Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 11:16
Static task
static1
Behavioral task
behavioral1
Sample
970634ed51fde1d29f045d6b2237cf0d.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
970634ed51fde1d29f045d6b2237cf0d.html
Resource
win10v2004-20231215-en
General
-
Target
970634ed51fde1d29f045d6b2237cf0d.html
-
Size
1KB
-
MD5
970634ed51fde1d29f045d6b2237cf0d
-
SHA1
e24aca7ac47874c632c730158465fd93cd9627ef
-
SHA256
a6b0091ff81f25d0e2077a7e4ecd4ca53032e1d69c18fce366b5eb2cf9186b87
-
SHA512
7782a6f7d66fe3029bfad4413f19172aed98fc7e94869f976207ab67a6c68a1205bfce09e3c515e53dfac1f846e93afa555f2e0e0f1ee18557702d80151445fb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2BD7D891-C998-11EE-B5B4-DED0D00124D2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000d429450ac2b43ce0de896712501fb04ad75b996cac0e85db5b0ee1acf53062dc000000000e80000000020000200000006f0256f254c90db9ff486c7e32c9e666005bb39f68654aa80007ceb36633797190000000152527fa5533be825f81af630df1d0877f5fd3b0cae79d9e89c6e3422f6f62ff2fe50854f3f3d2faef96a3c4b87cc0cd2fb9adf04c56b84fecec0f3a0201e175b31f8226c637dbafa3191c4d09bc1f32aad8467f2df0b0466af41197376aa2d101191abcec573e1ea44da6f55ad80bc3a67e1db96c377d3711c931318174d8d055eadeb17de4a9eddffb75ac1bd6b3ed400000003ececb784bcb61aaa82c2dad335fd9614d2b9134a154d72ae5def0c3e4a43107f12fdb03b8ab5b055dde4e0a376ad10580d2870b103dcb5f8c9864af7d309be6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0799c01a55dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000d57065a5ef1293ba0bc94c6c3b4f3fa83c9414d19084e1563b8ff6aeae8fb31c000000000e80000000020000200000000b27130fad98683eb51e566c29ffe9c0203c8d2433099b2f37fa46af4f728831200000007ab7a9604babb5d627a727d3a08c4e20b5cbfc0a0668705b5254b8c259846d1240000000813a190437340a84526a5fe58343df2e7838da91ed9ecd25456cde6b7c6ff9baa3bf5bdd9938716a6d6b72c83163474f986ed5886d6aff2d3e6333407481f11e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413898458" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1848 iexplore.exe 1848 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2864 1848 iexplore.exe 28 PID 1848 wrote to memory of 2864 1848 iexplore.exe 28 PID 1848 wrote to memory of 2864 1848 iexplore.exe 28 PID 1848 wrote to memory of 2864 1848 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\970634ed51fde1d29f045d6b2237cf0d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f0c6895feedf037fdff82a76ee744c3
SHA186dad8e2b347f840146786fe6d0725dca1a819e8
SHA2566d4f3bca89bac42b2034bf753f9b8bb400e45e1533345ee79ed29b5071020838
SHA5124494c578822e83a804697f333102da408376583fa740b572f940f8db3dfea1fcbccd27933095ced5dce3cb48d1decf0b4d99c78715eb96055c05bf18256385f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e08b8aed0d2840355adeb7430041f79f
SHA1c9655944e755c2212bd207db886e15ab3376c9a5
SHA256f428a25d4e4b8f8ed622bfdc3ba8f17ecc2bcd010a49ffbcd232b3cc3341e21b
SHA512945c885ff67693cb59a4d99cbe9f2e4644ca569de5b40c497eca6792f006973d813c7d3f1643d7d45bdc1db7e2446dad2b32c4b1dd4a2d153c4291f554e45e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553505f2c6049f8f4fa2f7d80b91fcaf9
