Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2025 08:41

General

  • Target

    Malware-1-master/MEMZ-Clean.exe

  • Size

    12KB

  • MD5

    9c642c5b111ee85a6bccffc7af896a51

  • SHA1

    eca8571b994fd40e2018f48c214fab6472a98bab

  • SHA256

    4bbf7589615ebdb6c769d6d2e7bdcb26072bac0cda6e225a4133ba8819e688d5

  • SHA512

    23cc74b5a7bdf70ba789d1730a0009414cfb9c780544e3d8d841be58782b9a9a089969c4295a0da25d07285505992386486d6ff0524e75605b96bb99cd3aaa1c

  • SSDEEP

    192:BCMfc/GinpRBueYDw4+kEeN4FRrfMFFp3+f2dvGhT59uay:AMfceinpOeRENYhfOj+eGdKa

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Clean.exe
    "C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Clean.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://google.co.ck/search?q=half+life+3+release+date
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:600
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:600 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1716
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:600 CREDAT:472079 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    854B

    MD5

    e935bc5762068caf3e24a2683b1b8a88

    SHA1

    82b70eb774c0756837fe8d7acbfeec05ecbf5463

    SHA256

    a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

    SHA512

    bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    24f4c41bf7ba70f49b71aa4ed3c2a414

    SHA1

    1c70530cd8c5a2fd9f511d03dfbb59d0e17ecb80

    SHA256

    749f6dddc7a679fe08ad9616286cfbf2dff8ab604a6982e87f20892e7de7f3d6

    SHA512

    5c253db92a9bc18fe7a2a8f49604788e8bc1a97b4a90fffe96ddef280dcd17f07396d67a0ff2eda54deacfee6a2c5fc27a6e31ac8a866a695d8e8346b0afd1fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_EB153A79B5AB80C6592F798A4A3667A5

    Filesize

    472B

    MD5

    f197d1de268e3b33a942c749ba6bede5

    SHA1

    a40a16e3d6e4779db874016d2d35bad797532b7a

    SHA256

    171d3c3f7a5b12a9ceb127ab1ed643dd93b7eb67dc2798996ff6b6dd6078a789

    SHA512

    0990ff2c012dbe21314b285969b6544d1fa11c872dfb1dede2b04b75aac062e17095f3f57626e841f461f0d332b304d6ace52aa008990559dd5055f3aeccf637

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    170B

    MD5

    28a38e1541f7182b597f08d0dfcfcca9

    SHA1

    fe55fe6236c77b893627da8452da17de03989f8b

    SHA256

    1353da19a2fb5b4c368e0df09e10b7c7717cb17b135a270d45ba54fdd3c64e3a

    SHA512

    bf4cd7add8a1fe4bbc5c57652f8165935371065deb1174b698d2b7317e0c774de80e7b82173f2abc06e83e5f632ce07953e22302dc962f8d4aacfa3dea25bb25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    b1e8805c595f2bfeea06e54ee8776643

    SHA1

    a5d5b08812bf84ba646193bc80a63d006b97d676

    SHA256

    5467ada214b66f2c0711bd1519c0dee31f271034b2e6d70e9235d842f6fea5a3

    SHA512

    71429f0a25107f68f4087677c7269a47089445d4356618ac8bc9ab5077c29687f3ad8bcb477e54bfc855f6f80343b0cb05fd1ef06936df147b6ce95c7fe7710f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_EB153A79B5AB80C6592F798A4A3667A5

    Filesize

    398B

    MD5

    1250f48db3eebe2168f6846065e76f3e

    SHA1

    70dbc3b86eb8416c2f0624820c4646803bd2b1cb

    SHA256

    d1ed41f953e93040fa133e08b85c9dd63d316a1d2899528ad0a91a629c287e4f

    SHA512

    03bcfd68d28b3011345eeea4fc8bf7510b52ee2d944fbc8c99eb10ee4f6da4424e983819372dee6b2e1d057665e6a4b54f687d5be7aa6862c5ddd88517c9b8f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b53031407d673ae497af3ba892c6a47

