Analysis
-
max time kernel
118s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:30
Static task
static1
Behavioral task
behavioral1
Sample
3815783b2d5867136ad74c3dbd3ed25a.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3815783b2d5867136ad74c3dbd3ed25a.html
Resource
win10v2004-20231215-en
General
-
Target
3815783b2d5867136ad74c3dbd3ed25a.html
-
Size
432B
-
MD5
3815783b2d5867136ad74c3dbd3ed25a
-
SHA1
2cf8237e6637eeec0585d80fd19d1e698b5e399a
-
SHA256
1677606a0d79da8deac615d7780546a4f4df2efb0b0edf908916efa075712c21
-
SHA512
744207d79f9e146fd291dad0b6c609d7fc3038f76a24c89cae3e26e943136805c0dfc649ead97913bf3728682d0a70b901bc1ac7df04d86b13903e3f0c38072f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa0000000002000000000010660000000100002000000036f9c1623d7633357a60dd13d5a9de7572a66247d43b647e5094d58e58bc3121000000000e8000000002000020000000d32640e39d2823e9fe1340323d2925e9dbbf70ab0be15c2ea3d74c7ea15aa246900000004ecf3f9ea55fef15c4296b6d7ebba7fd10abc07240dab1b7dfa2c05fec7753f79b36477c6f1b2bb57e4129ca41da407aeeff83e54ab66ea979822b268baa6524e7d50a73cbd8104a409f3f5476b17a383af9125d7db7491d8f25e923c8869a428f0eaa328c3af055ed3bd9da1aa096c32d0ec316f713cae852c77d520aeb3fc0b40704c6c9e127954fc2c5fbb38e0183400000007afb0d4964f93f75a1db623b0dd24563cbdbdc60e30c38dec4f2fe8ea3e37208e96f00acebd30164b723ad5ea5d47533d048baedd7a795c56476e5b7d00cdbeb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08d469b8a3fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410588628" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000008ad4f50915773f6b5f65f8e960acfd2b20cc808128d0aea3f5cbb9b1583a1e51000000000e8000000002000020000000a69f6cba614a018c1bd8c9d0ad0a08c35014678e05c3ba6ecdf5cc353e516cf1200000006fff47319c9d788b832c3111816bf34b35cc0a0b55abeee44ced4e19f316c51e400000005f65904d231b7c15822ce9c7a438a6c667a443e24ed03fd1ab9539a58aef6f3b5b09dab9864c51606490d4f5dd218cfb38b6bcf5743205b45a533df1e18c07b4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0ACFE61-AB7D-11EE-B2BF-5E688C03EF37} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2928 iexplore.exe 2928 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2672 2928 iexplore.exe 28 PID 2928 wrote to memory of 2672 2928 iexplore.exe 28 PID 2928 wrote to memory of 2672 2928 iexplore.exe 28 PID 2928 wrote to memory of 2672 2928 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3815783b2d5867136ad74c3dbd3ed25a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b1bedb9d387a76b482c4673c03933c1
SHA10623382edc8e79707ab69a7efddd84feadacd25a
SHA256a307ddffed054aef293c35e6a7318b68c2e088036397e695ec1087e61f7d0c42
SHA5123fbc768591a6cd1958b889c7c255d65192bef3360af67864635c624f6f7a8a862a7bb997aa904b236a92b4dda6bef65ee39c6188d38de3082e65992ae6b50d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593c17f08e346341b434cf5ea6e964d7b
SHA109889efbde6b2834e4bfffa1783e7fb945989fe2
SHA25604011dc1f2f22b1777be145b68e9ccd63c351a07838d3f6d299af94abb20cc75
