Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18/08/2023, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
mangadogs.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
mangadogs.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral3
Sample
checkin_rule.html
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
checkin_rule.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
vip_free_trial_rule.html
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
vip_free_trial_rule.html
Resource
win10v2004-20230703-en
General
-
Target
vip_free_trial_rule.html
-
Size
10KB
-
MD5
389c62ff3a731c11e7135dbf2496188a
-
SHA1
aa17e694f7f0a83053450a69dbce575b831357a3
-
SHA256
4936100f790bdc94e07f98c34fb6656a27b3f6ce6dded8dd86dd584f6da3a43e
-
SHA512
8201c1b87a9c4b7ae92990404ae496be032f9c6f2fbdbc521858fdc03b553e461d6233dbca8cc39f90e7f3a8666555c04fbd528d041c34b9481a25456d98aa93
-
SSDEEP
96:Gl5dvStaMabaHacaxaqakaLKBlOeWXwBRGRmHPH+OS7ZrxoBR3VJznjnezG:GIKBzr+ojnezG
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000dfff1b3a562844db5bcdd926cd82794000000000200000000001066000000010000200000007d8503af33f06969b803a352b04762fab2c85eecfd0a7dc5757f0c2b171fbdcb000000000e8000000002000020000000292f94b58f0883ece1626dfad256e13a439d6692685de420d6e3819755835545200000004d089b18b7e5e95338958ace2bad3e8fd32dae9036ed8d695179a0a8b88a5f1b400000008569751c9e7c5241c464703077038e4a34702b6e2f6cb467a56e8bea4127fecd3b0b4abcee797bf748dcd472c8c091dc998ca6c74bc0d93fde253b4f7e6f37c4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "398561500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0897D781-3E1B-11EE-B36D-EA84BFBCA582} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d092e9dd27d2d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000dfff1b3a562844db5bcdd926cd8279400000000020000000000106600000001000020000000589924eea84cac5d578e0ce9c0730b7c7a8ae1cd7b3c6935bd3a74317d41d206000000000e800000000200002000000038bb951f187952ee4f8141b19f3c24fbd0dc34e8d0322ea97babadd05b3f0410900000001072fc0855140a81f0e6afcda5d6ad273639abd3f103de8d5316880fdeb7cb394f7ed13199e46adb090f438f646ed12d0b0d83a0cb6a84a095cd8ae01cafd64a8967563856acc252b5d95e9d9b9dbae446ef21670468277fce5502813eb6fb77544e497984392e8d6742f6dfdb88703a0cc56a3a1f902c7d7a73a0b3c9f3511854aa93a6d61b5e232e8a3abae941a3ba40000000fd11eb57ae503766ff225154f9057551f5da57f0c49f69bd55ca577e088b67f419d124b5e702d371b0ad53fca4eb200829eb386c8b1c15497116497470805954 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1876 2488 iexplore.exe 28 PID 2488 wrote to memory of 1876 2488 iexplore.exe 28 PID 2488 wrote to memory of 1876 2488 iexplore.exe 28 PID 2488 wrote to memory of 1876 2488 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\vip_free_trial_rule.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57842d46671990af1b79a1f18614ab709
SHA161f9efde2a97a896ede2d6a066fa65a922f8a1f8
SHA25687b65e9d07d33b63445db3a324682c257fb8845c6c06b14f34fb381d08ca290a
SHA51290ccc4103632483e910b497e0a2c5c5a2d885a65b160e5481327595f365e3b66d7a962b19c2892860b359f07a5cb00f4a2473340fbe7db025a9bcb62c3ed6de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fceeea6f918a157b23789baba0900cc