    SHA1

    777aa99700b1c87923bcd46db1fa12f6f01eba1d

    SHA256

    0737716c9294686ee9098bf179818251af748af290a377293a7bc740313e72d1

    SHA512

    6c2f8c4a4af49341cf291f3257d8e26d87c076c5d7338a6e525b1db90541ebe83507a01f08ff4f1c14a4a9fe284344a39c598a03027bb9b6524c07e030e3f85b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e96e33776d761f9f3b9677a0dfa0ab8

    SHA1

    cea69f7175f72b1d48142fe509518d18e17284cc

    SHA256

    7d06752c28f1a0186eb08c92309f8fdd5e8c6a9253dabf27e5568b51fbc63790

    SHA512

    134b039b52a04f8a67980a7d33ccfed8366940eb99c75ee612d9b4f77b35ba485201124f52d5748dc054bb84f3c0f28887b45e65f56daa519054ca38215d9c25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    acca491295cc684d6ebcf5a89bb4a82c

    SHA1

    0d0ec5ca52aaf866ee5ab747e59bde54053b2dbb

    SHA256

    e95c99bd4d4aea47b461c3a4d86ffc3f531a0511f574fc8ca8f93c684a055b70

    SHA512

    d347eba627796419c23030f5afd017a73471106624fc10dd3be70e3d9c3c1718c2b2b92d5c0f91a41feef5345e652bc864de022165430dfa8011f260770f9ee7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    433d73168c3dd7ac90c9145c79d75d29

    SHA1

    4269d083cb14957db78a4e1533120a0c41915beb

    SHA256

    9232f9c9647305b3a5078891a5568d2eec60857c059962c04577900cae51b7df

    SHA512

    fc005dbbca123502b91a9e7143c99d3891ef777bb1dd4ea828edc8fed979f5efb894c409440cb70dd4d3d8768cc312393d2ee1fc61db210298b91bfccae22833

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    465c946802798e32a4c3a25600fbc1b8

    SHA1

    036ac223e294dd78875fe1260aefac57c345e192

    SHA256

    11d62f97799e58e656210a45d18d383ebdc4f5f7a44f464a78d1e775d1a3122a

    SHA512

    2fe1f67a28789a1c0554c4fae82d810815447eae3a08eef01007a77aa863e506d802954823c2b33df74b1d05d2d6e69991dc189636ef8cfb89d9a2badab727a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    457e9b77e4243384bd729a8e15199054

    SHA1

    b0cd9beaecb477bf6f8e83f543cb9432dc0d936a

    SHA256

    26a178d7773c462e32224ac24bcb0ff88366031a2990349bd20651214a22c8cb

    SHA512

    30c9e3f878fd636843382adea888a3cf3147a9e8108f484792c361adb44d965bf01388d114647a1a2482d7a5290b7a040d6767b490b3c1ead4da57b073870351

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    caa5097360a56b75063f90b25ed189fd

    SHA1

    b61161a30e5af01b63fe6066442c620c499749ab

    SHA256

    a5304e274b5c133891448bd59ce02eb1c6a9e0eaca9f22216915512ba6cd406a

    SHA512

    16225b44ccf12a65d32f804ab833359752d07a6b5857cc541bfa1bc0f171bb661a2d6a9bed2a237689ad84c60cef32d1a62e6eace3218795f8463a9da645bffb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0cdd99a92bd37fcd2b194cd71f4621a9

    SHA1

    e08f2a0c4e79750f41cf6cf81bfc8ba414a3f508

    SHA256

    3f36615738a40b2decbcbbcae465cf3e7f6ca3079affc3a22ed562e1f87b10b2

    SHA512

    2284b924ec9732add2454a22c0ff39d4929cfd86a718d70d4fda74c8e45f09ca98890287c657af87c045147cc2cdeb3a3d719d922e42063ba0d68b8a810e6bc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    397a168ddd0def5e52aac098ff8650e6

    SHA1

    ea36517fc1f9ad0857c90fa198350499aa721932

    SHA256

    81096327918e1da5c8a9053625faca2311b0ca6793a4d47a92df6b428ea28fbf

    SHA512

    5d096b246f2dc2ed4ace05d0605a849a8394dba0e725e0995346789592328a0e82f77760461cd230ed982168f1a934c08e510e09d49253c3d3d9c75e080c44f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d465034289968195812d7cf822e566d1

