Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
IDM_6.4x_Crack_v19.7.exe
Resource
win10v2004-20240508-en
General
-
Target
IDM_6.4x_Crack_v19.7.exe
-
Size
59KB
-
MD5
27016937b5781c4f84b6b3432170f4d0
-
SHA1
bc812a8c4d44a3503ffd6a46e4fdab925c622344
-
SHA256
fc1a02b509b8f351ac45bd45efd4e7296b365545a48ffd6a14e8e07bc7189155
-
SHA512
24a726276cc53c5a0d075d1bf930e24b3a1891e0754b17c28a5a35b5677fd792d9adb55e5e0a7fe18f056febb8af4a49a5a0fac33389205d1f4dcc0060422be7
-
SSDEEP
1536:5ilGC+HMax3AZ5GiavgfreZCRIr71mazhAN5TAS:5igLV3SIareERU5mazh3S
Malware Config
Signatures
-
Blocks application from running via registry modification 1 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "0" IDM_6.4x_Crack_v19.7.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" IDM_6.4x_Crack_v19.7.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" IDM_6.4x_Crack_v19.7.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Wow6432Node\CLSID\IAS_TEST reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\IAS_TEST\ reg.exe Key deleted \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\IAS_TEST reg.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 2916 reg.exe 4172 reg.exe 1164 reg.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 780 IDM_6.4x_Crack_v19.7.exe 780 IDM_6.4x_Crack_v19.7.exe 780 IDM_6.4x_Crack_v19.7.exe 780 IDM_6.4x_Crack_v19.7.exe 780 IDM_6.4x_Crack_v19.7.exe 780 IDM_6.4x_Crack_v19.7.exe 2276 powershell.exe 2276 powershell.exe 1612 powershell.exe 1612 powershell.exe 2396 powershell.exe 2396 powershell.exe 2396 powershell.exe 3704 powershell.exe 3704 powershell.exe 3704 powershell.exe 3704 powershell.exe 3704 powershell.exe 3704 powershell.exe 3704 powershell.exe 1512 powershell.exe 1512 powershell.exe 1512 powershell.exe 4504 powershell.exe 4504 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2276 powershell.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 2396 powershell.exe Token: SeDebugPrivilege 3704 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 4504 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 780 wrote to memory of 2108 780 IDM_6.4x_Crack_v19.7.exe 94 PID 780 wrote to memory of 2108 780 IDM_6.4x_Crack_v19.7.exe 94 PID 780 wrote to memory of 2108 780 IDM_6.4x_Crack_v19.7.exe 94 PID 780 wrote to memory of 4728 780 IDM_6.4x_Crack_v19.7.exe 96 PID 780 wrote to memory of 4728 780 IDM_6.4x_Crack_v19.7.exe 96 PID 780 wrote to memory of 4728 780 IDM_6.4x_Crack_v19.7.exe 96 PID 4728 wrote to memory of 4092 4728 cmd.exe 98 PID 4728 wrote to memory of 4092 4728 cmd.exe 98 PID 4728 wrote to memory of 4092 4728 cmd.exe 98 PID 4728 wrote to memory of 4796 4728 cmd.exe 99 PID 4728 wrote to memory of 4796 4728 cmd.exe 99 PID 4728 wrote to memory of 2608 4728 cmd.exe 100 PID 4728 wrote to memory of 2608 4728 cmd.exe 100 PID 4728 wrote to memory of 2176 4728 cmd.exe 101 PID 4728 wrote to memory of 2176 4728 cmd.exe 101 PID 4728 wrote to memory of 2176 4728 cmd.exe 101 PID 2176 wrote to memory of 1844 2176 cmd.exe 102 PID 2176 wrote to memory of 1844 2176 cmd.exe 102 PID 2176 wrote to memory of 1844 2176 cmd.exe 102 PID 2176 wrote to memory of 692 2176 cmd.exe 103 PID 2176 wrote to memory of 692 2176 cmd.exe 103 PID 4728 wrote to memory of 2864 4728 cmd.exe 104 PID 4728 wrote to memory of 2864 4728 cmd.exe 104 PID 4728 wrote to memory of 2864 4728 cmd.exe 104 PID 4728 wrote to memory of 1216 4728 cmd.exe 105 PID 4728 wrote to memory of 1216 4728 cmd.exe 105 PID 4728 wrote to memory of 2276 4728 cmd.exe 106 PID 4728 wrote to memory of 2276 4728 cmd.exe 106 PID 4728 wrote to memory of 4752 4728 cmd.exe 107 PID 4728 wrote to memory of 4752 4728 cmd.exe 107 PID 4728 wrote