Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 12:01
Static task
static1
Behavioral task
behavioral1
Sample
67922de7170315aa8b51f81dd171a081.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67922de7170315aa8b51f81dd171a081.html
Resource
win10v2004-20231215-en
General
-
Target
67922de7170315aa8b51f81dd171a081.html
-
Size
53KB
-
MD5
67922de7170315aa8b51f81dd171a081
-
SHA1
b8753ffdf3065a5f985027c651699f0ca9309ceb
-
SHA256
e80d07c704a58a500e997eee14a188805924a97e05b7637c12d2b74ae6712549
-
SHA512
21eedc9c450e66c7da968e8c37fd6c95722daa192353dc49f635dc15ecffd03f496b2936664c40b3d15d11290521ab93bc241f79cbcd45a658ab8eb28116cd3a
-
SSDEEP
1536:CkgUiIakTqGivi+PyUfrunlYQ63Nj+q5Vy0R0w2AzTICbbnoh/t9M/dNwIUTDmD8:CkgUiIakTqGivi+PyUfrunlYQ63Nj+qY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c096f44acf4ada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000f3e72879bdf5ea512cb9942060bde74af4b77bb2ba26282ed79e5fe8d541bfcb000000000e80000000020000200000002f7cd941ee2b9bd4f5a22dd7e951d768f07bae4fa61b62066f579fdd35d4cf6c900000008b183b77e1e0aaf0b1b9984b960b50cf412d2e6fd5c6a82fd5e62803c00c10383c90c47ebeaed6fdf0fe5887095534cc22c31371c46b1b092cdaf1acd1a353bee31314af504f31e6d14ab506c2080328168bae0aba1014bebf6bf1a089b54b128197cc403467745693e405e93c0be29e1d68c07ef702787a6fd270f200157aeb40fa99f619383a634c6e6fa674de438f40000000bf644670cec807d5a6a34a8ea3d79ddc2004991fe36074e8a5515e957811a48da9d9b17be8c51f0b0c50c1fc93d8702c0d04124cf54da984d7513ec2d8ed5905 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{724E3231-B6C2-11EE-B908-CA8D9A91D956} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411827545" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000f63bf29068a2803b454a55f477e9bd57bfcd46235ad0af42192947eefd279a01000000000e80000000020000200000000ec09eb13ba4447e6d8a1a8309f0562c92f55d0540093e593611a012ceac1b8d20000000ccc4cfed31407e6545a51063773685ec3e118ee3f4fdd665900d84f4893371bb4000000028ee005b39799b6c4767a41d8bff0ecf579fbcc634726d4522b68f6e17a47232eecef9f249faef6106e5a0eec97b1274c8af95d2b91a2e12121699f09fe736e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1152 iexplore.exe 1152 iexplore.exe 1128 IEXPLORE.EXE 1128 IEXPLORE.EXE 1128 IEXPLORE.EXE 1128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 1128 1152 iexplore.exe 28 PID 1152 wrote to memory of 1128 1152 iexplore.exe 28 PID 1152 wrote to memory of 1128 1152 iexplore.exe 28 PID 1152 wrote to memory of 1128 1152 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\67922de7170315aa8b51f81dd171a081.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b92cd4745f98746e5df17bbcc418190d
SHA1d27ea1b0e5575b19ac844f68b49e51a670805c5b
SHA2566170e1a0ab01471bc0dcf424fa317297e8d20c28c1f8845f895a4a9a832e77a0
SHA5126f073766da805e3e1ac443abdb2b57d43663e68e3d755703a3fec8269e44a82f309f2b62b70b3e1a96265a1e27c37e1d6a7e89d80e84ecded5920dc33fa95019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e89bf623adb72668dfd8f7dcc15d6f62
SHA18192c9a54442052764c8db8b7a41a30b7d3a7894