    SHA1

    776dd65d133859944d42a1ed733d7b5005031588

    SHA256

    8abf12234f59b745204889e42ec3986690558f0b92e277b1c217be3ec7276fb0

    SHA512

    ad7706cefd190d6fca0e47e5a6b821387b07f5ad82c9742cb99044a4904f464814f716f17c430a2377272a97b5119b0846e590b3c20e454e4e621dc934eaaffe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ece82ae95ac8e9e9006c64f8c16c97e4

    SHA1

    6290070e95ba4562d1b5b291ebe7c3a7fdd60848

    SHA256

    ee1c2f07eabf47ca26a40a179d365b3e5abd65b6f665d13b1dbc52714f8b6929

    SHA512

    8bb9d67399fb2e1f83275c75dd3a4657c950a2e90b7ed4e431725a920b16980052bde7a4ec9d6053e0ddccc2cb53356095c0f5f8bfc2ca2706ac6b363fe6e5d5

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\SBWJVJ5V\www.google[1].xml

    Filesize

    99B

    MD5

    c33c3f3b0bc3cc69c19096782a267316

    SHA1

    4b9e07f0fc58db9d723f9485ea7f81cc081c4534

    SHA256

    e93e24947745b213ac1c74792e89c53fcfdc110babb6ccb685ebb02e68ab26f1

    SHA512

    06cacbefddc38cfe075db8825d4eedaa3ac2a2de4190b5a312e25db39517566814b89a9b0bf7219f9b1472efc2984701547b56cb3f5cf9dc5767a5fa73a3a175

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\melo7gx\imagestore.dat

    Filesize

    5KB

    MD5

    f16433dff2ba8f9ad520292d70db52ee

    SHA1

    848e6ba7621d4bdae55429b10fe1c143742804eb

    SHA256

    21aa63884d9897d2872c4546f97ed21da0c67d3efad3b11c1a283075a5017371

    SHA512

    05befaa01d7c2a5d6cc50f28e75c9eeb7f9eb99604474c89b25f662d5035153e0c6b77a73937d723e6ed12f7a78fa38606482a165947acbb679bb41c485ab35a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7BCOPU31\styles__ltr[1].css

    Filesize

    76KB

    MD5

    6aec8cfd5d3a790339dc627f9f1229b5

    SHA1

    b6c8cffe38e1015dd8595f2dd1a92435e2795874

    SHA256

    80583fa3c83831a9e036eba0500d1b9c0d30892d0701f1617e0fafaf5aeaa2ca

    SHA512

    4279e479c860007d04cd6ff0b8c45131c18d87420cd5ceb5c727a7ddbfb4206d007069102d643da97c3bf01d0b756a2ef4662c8e39b6969fc154de3c763b1efc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8P9TO0C6\-BI9RTDu-8BxHETcsTOjKWTLabkSJqe6xhYO-L_zfak[1].js

    Filesize

    25KB

    MD5

    16a0d41698c5d70e7a56c0177de31cde

    SHA1

    22d67dfe0defd61d847f607782bcebfc8945cdca

    SHA256

    f8123d4530eefbc0711c44dcb133a32964cb69b91226a7bac6160ef8bff37da9

    SHA512

    90728f9da056eedafe7599b9d9703deee36d1318c87ac8966680096a3328177a88dd946b236b8f1a04d5318b20554085eb64986d2f626e09d3448ec3c4296c97

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8P9TO0C6\api[1].js

    Filesize

    870B

    MD5

    959fca740c230726e5a7cdf2b7603468

    SHA1

    1fa3eb9690cb728a4ba96846bd8eac87fa914073

    SHA256

    1a7a8da967879cf8c53e114c331242c5d44c39d4b4778a0824bc2f363504c3a5

    SHA512

    c493d157fdb40ca20752cd7419c3bf837c12831ef05d0d3e41844e17fc99096d1a7429adaa58ade3eb99aa5e5ce4ad91af8ef7c25f36c7e69f341ad0f2e88e86

