Overview
overview
10Static
static
79cb020a79c...df.apk
android-9-x86
109cb020a79c...df.apk
android-10-x64
109cb020a79c...df.apk
android-11-x64
10appboy-htm...ent.js
windows7-x64
1appboy-htm...ent.js
windows10-2004-x64
1t-rex.html
windows7-x64
1t-rex.html
windows10-2004-x64
1vk_dex.apk
android-9-x86
vk_dex.apk
android-10-x64
vk_dex.apk
android-11-x64
Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09-10-2023 22:05
Static task
static1
Behavioral task
behavioral1
Sample
9cb020a79c3a1028b5a278712923a3246978c68a544009480e57887e14d674df.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
9cb020a79c3a1028b5a278712923a3246978c68a544009480e57887e14d674df.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
9cb020a79c3a1028b5a278712923a3246978c68a544009480e57887e14d674df.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
appboy-html-in-app-message-javascript-component.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
appboy-html-in-app-message-javascript-component.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
t-rex.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
t-rex.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
vk_dex.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral9
Sample
vk_dex.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral10
Sample
vk_dex.apk
Resource
android-x64-arm64-20230831-en
General
-
Target
t-rex.html
-
Size
80KB
-
MD5
16911fcc170c8af1c5457940bd0bf055
-
SHA1
eb44540186285271130b056fa6099b1988319fc4
-
SHA256
dc72cfc1f1d2a5013bb9de34f8cacf5e26e542d7d713fcbe09b865b4aaca6ddf
-
SHA512
131a00b7895a40ea0fb355ecc5292b3cbbcd23b45dd59b07da1b8eb86501ff0ec698ab5446687cd7ff5fba03d97b7a0b6e47196dc284a51c677cf04dbe13e393
-
SSDEEP
1536:V5OdudTTa8udsB7g1BuqHkFT5VgYzMGgbJsMPz:Vq0y80I7OuikXm3bJsMPz
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "403050987" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bbd2da6efca7814e97bd67c6ea97aa8b00000000020000000000106600000001000020000000d521d786e384ed0d71ac159275a4e07bbc2a55756c557f77e6c76dda99b739d8000000000e8000000002000020000000c98b67211d551d74df1e4aae7f2b5fc5e780e99e753882aa670ce4eddb04480f900000008b335a2777d7dc6c58ba7f598910bb10b641c1f05328d03ed5944be9f3f4a9a7d5d2caa8ac24bd0edcb9931df525884d11848ea2472a0eb72d51c5e1f1765f6b7365f2210b32fc08f0121d66fd5b97891dc8a1b5ad3de3f4c7a219336a57fb3048af3a38703c58c33c5e0c103ed6a5017bbcc0e03aa2ddf88982229412fd66bfa7cbe1eb4681a4d699cb5de44d082354400000008799047b06df296f8564925e8b641fb781aba3c8234689c66ed3c0f5386f5901441a998324889ff82929c9a346fa50556a18035e7a6e08d679a839b7dbd2d4ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE4AEA41-66EF-11EE-A4DC-56C242017446} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bbd2da6efca7814e97bd67c6ea97aa8b00000000020000000000106600000001000020000000179625d10bed217375cca659e41c6692155c2c9b822723029a549e2156085748000000000e8000000002000020000000dc7e9a2c779903481918f33e8e3fb946b328a1eb4ad1aaf3b6f675c944f37cf1200000005b293bc4e96bbbd085b6bb0ff2840f967fd0198dd2bfb6c44149043eafe1be2140000000b2c0726cbc67526ceae0dd7b89b15783cb341409e4a0d4c2aae5feabcf7098c1d51443860a3fa17986b4d093a0f8c42a62962c5f4f0f516fc669898f1ab40aad iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50a9abc3fcfad901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2144 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2144 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2144 iexplore.exe 2144 iexplore.exe 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2144 wrote to memory of 2596 2144 iexplore.exe IEXPLORE.EXE PID 2144 wrote to memory of 2596 2144 iexplore.exe IEXPLORE.EXE PID 2144 wrote to memory of 2596 2144 iexplore.exe IEXPLORE.EXE PID 2144 wrote to memory of 2596 2144 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\t-rex.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2144 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e80a29c7703ee58027a6233249e2fefb
SHA157ca383ff499fe8aa816fbe11b572db7377b10e7
SHA2560ab84804598b5c38af1a2b3ddb743e45c5b6a51db7fb521355f4d6d463988e67
SHA512524cfe05080a953c7e408faa101deb7257e2ea58f098285da97d2ccd749395cab379c9f8d399569a134d917eacbb16182c39d123648a9e82e6654ddc7aa74721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f80a2ac360cf421d041337b795df77d7
SHA10d86ad6825859f50394bd549601b4c583db6e37b
SHA256b2855509c616c93feb6200cf851f51bc4a144fae1e833773a61b1f8c42c7ae9b
SHA51235b7a79532512819a229876ab669586cc278e193be3939b59546dec8deb35534209f498b50c63da58d78c9fc58722c8140245e47847af0e21b61a8e9ba5ddbdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ad0586d0fd9f4e2d4854cf4ac663fce
SHA13b398c34c0524d8b459c5121d226715b542f50ff
SHA256f23289eff1bab45dc3fb4e6917eb35478ba98209e778646db902febe1461337f
SHA512efc421031fcd6d58675a71b09feeb70e3b83defc07790c2a8c8a9008e7b2a09467ebb78f1654fecb6480ff930d286fa32787d06dfb34e052f2704355a2ccaa60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adf7b7fb03d5109cf68a3a00dda8d112
SHA1101f77331c6c649f557d0365d54a3d02921406f9
SHA25648cedb4e5cbf649124246b3442f58f0d74a1df12ae07b9f939ec472d3c26a26e
SHA51286053ad1995f8666327dd33232b489666ebd27388b53272ff27a8039353d0a2d8b7b803854929317164653a5f45665dcefffa7d9bc54ae93af7d2fc07b475732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b494ee8c366fe3b13d6953d3a28fee6f
SHA16eeae4e3cb33fea7f039a77b6f1137474f18e287
SHA25616004e12242c58c2beb4d2aee12fa17d57496b1fc82ccda1566ea1d23a03793b
SHA512c128cb3fd3105fd85042ef419ca77f0d5045581d04db6008b275f59b6e0e9da78a0d25c16806b86eec744cd8052655244d15676be7a2307facbf500142ff60c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524af098dd3a15c5e1bdecd9ef075e4a4
SHA15d5e40fa36a4c6c24d0a76f285e854fb1984fd10
SHA256c80b9cda07176262b3ac3e692659a748266a427e6fe44cb5730d01d2e0fb96d2
SHA512ee61197ad007d7dd5d46b5dfdad139595253125b51f0d7f99e8373f8390ccec7e2fcf901423cba97cf06f82d78412a59deb0825c920b11c7299d7ea0fc218f69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2375fbe3e68b4d7c2ffa6b2572c9a02
SHA1e7be5905ecdc4a53c04690a31bdaaaa782f7afa6
SHA25638cfa80b71bdb253322a2368c9d37d7b1cbf103b424276928ccf089365b7b85c
SHA51247905697ff000a01049108a62993a7ca61baba03b5c073040288836efd67a69f0de5f458e8f64294fb3a9deeb2de855300d9ff99821d4ee538dd29262b503b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f89e8328d92d585bd18bb59e84edbfa3
SHA1eb32c7e6228dd2c364f2d2f5f1d71d4532c3f602
SHA256c846e07a7346ac58fb4ee73c873219905a98e87579c9bacd307e22ad578c04c9
