Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
4a53c590c76137faf2f3042e6a1996172d869abdcdfec77f8424c116ec7eb3cd.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4a53c590c76137faf2f3042e6a1996172d869abdcdfec77f8424c116ec7eb3cd.html
Resource
win10v2004-20240226-en
General
-
Target
4a53c590c76137faf2f3042e6a1996172d869abdcdfec77f8424c116ec7eb3cd.html
-
Size
6KB
-
MD5
60ae028d75248159a59138d427a564b9
-
SHA1
58db85cb149bd16c3311a5f12169a7ffc982a686
-
SHA256
4a53c590c76137faf2f3042e6a1996172d869abdcdfec77f8424c116ec7eb3cd
-
SHA512
9a124e3960887b7d08e94b1d71f6c585a372a734b0d03e80078b6150ad54ba8819964234afc73f2730b16ad11cc5ebafd26c669e578b9fa19403c14ee7f53070
-
SSDEEP
96:PWJ/SNi/FLQVTLKCGWz5NN5PXy0jRdo+LIl:PWpV2RKCxnNByT+S
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90973d258375da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000dcbb6425364f1a2e4feda9be4d6faf499405b8176a1ad0d49603d5168b143eea000000000e8000000002000020000000710ddce6e08637b6fdbb2f1d3aa1c62e404ebf82ef64cd3452c9508867a8fb8490000000fbb0630ff4831981104d88cdf0a98ff673647c744940a3fd5a510c3648c1192da82281d9721aaaf047e9e1967a0b52bb6b08db2b515b7c683989e21a4bc8dd382f73c68df1495bbc8f107edf1fd87c667561c87b3a66b4d6d1512c6da30b6bb81e827eaee9a81afd3ba1afd394d4c970a6087a9f6d92a3cc5d2daa106873f015423148bc9eebcbc29bf219051063a1a44000000032be3a6cc75abc8086de8eca3771ffe0f721307f0e41ff66ad45c7ef95129a51812ca53342531c300ca4445bca1a55f60b088e6d4962f656f7090cb56d7a2a5d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416522739" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000005cdf1e5d9f055027b4e26e95220bf833e2bef407c52489afb72a2109bad21eab000000000e8000000002000020000000ad17a09b5e132b44b39f068c3829f09b95d7bcc40dac28182c0ce8373d8ce82f20000000be9937d5df411626e683d2849399ce81880862bda6872d03c679ca0cf00129fa40000000d6a126605350ee1e9e13d8d7d458b9c71111eba624a0f37bdb284ec2e5628f729c78f08eef56707fdedd4651a285592b4075a4c7f1ba43de9371c7e3e54abbfb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C083971-E176-11EE-989B-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2700 2872 iexplore.exe 28 PID 2872 wrote to memory of 2700 2872 iexplore.exe 28 PID 2872 wrote to memory of 2700 2872 iexplore.exe 28 PID 2872 wrote to memory of 2700 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4a53c590c76137faf2f3042e6a1996172d869abdcdfec77f8424c116ec7eb3cd.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5969999b86414e27eee7539d781ef771c
SHA15333ba043b5370730920e53ffacacc3d4103310a
SHA25644932662063cfaa217dfacd9e466499e284a853e02744c87ec863b3f49f9070b
SHA51257409a689f4e38bb2d4864dd5dbc04a4ffc258aa54c7d1a657e72add21330aa21870b76dd24eaa9ac68755fc915181d6c9d6eea629d009bf6e2e94d426d897fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5424fc99a06663c13c8945fdfdef0fa05
SHA15b77eb77316b96603dd95961cfa06990c54dca9c
SHA256e17bbfee93eb8aff81719f3cbb610258bda04b6f536449a3e26431cefd16f62d
SHA512209a31f00fd1ac93854896515453895ce9141ac395bccf77b9dab32784644b0a6818cd91cde12d134ff267fffbe2435bb01c4270ee107c2a9cf46f1184ab8bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ea61a20b3d827452c00af6dd2abf67e
SHA17378b408348c9625036a22be38876ca10774d8f6
SHA25658742c0ebc10b7b498af428053bd460ebc8e00ddfe8f0ff6d68337c89e411b77
SHA512f64a865cf4ea64b6c581a7f512907a5f6d287b98d35a754b538b0b5cd68b2602892614d8be1fb7c64e1f7df361a6ffa9a20d9c9891ea9f820954eda229840443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50225436ac327a3eb450aa63a7c27c032
SHA151c4ce55d336ac39c3c1e2217dee3f7216872e81
SHA256a29ae7a9a31b3f8ea350bc27f4634bf97980c7068307ac7d62903f1984195692
SHA512f1332d27d6c4748dd6fa098b28888801df7866213f4c37009f054bf2ba1c25862f174598e1872c4bd4bc59dd6ddad6e0460bc66072affa965a1c15b68610ec1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591520783ce18c45938612dd9933d59a5
SHA151ebe8c34f9e7471e5c18144e9ee5af1f3125c72
SHA2567b1cd8d6c235319da02246db45669e1642bfd0d8bf6ccdadf0a4328c422ff5e3
SHA512abf93ad57d0fb958594b37edf99e8493e70ea54f4e972ad0a6435ef2a66148f186f9e85e53de6349c7af4bd41a968d500281170d0ec93aeb5e22e93fbb1a4b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582abd12e43dfd4ea05818b6934897156
SHA104385687d547392091f1f22b0db41eea32078080
SHA256b8998df6e023301feba545945ccebf53ad06ef323a01e130befbd308f86287ed
