHA1
fdff2a7d0116b75f218c62567e451e61c48839da
-
SHA256
e2015498d9e30df911306c05d2c53933a373e40f25554d713abd8642baadaf64
-
SHA512
59ac4d7bb2080944431cd34bda0e395e57987bbcc75c7859d9ab3fc59511de599fb4c3160e763da46f429984ec9f1d53dcac25717fc3c577194f81fe12cad181
-
SSDEEP
96:uzVs+ux7ZrXLLY1k9o84d12ef7CSTUsNGdcEZ7ru7f:csz7ZDAYS/bGdb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000c77a0e57cfe80e08707015cc360edba49a2cd8e23b00ed6c946aeb7dd5e1fddd000000000e8000000002000020000000c5933e88851c1bbf6e3c041a6cb9bf0af565e5bb3b860a1a08f8910e03a7805220000000e421e2e7f9cd87d9ba573cc3e003e9526fa8763708f4a60329818a753432f267400000001339ebde53e041aeb8de542a065beda037aa4460b905312742caa8bac986868074f796e53a4864ccf6d29a9624248384a85384f45f83f26d95381d084f897995 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{346DAF51-B2CF-11EE-9278-CE7E212FECBD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b5020adc46da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f1200000000002000000000010660000000100002000000097e60b075ce5ae305a43421a6862123f7641cfe90c9140ce40c923fca5341734000000000e8000000002000020000000d4b5baaed8f620a22fd33cd6fc5227f62bc652e704cfdcb3fee220ab656aae5790000000257226955ce5c0b9750ac7ea378067eecb37121b4829aa6ec684a6de3c0290f5d94607a1003c9f6c3d0c5eec79107b3df4a13bcc8d08aba01d74455abc5681de19abea5d48ab047e1a6b348283a28e264fc99eb51e93ee15ed67e44031e3a8f97504b2e5b3727884afdc46dafe2f79871ac55fbd826e762aa740b7eaef7b0fe5f4ac0f236a32b3860df250d32e51fcea40000000262d65de128f060dfbecbdf1bf3c0824f7a4bc21df04d3916c98cebbb9b5f817ad54f51ae5522819dfd4ba90f7f5afaad11fc45f076f20f0741733114b05b25a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411393218" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1672 iexplore.exe 1672 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2932 1672 iexplore.exe 28 PID 1672 wrote to memory of 2932 1672 iexplore.exe 28 PID 1672 wrote to memory of 2932 1672 iexplore.exe 28 PID 1672 wrote to memory of 2932 1672 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5b1d4bce6e758979a479a9a4b7340b19.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b561b13166faff43fb51a30a4a72d8db
SHA1df735f2d7b1759e2d4625000300c62364139f061
SHA2562cc2ba79b5fbb577372a52e19ea61774c84a9a6d3ca32a9775334e0b063187ec
SHA51234d1ac990513de14e748a1528e40c1d740b2ee2b3d762ebbdc8316c056b0fe03b1a59e488f5493af33a32fabcabed6bb87b3430c1a7be7435632a64b401d9af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58352fe92872ac525883b171cb8ca0424
SHA10734e023eccf5137d90d29a4f00342fb40755c36
SHA256a9df7ba0ff442d552fdaa37c88628fa105ff39d70ac2da1ebd842e0c614a93f6
SHA5128a235678ed335497063ba6262fa2cd4d67724ff1b254c1870b01ab00a563f9a07e2ef3fd9d2afed3224a063bbcfbf405ca2cbdc13b9caddf57367ad1d77564a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdda9045be3e1d5c1d41bd4363ee9a71
SHA13d30e87ff97ab3e70a89865cd1cf375b4754f599
SHA256bd02555aad909fd81239181f805276eab0bf6aad388ca7eb1ceef19e6f8267d0
SHA512f28f60b919b00ab7ffb8ae0434b478d56ad60fef627e6d01acfd680289fae056f5ed38347aa639412976b679d03239b651adf3bae0a0ad092fa986d87c1f8a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d074eb19a55f18a8eb04e004883ddf92
SHA129bf0b87d8ff37f4f7818f13edd0b2f443635607
SHA256f47ce0fda187bc3823b8a884aa6ee69fff8c734dd1101c6f6077aab498f09ab3
SHA51244ccd896649f7df4095a5ef07d021b1e14ffd57d47459823575bc207709205dd4235139fe2f2a951970fc120de45269e5fa923ef24b91416f0c819b447b1a15c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583b4f8d684efa4699e61d62c9b5b085e
SHA173a548f016f284ca68c968ad30e6786d51d2cc1e
SHA256fecc13234941cf346403878c57aeb260baaef8d3538e862020b7ddbfe04e514a
SHA512665f12c56c6eaeebb21756a1f7626188a23e58217b27b1261595ddb5780a3ee73c1ab48d73d38ef47d62ba93fd88d9d90313e84930ba49c86687c97103336abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aab8bc0efeeadf0ee2d665bb0c5b3381