SHA1a6567818f9085c854117d302d68e05b437069ebe
SHA2565a7ed43509718597bba92eda8f678698a35f33c1cce82149da5d90a1fcf344ce
SHA5128843a786c5530744580dfc98b8705e88f190f1a807bf68a65c17ab0cd3408fe34afa20e7e86ce880b95f40fc66eb1a04a750fda4abe5a62c340a90b19defe5c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59797cbd72b1e8b6c7e41cee8990c8e6b
SHA12957188ecf3adb8017b8c082914cf6e3901abad6
SHA256dea39b89dfb4f5f42ad9f8751e2660de3c8c3274ebf4e11ba1b4f6c269036184
SHA5129b46190adccccbd20be969b83b14edc454de4d9d1bf555849256eecb6d7c15bdd5d09406b03ddb328fb944333585be389be9d48bad4c797b8963edc862e72dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c9dbc91edf68729bd70874db4f19f7a
SHA13ab773d9bccaa9f18ecdfdbb6aaec17c91aed54d
SHA2569b9d080c0fafacd3c6242ecc64499e010ba3892c82ffe7a03aeb6b097c364eb8
SHA5120007bd9b31162e64089f45a0ae8bc9b47f7b0975311ebc62009c12792463425de952c80739c0a3f9a3df5a24a39f41aff8860164d5b535fbe161c79878127af2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530c0579c7816b95ac7a9978681b82eb8
SHA1f3b79accd66372a73565a29d3615baf228106334
SHA256a13cf42f7893a57006e0c572faa2f7ec3abfa785d74404907c1d3f383d262311
SHA5127ceb9c06b469f5d459c0cb71bec4f27126157db31ee90245c8a3ddaede234c9dd32f645296b855d56e8abb26d260518b389b978e0996d166ccff415e1ef69bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4f95eb7589170eecb071755ea85898c
SHA14a3b94e2d6f89f3af58735176a4ba5fc85608ba3
SHA256edcacc345654fc5cad337b527ba340e811807fd1b088e40e01a24495ef5f6074
SHA51200985d9fae4260927fe3d26a870659487743e0fdf6abf2c51b2138189a09d6c51118b1c3c31cc67ee913108205498d8383c81ade23f8fbb1197f1d1a23bd6ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa058cdd94c7a14f5686d424852ebb5a
SHA1ffd9e1b6e57caf2f59bfe7fb7a69f3bf8662cc4e
SHA256899e99a5016836b5c96f2ea5251d371372a235f24c7e2277723d500aded440b5
SHA512ae25a7846fe0697c1076b20461b7332156e85389afe8ddff1435b387aa6b52f6714b6b3bce0ed93b217ec2e01b2c8d2497bac36125aaf695d016fb1ca3ee44e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577bdb945685399300afd6aee9bf64923
SHA1e5c24c45cf5277d34d283b526bfa29dea74840fc
SHA256cd4b8f33ae1271e80b375f677162fb0a3407954742f4633aafb2dc2199c7bd69
SHA5125b134819eb09805f1ee71b2064e363760499268ed972a30e47260dfa015c90064f18f814717b3f8630236b95b151f9b290fa9cf23d4c29cf97fbab6641f4dcdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aba2ea3b3471f9fe38a0dc4353154e5
SHA10fca6cbce0391d0e69dadef999d548b5f8abeb77
SHA2565e609bd5887cc4635ebd4de1ef2f948f9f7fcd2831feecd15ad67751ad937755
SHA5124df65f76f73e3b408c0e58acce1a801e41a8e177c4839d1b3bff683952a9261d00d919fe1a4f6813e6d14790242224791f9d66571f6dcaf3805f9bf97cf134bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544a9e88274933831eb3b85275ff4b67e
SHA1a891ebadd0103d0fbcf465b94b2b2f745b0da0e8
SHA2565c8eed3d2f2cb0e1ab073f2a7680ae3123498fc8fd6ea163a0d405f42bd3d81c
SHA512bad791f5f278c1bcbe4aa26ddfa6b85679a1cf4e352189e1c9e45eb69ef9d3d75dfdfd9945b0900f833b24741ad776e34f5062e5d4ee816a6b852d9258679826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569d4ed1eeaa5e8a91048efccd5215e3c