to memory of 1612 4728 cmd.exe 108 PID 4728 wrote to memory of 1612 4728 cmd.exe 108 PID 4728 wrote to memory of 5068 4728 cmd.exe 109 PID 4728 wrote to memory of 5068 4728 cmd.exe 109 PID 4728 wrote to memory of 1600 4728 cmd.exe 111 PID 4728 wrote to memory of 1600 4728 cmd.exe 111 PID 4728 wrote to memory of 1600 4728 cmd.exe 111 PID 1600 wrote to memory of 2396 1600 cmd.exe 112 PID 1600 wrote to memory of 2396 1600 cmd.exe 112 PID 4728 wrote to memory of 4620 4728 cmd.exe 113 PID 4728 wrote to memory of 4620 4728 cmd.exe 113 PID 4728 wrote to memory of 2884 4728 cmd.exe 114 PID 4728 wrote to memory of 2884 4728 cmd.exe 114 PID 4728 wrote to memory of 2884 4728 cmd.exe 114 PID 2884 wrote to memory of 3704 2884 cmd.exe 115 PID 2884 wrote to memory of 3704 2884 cmd.exe 115 PID 4728 wrote to memory of 2964 4728 cmd.exe 116 PID 4728 wrote to memory of 2964 4728 cmd.exe 116 PID 4728 wrote to memory of 1164 4728 cmd.exe 117 PID 4728 wrote to memory of 1164 4728 cmd.exe 117 PID 4728 wrote to memory of 3992 4728 cmd.exe 118 PID 4728 wrote to memory of 3992 4728 cmd.exe 118 PID 4728 wrote to memory of 2916 4728 cmd.exe 119 PID 4728 wrote to memory of 2916 4728 cmd.exe 119 PID 4728 wrote to memory of 3684 4728 cmd.exe 120 PID 4728 wrote to memory of 3684 4728 cmd.exe 120 PID 4728 wrote to memory of 4172 4728 cmd.exe 121 PID 4728 wrote to memory of 4172 4728 cmd.exe 121 PID 4728 wrote to memory of 4372 4728 cmd.exe 122 PID 4728 wrote to memory of 4372 4728 cmd.exe 122 PID 4728 wrote to memory of 4208 4728 cmd.exe 123 PID 4728 wrote to memory of 4208 4728 cmd.exe 123 PID 4728 wrote to memory of 4208 4728 cmd.exe 123 PID 4208 wrote to memory of 5032 4208 cmd.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\IDM_6.4x_Crack_v19.7.exe"C:\Users\Admin\AppData\Local\Temp\IDM_6.4x_Crack_v19.7.exe"1⤵
- Blocks application from running via registry modification
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\reg.exereg.exe import C:\Users\Admin\AppData\Local\Temp\IDMRegClean.reg2⤵PID:2108
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c call "C:\Users\Admin\AppData\Local\Temp\BATCLEN.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ver3⤵PID:4092
-
-
C:\Windows\system32\reg.exereg query "HKCU\Console" /v ForceV23⤵PID:4796
-
-
C:\Windows\system32\find.exefind /i "0x0"3⤵PID:2608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo prompt $E | cmd3⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo prompt $E "4⤵PID:1844
-
-
C:\Windows\system32\cmd.execmd4⤵PID:692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\Admin\AppData\Local\Temp\BATCLEN.bat" "3⤵PID:2864
-
-
C:\Windows\system32\find.exefind /i "C:\Users\Admin\AppData\Local\Temp"3⤵PID:1216
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "$f=[io.file]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\BATCLEN.bat') -split ':PowerShellTest:\s*';iex ($f[1])"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\system32\find.exefind /i "FullLanguage"3⤵PID:4752
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "Get-WmiObject -Class Win32_ComputerSystem | Select-Object -Property CreationClassName"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\system32\find.exefind /i "computersystem"3⤵PID:5068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell.exe "([System.Security.Principal.NTAccount](Get-WmiObject -Class Win32_ComputerSystem).UserName).Translate([System.Security.Principal.SecurityIdentifier]).Value" 2>nul3⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "([System.Security.Principal.NTAccount](Get-WmiObject -Class Win32_ComputerSystem).UserName).Translate([System.Security.Principal.SecurityIdentifier]).Value"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
