Overview
overview
5Static
static
4var www ht...api.js
windows7-x64
1var www ht...api.js
windows10-2004-x64
1var www ht...a.html
windows7-x64
1var www ht...a.html
windows10-2004-x64
1var www ht...x.html
windows7-x64
1var www ht...x.html
windows10-2004-x64
1var www ht...g.html
windows7-x64
1var www ht...g.html
windows10-2004-x64
1var www ht...3.html
windows7-x64
1var www ht...3.html
windows10-2004-x64
1var www ht...e3.xml
windows7-x64
1var www ht...e3.xml
windows10-2004-x64
3var www ht...ase.js
windows7-x64
1var www ht...ase.js
windows10-2004-x64
1var www ht...b5a.js
windows7-x64
1var www ht...b5a.js
windows10-2004-x64
1var www ht...b5a.js
windows7-x64
1var www ht...b5a.js
windows10-2004-x64
1var www ht...b5a.js
windows7-x64
1var www ht...b5a.js
windows10-2004-x64
1var www ht...b5a.js
windows7-x64
1var www ht...b5a.js
windows10-2004-x64
1var www ht...b5a.js
windows7-x64
1var www ht...b5a.js
windows10-2004-x64
1var www ht...b5a.js
windows7-x64
1var www ht...b5a.js
windows10-2004-x64
1var www ht...b5a.js
windows7-x64
1var www ht...b5a.js
windows10-2004-x64
1var www ht...b5a.js
windows7-x64
1var www ht...b5a.js
windows10-2004-x64
1var www ht...b5a.js
windows7-x64
1var www ht...b5a.js
windows10-2004-x64
5Resubmissions
19-07-2023 21:16
230719-z4frlabb95 419-07-2023 21:13
230719-z2sndabb89 511-11-2022 04:56
221111-fkt1bsbcbk 5Analysis
-
max time kernel
118s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19-07-2023 21:13
Behavioral task
behavioral1
Sample
var www html kemhan/alfacgiapi/.alfacgiapi.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
var www html kemhan/alfacgiapi/.alfacgiapi.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
var www html kemhan/wp-content/themes/menhan/css/fotorama.html
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
var www html kemhan/wp-content/themes/menhan/css/fotorama.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
var www html kemhan/wp-content/themes/menhan/css/[email protected]
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
var www html kemhan/wp-content/themes/menhan/css/[email protected]
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
var www html kemhan/wp-content/themes/menhan/css/grabbing.html
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
var www html kemhan/wp-content/themes/menhan/css/grabbing.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
var www html kemhan/wp-content/themes/menhan/fonts/fontawesome-webfont93e3.html
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
var www html kemhan/wp-content/themes/menhan/fonts/fontawesome-webfont93e3.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
var www html kemhan/wp-content/themes/menhan/fonts/fontawesome-webfont93e3.xml
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
var www html kemhan/wp-content/themes/menhan/fonts/fontawesome-webfont93e3.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
var www html kemhan/wp-content/themes/menhan/gallery/jquery.aw-showcase.js
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
var www html kemhan/wp-content/themes/menhan/gallery/jquery.aw-showcase.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
var www html kemhan/wp-content/themes/menhan/js/accordion6b5a.js
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
var www html kemhan/wp-content/themes/menhan/js/accordion6b5a.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral17
Sample
var www html kemhan/wp-content/themes/menhan/js/fotorama6b5a.js
Resource
win7-20230712-en