SHA512c6971355111c81d5398c4dbb484b651573b2c950bc708eceac323d565f58ddea42fbec6644de1d8c84214187a112c03991bb827f3ceed4c36d5c2a0f894b6677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55369f0140c0a2d31070cd4a2e399b354
SHA1b5b7921642186761247125a2ade632a3a8f1c2da
SHA25692ad23bceb6c828c7be61a987329195e2b353ee420c3af942232524f02edb36d
SHA5123d4d392b42f0c91474235562279b6fab62e99fe57ad2c3fe3859e8b135d5ef6025dbdab220ccb25a062b520463b7e0b5d18b115961acf69e56a672020e43f1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be31c3b553b40771dc405adaf0b7bf40
SHA180cd75435c60215116a8f8812e41deb02bd82f9b
SHA256da7b898c6dbb7310adfbbdd2f0bd47fd4e531aa8f49721b5fbfcb0c082029177
SHA512f589a29c53e3378073bed56429eeb4b166d9ed5e54ac2c2cd0fa7d0168efa48b2609bad20d3adfba187c7ae1413f689663a032d39db5e0b25e5ccc40029c1036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b74ad472b0c6b7c5be37eb7180d633b
SHA18bab8597d3ee58160856a04d6dca28eaf34fe02b
SHA256874cb226d296c7b7b6970d969726082d09602b4f6efb600f062af846db40448b
SHA512f21a2c74802d25df395c25ec0f4772d59821a6fc92e048086f43c21e9bd89a1f80055b643c9f0bbc75d7c883561d6267b5a133a91d37c13e92bbf48a7281b14c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5027ac38d37efaa650c87cef465558ec5
SHA13b4673f3feb6561a66b37477a4a665c7b23cd1d7
SHA2561b623776522d12a5b47d70df3200ec0a7cb941aea113df41ef5dacaa3241d5f5
SHA512dcb5c63edaa963b75a44bab9931973019355e64e3003fbe8d7615baee1d2ec357d28b8f07a5692bd2f75b9c9f09367b70e7bc98cd2d072c7fb0752feb7231d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd82b9f217902fb07b0ddebd78f2443e
SHA11ad8b17bd94fe891931d7887a28b493ecc35ccdd
SHA25679a6e95b9af1ed19471387d5cd645455cf4b0d6edab494a9b03286aa026bcdd2
SHA5124ed22543ee4a4b5671ab1752d6ca404ae6fa186b59298d3fcf530ed6586c61a63a3e885dc19b3335e394cc037cc21d7ae7ef3cbe94c4bf056dad0904ab6411bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5903c0304e17a0bac5e51f67e8b542b10
SHA1e5108e1b252fcd3d1f48ff294be7bf89b5f5cf3a
SHA256fa3d5579ed52aec70426d6376bba7269c4da7ff0bce00a418f7c3e50db8cda90
SHA512fbee05139ec67fec00c1ed409bbb58e570f9a128d7caa2465eb30a5519625d9c34ea02847b645c1a15a999162c13f6d30e0ed9d0e2ced575fbb129234c15a59e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5779d78044bd28c4ca1dcbc4e7d354a81
SHA17b83119a61d599e359dc9138503568d3f4503e78
SHA25633f0f16eb488a61b48cc862ffe34e4aeea5517a50146b0f86a4c0973d87fdba2
SHA512748afbf7ee6d9940856fa243ed82e3eb71abb99c180b3848817b5945a610833ac60bbd0ed4808f9d02762022863e06043af74932cc4614ad1f2a83b478d673ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b354782ae9340836617f80aab50e7944
SHA1aaf2b6fa4ddb74ba7c77bf792756057f7d46f608
SHA25624d52848b52b1e98a0761f27e21d474ccde642decaa7944d2f6170f4563ec9a6
SHA512de14cd60a2da1ff820b4938b716291541998fc2bff092604b89e1c88c548f570da0a2eeca8ea12e44c324723808d39a6fc48c562a98ac794ba504ddca5a2b25c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e487e582ff4ff1824848731cc3ea16b9
SHA1ced554f0e510f5a715f2722a1e401c511b591e19
SHA256396a5228333e14345ab5e46b1f340bf1a4e14a8152d57c7f0a41b7cd2e895aea
SHA512b268c1c907c23f1bef9559d78ba71eaff152978cb42db4e37608b8887164700d382cf4c0b13e4a56f293d5ff2c6f29bfb362d6bc535d33901b88b6052fe58f1f
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf