Overview
overview
3Static
static
erxczzxEr0...ore.js
windows7_x64
1erxczzxEr0...ore.js
windows10-2004_x64
1erxczzxEr0...rap.js
windows7_x64
1erxczzxEr0...rap.js
windows10-2004_x64
1erxczzxEr0...een.js
windows7_x64
1erxczzxEr0...een.js
windows10-2004_x64
1erxczzxEr0...x.html
windows7_x64
1erxczzxEr0...x.html
windows10-2004_x64
1erxczzxEr0...ght.js
windows7_x64
1erxczzxEr0...ght.js
windows10-2004_x64
1erxczzxEr0...ain.js
windows7_x64
1erxczzxEr0...ain.js
windows10-2004_x64
1erxczzxEr0...zr1.js
windows7_x64
1erxczzxEr0...zr1.js
windows10-2004_x64
1erxczzxEr0...es.jpg
windows7_x64
3erxczzxEr0...es.jpg
windows10-2004_x64
3erxczzxEr0...ore.js
windows7_x64
1erxczzxEr0...ore.js
windows10-2004_x64
1erxczzxEr0...rap.js
windows7_x64
1erxczzxEr0...rap.js
windows10-2004_x64
1erxczzxEr0...een.js
windows7_x64
1erxczzxEr0...een.js
windows10-2004_x64
1erxczzxEr0...x.html
windows7_x64
1erxczzxEr0...x.html
windows10-2004_x64
1erxczzxEr0...ght.js
windows7_x64
1erxczzxEr0...ght.js
windows10-2004_x64
1erxczzxEr0...ain.js
windows7_x64
1erxczzxEr0...ain.js
windows10-2004_x64
1erxczzxEr0...zr1.js
windows7_x64
1erxczzxEr0...zr1.js
windows10-2004_x64
1erxczzxEr0...s1.png
windows7_x64
3erxczzxEr0...s1.png
windows10-2004_x64
3Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-06-2022 17:18
Static task
static1
Behavioral task
behavioral1
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/before.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/before.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/bootstrap.js
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/bootstrap.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/fullscreen.js
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/fullscreen.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/index.html
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/index.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/light.js
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/light.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/main.js
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/main.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/modernizr1.js
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/modernizr1.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/virus-images.jpg
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/virus-images.jpg
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/before.js
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/before.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/bootstrap.js
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/bootstrap.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral21
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/fullscreen.js
Resource
win7-20220414-en
Behavioral task
behavioral22
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/fullscreen.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral23
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/index.html
Resource
win7-20220414-en
Behavioral task
behavioral24
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/index.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral25
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/light.js
Resource
win7-20220414-en
Behavioral task
behavioral26
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/light.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral27
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/main.js
Resource
win7-20220414-en
Behavioral task
behavioral28
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/main.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral29
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/modernizr1.js
Resource
win7-20220414-en
Behavioral task
behavioral30
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/modernizr1.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral31
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/virus-images1.png
Resource
win7-20220414-en
Behavioral task
behavioral32
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/virus-images1.png
Resource
win10v2004-20220414-en
General
-
Target
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/index.html
-
Size
37KB
-
MD5
2cda3d712eda3eaa8b8f1d047186082c
-
SHA1
bcdeb6ceef9b9ab9bbc48681ac84f6ca9c77e888
-
SHA256
cc243cb9d3f75fc87a3c899a99e182279c4b49e7c823f89bc9bdbfaf5ff65d84
-
SHA512
81d144d1587736c8f2994d03eb935352facb0ec221bd36738a159f1c8efd53ca0927a6dd9b407589cb337b4ceababe8dffef2bb6b883d3f3eac6544813614628
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2421000585" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30968997" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80cf859ba58cd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{BBEEA828-F898-11EC-AD90-5E4EC20DECC8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d44f7c908017924dbb36ebe98e677ce100000000020000000000106600000001000020000000cd45339ed8d22f366951fa4852aff5309b02db3410cb8699e59294c5c729b6ad000000000e80000000020000200000000ee867f260661347972d8f5e0f389793a1821b0bf9942977ad9f2576ad1bfef3200000004309b9da2479a298d9445dd0c6fbbb18a8b8e2e502877ccc99ee3aa8021a90af40000000949d410403f7f9a06f31cff83b005f356dda93406a0f18e9331b878e00c322273220789a057f9e79f553e504358d16f3a207cb6f62cda6675aa93cd12d37dec6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2421000585" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30968997" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2431898012" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0597c9ba58cd801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d44f7c908017924dbb36ebe98e677ce100000000020000000000106600000001000020000000f1d294fdb654c4d543f1008d93daccde46c742327a2ebaef98684a8fbab4e2e1000000000e8000000002000020000000c5c31d656f7f89f53dfd5c7ed13a950308350c987adc291b246e183464c7da92200000004f847679b64425bd68056aefdf2ed18f8901dd79646e6ac193db43e4e9a414d340000000d9afe40f9968721ff470ec9491ef3ccfadcaae0ac29202507417fec2ebe96edd4ffdf2013c95b403e4ad29e01096de84950e989667c66fb460b8855bfca525a4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "363374516" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30968997" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1809750270-3141839489-3074374771-1000\{FEF5489A-A82B-487D-BFF1-FC60EEC45CBB} IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 3312 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3312 AUDIODG.EXE Token: SeShutdownPrivilege 2368 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 2368 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2368 2176 iexplore.exe 79 PID 2176 wrote to memory of 2368 2176 iexplore.exe 79 PID 2176 wrote to memory of 2368 2176 iexplore.exe 79
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc\h0el0pIED0Er0\index.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2368
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x410 0x4a41⤵
- Suspicious use of AdjustPrivilegeToken
PID:3312
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5c4a8c03b96371fcbe2e3a0e4b911e38e
SHA190f79bf49ef625e17a905fa2ff899842e7a22704
SHA2567294630739e87a3772073ff9293df877add559be651ec165d25a366aa50f56d9
SHA512c28695b0b9979118d83163ebbcdbae815eba4aa4e31a01787bb8e220ee90fb7c388f79420a9a708158e3b707a684c4145105ac731a11e0bba701922752c669c2
-
Filesize
7KB
MD5df6deecba36f8d0af53eafa9c51ab1f7
SHA16430b114505bc7faf945b1bf250b8e33adfd54e1
SHA25660d1053bde5fbca23ed8976f1eabaee9c4bb459d9c997e5a76bb2182ee916d98
SHA512524ba4be0dde21181da4ff97a00caf037f382cf7e128629bbbf0b9e7a65d6df39b78e09ecfe3ceef8ed1f69883d6d1ceb1ae32b36594d14b0d65f5c6ccbfe46b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5d5c1f347a1ea8a242b341ed83a2c1cdb
SHA1d4598971d0fb466da6bf9bb0eda8a9ffe81508f5
SHA2562b312cff85b045f4b5a32f526d8e7b3630d07fc693553e7b715068614c8cb9ee
SHA512b44279dc638267de2448114081faf35cf413cfeefd3b104b6148ae12d39d645e30b8d1bce21849803074b651493650582c206bbb1d6fe1ac1e3a6a2f9ae43830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F
Filesize226B
MD57082ea5a9c7d1abdb7b47a85ef11a342
SHA1c1c3219f31539a67616b57f5731cce890258a77d
SHA2568c0425b5ecf5df506869a131caf45a7d4ad830cc23bcc7af8590756304ec5f78
SHA512e39f5e192bca491cca04e574a1d66d866dc9a86f91c63959dc2e2d3ea0ae22a751c3ad130dd43a0a260674cfbdb46f69951cb9916abb2291d46a72644207266b