Overview
overview
10Static
static
10Octo Banki...et.zip
windows7-x64
1Octo Banki...et.zip
windows10-2004-x64
1www/server...kie.js
windows7-x64
1www/server...kie.js
windows10-2004-x64
1www/server...ery.js
windows7-x64
1www/server...ery.js
windows10-2004-x64
1www/server...vnc.js
windows7-x64
1www/server...vnc.js
windows10-2004-x64
1www/server...p.html
windows7-x64
1www/server...p.html
windows10-2004-x64
1www/server...u.html
windows7-x64
1www/server...u.html
windows10-2004-x64
1www/server...s.html
windows7-x64
1www/server...s.html
windows10-2004-x64
1www/server...o.html
windows7-x64
1www/server...o.html
windows10-2004-x64
1www/server...w.html
windows7-x64
1www/server...w.html
windows10-2004-x64
1www/server...s.html
windows7-x64
1www/server...s.html
windows10-2004-x64
1www/server...m.html
windows7-x64
1www/server...m.html
windows10-2004-x64
1www/server...s.html
windows7-x64
1www/server...s.html
windows10-2004-x64
1www/server...s.html
windows7-x64
1www/server...s.html
windows10-2004-x64
1www/server...r.html
windows7-x64
1www/server...r.html
windows10-2004-x64
1www/server...r.html
windows7-x64
1www/server...r.html
windows10-2004-x64
1www/server...s.html
windows7-x64
1www/server...s.html
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 04:18
Behavioral task
behavioral1
Sample
Octo Banking Botnet.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Octo Banking Botnet.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/rc/jquery.cookie.js
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/rc/jquery.cookie.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/rc/jquery.js
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/rc/jquery.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/rc/vnc.js
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/rc/vnc.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/_vnc_help.html
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/_vnc_help.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/_vnc_help_ru.html
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/_vnc_help_ru.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/apks.html
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/apks.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/bot_info.html
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/bot_info.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/bot_row.html
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/bot_row.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/bots.html
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/bots.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/command_form.html
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/command_form.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/commands.html
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/commands.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/errors.html
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/errors.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/footer.html
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/footer.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/header.html
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/header.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/logs.html
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/logs.html
Resource
win10v2004-20231215-en
General
-
Target
www/server_www/rootMD50MA/panelcGFuZWxleG9kdXNvY3Rv/tpls/_vnc_help.html
-
Size
911B
-
MD5
a31f84e1832b175afef045bcc6263fc3
-
SHA1
39acaa62912a0a8d1dbe337a0d697a804608ff46
-
SHA256
c4359224e99f8fb61e3162b1343a3b2cd3be4e5756a7b911a83f6598933a98e3
-
SHA512
301dd41c3196be64dad70ca2f5348d8fc1c0e001044939e8b2cd5706146c3f64eb70abd7abc44196ac69d782581bc1ae9fd82e7b0ac310e3f8ccf2f430fc1fc8