SHA1fbceb3ef2d32d1b72c6a6c9c172f526bbf609fb5
SHA256112f7267709e9b9039c30cb0b860b3b24e3be0d2810a2ea95ec421265f8825a5
SHA512cea0fc3b35f0fb7afa6583c97d5b1f40bc10eda50165266ad791b61c8b1f2958848dd85e2faef489ed901e922dba30a57133033e31d0c99c4faff8329589284e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537da1f1f956c3077ff0f0c24e439bd9f
SHA15e64c4f3ee9b824efc64228006cc74175a1940a1
SHA256542389f9845fc8061e737ed975b29b080fc17f6328da9fad89012d7bbb0f9dd4
SHA5126a04911b8191f3c4f100035a34cfe2a318506e4d3c4b83ec0e9380c26313aa52e7a4bf15004fc41772382f490d5157eb04c20e42846182db679012cbb2c7d977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555dded15553f183ecdf0a23fb539a880
SHA114ca71db146adca5c8006be0a18f59485437e396
SHA2561ec4fb4820974b836a40e1a909783b4d41f894be621b689957d613d9eebe368a
SHA51285046cd995ec923209a849480d2d735dc261e582bb7f6417391938aeacd5a9b06f6b76c23d5d7f5fec9a33e54a260474fb24d6cf64cc39ec74af1a7ef9fe5fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1bfc4977c5a0bc8240bde1f30f19e8f
SHA11d4713f023d258bbac1eb8eaf3c7d64c19b6c902
SHA256af7bdab26999ef8d088dd36d03850941ed58506f1c9e5286eeb4df05903d6e03
SHA51203df6e1b5fb3450944d314142699c060fd8437fb6dd1400c38cf84cc0756af6bf7128c366aedd83b206f68a96a4236994a35f2f5cf542effce94ad448c198007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573c5ee21dfeb6f9a4650fffe37d00737
SHA137206896caa1e66e6dbd67148d20f64df63ada12
SHA2564eb1c2e90f0fbcfffaa40ed6cca268537d5d3f0443395df93c73168f26241064
SHA51201920cec84ee738bb2eb933158efd0e7b04f63496fef432edcfa00d1d5f9004b0df754fd8071e038d98368f25e71bbc015eceeaede904438f7ca8fd778bcb113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514554c24a9318b892ac20d621cfc770d
SHA18730aa3e40948c148b869cba21e2e5d2c1b8775d
SHA2562938acfe4f024e9d251a3608273a5c973cf9d917816062d3a0f12bddf1244c00
SHA512414d1d3e6aea60f2202e80bc43dbccfbcddac5923e6fdad08427a3c65bcd4e18c23fc0919fc0f65c6151363946a8710d41cd3754261148f29e8083d8403c2fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52aea77d1e780c4702af231f575e8da9e
SHA1879abaab11d49a62a3bcc9401edb4ebc476fd137
SHA256cf85adc58c09fde22ac7151c0abeacd2485f9355953c59a94ebcabb5bef2e6e4
SHA5125ad002981aa7f6d2e14bca852d34c77b7f92dd7ff6d0dd560e41264f4e8a9f13cfca896ba637e72651e291984585bbcd2ffb1747e826226aa2334170c3aa429d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527a59b34b5447ab11003a3028d11db47
SHA18fa35ded666783b0be20b37e72a31aed05124ea7
SHA2565d5180615bf0459bedf4996da54634a28ee40201820a551cebea1dbea451fd1a
SHA51215b1efcb18879b9bad4fa4d732fa7c346e4acc6f363e62a98b0bda8772b2b000a429f18130d5f74e1513ae54d8d542ea7468b54e718214ad39b1d9e849ea819c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566712560d879620aa2b2ea7bed4a1555
SHA1a58473ff12a8fc56c07c99b6010fd9adc87e7c4b
SHA256993cfb2c173b43fab30c6e32ea2605a64b45cc1b27f1e4c2ba59b6330545632b
SHA5125a4804365e3ff8947098f06de16f982ed1c188ce4a757fa1303ebccd57b6cc7a52059e1e6d7a681c22583f8423eef31aee511b2b12bf2cd98d30dd34465cd3c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f360f64f84f3925b144ba5229ff7624d
SHA184747b76a1a32f41958663494be06242870a8b94
SHA2561525142d2482d656450935e37e8a6e5899e5cca59d35ae662c2d2f23ebaa4fb6
SHA51248665f4ab3b66e86209dc9e4bedb942d1fc762456aba647c7b259e51b4ac61f7aa3b243bbf52353d71d17aec1362782c10acc27effad13f9f763c29cedf1cdd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5fa46fc54bd9fbe0adc362f6161df7323
SHA1246e0682697048dc9d0804b089475bd0b0ade591
SHA256bc4c4965472328918619861b820883a8eb82a85c59d6ff3103f5036da1fbc009
SHA51225e721bcfd15d9b7616a9031a7119004d92055db19a27f67b48f5b17fd78136eb43b1d57aeb7030430f197780c457acf1cf5d0695e8edfa2157a093a0a3e893d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06