-
C:\Windows\system32\reg.exereg query HKU\\Software3⤵PID:4620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell.exe "$explorerProc = Get-Process -Name explorer | Where-Object {$_.SessionId -eq (Get-Process -Id $pid).SessionId} | Select-Object -First 1; $sid = (gwmi -Query ('Select * From Win32_Process Where ProcessID=' + $explorerProc.Id)).GetOwnerSid().Sid; $sid" 2>nul3⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "$explorerProc = Get-Process -Name explorer | Where-Object {$_.SessionId -eq (Get-Process -Id $pid).SessionId} | Select-Object -First 1; $sid = (gwmi -Query ('Select * From Win32_Process Where ProcessID=' + $explorerProc.Id)).GetOwnerSid().Sid; $sid"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
-
C:\Windows\system32\reg.exereg query HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\Software3⤵PID:2964
-
-
C:\Windows\system32\reg.exereg delete HKCU\IAS_TEST /f3⤵
- Modifies registry key
PID:1164
-
-
C:\Windows\system32\reg.exereg delete HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\IAS_TEST /f3⤵PID:3992
-
-
C:\Windows\system32\reg.exereg add HKCU\IAS_TEST3⤵
- Modifies registry key
PID:2916
-
-
C:\Windows\system32\reg.exereg query HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\IAS_TEST3⤵PID:3684
-
-
C:\Windows\system32\reg.exereg delete HKCU\IAS_TEST /f3⤵
- Modifies registry key
PID:4172
-
-
C:\Windows\system32\reg.exereg delete HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\IAS_TEST /f3⤵PID:4372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment" /v PROCESSOR_ARCHITECTURE3⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\system32\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment" /v PROCESSOR_ARCHITECTURE4⤵PID:5032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\DownloadManager" /v ExePath 2>nul3⤵PID:2128
-
C:\Windows\system32\reg.exereg query "HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\DownloadManager" /v ExePath4⤵PID:4948
-
-
-
C:\Windows\system32\reg.exereg add HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Classes\Wow6432Node\CLSID\IAS_TEST3⤵
- Modifies registry class
PID:4268
-
-
C:\Windows\system32\reg.exereg query HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Classes\Wow6432Node\CLSID\IAS_TEST3⤵PID:3248
-
-
C:\Windows\system32\reg.exereg delete HKU\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Classes\Wow6432Node\CLSID\IAS_TEST /f3⤵
- Modifies registry class
PID:2424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell.exe "(Get-Date).ToString('yyyyMMdd-HHmmssfff')"3⤵PID:4192
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "(Get-Date).ToString('yyyyMMdd-HHmmssfff')"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
-
C:\Windows\system32\reg.exereg export HKCU\Software\Classes\Wow6432Node\CLSID "C:\Windows\Temp\_Backup_HKCU_CLSID_20240519-232217646.reg"3⤵PID:3024
-
-
C:\Windows\system32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "Email"3⤵PID:3612
-
-
C:\Windows\system32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "Serial"3⤵PID:4520
-
-
C:\Windows\system32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "scansk"3⤵PID:544
-
-
C:\Windows\system32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "tvfrdt"3⤵PID:4436
-
-
C:\Windows\system32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "radxcnt"3⤵PID:4808
-
-
C:\Windows\system32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "LstCheck"3⤵PID:3232
-
-
C:\Windows\system32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "ptrk_scdt"3⤵PID:4328
-
-
C:\Windows\system32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "LastCheckQU"3⤵PID:2292
