Analysis
-
max time kernel
174s -
max time network
205s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 00:55
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20231215-en
General
-
Target
sample.html
-
Size
23KB
-
MD5
5d7e643b9044e1f0884f3c9c96687d74
-
SHA1
9c4e5d96d0e479976b003fdabe68968a9fbbf642
-
SHA256
c7efd8911abb0ba65a009981567d7987aaa76ed83e2bd7d086ff3a730d96de9e
-
SHA512
29cdc1294ed79ddbda9b47cd95725252b626c3fa72013d5e5cb20c018b52015937faf2bf2bbd07119c96faa9283bcd79a320bc04bbe875586ba27dc876f13b82
-
SSDEEP
384:Ud9zSFpvs1ihbIAg6CXe9+gDib+pqSRUHqFF//1RF5vMotdvu3hl:Ud9zo92i2AgbXe9+gDib+pqSRUKFFPMh
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa0000000002000000000010660000000100002000000093f332f26150cb68e2867fb4595f1c5801606ca8bd4c2d625603945f37ceb4ec000000000e80000000020000200000005b9a6e6e3d3a8eb36da688e4f0c9cb8707b425ab4a51303aa40d4caa9098ac7c2000000047a6dec88325bafc9cf829838d5741a36ce4e62a3e4888f599a7a91b72af509d400000003f737834916cc0eb79be53d4a9927c82b8b04bb4c5ae03a9438db93832ee1322ecff40b08ef3bff0a796d61e0d8c8dbca10e2456362e20901f638a6e99e31790 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409749430" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000940ce383c55d78a331e3eb8acad58b26bbf5912940dcbf8a51e1378caf76b987000000000e80000000020000200000002b639b49eceff6703eebf92559094993a8d1caab7a1daf70e72d61da68593be0900000008d377b370f19a5afff3ac050e101fb06ebd1756a20ebc61d9e6029aae5a8f9879c372ec6259b25ad2af6ff9250284326feff6acd1ad7dfffc476344bd6a72c948637d52ea92e22b5f730046ba45bcc8b06520d8d403ccf812db80d92e7aa3205db8cede21251c03aa8497661ad3ac2cb96e0b709e8fccf6d378aa0e0ca515a31ab56ab1454e1b545923675c2a7a83d5a4000000097ba8dee0bfbeafcab8e0b666eb91a0ea64b7ea4d292587c171eecc29a3ade20c5b6bc95c6bf3de500a1db8d3d6f115130914d94b8520e691ccb2cefec797638 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3C4DB11-A3DB-11EE-84BB-DECE4B73D784} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b031a6d5e837da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 1688 2980 iexplore.exe 30 PID 2980 wrote to memory of 1688 2980 iexplore.exe 30 PID 2980 wrote to memory of 1688 2980 iexplore.exe 30 PID 2980 wrote to memory of 1688 2980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b43baf7b80b3cd582642fb0983dffbf
SHA1520304e3a0e86505735be893c859715b508cb0d4
SHA25611b30a71bb9bdb45758c1e2e341a93eaea1aae7bcd506254b3ac5a7c8b35e3e8
SHA5120861aeef6e8ffe4e4e510e21ccc034155ef94dd3d0aa04c623e98b74a6757b8d1b069d8a704923d50476caad071add99bc9ed1861627177c1ac36642bad4265c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a63c02046f2624572a3f03e931a5fc9
SHA1a6820639284cfba45cb00f4b6fcc22b43700a2fa
SHA256c11e2216776aca676926161022c77cfbe774be046e6f244daa321062fb9ee4a8
SHA512fee179e17a61b8891ce795bf01cdeb5c1522a9803adcd3609312fedd6af33077d3fa1e78e349395605b86b26e22320b35c2227fdd8043aa3ebafc64b29f8d24e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d232ca6aa0854470c5d877faf8d73a79
SHA18a85cdd261eca8b7034447a508e3d6992ad29531