SHA5120ac376aaac8351b620c9d6099f3a09a0929b156fbccd1804171e7846dbbf8ca4ae0fc1ec18e0219179107a4cc415f35141ac946a72ae6aa09d52c01edc8b079f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5346616ee84cd33147659ec911ccd76c4
SHA104a260a62fd6175866a7c519e2fcb8f40ad6d057
SHA2568766bb1af749bcc9b7496f8df9732feb05e07ddc8db4bfd2d8c0fe2115fc8893
SHA5126e794a17bd445a29790095cf102182c76ec6dc190b788e16c3b7718d22f4f84c02db23575016d62cba2f645196600046f0a2d2dae2d70c5833b3b0a63d2bbcc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd88576eaba7fac0865d10754909d52d
SHA1be39d3c3f71d75d4a3a62c611276434b0707d28b
SHA256e12d74b69d836de808dc79e18e521039ffa749f32b62d0517cb0365b855cbfdb
SHA512da09c7a06871035baec12db55f3bdbd8e81ca6c50bf21f06646294d7639a6cfdb28b39cb0cd04eb6bd61b30b4edfd8a666abe8fef1e268f5d63716b1538bc0f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a76426f2c6732fdeac0f132c9fb5c48
SHA1ed6888dc54e585d3134856fe6fa88733f9617a7e
SHA2560228caccd95711950afce8e357a9871488a4872d61685b6109b6a22e76416d10
SHA512409bb488203b1bfc2e8daf296de08e5439ee7ab79ba5a3ea5bf0fe00a8fc420df06d371908c84959bdfa9a99c7ffedb22e0022c92269067aad99c56d9b4c9c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561fc07c4c3bb4f155cf7e929ba5e4206
SHA1626e0b97a9136f3d6bbea8d44bc51ad01dca85b2
SHA25672fdeba8cec45d22aeea8aa688e8304d448ccc91c5041dcc9eeee509f664f1a4
SHA5123c6f8191a3cb51e3ff37dfb80bebb33b0dd3b46214c615135cf0de9dced6af35d55a28e6218cfa909a172d2a4b37d5845df62eba7fec2bf6be447eed4fc28cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0004cbbe17cc45da963cd499eacef95
SHA11464951cc542588bb76f52bceda481a288ee483b
SHA25651e1e6955f4444889cf9e7e95abf3063635d221b2fbff5348c3efe2107a106a9
SHA512406a9ae80f30cd8bd3e19fab86812057c02683da67076b2ac2e4b3013324ec0dd826a17e6636c40e3fc8e2b74462a6d8825ba6a1083e83c462de8e5288171900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584a7d98d417f81a9ed02c5119c5175cc
SHA1bc42cef3018fd4c3ad6cc1b109c8d703012ed7fc
SHA256f70ea3a37cf264af2bebd9cb0e6fbc452e496951e96ead19ece292dd5d46f692
SHA51226cbc7a330d3b9fbabffabf65b089c6fa23500292ea66ced48e46fa0f22bc118162d21957953ee10d0f9be24d920bde81dadf469df87c8272cec352e3e2507b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c0203d657ed59439e370934eaeb0a21
SHA1013b6350421ee0911b1d74c6b7f4949c797827d9
SHA2566883100b48582ae198f5c6c6d98adf1935ea023daa49ca764805a8f6b880f8a2
SHA512a39cc82395649dd2cb6852cbdfc26d6c77f24713a23520064e75c97851d8a8b7dcebdea37f3efcd8d0d474f81b38fffbc2862eb7021709b7baf6382a2f882a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bced6e6f1fcbfa7e30bdcf8d8f1b67f
SHA19c46bd15e40a0ffde06b9cea252e2244e80131f0
SHA2568f0dbfea8c3c90026aadb8dc0f8ba4020a685bdad0569d20c7acb39b336ac947
SHA5121a702bfdd32d3f70306f9b930c6681a3e6c1d137779ec193983dc5deb843a0d4c9390b227efe79eae1534bafc61c68fd5edf64ff2cdbc20a905ea2a70200cb5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590d0933b8c11b7ef6749c409aa0d8a39
SHA19461812af69c60799d35f6693f0cbff8dcc8a02d
SHA256053a32975bdb3cf2b410070eb7cab779b2920874df9138492f4f6ecad6b4b700
SHA5124f787b00d4148ecac27923cb063fdd14110c374dfb9091ac1283762214bbfb006abfc28de05dd46a1b17fd8c6cf16282a339c202dc6847be85172a301b2019c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e826a9657d44e0ac9a2c548e4629f979
SHA198ce27e743897f1d30e67544716cf9d757d4540f
SHA256ae1220492c8201b7e356bdad2936f23be4a9269780b515b084e452cd5099c4e5
SHA512a9e8cfbed42f6ec505036517a4b9f8765361118b58fe548e0d937a11b1c4ec04df3950be5670d720c244242ff598d9c2f3ed1304a4f2c84fc4acbec1a563bdc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcd6a606ccaa9e531b867f7e66a2c176
SHA151daee26d9bae5719afeda2881b74942b4c01439
SHA2569a897fb305745408fd74f565780de1a74ca3539c6d6e7260ebe2e1a3bc7fe6c1
SHA5124f9feea7b0f3386f3b6ea5ae92d7a8080319392df33eb7cbf5f825fdbfea62f5aaf22a8574054712f7a123615776c68ea4b4e38332085b8a4b82baf87fbee544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9c30b8ebd6ac7ca4eda565ab8e2579e
SHA14a88f1ea4b650e749af6f96596ea3cb2f83f47b1
SHA2563efbc878a6a18b48f25679ee82c7e423adbcc515de41145e6a04cde9d2eee338
SHA51257ce896f1e38a5590a27cadf22df7618c01d899739f0dde7336d1d399698244426b21e84f328fccbcb978d3fac5bf127779fb23ed1c87b543bb781965af1385e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63