SHA2566211c81c1ef53c39d86a411ce1e5fcde591f3c1cb21634fd8c76dd2986aebd52
SHA512f9f4c49a12be15ca93a4df5d49dc2b17a40914dad6792eac7f33362c748ba1f2b2b9c367d385565ec1102122b26230491dd487046cb15d71683a5533eed59ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf358141a773c95892555dd0319d1338
SHA1cd0d8b1a08202b41de6cd7a9a227cbab35f65464
SHA25603374817438177424453dd1f8e11dfae79fe958fe0010ae969a56158a1e264be
SHA5126d5c71387e82216f881777e63d12fd3dcf49ce306b2891fb4982c88f7378c05c2aa2b5c1c4b0a6bab88edb614f725e0cdadafe18f02e53768b8cee06f143b045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567504f82c8e4b4aadde983d8d03a37a1
SHA1e3d1ba105686887fe9ff7e8ff8665141586692fc
SHA256f415c15e6ce61b663d92d0fa2644051e0b4fc29825e25286a76815e78fbf5a4e
SHA512c29ae5c00e8287faf5722c01d9ae34e65310e90ff380074e9f91218cc75537f3fec47deb192c3c4fdde417955a620c06c43b194258c75babf57bd4877402376c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a29ad8b03a225d4ba6489108b0f3b73
SHA16b2f3d626aafba0ece2880c6ea51b32c32c8059f
SHA2565d36013e786c10a2ba169d2ba7b8a29d4f95978858ac435129f606fcfaf4cd3c
SHA5126b643907920397e24f3794259db634435b5aec089869b7caf2027930ac699b99d197068273ff128329a58a20cb5f57636d02cc118c2f7441f823718bc63346ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5367b9476e1b77c99882d45afc03b17a5
SHA1a8d98f2f7e396b625be6a9af91581807ed47a958
SHA256f9d3cab90abaa3f9f69596905358abd928ee20dd6d0c93d5583e8e19c9715f95
SHA5122e83a0b76b041cacd9956528206f45a196f817bfeb4e911f3e878a8d3751052d79d0c292e91a282e18ba44fdf667aec131de625fc2c993dd59b0dd2b884c2df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7acae395e50fcdfe25c5cf0006fa5ac
SHA1dbb0568e8d468667f757668925260523d4596c27
SHA256970da5b3c9ee10e052f05e66c27f30d39511a214b350b76230f4f81b80818545
SHA5121096d297b91cedb57a1e5b90cfdb9b070f22de3e7c1046d65e9b52eb90b45cd4782eeca1be3df07154d8a894531aed96011c79e0a2b70d50752c36013fab3ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f787b7bf7c544f97ae7786c4e4ac394
SHA15bc3764395406254a948f6dcd224c38bb4a92e6c
SHA25621bce030982feec87b9ed6c2a09657e1ddc767eb333967b38fc65043310de0bc
SHA5125851275fd359d56f785a02cabdb02f04fe8e091ca8f3cfa6acf7d31eec69e7e8e51caa4387e2a8953937d2ccb318aac53df55b060e22d6323848b51a069e55f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcc94952603e81ff92a92c64504aeb8b
SHA15d8a0684ff73ed808e2824770e68f974ee6543fe
SHA2560f24acf6a771272a71e2f867b68e62455376c49b65888fe32caf9316343482f0
SHA51236244d31def40ba23ba5be03e2fd1cd7e7e3b1ca85dce238ee6761e446f803a5ef35787d8892f44807b8754e4ea915b674b95dcd7524273b79352dde46ec3577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5915941ef27247ac5c6529f2dace73005
SHA19966e3d92b89536f34eba54bce653dd4bc251cc8
SHA2561ae8e3df50d0790ed7e8bb6eec0f2d61c09858e90bcdba870b7d0e3e17d7efa7
SHA51244a7a4227d49efbd569be39d7d755623d6970ccd2d9e6cf56c7399477825d4664a9772c100a2b3464e2474f5df0d9de17e5572e39309d0c7013c1cf29db45246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b02ee23013207153c682eb0b0298155
SHA13a6f163a1926b58f251b9af7893556f5ea31c9c4