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DUME8XYE\logo_48[1].png

    Filesize

    2KB

    MD5

    ef9941290c50cd3866e2ba6b793f010d

    SHA1

    4736508c795667dcea21f8d864233031223b7832

    SHA256

    1b9efb22c938500971aac2b2130a475fa23684dd69e43103894968df83145b8a

    SHA512

    a0c69c70117c5713caf8b12f3b6e8bbb9cdaf72768e5db9db5831a3c37541b87613c6b020dd2f9b8760064a8c7337f175e7234bfe776eee5e3588dc5662419d9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DUME8XYE\recaptcha__en[1].js

    Filesize

    547KB

    MD5

    19ddac3be88eda2c8263c5d52fa7f6bd

    SHA1

    c81720778f57c56244c72ce6ef402bb4de5f9619

    SHA256

    b261530f05e272e18b5b5c86d860c4979c82b5b6c538e1643b3c94fc9ba76dd6

    SHA512

    393015b8c7f14d5d4bdb9cceed7cd1477a7db07bc7c40bae7d0a48a2adfa7d56f9d1c3e4ec05c92fde152e72ffa6b75d8bf724e1f63f9bc21421125667afb05c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\KFOlCnqEu92Fr1MmEU9fBBc9[1].ttf

    Filesize

    34KB

    MD5

    4d88404f733741eaacfda2e318840a98

    SHA1

    49e0f3d32666ac36205f84ac7457030ca0a9d95f

    SHA256

    b464107219af95400af44c949574d9617de760e100712d4dec8f51a76c50dda1

    SHA512

    2e5d3280d5f7e70ca3ea29e7c01f47feb57fe93fc55fd0ea63641e99e5d699bb4b1f1f686da25c91ba4f64833f9946070f7546558cbd68249b0d853949ff85c5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\KFOlCnqEu92Fr1MmYUtfBBc9[1].ttf

    Filesize

    34KB

    MD5

    4d99b85fa964307056c1410f78f51439

    SHA1

    f8e30a1a61011f1ee42435d7e18ba7e21d4ee894

    SHA256

    01027695832f4a3850663c9e798eb03eadfd1462d0b76e7c5ac6465d2d77dbd0

    SHA512

    13d93544b16453fe9ac9fc025c3d4320c1c83a2eca4cd01132ce5c68b12e150bc7d96341f10cbaa2777526cf72b2ca0cd64458b3df1875a184bbb907c5e3d731

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\KFOmCnqEu92Fr1Mu4mxP[1].ttf

    Filesize

    34KB

    MD5

    372d0cc3288fe8e97df49742baefce90

    SHA1

    754d9eaa4a009c42e8d6d40c632a1dad6d44ec21

    SHA256

    466989fd178ca6ed13641893b7003e5d6ec36e42c2a816dee71f87b775ea097f

    SHA512

    8447bc59795b16877974cd77c52729f6ff08a1e741f68ff445c087ecc09c8c4822b83e8907d156a00be81cb2c0259081926e758c12b3aea023ac574e4a6c9885

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\favicon[1].ico

    Filesize

    5KB

    MD5

    f3418a443e7d841097c714d69ec4bcb8

    SHA1

    49263695f6b0cdd72f45cf1b775e660fdc36c606

    SHA256

    6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

    SHA512

    82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\webworker[1].js

    Filesize

    102B

    MD5

    c206147c7cae99642a4f8a2c640a0019

    SHA1

    8c32b7b7e0807bbe85e5c8c94f87afea31eedc40

    SHA256

    6f55adbecce78b9c566f8dc830177dc91782702ff35f213f009fc2b902e25603

    SHA512

    0d94aa53b801ac69a9bb4a7df4fc0e00b6ffd1c5668a6fee4efc11986b7f516eb27a8a0197c0106a4295acd5f63c222ea2f1bd9431bf2d689672ac91c5528eb6

  • C:\Users\Admin\AppData\Local\Temp\Cab205D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2060.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IZV336R9.txt

    Filesize

    124B

    MD5

    66bc22e44daa75b71ebb57c8f9d5a528

    SHA1

    cae0ca95c15f209529a1e12a61c8535ef3aee322

    SHA256

    dfda90d6e7bf8cb92e1d4d9fc45bba511e6c6f9825f0db859e45dabb69127284

    SHA512

    6a93d054484b5a78fcfe1f82aaeb900edffaf0794f0be0eae23027502550b195362f0b00484aa05292d92b09ee007dc2c1b67d6c47480eea0351615cd3293ead