SHA25679b35257f2ad2ca953e03e271f9402b66b1affe5cef19a46b12cf83186578b96
SHA5123f584b15a68e9aee168fd848da67e2a97e7165a735e6d26a060e28b93f2fc9bf8ff0595d31c00eaa26f5f7f32dc254d5474dd191f588cde60407552311c5f120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5332569f3bdd655e2b8df3fa464911db0
SHA1a1afa188eb4dad0fd91016f36640c6c465dc08a1
SHA256a6309aa001b883deadc841b53baf6c8683374036f7fc0c170d707b111292a823
SHA512d29c454c21478dfc5aadcabff2e96acaec7553c742c7097006cc4afd1e7b4e3a6d49a92da9dd46b2899b71fddf9ff158a71fb9e487b85614d7c73a4480dfa637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566ad6f2872310ca8fd04c05cbfcbb2da
SHA1f046212785921c67bce56da99856a34bb11c7554
SHA25676ae05d33b616daf607e76085b5ab821cdecf9baab3251000e7535893e12b250
SHA512c38eb345b143fecbfd40ea25fb3de2105f959320e335ff356cffa0ee940c14496871a7beddffad0cd59f918550541ec3ab83bba10c6e6cd85f3e10d97f917255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4ef0f670b6488f2223185d78cd65731
SHA15780d938e38d9209e82c40fae8d714184f29166f
SHA2567a765cb7f3abe981e13c015e7b273de7bf9a71c22c5620d722e6c6097c58f3f0
SHA51234a288214d0d075c6bdd100d42a4fb917fce968e7fd445bdd79fba1952cffb769897743f3957a2dc5fafb59013ccebd71e9fcbc9dd42101de268ebca500cbb33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50834450334215fc74f3741cf14e0ced5
SHA1c24f89b1058bc24bb6f59f85a57200d837ac3fdb
SHA256eb61f56b88c27e29048677b24eeaa6900a64693d0a451b29d54fd12098c7a743
SHA5127805e3cfaef33a8d3f88830f325806477c3021990717cc10ba5c54a75ed38274694a1861db498fff5886a658aa48aeea653d1682880550c7aad6bde3bebf50a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5794c2c5eb464f957d2f786e85888ec5a
SHA1e07e4fb70e3f206aafd0c01fb072aff9d7f66de0
SHA256e11405b4125dd424f07206c3bbdd300b61bfdffbfb2ff399c7b37eb7b3000bf3
SHA512e342ae8912ee4723bc6ef5a55b185e8e05686aa55755539ddde0366951f7b52309f89eefdcf78d05d3cd21b6de729d1c7092c5e9c36a614c51607e364a74588e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a07cd08b3ed69a372616ce81df004749
SHA1f59da87b25f3653e391455101969e224ae986e78
SHA256fd8fabe13c15047d795e2430aa6078f65056bdd029628a883576ba646d896e9b
SHA512abb9baf9e795412b10ed188e97017db4be2dc15bb762ee0deff0e6e2397b45ec18b1c4b3fdd972a1f265af8de8b5e68d6da0f50824b120d5d4914253742d8c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1c57b54fb9d8a39255c062bfca1058e
SHA11eb5bc58ead45db04d0e212d1a9eec61fc9105e7
SHA256742a2b25f707365026b6fbc1ec09206877eeb7b5e1751743002ddad3be80d2c4
SHA51286d5f6c5fdff44cba600fc8f86c55942c7e71db421dc2e9249761efe4ce6d21d7bab886fd9925aae2c850dfc1cba95141326cc6c68cd90c3db7c61ddedd8ca41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f27e634b373ba87b8a65b6b21168fab
SHA1be899e54fed396e13ffe168c25f7e9a9d11649bc
SHA256727bc55e338dbd617f1050e70d91e9757cee12915f3e470062efd5a135686a10
SHA512b2ec036197ec29c6d9d327c9ccae88efc7c67415936cdd74677181b96397285f87445fafd3fb8665f3408d40fd3988a8e89a5588e7841ebbbb71dd37d6e8b6d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d7b59375743f47592c5dcb3f3662434