SHA5123d29327b2a4686b3d173eca81686320745bab2cfdf19f016f7cf002cc968b960f0eb87cb285a3f34d6e8a976e7edafc50610e2a97b229280562039f7ed7a42a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50047eb78ff03236cb650a74a2f2b1034
SHA1160d014f78ef9e3adb48e76a47ee4658578758c7
SHA256f863b77a7b7166f1c1d21fa04b18566370c069cb4fb786eda376a8b3ac50d59f
SHA5125d338718e953438cd4492f4c3c661af5f25121be1c9c11852714d0fcc3c7bec5ed51ea5ecc2f25c215478042fa33e75049578556292de8975e2b2a000137c06e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5021beba1b29315b44ae679d5bef40761
SHA14e1a61d6a4e2799826ac0ee007353823cfaf162e
SHA256f6653eb39395b99dbed7d079d6c37dc85fb1c84b404dfda2db47a3766b8cdbc4
SHA5127e490153b75a2bba4e0c139795203954bccc890fa1a3d75757578225584606d76ec8a3fc8cbfaa10f3f90c3a2a122925769b652a0706a02ea9ddc3541f79970f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574e9bdefe811647c67352c7db2e29bbb
SHA1c1d349e0767533aab0f7b0503c03b91df1e8416a
SHA256a439ac3aaf08e60cc559648f87309212ed50fe5ef20ed555e7e4f01cac3f9d77
SHA512d4e63cbb38a604ad9092db686d23a0a6f38269698d1b7a7ed133a72901bddec446a1aa0aad95a416c67f0f2ec5d78aa45fa7ea782edbcbf5412b323843e8edfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a5920feb5c9bdb83fe6bd5555fbd497
SHA1b9c0de57b16992c834fd162865cea119b8db2aae
SHA25634f8e3b029c19a4ee48900755cef4129ce532779da937b5a4cb86f064ee9b421
SHA5122ea70ba155646f8b66c1531b3a4bd9a74105bb4b0acabba1f26537838735ff42f13a01e9f56ffd50406b0b2dfe7a5efc46aba3686e7403431077e163970e6b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552cecc75519ce98d33bed53cf71cff76
SHA13b8e8c8896d37a797527fba4ea7cdfe1159b4575
SHA256d46d1e3f73e80a0a0fbb2fe6b2b179cfb4f1788ce6b6f49efcc97e70f2037c35
SHA512184423262acec1aa677e3ff5c642486f7445c698777e25c0105de464b2b6adcc7e895fb2ccb1a7de62565bfa4ed173af773884892e33f3fac49f143badd9116a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f0a6aa973deb58f18acd2b1374a4123
SHA1b0c10a6a29dbe59cc152deaff4616d2bcf5f5c7f
SHA256736f3bc3d15bfaad20532976689d3e529979230f24691dfb31bbd8bf8809aaa2
SHA512740dc868b0cb25376e5c4c5f80272e804850a4860425c85a277170f88467c3995403b9d7f2d7ebada3d1e660c89bb48df93a240d5ec1c84d4090a34124b94046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5806ce142688df37534e5733143af6a
SHA1d78fca1fb310c3a0a6a552b34e38d9bc659bf9e7
SHA2565deb1d9f8b3300d9260f5da4e93552ea17efba89831cdbc7ad2a456731aa0885
SHA512a3440aaa6b22a4c75f277889db45dc115c1f1c1b08f236368f485930aed5498d419a4a27bcde17e3ce05a9c298682738606d12785477b7c973bbeefcbf2fdea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5551e8e8b85bdb5f5d2e1309fd86319eb
SHA1592feeb4bacc96c6324730938cd3b44c603742ff
SHA256cc6c2f8b9e6b815401b8231b8a687aa9629fed4c14fb35f186a9f6fef564d75f
SHA512d9c03fcec266ca811d2cf289a89d14ffe55a98f80ddacfa4f8c439e29e89dd1bb327f8dd0d657be90b246af6eb2f238048deda4e889abaacb6590cc16ebc25e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501b97b99a3831dee600fe8d0b49e4750
SHA1c14abf37cd754457c0acb02632c97ea5b70e57a5