SHA1fcce75a5d08d604a345e51b5fd5d24a2e6cabf5e
SHA256798805b630db1b945fb1c43175ca55be497f09cb325c57600d5cddabfd70b722
SHA51249b5b00e40dccaa3bfe41fe2ff849facbf6254911680b9341fe9cae30fde791acba1f28042e662cb5b95ecacd2cf7ffa90ef04c75759804d0bc11ba8b4933626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5435ee0ef053ceecce424e77d3e48f9d8
SHA15ab299e07128eb1a0f1ca19dd44463d6da371620
SHA256e2f45cd9d481f0bb1e2377819a05b6643593e3d8a7917c0e68bfed5ddaeea9e7
SHA512630f0191fefcd2b41d31ee1191352ea300d3e809063261ad6a60411cb1a4084013ce618c763ca5f0a9b8ef75df2b871201ba232de7fd0c76c308e13be22f457e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfc573ea2747cffe0994959b34e03071
SHA1ddc31fa7c74008e5ac9e609abf12bb0b6f374b49
SHA25680335c56b58f35223ebe842b44450b260e398b432469d7fb3aba4e6379209032
SHA512b511b0d0614a77a44c59109333bb8f3a6cd743fd86458f6fd1a0fa2b9c69b20fcb089fcf25657070ba48a7dac8fc7ff88f21721ad623ec4646a494cf95dc7d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6fef2206903e033575cc7210d3c9795
SHA10e86f74bd9de006b2c99a10213b9fdf7ebe52708
SHA256a76dd169273976adc71f22ac6100f6bc5f7b47a0fb8887ec34e3ca5c986ecc5c
SHA512ef22e5f62a460b442816dea347358e8a0caece6d4f8fa150c94326d130c94570da0999b477ac989a793f4ee7c3fc8642296be47ba1bb719dfd46896ed7453de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554f7fd2369aaa016f6ae7d1955931160
SHA15760f89447089125e1cf7cd24240587a54d80d4f
SHA256cd1e87ab7e7c99cb07cf23d909ff72592cb9753da0da3d772bd4f9ae88ad3ef4
SHA51211e7f83e5da4361c0f5fab005c1196d20da357e292ddc6ec65f40ffcdff2e68390a209b59c5d0ea72eacc6089e4b76e645f5fb29552e932eade55d97617d32ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e501259bb8f9d42d7ce974d929d1159
SHA1559f894c20371d74565e967e5a62fd6e1bfa0e1b
SHA256c614080d07d4eb773accd62327d79fa32710e15b0d9d034dcc44f6eaaa5d48e2
SHA5121078f7b385192e87c6532603e595c5c22c2107918d21d4bb068d6850e6ee6ab4290ff938211ff96c579b2e800f99722e77b72cab0e8bf51a1ea3e1de08044113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d85a1a932761bb89ec06c34983d5d58
SHA1dc6c1114bfaf4aa1d972a08348dc151ea6726b15
SHA256e9dd71e3dab00ef9e8b172bbdcc67eddfc08930e00b061e6d28839bdff91a376
SHA51206e2480529526040ebe143cac7d91645afff22e82b92ae47ee7f057ccc017fbb600606e7a736ef15f08d5f654a44159c72c07aa05d26d3cbe0728182adfa1a02
-
Filesize
1KB
MD500e6a91aae88f01480b99a9bf64f010a
SHA15bee56c20f6cf7550ebd765eed22d6b99d569423
SHA2568523de2ad4e7c1e9dc0031f54f5f4e1601bc4bf7004c09d160cc2ac5d4701e32
SHA5128570f57a8cc56353a164862f0f3048a74fb0ea90955e453f8fe5d39f7867c9fa73e9cf7daf2bfecad715979d430fe8f96baa4a074970a7fc6de3f8933737fa85
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JIH1AB02\favicon[1].png
Filesize1KB
MD5f49c4a4bde1eec6c0b80c2277c76e3db
SHA1df34f60a4001bdcb8c2ab15cd50c92feb6288a31
SHA25650ee6523a4cba10377554c53f88bcd8b53cb5d11a03439f04f73aff55e982e86
SHA512fa7c06123c254188bef8e3a9a62f86c09e3f0d6e1e8e4727181d240d715c7b3a1ad98ceb09a0d2e4479d2a541afc345b363b62da0c58ddc9e4db2ed01ca8eb62
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06