Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe
Resource
win10v2004-20240226-en
General
-
Target
b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe
-
Size
1.1MB
-
MD5
99130099fcae6f94ef50318ae0475f1a
-
SHA1
a08039f3dab482b2ce679836ceebbc8b59923b30
-
SHA256
b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d
-
SHA512
2d6a0f32c5db78d4830e754bb115302a02ba388948750181816f2098a8422f8f7ba4b5c2f83bfae38d768bf6ee032f3235265380a7cfe288de18ab5a885443db
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qh:acallSllG4ZM7QzMS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 4468 svchcst.exe -
Executes dropped EXE 7 IoCs
pid Process 4468 svchcst.exe 3288 svchcst.exe 2084 svchcst.exe 1992 svchcst.exe 3312 svchcst.exe 4704 svchcst.exe 3392 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe 4468 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 4468 svchcst.exe 4468 svchcst.exe 3288 svchcst.exe 3288 svchcst.exe 2084 svchcst.exe 2084 svchcst.exe 1992 svchcst.exe 1992 svchcst.exe 4704 svchcst.exe 4704 svchcst.exe 3312 svchcst.exe 3312 svchcst.exe 3392 svchcst.exe 3392 svchcst.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1804 wrote to memory of 4524 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 96 PID 1804 wrote to memory of 4524 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 96 PID 1804 wrote to memory of 4524 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 96 PID 1804 wrote to memory of 708 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 95 PID 1804 wrote to memory of 708 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 95 PID 1804 wrote to memory of 708 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 95 PID 1804 wrote to memory of 1008 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 99 PID 1804 wrote to memory of 760 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 98 PID 1804 wrote to memory of 1008 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 99 PID 1804 wrote to memory of 1008 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 99 PID 1804 wrote to memory of 760 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 98 PID 1804 wrote to memory of 760 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 98 PID 1804 wrote to memory of 3652 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 93 PID 1804 wrote to memory of 3652 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 93 PID 1804 wrote to memory of 3652 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 93 PID 1804 wrote to memory of 1188 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 94 PID 1804 wrote to memory of 1188 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 94 PID 1804 wrote to memory of 1188 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 94 PID 1804 wrote to memory of 2608 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 91 PID 1804 wrote to memory of 2608 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 91 PID 1804 wrote to memory of 2608 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 91 PID 1804 wrote to memory of 5012 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 90 PID 1804 wrote to memory of 5012 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 90 PID 1804 wrote to memory of 5012 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 90 PID 1804 wrote to memory of 1984 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 92 PID 1804 wrote to memory of 1984 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 92 PID 1804 wrote to memory of 1984 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 92 PID 1804 wrote to memory of 2460 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 97 PID 1804 wrote to memory of 2460 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 97 PID 1804 wrote to memory of 2460 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 97 PID 1804 wrote to memory of 1136 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 100 PID 1804 wrote to memory of 1136 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 100 PID 1804 wrote to memory of 1136 1804 b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe 100 PID 708 wrote to memory of 4468 708 WScript.exe 102 PID 708 wrote to memory of 4468 708 WScript.exe 102 PID 708 wrote to memory of 4468 708 WScript.exe 102 PID 1008 wrote to memory of 3288 1008 WScript.exe 103 PID 1008 wrote to memory of 3288 1008 WScript.exe 103 PID 1008 wrote to memory of 3288 1008 WScript.exe 103 PID 1136 wrote to memory of 2084 1136 WScript.exe 116 PID 1136 wrote to memory of 2084 1136 WScript.exe 116 PID 1136 wrote to memory of 2084 1136 WScript.exe 116 PID 760 wrote to memory of 1992 760 WScript.exe 105 PID 760 wrote to memory of 1992 760 WScript.exe 105 PID 760 wrote to memory of 1992 760 WScript.exe 105 PID 1188 wrote to memory of 3312 1188 WScript.exe 106 PID 1188 wrote to memory of 3312 1188 WScript.exe 106 PID 1188 wrote to memory of 3312 1188 WScript.exe 106 PID 4524 wrote to memory of 4704 4524 WScript.exe 107 PID 4524 wrote to memory of 4704 4524 WScript.exe 107 PID 4524 wrote to memory of 4704 4524 WScript.exe 107 PID 2460 wrote to memory of 3392 2460 WScript.exe 108 PID 2460 wrote to memory of 3392 2460 WScript.exe 108 PID 2460 wrote to memory of 3392 2460 WScript.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe"C:\Users\Admin\AppData\Local\Temp\b2e9de5d7261c969e775410f89c5e60bcdf655f6fbf4e2a672c84b2938141c5d.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5012
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2608
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
PID:1984
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
PID:3652
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3312
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4468
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4704
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3392
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1992
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3288
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2084
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4104 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD569238bac1a4b65b4797b4880ec6ca735
SHA1f88fc57900122911d0a66a566e55049c91f42400
SHA25682acc15df8b63ff3f70f64576f75d16f4150234dab8227f7e6b41f3d195cfabb
SHA512c8d1b54fc2afafc8478d6cee727a6969235a542c5745d1518ac7ef09c650765787a09cf2fb20b864e690b0faad5f9691479a8c50484b02088a760f6d866a99eb
-
Filesize
1.1MB
MD552abc1f2ba0629ebba79d8d8aa3deb12
SHA179fb46be4d853c67306bc0efa398c094f6ced838
SHA2565764d45bc8ac35aecf56d4544fb2c04b497fe0b58d9feef74d88192da37116ad
SHA5126cc647e43d294dfb594a36e929aa1d767934e2c16c561fa40ea520606f3545f5c3757df511ce428ac283081097eaaf29c2dbe4efd177a0503087cf7015b369e9