SHA256cf0f05a66e820c366d13f392d755fa2180bdc08e8bed5e38d44a874a9a903d56
SHA5123dafc0412c50c63a1bd8b6f24704d597dc6a37613040d85b878a53e2758717ac7b396b3883616e872deab46889d8028424d4d454203ee9a0c0780dfc0e6c7aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c13b857c912e8fa4f3d7fda36e411b8
SHA17862b48cabc433e062c1fb7c03cb9e66f6d6b7f9
SHA256d04cc16b2f70bb23726b2c316e4b4d5b71707e58a46f60147cd371edb070ce4e
SHA5127d6173eefb87e77f50d18e6c8e7592371cad84d8008f16e51ec2de4545eec111aec46ef54e3cfaf78a70e5cf016c2dd5d35d0f6ed2552f136fe1f1d0ac97cbe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b07bea50000c63c4e079f696a48478b
SHA15d2cc4e5dbc7b66b4e1b824426061c757f49e1c3
SHA2561e1720db0c2495a2a9c71a9a79cb16466f672b8a9f575ce11e63acb3cb75a768
SHA5120c823a0fc3caa77375211dd6d8893e76401ebf5c81057ae7a9a26a7b8f1ee9b07ed15d9ff90598a0da675115b852f26d77fde141009a8ea695c62379ecea2b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558903f35b762bf0175d51d59b240ce8c
SHA10ab82f959baa10707f2a36b00020837c6ee3b63d
SHA2562f7ac13b4250d04d01f6d58e6f9a7bbb791778bc03e88cea1a48baaaa5d1d1a4
SHA51270c7530fefe5fa6f283709cf436245193d9265051657855901889ddf3cf2677d0e9a7b1ff3646e9dd23ec5bace66f2a4f307c569c785674bcf7eaf5c932c7286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a717fe120473e1fbe124a2632e169e0
SHA18c1a5f7ef8348c13abe07a0ab8d882a20a8c495f
SHA256e3dad1b962043163e59945170d14a16a766aae6239c3c6154c265d0e2d8d27da
SHA512b7785d33e2320ed6d4d849be9024b41ca06928aef301953d57fad4ef5d045d07486688608b95300145b241b3c012214aa44116863e4d6a367042669c8b430c4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5c15066067cfd3c8d3775098ddf1eff
SHA11ce9de1964064e1bb86bb2b1565d0d17046a4d8c
SHA2560213ee6c4a626c78037d9575268a6534634b6dda5f32c8478cd14bfad26abc99
SHA51277806500f2c48aac22dd4912a57b089c259585d26b5483726733c7813ebb40782c64f5fe3d2a067652863456d13c87082f755a76d7a4f438cce4e8fe6de11f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519ff72d6265c11ee513f2fed004323ec
SHA11ff09c670779e30b7c63b4284b21bc0ab4dd4c02
SHA25691bba194bb475b676c3e6f92389d6754d30512c48390077cfd88e966edd7b95a
SHA512ab6bb14f85e6f58410fa3023938bbeada15a21c91499565416b03fff416cc2bd3b7308b57bf30b20cd4436a5fa3338d324476ac52e1ff96d69123287763f690d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57de3842bf1fe985e9a0bf3624ac8349a
SHA1363db685038bd2fdb2b38e52505b1350f4bda664
SHA256a713684a6a613a1caf7fe59e226f6430eef2727bab02b89327d436867f675358
SHA512f34e920e092588d8759c0371dd75ff8e6a76b0841d3ba75ff820c02a06964cc59f06fb63a07f733c94837ea596b0814395f87d889e279df1e51c2514e3b0beea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e20dc8d0ed25128658fa4bd2604d919a
SHA14ddf6fddfa4d7b3decd7a636db6ddff083638051
SHA256979ead44772690b0aaec2b78651605fba73ce123333b3b040a0625423d2b3986
SHA512e98cc49e69c6301c545f69707becebac1c4780b5a15b6c2f664a91c3c25527b1339081f82c0d8b5ff6d95fcf7953efa4dd4d4bfdd0e788cc30ea3263fced7bc4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LFTKP12M\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06