Behavioral task
behavioral18
Sample
var www html kemhan/wp-content/themes/menhan/js/fotorama6b5a.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
var www html kemhan/wp-content/themes/menhan/js/jquery.bxslider6b5a.js
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
var www html kemhan/wp-content/themes/menhan/js/jquery.bxslider6b5a.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral21
Sample
var www html kemhan/wp-content/themes/menhan/js/jquery.min6b5a.js
Resource
win7-20230712-en
Behavioral task
behavioral22
Sample
var www html kemhan/wp-content/themes/menhan/js/jquery.min6b5a.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral23
Sample
var www html kemhan/wp-content/themes/menhan/js/main6b5a.js
Resource
win7-20230712-en
Behavioral task
behavioral24
Sample
var www html kemhan/wp-content/themes/menhan/js/main6b5a.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral25
Sample
var www html kemhan/wp-content/themes/menhan/js/modal/js/basic6b5a.js
Resource
win7-20230712-en
Behavioral task
behavioral26
Sample
var www html kemhan/wp-content/themes/menhan/js/modal/js/basic6b5a.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral27
Sample
var www html kemhan/wp-content/themes/menhan/js/modal/js/jquery.simplemodal6b5a.js
Resource
win7-20230712-en
Behavioral task
behavioral28
Sample
var www html kemhan/wp-content/themes/menhan/js/modal/js/jquery.simplemodal6b5a.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral29
Sample
var www html kemhan/wp-content/themes/menhan/js/owl.carousel6b5a.js
Resource
win7-20230712-en
Behavioral task
behavioral30
Sample
var www html kemhan/wp-content/themes/menhan/js/owl.carousel6b5a.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral31
Sample
var www html kemhan/wp-content/themes/menhan/js/zozo.tabs.min6b5a.js
Resource
win7-20230712-en
Behavioral task
behavioral32
Sample
var www html kemhan/wp-content/themes/menhan/js/zozo.tabs.min6b5a.js
Resource
win10v2004-20230703-en
General
-
Target
var www html kemhan/wp-content/themes/menhan/css/[email protected]
-
Size
242B
-
MD5
60a91b6c17c166f9df9fabe704a94dfc
-
SHA1
6372dabec5d08f1a7d75a3994c1ad7decd1153cc
-
SHA256
4221c95ff4501a4b53cfbc73ba20004a65ca83ca6c64ce99b57982c93d2314a7
-
SHA512
17df4452440f955523f5a13d058df5602e7d327c87a338783348d1195c728788dbcbecfeae51f169cfb9ed3c323afd4a55d6ea9a35588808c96f13c2a952da4a
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c7eaec47cb7afa4887efc5e3f3ae1d8c00000000020000000000106600000001000020000000dd9cb6e8028fae07037cd93942a6046f2d3e25db4a557845bbe711c6d87f5565000000000e8000000002000020000000acae20e79aa2921302bc838cc930f8cd75c90ce861d2ff4ed407386d0824024d9000000075c8000de5ae4315793f3b0aa760ef47ebf5676788760528d54f77ef58231276875dd9e37822e9b3aad204cdd285f2048a7564e0ecde2f1aaff73cbb24b1be7d19da11a097a3777d1c8d0e635bcedb0085b4727de681c2c15f9c7232b80f2ccf7c59c835b92515b8d574b1b36f8857588146eebed485803421913ff017921fa7d196de2a631efa5786bfae8d9693ed0440000000646b84d960bceb2a1225ad6d40deaa8806415abf7c02848117d8eeff9becf7c5f3912657457a464dd1a7251a7e88352ae1e36f1f5ec91ebf0e5e4f599ed0ea1c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4916DEF1-2679-11EE-ADD6-5E6847EBFE3A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c7eaec47cb7afa4887efc5e3f3ae1d8c00000000020000000000106600000001000020000000d7274c6f46e762deaf79a7c7fdc1b9dc412c39a980a3510c21ffcd4ce929b4a5000000000e8000000002000020000000898d126d4595ab95ff7ccbb314002568b9c141a4838078192358b9f3831ffe1120000000f54c5cde8be22f3841a8c371b70da8a1161a27526380ec4159c3e889646f391840000000c27a65870cf700d413104db1131028636881f6acb6faac7d463eeabf1de9b448fa70ed67ebefc04867d021136ca241f03d9cf352db296a8e0de32e8e011c7e05 