SHA256f5ed4c2b20346c552961d4c370f344ec45994a66a0dac51bee8b1d4b5725e5a3
SHA512cc68f7972e18ed12e0e13273b827da73d7ffb764156c3913ec11e7230ccb903a6a36107969f11b112ebb638426a5cdde2f4ac04a359790365c32cb7ae5a25d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56651f45ae190d068213a8c71652e99d2
SHA1513a50ed320eb9bada0ffcf81e970572220bf475
SHA2560e6c839e68418562358a72f14cdab35b8ae2dc12a2ed5a03da43883980425351
SHA512a4cd326aba934eeb243978afac47b53e6085593f18514958ea897b01b07b8543721cbebca644e9ea42a23b0a5acbae1f2b08d6f198cabf83d1e98733ae88a1a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5559d3a7ec25b3c6b62301df3ed397b18
SHA180d358d8b087b9ca74330600fc55d664d01efdd0
SHA2567bc5e2e6ed5be1ed4f7570d52e1a91ef22a2722e070ce16173a7e2f39705b1a7
SHA512ace63b6d880cfd98f9d671e8bd3db2b04e7ac4c3c3591bbbdf876ccdf38574e2702eecc3c382b6ff3b15c22e26d8246d3ee7524043021319c202e7e7895491fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ffb8886d392cdfe8159b400a5f4c216
SHA168dee0bc45ff91ec07c2f38ed85047f47f3dcdc1
SHA25621cd5b44aeb75eef5fdbe56c68fed42c49851a8f9e6f8bef9a3e99b92b977dfa
SHA51263d1e48d72217d3eeb83049b23ad7b7c6707cb735781bdd4e9400b0a78d337523a98b191786c0ae3282a0cd41428131ec0cc58379f50e740b3938138316dc5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9e050f2dd4a15fb4e028773350a710f
SHA143a821ae08f0857bbb6dd465d180507bc3de56b0
SHA256be088cdf3b6de1e774d29a2d3427c13d88084e91481f8d5f464d3adc0326fcdc
SHA512df91f0320fe19c57a051119a013b4617ed18670d7f08c90ea134cf2cbd0bf7d7269a2ecbd7a8cd14858852010e26520014f222dbc87a1d406be34fc0f12ced02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595db8beabbd92fed54a07f3224d01879
SHA18ec820058dbf4877c667d204b7e40c41e3f4bf9b
SHA25606283c27e927735ed64a85263b0c0cc30a5e1cc20cd38e4c114690c7df623f41
SHA5121d898d29532217b8fcd8d6e8c443c5831fb255008cc40a618fd7b31a340c0a62cb91d46107cf19427b18b21983562c0402164401e981c48a84b601fcc3a406fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c2fc8ffba8ca5f9bfa6b855e4da5fee
SHA190266414ef74f9290915e45accb0930a44ca3c1b
SHA2568fb90736eda5545c0935c0ef411a30bfa1cdfc0e9f879b21b5560f42f035b697
SHA51294eac0f04b83adf7a6a453deb34ce1dbdab391d3b9b4ef38f37b4570d7eee809b2c6e106a53b049aa2cc32895e3a25f3b4429d7675ea5e7b1b3661fbec98be7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e15fdccf940cf3279fcc0c81d3da80cc
SHA1b78b7efc376bb48e7931f8e24a2a422bece59b0e
SHA256d834ec08b66f0496c27f8b4fb9f928786cb005bf7b2579d5d26eb914891f4fb6
SHA5123caf89126856319a08adcd22d22c3f69a43893ca1242cb367048e340d66b6fdc91ce98a9fd99b2489720853fc295edbd3cd5e9bca0854ca617247246b43f530f
-
Filesize
1KB
MD58513ca00dbdaa218647ae8f9cf02a10b
SHA15d1f28956dc771876c44cc19292f0a6120a95c82
SHA25651af3d41cb1ac5ae4364cc33275ee760cd6f04be140d482eb1134dbe9824fbdd
SHA51288c3230a4788436b95eb9255f884be1cc9a5f3704cb3cf741b8944fb036c2cddeac1aad26c7b0e821a9e7fe74328c194302ea4a54cf3b02efe5a0ee5456391ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4R90HQQX\favicon[1].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06