Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
bc94186b62ca8d2dee1f4cecbb37a938.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bc94186b62ca8d2dee1f4cecbb37a938.html
Resource
win10v2004-20240226-en
General
-
Target
bc94186b62ca8d2dee1f4cecbb37a938.html
-
Size
5KB
-
MD5
bc94186b62ca8d2dee1f4cecbb37a938
-
SHA1
f11832e3a85a8cbc2534c710c3d8278f8d23fc81
-
SHA256
74820eb95a30a204d99a1ea795a4cd4f379a890b57e48e284d3c41b65bd7bbb3
-
SHA512
1ce82265a55fdd259dc4ad5a1bbb8294a33b8a29792cca8a20dd4405b23d74af41737bf26d928db7e482805e5e9f5622f2b2d659ebfc434b86196b4a152953c3
-
SSDEEP
96:SIh/Ren0+PF+X2DPqYCX3C1leQpnbkYEtdQaxea7TYc9sC/rkl+YCbN8Q4P6tans:SIh/kn0077qVnC9ax7TR9PAlzLQ42GWF
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e00000000020000000000106600000001000020000000a652efab814984dd763db4913b831db3227f67dc734d18f3f1b72815ffae2e40000000000e800000000200002000000049c93d2c2c8241940bb099045e74dafa5dcba5e7e441deae9226df744471ff9b200000002d0cd6e3d9e27451eb6c98eb27cf603c8c1f6391d6675018301b31fdf521f9d440000000d4c88273f828e35ee3d8a0a18b01e000b5f8d81f6a95f42691cdcac0e33ad7b5b29cf4860765d17fa867eb196714efb9e4983dd5fda2bc7563548b9b7eb52d90 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01fad6d5572da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416173255" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e00000000020000000000106600000001000020000000f2e3529fb37d022d7793dac252b5d634894062f517b42a77231917f88d607f09000000000e800000000200002000000039d44273778b552b5e8b867e8fd53b8afff5f58ad8872dc6893c0b7a10addc9e900000007665a28c3f14676ddeeb9d36ac6c04b63882d6a077d4f8d59f015f14787ca51c0ced7b91a6e63b24524b16084c61a34d52a014f50dda999cb442d55c460321915dd2925b858237a8208e2efb93ce6fc90f33c8388aa50f5e1c3b954f92a7baf54a0f0aa032fbd29869d84050a1a02710a0e66e0c0ddfb18d5f1f53b8e50c2eb9744ed9b42870fa8c9a6535ad81cda518400000003db4a2bc4ff53a297d3d9fefcd3b45da2b8e3579ab0e5877151ee362b90eed9acd265316594ad0364214c621b1788d45b4f177babb5084a567b9cb761a27be68 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{945A1031-DE48-11EE-8D41-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2016 iexplore.exe 2016 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 3040 2016 iexplore.exe 28 PID 2016 wrote to memory of 3040 2016 iexplore.exe 28 PID 2016 wrote to memory of 3040 2016 iexplore.exe 28 PID 2016 wrote to memory of 3040 2016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bc94186b62ca8d2dee1f4cecbb37a938.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f554d0dbad27f92fd71691cafa065f0
SHA1e6144b033feb2bb63a7285547aa6538492558ec0
SHA2563f28e22c5adb9f3449bace36f4f4ade93c4f1f60276d29568de1fb79a8557114
SHA512ca594316bd59ee8514055cf274bdd39870cdfa3aab21c732f10313dfaf0f032a7b4b55581e4a640898cbc049ce3416c4b0f27423b1c6708e684e4737c5282373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50aaf6b358b991ed387964671981c6d00