-
-
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Wow6432Node\Internet Download Manager"3⤵PID:2344
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "$sid = 'S-1-5-21-4124900551-4068476067-3491212533-1000'; $HKCUsync = 1; $lockKey = $null; $deleteKey = 1; $f=[io.file]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\BATCLEN.bat') -split ':regscan\:.*';iex ($f[1])"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:2800
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\Software\Internet Download Manager" /v "AdvIntDriverEnabled2" /t REG_DWORD /d "1" /f3⤵PID:4640
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\Software\WOW6432Node\Internet Download Manager" /v "AdvIntDriverEnabled2" /t REG_DWORD /d "1" /f3⤵PID:3676
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\DownloadManager" /v "nLst" /t REG_DWORD /d "1" /f3⤵PID:1340
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\DownloadManager" /v "LName" /t REG_SZ /d " " /f3⤵PID:1948
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\DownloadManager" /v "FName" /t REG_SZ /d "Admin" /f3⤵PID:3032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
1KB
MD5e5bfec1063a497048fffb231a0621403
SHA197cf6a89f237f43b9c22e3e081f7d45924d435ba
SHA256325d1ffa65e9593a834f3662168d0c1950de148c63f1e43b86727087f3881d6f
SHA512e38c5189054cf09fb15de017d0bbe226338124ee02bb04530943c8fcfc303dbe5fe5fd28c9c1aea1b552d1a2b0b76cabbedd284a38a07d41ec9cf9e55b44dd0e
-
Filesize
1KB
MD59c40d607cf1b4353d3ee6334566d6c05
SHA1f721efab33b52e855be98a86a9fdfe0699a52456
SHA256a5c6e9bea6ec56b31f91d68fa6c3f5d5ad2b4de10ab40eba706f265a91c756c8
SHA5120e27affda225ba3027a0531c6b73ec4e11c46e096cf672912b3ef7e22e24d28b4f409605c6a58d4dcf1a58942853781686b8790d63b2d667bcedb15a70505764
-
Filesize
1KB
MD53ec7192bf61c645b892a3a49564222f9
SHA1a0750ba8858b1d46edae06e3d8a3928b120ccbe6
SHA2563cc945fea020db691b62ba07f8dec3bc079562fed7bcb2d6237ca77f842c4e7a
SHA512b662f87c57009ea9c5b35328e6b9db85d7b5e958c822c2ebc0afc2d17fda92aa88cca4dc6d8b7a05bf3ed4a775dca849a1b3f26f3da21b8c2e7d92402cc25023
-
Filesize
1KB
MD5ce5eaa6cbc87f7cea74fc78306fb646a
SHA1f92913ae33a2b2829829eaed2663f364795e8998
SHA256b260ac27d8c42614178b2b5705e0574b4a5af4213daaa9b174b47341e3a6984e
SHA51245948248a5d5307777df92bc35dcf63366d6f94ca652117c611f85c8167c938cf6e68d7db867ea926de4525f37d0572588c3682b504075c6b9f38ae903e7932c
-
Filesize
1KB
MD50f6a3762a04bbb03336fb66a040afb97
SHA10a0495c79f3c8f4cb349d82870ad9f98fbbaac74
SHA25636e2fac0ab8aee32e193491c5d3df9374205e328a74de5648e7677eae7e1b383
SHA512cc9ebc020ec18013f8ab4d6ca5a626d54db84f8dc2d97e538e33bb9a673344a670a2580346775012c85f204472f7f4dd25a34e59f1b827642a21db3325424b69
-
Filesize
19KB
MD59fe22c4ad624881f8f0977cc7614346f
SHA19716758c55c57c354fd3e7ba14a40ae03d9db7d0
SHA25612b47c1949cc555c2f68f9fd4677ed5266f25c4da4630bec36e303629b133225
SHA5125e54cbdabf2c84a9df1128aade9a4743e8bf26140675a43f00255e45af28862660b2d45b7138fa2b7a80c8e409bdc5a13500068aa587440cb8fa7df65d171354
-
Filesize
5KB
MD545dc895cb92093f466aca0e3fe5c09b7
SHA15d815d6dde9a40a822f6144c0f7e9f31f8c6936a
SHA2564c0e2396b9fca1bbeb36e9ebb27f27e63cd2662abf8b18f042d872322e1363eb
SHA512e5fb3d67149c373cbb6050d3b783fe521e22a518e2bac0450d8ca2d21d9fd7686d4da631be1ae0c448da000b07f0ce205508241639712e812768c2bcab7a0ec6
-
Filesize
32KB
MD5e9d06132591c36129e4455d063612beb
SHA1798619665c9915bc2f50bec9f0d9d0707a5a485e
SHA256357e1fb247f831c9b4a0363445a0a7446af42dea4585f5c7357391e5732f4b2c
SHA5126eabef2e10285611260d6ea1503bbb2eafb830c3dc4544f064edfa0e6821f21bbe65a77878cb18f8ebfd80ff520459e9a65f274f9c0eec7e772bec1c41d0476e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82