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1A3E1EF1-AD14-11EE-B2BF-5E688C03EF37} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa0000000002000000000010660000000100002000000002537dc9110aa0b750451880b0fb9bb65153dcc52304425064d20b6ab6f73bdc000000000e8000000002000020000000a45d33cc68a70f9105df9f8cd320bc0bc2c4fb6d3384c68d48213c670019d45d90000000f08da9c5551026713a7de3151304fdb8f8c524da265453b2a2dbc63e003f5e8098df05d3dbffe8ef9059e79c1fdec17529f7cb2a68ebc60b01ca1ce4bdc24173004f197f69c6ad44c7f8c2e2689aff8c9f9e33e0d3f27c71445e3cc3c78597dbd840ac39274d8cb6c1f473703b27098acdc248a87b4764128d35997701eb9742c58b02178ce445123d57ef273214d7594000000034c4e598e269c2acd29b2a56f537807bbe772af0210627eb440f947f402cc5a9420b5c88f52353e043053391124e7a8ee67a2eaa518c09373aa865f2359a3222 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90feeeee2041da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410763112" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000fe8bd879f5da43e7077dc882142b4246e56c3ef379d2a61f26763f09217d33af000000000e8000000002000020000000bea55e48aebd6f4484260ed3d8a5fe2eda5f3e87a136520b9edb7b101197666a200000008969d15d393c048ee82d75b9aa5602c882132154195eb90c9fe78433eba5946340000000c569cc4a85ddeaec1c555e67c95dccad1af773f9cbb53dbc6a3d509b2859f84de00d51f6989fcb3ecd25003f72cc386b4681fbdae96d9d8fb1fb8919dee173ef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2988 iexplore.exe 2988 iexplore.exe 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2988 wrote to memory of 1728 2988 iexplore.exe IEXPLORE.EXE PID 2988 wrote to memory of 1728 2988 iexplore.exe IEXPLORE.EXE PID 2988 wrote to memory of 1728 2988 iexplore.exe IEXPLORE.EXE PID 2988 wrote to memory of 1728 2988 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\www\server_www\rootMD50MA\panelcGFuZWxleG9kdXNvY3Rv\tpls\_vnc_help.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f3d58210a01f176dd4bc6a3b6e539b80
SHA13831d737f381131b2ecc7e348f3f624e7c2e96c6
SHA2563c9d42bf2c0befa961f7e4b85fbfa10af2c6f3dfeaed696e06acf99892c29341
SHA51257e8081e0d36c29ff3e63f5e8178b3061155dde681820be00c580a8dd5352297eeabe245cec4d8e588ec51a952da7bc8d2900d669e87dd5f641fdb0dfe91f11e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD574baa28c2c682b38cd41ce85554e2130
SHA12a9bc9a96a0bb9efd4bb1e61f862b4e20f1ece85
SHA25679cd09c799eb4ca64f240d7614c09887dadaf02ee717268c572b31b6da60a60a
SHA512e957228bcb31545d911ac3e30726fa0c4ac828e1de250c2c411ea0a84b1fbbc052de67e87a6bb63fe13efd903dd8ae47521f7800488bd48729b96c6c97d1a4f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d2d7c5d9aada9d9fbeecc3bdb2faa874
SHA1524634900dfe2760250165b16096f57aecb0b6ba
SHA2560a00c7244d768eac30240fc9f9304ef9473e97f96951adedcc17aa2801df5c43
SHA512ec226d347de720b18da91b838e9c5286c18907d7bb7fde527690a3f1bed87d63c7e47c374306ee7006ec907f8c1c9933ff61946ef718bca4bb39c7f79b14c028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD558de8fb039ef2ee9e987efc0a22184bb
SHA1be812212afa79a5dd51fbe8d3b80bc3ec75a3677
SHA256959867a17f656e825f8356009eb993ff379a80ecd751d6858a737a553a1c4f85
SHA512882a69475c0a831631002bb29d245ffa6115b1afff76c017117c9475b175f9a43098bfdaa2638f1fa823f2957e09ca7a4427a48eecde9a6a8628f294e3266e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b983bb415600b23efa2bc72097f7eb64
SHA146ad13ad66f301ca5656d3890183ac0f186eebcb
SHA2565b0aa87493b532fad40cf1b3c5aa11ad006a6a473daee20554e32779d2ce189b
SHA51202a4da02e3c96c435c9ac7ad4189f4b0cda3d79b304e2e6c494edfd2ee5206aae1f0b295f4515fbd1310f36976542c0b872ff5f10e40d68e95bef34f289bf2f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53f369ead0127b66e1e4eca8685487926
SHA142c5d2fabcada416baf4851e418c75ca5bcbc174
SHA2564c737f09ff5a16da594f247d70e8311038e4a12c132fe8a44e27a6ca27bfc35d
SHA5129d99ced0a2fce932b7ad53a405cb8ee42e504425bc8af3387b4934b19e08bd7c33c127d72d3119655e2d9608d2691a0c569fe8cb35eea10f6ea560b9ac32d439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f3679e6de5740af09a6c7936fe57b784
SHA19af4ff6bc40c565edecc346b0c1451c84db89b42
SHA256f0bad86e972d98e963258f6399e8c521b0411a8bb816488087149b75f379e6be
SHA5121a13d1dc450d9967db2e38631f50922b6255023226a586f99788d677efe0b772934e6b40c0b4bde43b91c23b6a3434f1e0ceaf15d30570ed499faf08dc317fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55619dd8d6dabbf0e22dbe87e92b958db
SHA10dcadff8c2d335fe6d6c008f9ae37d26e519e063
SHA256b78ef99178a1f011e80a5082414b85aee9079b69644bc27d8db2d5a6c11f91e6
SHA5127ed7b7ced926e9c0b28d36b9af13c273f75bf78dfb7113001aff3b6fb15368e10c4bf2375f37fa79c0418a0487b01b71c1352a3765c5f33c86d92cd15d4e1438
-
C:\Users\Admin\AppData\Local\Temp\Cab92B1.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar936F.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06