Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 17:26
Static task
static1
Behavioral task
behavioral1
Sample
7516c8225fbb5c37eec20fe4eed0ecfc.html
Resource
win7-20231215-en
General
-
Target
7516c8225fbb5c37eec20fe4eed0ecfc.html
-
Size
2KB
-
MD5
7516c8225fbb5c37eec20fe4eed0ecfc
-
SHA1
68fbf287a6bdcb30a9b4fa1f094a54e9474c00a2
-
SHA256
499df9bfb4dd6dbb3d788da556ab15cf63dc147098cd8a8c521b5ba00ba9787e
-
SHA512
80ad5c0fd37149f0d41c0ab69ac76015c93510ea4aec4edcfe4c7a94a491f2b05149aa747cde649472dc3dccb666921bdaccfbb3f0ebb490214fe9c01114981b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E00C45D1-BBA6-11EE-8C00-76B33C18F4CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c19300000000002000000000010660000000100002000000063c73b1c9f0e25ee52c6c761509b65a18cedbc8468acc56332c09646515b28d5000000000e800000000200002000000019982a911d34edb97febd5fa302187d71bace747cb2b15cc88ee20f9ddf2e61590000000d688193a0c5510f6d0f2a7e6c6281d641ca9c48fd30890c9b026136270827fb4afb892000d4749337a96b32572b2b0b73796055b45767128199901572a4ece52ee5ba94c3ac5f2e590115808afd58678c8f2473a2fbe9480b7599ec2ffd9a307f2a1005e8b3670f2856f10d30bc6d2d93d9f16a5ad49e2e43e1647103172d563034592d2db40208bbf935ebe90af600040000000b2fd1651e6e3f01196730a41ad2e826b233fc5784bdb666923ce57627d617d53b7cac6f470dbe09499b334e5706920f331e309f3b92880ad057944c9bfa5782e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412365457" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00451cb5b34fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c19300000000002000000000010660000000100002000000093b1163b8d733246b72e3590c047e6ba33d19040f07f56c96c4cc0448f76aa83000000000e8000000002000020000000b2573e7953d425b11bb0021d98e7009047a95dc177844e34425a8b1504d68c8520000000350b86a55107878c9c640a3f04fddcb0265b4827e7b0c379a4a4f442cbda4fe54000000078cfa6c492459a48aa8227cde532d3981a40f9079f8285a4721c924f37c97dd5eefb2e698381ded188904973630743fe29ebc8d32a6fd580887fe6714caa6b13 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1444 iexplore.exe 1444 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2700 1444 iexplore.exe 28 PID 1444 wrote to memory of 2700 1444 iexplore.exe 28 PID 1444 wrote to memory of 2700 1444 iexplore.exe 28 PID 1444 wrote to memory of 2700 1444 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7516c8225fbb5c37eec20fe4eed0ecfc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ff4c19707555e8f6cb96cd181bcea4e
SHA1bc470ac059df7efc6576352cfedadc4b5d9e2dc5
SHA2561f6d349c71a4bd9733a9dda1104b794a0fd2238b9857552e81d3d0e7d39a612e
SHA512294ce800259881a75936e5063c148889e8d9a3648b929419c34e5ed1cf5d531fbb2c2b8ccedaf8c1e438b3fb101e70231f616b687c3b5f8d4ba17a2829ef9b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506cd6010c6dcd82d0bb38d58d3db94d9
SHA1a3cbff1546099a352c430cf4db55f11f9f58e3b5
SHA2562b05b2505e34172f7e4e786d0ad8b3ab00c88619fb7f9c8e3b512fa6423fa89a
SHA5121af97e098f50ff686994488065703c713e2175f8970fc5e2806ac6da78d31a0849ece9ef8a687972839b02f06cd48691b215be416c3f1aa5a05b62aa0f7cb4e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56deeca385b5ef5bb81a4cc0d00453e2d