SHA117f535211d30fe8c16fca19773bd43b921d0ac7c
SHA2560fb383fb39cf2e582d0e3f16944d0744c2f226e1571295e39e550a0f76f3d949
SHA512d59672ff2e1c2c379331384bcc49607f1db60bcf04620a53795ff3ae9c7d7a3dbde16cf4794e09391966acc9d55f1ea9e5ecac1a94c936570418f79e4439cc33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551c21869d22fc99e2050af0ea4e7ea56
SHA197e2711949167c57695d685339e13d39d5a6e334
SHA256dfe78598f83e6211ed69a1e55acef15073581e38d95899058f7a0e4a4a75d36e
SHA512f6c142f16fc58512c35740c31a0e2e5e2a70180374a3050e23794f165b719a893ed5c5c0b3b0057b82f0a02558661b9fb69029d439d567fb9f5c953bb8dab9d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f211f38b06690676cc38e8bdd47e5410
SHA139dadf9c741123d56f8adbc5322bc79812b34e85
SHA256df8e6da195996722f3555f2f76571540225c844239164d648e41087ce8108d04
SHA5122808217f4889895101967d92b47d486570f9c13c92a788f4d67b3c882f314e9f3ed6bf28218a1eaba2c803ce88ba4c9955816d85c27335a5b0d176cd140f6870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c76af37f8ba46bde5fed09465bdabb3
SHA18c638e14a06649e134a87a748b29d6c494135911
SHA25677df36c557684822ca9a0ab03a012021fce890ee4e8c7d87c55c2db31184de74
SHA512cf9611eef6ae81ed2e89283779f3d6d62f33f83c5ceca196807141b372ace54e61f36c42fb7d11eea0fcc767f48a1ddaa3d2922bdcf699fb954b861fe3156b85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ace1d32bf2cfc63348f8a647d53b49ec
SHA15a97aa8f39b91eef0d1aba18be86e096507fce70
SHA256ca43b493e4fd63611773b274f1fa5a30c73d13a563f65833492d510f92494924
SHA512c2c00d3750f4dbbc1bb2ea4a6be4bc559cda869c5f08614f24bd5335454fcf3a2c4acf79eb351a209c1bb2fa6d4206d11af173f01a9a7f0437313accf4907bc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b08e76cdd7fcff7edd55550c10056b54
SHA1fe245efb099cdb3af49630e9f7d6d4d84a553cac
SHA2564c4417f1c6fe01455fafd98058099f2c6fe61049c5b923914a50b5a68688739a
SHA512f7fecbc5f1944664a7b0285f7ee197fd917212fe90d91da9b4570e40253d0db8cab57a72adb4e3786876cb62ad54a6e298e58d95c03a41ee5920c949d78ab9a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aae3f6cc3907462b6696da8f55af83f0
SHA1a220447f40747d9972f33bcca5b497104cec8267
SHA25629920f4d9645b49f6f5365c4b9c5f8e8a281f45977104288264ef0d5e2f3ea8f
SHA512e7b6ed4c6dde65dd51ec5d554e332d285f890bcd4193fd8b2eb894e70a4a6c586c60285358096c16729cc508161df577af03bddc652f41d3d0495bbb67acb48a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6WEH2YLI\8531WR8I.htm
Filesize114KB
MD51fc33214a308d78bace104d3bb3873d0
SHA1e458a02f7746553c4fb51ecf077bdfa5052221e3
SHA2568313f95fae1ab43cdf5dd271f400f632692c1159c07feba5a7cd9e48acfb758d
SHA512c55719857433fdb2a75a535b04f11647c6ee5a8b2cf451858e01f7e321b4c8944b6f28e27506432ea2ce74cc2696fc19c53aa442db59d99af2774e0a272b812e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6WEH2YLI\Two-young-sexy-poses-nude-in-pubilc[1].htm
Filesize5B
MD5fda44910deb1a460be4ac5d56d61d837
SHA1f6d0c643351580307b2eaa6a7560e76965496bc7
SHA256933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9
SHA51257dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06