SHA18a2ffcc156a841310a00419eb4201cdb0d1629a8
SHA25685725ccbf8e60da9148050d171095eac7b047c1163b9d1e9c5b79ac946c55546
SHA5129a2de8a98c8e6a412d3e720a647aa5a0a4315a19be7e7bed974bae329d883ee03444783f6df7a5d4be925bcc65118e8fb3f734db187f9ce2bd93678e2064a74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513841a253294c13e66cd3a0015794f3d
SHA18072a5b95423f6f9c09f08bcb4e9cc89e070b01e
SHA2560bd6acea3d0b515903d047503e0ad1210e7ec24174a487af1612dec07d9250fb
SHA512d62a437e2a5ccf8c5f09faa7a5b9886e0b165b63e223b62ef4f7222afbcd9b1d089667444ea5c9baefd5dc0885119dd20676087105246805fa218f275895ed78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581eec99eedec81fe6bd4754c6d47bcc0
SHA1725d7534c2e355c559b77f2902256523ed293d87
SHA2566152bb2744000d7dcc5fcc7a5c738b48eec45960de778210338c07cca3eb8b1a
SHA5127c5edc9dc1afea8481b3c9c1ab4517a3c5abf12a9271eb1e7f20afca0580635b8acf80f73244306adcee4bb372cdbc39f81c7f9ea437fb63b60388c32da88e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596e8dbc5e3dbf1b9a33d6b5f67f6018d
SHA162b2bb4093b9a3debf14785b61c2f01982afb440
SHA2567081559ab69d2c779a1a7c099d2cb10929cb27a2b874c6a6c8f3ef018ceaea38
SHA5123ee942f7ff0e26e6d5b9f6c620e2387d875ac3f6913a0d46141870a138503dae0ac4e933bf5f392bb4ec2a1f4f7afa382b30978784033cf9592004c53721f542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f2b315543cceedee322aade13345f8b
SHA1d07610e5a5bf5ebb7ebab18a15f663e4a8338162
SHA2566134755347b60714df6c4b18141c1fabcc8dec3c52f1823b72e24a445edb5191
SHA512f59e9184dc2fcf2bfb096b4cd9b0b7fcfc1a15b3e0a5ce25100336ff6baed08b0f4f7dac1bb30507028ec03291dd4470465ffa66933a28cc8f1838d65d2201c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54726e3e854443263693860cd42842776
SHA1cf2eb81d5ec13224aa8e276189d7a547282f6f40
SHA2566ffcc616accddfa57181abfc1e1064d38943742a6909787fa484f3e702c29bfc
SHA512f7ed5d2d741df52c08d04b598be23e25e7c8974a812356c04550ece09418744e5092fc94e66e015c48d7e0c4e0ef5a89b29da89de3dd47bb9d7421da800dbfea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a702531549be7f517c0e4cd69d3a36d
SHA108cd06e4d51fa9929871e34b5653ef1609ddbf5c
SHA2567288ff9e79e3de1d1e1428099570a0c2789693a7b18c439504cb5bbed17eb853
SHA512692cde11220628edca82146fd8ddf1002ddfccdbc1619b22c9b22a955747f2d77f099d8d69534bfa78c9d3c428a768317f6c0fb194104018b87a3e39d0f82c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae7a3813d0aaa8cf06276ae8b52661c6
SHA127b97f8de4f0cf74303425c1ed8c55ff48eb2617
SHA2567d67ba50ad3dc4c8f61227f01c1e496c729497dad2b8ac118722e79e77d32e8e
SHA512a64f30cc8c930eae741ad05cc175fcaf0c7044c6d2f155a877a31a4d084ef405ef346ea3543b2410831ef850d2b1d25a6dcace7ba54fd2ac1de33b5332db6271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d1ec4bdfdc70318fdc32ded237331b4
SHA1ee70643686bcad7ced3e956368fb3cbe9aaa53be
SHA2565b32cbd4dec9f4a266668f409736c4072a67483dd285959deed59ff4bb4d8b03
SHA512bf8e992acf9de8c793d6689389eab5cf20bfe2c1804b011545579cf8ea927642a3614f85665779dd827eedfb87290bed9d3c332126e2edda56a8de2238f00ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e01909cd858264502be2a0daa03f9c7