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0468b2186bad901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396566260" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2256 2356 iexplore.exe 30 PID 2356 wrote to memory of 2256 2356 iexplore.exe 30 PID 2356 wrote to memory of 2256 2356 iexplore.exe 30 PID 2356 wrote to memory of 2256 2356 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\var www html kemhan\wp-content\themes\menhan\css\[email protected]"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2256
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59aae9177d85ac41ea63c28369099c4dd
SHA14d41a8cec22823b9fb67ab9736e2304a2f5152f4
SHA2569b9921d16d426942113ca59a753608ce591e984c24a7b0c8a600b696c31fbaf6
SHA512a21769f82974b7022f071ab81a9c551957a69148b5436e50f644bf88f780d7d70055710ed71d76baf28546ad2c24c303dafd6e527da71597aee795c74b122ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD577aa8f9eb0ee4ed88e0ddda415d9c5b8
SHA1cb428a2d29e530979a922fd4fad184bfec73eb3f
SHA256269855fcd3c947d6ce3b967c7174f28ee635dffa74fe443852001d727217839e
SHA5124bff864671c7076c92addf09088952457ae4ed592b749dca3a2955e91c1ceec6d2c1763e7e9757d23701253430358181858e37a81ee42b25772a126690400557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58ef28d806f6cf39ddd7598ed3bf1da29
SHA1e0626a1b676dfc976a4bcd39f07c4ad688996bac
SHA256a15df557bbc47011533080e1d1fa06d9cff05275861e62f7222db81e9e4f1c63
SHA512efe59a533f593771fdaa21696b4dae1ee54bd7f3c97ef5a8aa1e0dc27b9415c0356c19855e5f2ef9a8383d268aef08a4d1bec518ce7618c59cf0d61f9a9249d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58c83f2db81bced40eee3b6df10e4694c
SHA1241712fc5904a43514a51e4ab9bed2897e8335da
SHA256a9df6e590d73d1519c2065abc719fefc69509fe03d0261dee77c47ced6c4509e
SHA5129a960e4e55e538a5a8c35e9fe5d2db1e2af388e4f85ea4055927d2e5473e85d8ebd37f4784cf232f46d2a2c0ec901bf97d3cc75889ebaab4153416aa0ad98348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD500b3317c0d4df9213d06c8005ee7b6ce
SHA1498a34ac7554319481cc03484b875555b898cbd3
SHA2568f9de8ac7149ca02895b7f8d691ce10f426c3f02d9d4edf02a3541b74b1d7218
SHA5122635569595715dd8d021eddbafadb534b844f069a619a022983d515c4b257615631ad9cf2a35348a62e12de64e293b91b623cd3daecdfb304a26bb7294220368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5db481fe34dd65ea5d4a676956c1ea8a3
SHA1f083914001baca69e4dd39bfa4581c25427b84fc
SHA256eef3c7466f276dc8eddda422be5b4ae69be6266d613cccec520159f7f305cfac
SHA512a0b954c20dcd5f201e6347d39aadac749942ae8f536cc4d2971d85f432eea3793e136389de4b4bb6a31d1e73cc0cff99bd7de50d26fecd201ee60619dd30b43e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD586801f9d4a9e057c436af3474024c0e2
SHA15599df5ab68e69ed3753faeab5b3d0d4a93d234d
SHA2564f380f9eb181aa38a2bd73b00b85dc32650068b1d0e92349142ef74614fbc4d4
SHA5125133e28060895c1096957a84174a46628d3a39c3ab36c1c2dc5c5a4a2c9b847121ffb82eea163664924b3ca1e3d173145c9b88d9c2adae2880c0872654bb2f92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8AJTUMOT\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD56ef3217a8831b613710b8e1102240965
SHA157c27ea61e713ebb1ef2d24e9609cdaae57a0f00
SHA2564b7a7a3b21bf8690e00e5cfb305383450472baa46070e657003164d9c2fad5a9
SHA512565326d208bb16e6764712524130f74ffef8df316736392ba411e8329a1f807710a1e84eb66d2696246134b4a6b0681380f7051886329bd78935ad74f5530c91