SHA1fb930aaa224bccca7187b8aabc4f0198aaf4c6ad
SHA256280ea65d50dd281fcdea96ccceba2c9fa4687b8b855fc07d20656e63d1b4a764
SHA512d5642a83f901a49b62d50da0b3f962df368f67b47850cae02cac12b6ccba43d0eb31fc1d44fd3590469b42bee4f59c09beb710ecbde787c79561515c169c80f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56594c2c77c61d65425f8166e05b46f51
SHA191441d68a4e77bf1a5202fca85d19807a2bbdbe8
SHA256c2da6712d21f237daf0b59a3e0da3570dbf640366bc7e3d1c77310feb2d5fff5
SHA512566a742914cfba53ca1a76ed80073f6fd185f0990c2b9df376f70d1a28ad3581d80d04598997b96804934ca6ed66591f074ba9568b7c315e2e0d089baccb8bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddec08a0453e3ff4191cbecba27f1462
SHA1017050dd32b0e111f2a673b73d0278ff31369c3c
SHA25682bd66d9843324a6396ee67063a9a24381968f6321e0af71a49ff79181b384f8
SHA5124d7f67d23acd95433dfcb2593f38682c100c91a137fe1102ab13d32c4b350b2bf91be8bf16c7d452fb01c2fa88cf167a46d73fad21291e8c0c1fad9bf1efefe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a80eb26614cda2885cb2658acc2741e3
SHA1f83b25a3a2626934c551814f63389788a2bcdc62
SHA25600f3e760f8efefc9aec37be0b411a8fc116a9da5093682ab417cdb512a8a6d8b
SHA512c626446febbc9bd8319cd77de9e678421d9344efadd9cc666aecafdecbea5ed57a809a9eaf898f0bda8ae7a97e10a80e7fc959605cd4d5de8b8a8d61672ffd70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579d611fed4e2035af44108649ad3ff9d
SHA142e0aac8a231e8048ddf07b2501e1c805f1e2bde
SHA256a06ab4eea5bcc562336963d3587e9f65d8ea842c5cb61d4b497cefca3c6b705d
SHA512f79d33eb6c5a4f7a4db4a32cef87a0a8850835ba44c3567cd7ccdae564e8236c1199f82697086d734271b83dbf276db36e67264f3e80eda78c29566fb7ae65dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d499c207bc0d11b4bf14ee78a5b27583
SHA109cc6eb30fd107794c7ab87a4f5a8af95d14bc2b
SHA256c5ec88d02cf32fc4d883cffc682e5058f2a31d321a2dc4e1b2d2de45b3a9639b
SHA5120600b1c6cb91fc208d599fbfe29e41900c231649224047514c22d469a99464892a6938150e3f8063bdcaf8f63490e3f85e0c34e41ab51b44c65d060fdc45d7e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e7fc50723e56733fbb7f8babb5e9193
SHA19ccd1ad21efacf3a19b8c0a2f950577c7935d3c6
SHA256082d7989a5b7b4d48dd3aca01270361ba381c274899b13fd224b18d49beec36e
SHA512df5ef9c1a6c4600953788198c31e6d21a30ed0e15ec772f103d178a2a414c1b5344f91e184ecbe64998a3bed52b6842c7cd05673bc74d6e83194c27855f8a942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf13d6a800e977a20fa164bd46f37f6d
SHA11b7088c9cbff122d23c5a4ead0bd824403a05f7b
SHA256730262c75d777bc4655ffaa5edcf25dfbd7f80a33eb6c8317620427b14e73f20
SHA51225984416fef6a53519312dae2f9a046eb5cbef2c42a274393d5b6c9454e7752ef2ca6d10361eeb2bad07f22614204859eec00ac553ae5ba7204d02f03a72d8b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ac7276307df627709cb7fc74fe90ab8
SHA170b1454332dec333cc69fac8a9c7483e0f21977e
SHA2560c77ad9bfd351d7d1d546a188fff68e1e75eee91f4afcdeb0b4aa035f0ab95a8
SHA5123ba63aa9d123690d7433167e497860ddc8d3b5f9cee54ac4e8535fbadb03cfa61461c198f8c937394a2dc8dfcef3c036e7806039a859d32a84e615ce2ae7dd99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573773020faa7f0cd50047fbef4018563