SHA14bf406a1c1e295437e046e92fdc87e22146d19bb
SHA256cd74ad336db7204adb0066334a6be434c5ada69ed8abd794de98fb0c9e1a2e06
SHA512ee560830744842709a819405b894fa5e1fd280435a7d75a1a4f511b3c47e9acab7d353510881dc7cb9302b45e0c969bf8c7fe780c000938744bb55c211488de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a67e7cd235b94b5bb5718d6f5e710884
SHA18b6dffff57c3afb242a5d516cb3457b0a8c9da44
SHA256cb4fa3a8573a94ec107fd69ef5d365b4f3df46b06a5143e313f100d8f1b88574
SHA5123e46dddf4dacbef1833b51ca79b6b58c4bd7d9af2fda663576c5277e8cfd02ab53630c149e6263b4333080290e327fdff2fb9698e439cae2f490caef1e6c4263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f38ed9c02836f3bb6642c47a23bae1a0
SHA1bfe54349d8be04c0e836432ca77a7b3ed030db25
SHA256bac595ede33d30ab067f8628d94a838edb51941bf6f7909e0a4f5c98d4dd0f0e
SHA5120605aa298a71655c9a5995a6e6daf82ba4a73d867e640f1f0ded7a30ef04cf7fb0aef03786ab11fecbe76e86c751040da7b37ac2dd5978964d27db83b9a87e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a5bd6be75216cc0e75ee2955af0dfde
SHA171945f5cf9fae8f648b36e4302335cd7374dc546
SHA256c75676dc2841f56dcd60f9fdfcd9f8c8ac0caa0ead78734c29bee2a1885d9f33
SHA512b85e4ab7dcf495d4c844988f5d7b1a2fee327039cca269b618b75181ee55019af457bb27e47f6fb5da183d8d49e23af9bddc75224f1a805a7e8502dedb093ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56df4fbe2c5a37cfb7fc032f261a44aa9
SHA1198fd2059a35b74de2204c223f1a5dbbd17d136b
SHA256208ac16fe6230fb90e7b88047aeca1c85f9cf0fc09830331e71ae099244b8a00
SHA512d7abb2d07695e113ea9e3f0a7cbc7bd75ec764d87342e41390f3350a2686f33e76b48719d3060aa31eb61c0825d5d1c0f013eb8937822497a00f52c2428f341a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b009864d571b5108e656ba1ea2a1f4c
SHA1b3b74494c99862f34120268c5ba5e2788889ca25
SHA2561cf3d9a4f8d039a02adbabed40b91c8822e8f5fa2e6c6920d4738df5f5187ccd
SHA512493c8de8dffc85af90b55f5c4237d8335da0dc4dff9b15dde58b2d313328ede76aa8a622eba68d9dff1a6b7a89ae3dce15c2884b579c7db04aa0e8ce13e72f26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bdb52d5d2ef7d077c8420326c7b7a67
SHA12f02a39fec77a09ee2a8a748d4ffc6b78d648f63
SHA2566fbf205fc7f1af95253f2e6a07dd1cda7aef06d938fcf7c7c866657f3bad2d20
SHA512609097ffe3618fc69cdafa181448bf1bdb4b9bd07a3727741b2c61c74063b4dec1ce8dcf855e6b41495bc6c01065d10daae68fff332b9d8509bb86f191842cc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef517d6283fefd0303b0e7316f377143
SHA1703964fe12acce6d27348778c4c7781a249e2bcc
SHA2564be8f9f8d3441f2bc12248885b059439b57b54c3fc2f9e88d506285957a4090d
SHA51205abdbd26947b3ac9772a3196255bcfea3c76e6040f0271c6b07870b539b4ee8253786015995c2a9fae1c9aa9969dad4886135f2a7c213d0941144cfaa7cb755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5944d43c8cabcc504a2ffdec07d0c399e
SHA1d864f6051f8a382943bfe0f47dfd4c296240be2b
SHA25654ba1f6d6683a92ccadb8f986f014ad20c8f19ce469d7cf8216a5f89a479d164
SHA512fc18193f7230f5545fe410cfb187c536be01c09c7dce7264d16e9bd9f20c3f95017911cdbdce4010e0b874e7384fa51c4dcdb561017a1e1cf38137634b9c7465
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27