SHA17b2d7cd105a6718e5a4c5c7c866f7ab047a4f118
SHA256dc5ce77879e90d147a23a57fb01105404d87fadff521ee84f74104c904139bfd
SHA5121077b4744075c609a66ef4a620bb2d8f271986e4b68a29d730d994459adc4c9d95855fcb3ada020e6f155ecea13a63a98ba930d2d48777d022f9d9a0692a0cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddafe48dcdc59979fbba7e6e7fa6fb7e
SHA171e7ac4b330bc63e61cef76cc0a35bc62306da7b
SHA256154adec53ffa3f2d66b82898c3223a3fe699375ea6802ba5383499e094a7258e
SHA5120acb2ed9a560923f6f7137d38386e95585d00919b14954dc892b8ef17c0d0d7b9c5b7924b21c42595d939a23c4ff0e85292afccb23fe173c3fc0c69d6626dce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53116ade8b8feb003d37116b72f23fd86
SHA14273bf0eff2a99fdbecaaf3ea1a71b664f896f6b
SHA256af937e39d1784518eed0c74ddf5d7984d22a50cbf16202d0d606cb00ad007bc4
SHA5128c6ba9fc6bb28cd25d364524da3e62f832645ae48429587a6c356c4e72e519394f96749cb6a2b213bb18c527091e824ebbe0ace5219f44733bb2bd9581888a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5320c9ca6c5a7256b205b309d32576f5d
SHA1c0913f5fa35d8be7e4d1e48d91b2e705a706ee1b
SHA256c3ba3f6f095007648aee56cb039d903290f66f3c2fc8f5634eaaeeaf7a72ec25
SHA512b82aa4dc75945514ad60a9c6b0baea0780685b6809d93b98ac9c76d87f634461a30e0b51d67081f05dff3bedb19ab08d2df3f179952e3bdb77e0873b6b13585a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad228b634b5d4921d6df7431a0f9d67d
SHA19814fd8a4aa0e94e837e6c35d511c05ceab1774f
SHA25672618932a7ec88658a422a52eb4e61a42c7dd23c0b04fd4c6405dfecab11d14c
SHA5125c37cc23742af6ad0cf7e8a95b85c4d3a0f4c54f42e384ef4c34c29c5550d4b7af7e72f42556f9f9dad372efdd9d85817ceff3c695f3b75d9e838c61d885d806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54deb7ec6cfbafb89f50750a5a8b39f01
SHA176a419c331b9fd20cca2fcb45c7de6fb0f6e5905
SHA256b5339b95fa0a989189fbd8ac0ad599ea302b8ea99dc4e2d244bdc06e9a02d85a
SHA5124b5824ed78973a8fd5f55046202ae30eba58f2356baa2cd3324bee2457b64dfde50f703705fffac8f172354306762f713fea2de397d8d13c2be52f17a165d555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fc886967ded66fc43ab62deffebef9e
SHA1ffa56e8951fed3242768488bb4593a673d5ad107
SHA2568052d9f460e7e9d65cd868e4aef9dd9fc895821936900d323bb38efe911eaa5c
SHA512eeb51f6d47cda64c2484f5701fbf5fcbde0bfeaa7cf471d5d7d5eedad5486dc7d425813d9338a14406cf988a28359a093a0b67899e14d0d4b0d759ca73c1b85f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2fd5655188c596a2ae2004e7d744a55
SHA112638cdcb5d89325ba28909ca58fd68a1d980d48
SHA2560b8bae96a4b38d1bf42e01d0caaf18e24411217bfcd9aefc179405fd732418da
SHA512379b90585a7203760dd2233c04308c1d6ca31fc01df4e830632e4a3cbbe3f6ea4d357bb732b2a25b1ebad70a56358ca0e7a2f5d94f36fe6a8b5bc3b8b10e8b98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fec65bd47b8e5f5866d208cb233df0c
SHA16da53cbf8d00a0a9217a4a617905322b47f91484
SHA2562677290bfee5a160529c34a1c7a20ff1fe13e39d93168a41575f8275936500be
SHA5125a33be0887c25348d955d0db2ccb142274e930cf44bebce9274c1d7e7c9a13f2da97443a994d160c08f8b607592c1f954e4a8ad7468617342be5effc3587a9b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f4c09806b2a521272f50a27587deec1
SHA17e3434cc1376060ac369df7ef19fc5571cb42827
SHA256df2e8e27db5034449ae5bcc35553095e0b601f6a7476d7e383f16bb6f5e8df78
SHA512a9d9d7ca56b72ca84a93c8ee9a35ce8065276943389acc00e1f99c5e8ff71429844bc81faeef68a8f8c97de78f5967678b0100dab2666f09d93f7100e2f91985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7af9fd783fdd2099295284c8bf006e9
SHA150c139b38577ffab8ca0edb14937c7851186d56d
SHA256642622bfc0e035f18a67b90deb81261383c650a0d0f57d70f9b570435dc60506
SHA512ba9133da2afaf082b91a6bfbaaefc467b7af95dd20bca0046f065a90797e48777bbc1d8fa1d39dd5729fa8b3034dd6ebdf4ee25b1db5313b2fc6dddb77db4190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccd28153b62f53475799313ad54a97ed
SHA1767fbcdf893e8cdd6e6c379012617e44789c92a7
SHA2560e38aa35af32e4fabbd1c3d8e2358f750159a90fbef80048b8be62c174766f03
SHA5121b1d213bee9e90db3eedb44f9c3ccd502d7327d4c32948cfc85627141b58ee1a46f975c42200b694bc3037081bfddb08e5cb0f0f851063653229025f1bfa9fec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559f89d1cf12fa7c9893363c3e7759c55
SHA1a4f637a221ff038078b71dea154f6b79fe3d2e3a
SHA2563727354395b1ba994348b64d78b97cb3a4d3f7e4ba335934e6c98e1a19720a53
SHA51254564133e89fb8c1ce857b982ce4b6b95b7278f8eabf14055522a1cc08255b81053b180ffbef9b394bf197f767614a57246f0ff91a8e66236d70fdf14539a449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b15f38a3010ecbe42f1e0ba2b20e35d
SHA13513f981a34de470f09298d5d0120dec6d9d79c1
SHA25671969d39bf017bfa0a20ace3bfd6cdfa6c7d09058c526e09fde24bbd6fdc5cd6
SHA5121a15cc359af8750bcdc8699d6bb518f71daae066e5f3a6f59511d429875891801c777d3a46630e57230157c746a77f73fcda8b6a9b457783ff4e8636572b39d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df63b52f73012f010c970d1d4e2df4fd
SHA163f600f38282f49a3c2f22fbb0d1ff5364c01cf6
SHA2560affdb8b243b75af7eeb1fdb995250783a706e09c8d93b9fcb9850eb60b99d2f
SHA5121015824048f9d529513520ac60f38407c127226ee896f2ae7113225121a2e8a2592f09e485384bab8330e8546e75d9dc09359754e31db5fb20669130edebadf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530bd98db0e0d7cbe0331c03d2e72fced
SHA10ab7218c1a3e13084bc80b6d2826325f8198e75d
SHA256ecf6111653cc1e8fec5f0c77abb7594dc48d02df27dcbe3db3243e43dfb82ccb
SHA512a4429defa90da5f860cd35c9dd3beb22d8a648566ee502a588a7589be60183afafb7035142ebf696e2f97a9e76728eb77a1bce1518cdd342dd73b16e6bb77ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596a007a4d860b1220aecb662f30415bf
SHA11b06ecd3a22aa323fd73ce808a3d1b90a6db55cb
SHA256cc46b972d4cd0a3428d8dabda3eb765333fc858f62652e2f5575cddd42672239
SHA512ca21281cb4d02e2a8ea33f3cb35ee4c8dc6cbaf035dda5242838c54bd10d2692d642b5345fb2fd7af9f4ec700379232dbd35cc9996012bfe2b7d60988701e2f5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63