SHA1d526b25496511b46e741b0f3c8b8dd3936767b35
SHA2565c397e77879954101987eaedba01ca3f643b5f8a7bc0d93524a36c5e7e30acc3
SHA512e562054975ae1a7bbbdff034355483e1e127dce5c98b918f8f31e7e82c75b5d42734fa6af368c5e07543ef19332685c4f6cf88f6c37b311aaa01f3fc98bccb57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5024267ab553810f90e5d99c3935df895
SHA131ae1bb35acd57299cd25521f5138f6b520bcae4
SHA25632f1eb30d2323c26da636cfcea50b198784716495bf5be49101435877032fa73
SHA51250ca0a5e28d6a5cfc2711498fd89ae26df9d7aa961a00efddce5abde083ccfcf90bf89c6d6bbf8f601ceac110ce8bc0221b362108d16eafbdfe17c96657dc4a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580a51ce0ceeaf09ca7a47f8544f49aeb
SHA1475372a5e4e7f377c2ea6462ee0e1ee0971c74ad
SHA256238ab036e098fb6a00e08fb948af6a9db164bc4fea265f4420fcda3d14160188
SHA512cab29bce17921e88e446383e09f6bb094beadde6ef6744941dd56fb4e1c6a52e62716049276445b849c98fad271b2ae20de9d016a7078780aa713d015b2d98f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7dad701b17c45850fef5a136645d11a
SHA1cc91b10719e9d23d686dfa510f971379ad2e3226
SHA256b8c5f9de579701911026307e3c592a73439d21caa9ecb8dc3b8b4fe77421b46b
SHA51296f8592e39bda2ab7869c70ced6abff4a06dde86b76031ecf7f5688301d8ad049f571bc482739b9f9b3f911a936f5e1ef3539bad513674ffa09b55fd4e5e8dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5019f0d1a0184d0e19fa015e7854ee4e5
SHA17595dfcb1e5ad079efaa3a9167a1a933f61dd71f
SHA2567916d7121593133231db75d296c7173a1759216dbd53fafe21201a582ea1a78f
SHA5125bebcf47bee6c9dd118eac8f2ab89f3477d55478fcf6da15d2c287fc361775c3d7ae87a020a9acad97fbdab723d4f2d8b406e6b5395e9fbd5c7328dbf6d22eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5368d3d0b29b6e242169ee32095683f3f
SHA1e428d65e76ad50360c668cf1b4fe16c3c5c456ad
SHA256edae4d49215228d8f9b63b42dac34e77c342d1f994450963f6689d86d491cc4e
SHA512825dc0e9f0107797703148658912994a47b10ba076ee0c1492040a3c6721a92699d193c2a1a7bbdf1c8c459e41ed0055e332c14a94e654319a076348c22953ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9b79f473fbbd374aa8be1a5adb06c60
SHA174bfc29492d670504627e7eff72a4f7540a9e7a0
SHA2564435929e3e831748c35a9e5b7a249df821c5f05e0c52a2383b47ccb258562351
SHA512750c78c6d20449c0e88569abca25253fd49d919507ecbe966f23cc6f6742e52c423c5480408cfafa0c7fb238778a458a679721fac30bf5ba9a1a63a7cbc3d49d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f9a872302be56592c0e619588983e86
SHA130924222b7d5dc3f0a698e2ebf6260631c4c95c2
SHA256768dca400bb6d35bffb2a7fcf0ded5299a11e14ecb1a0818e18b8db13591f1ed
SHA512ad47ef1bf602b7f28332a8f1d1e6974121ca344e4c85f0120cb62665513bb1d71fab8676a974e68ca83368e9bd0a3bc99c79dac376ca834b9d66a6fe2be239cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dbe66fc23a4fefea89d988f37ce6631
SHA19eee61dd7e35a3ec9da7da74f8a1cd982f1e188c
SHA256c26f3c90a31b96c92a599a3735de0b25c9cb695ebf67b482ec396f2acf3136d9
SHA512529db5d0fb8e653005b0afa7501d174bb17ff70073001671ab9eb9cbf7dd6f99ad35398386127f0f559c3d6c1647c75976b10da2ec31dd138d080053358c36d2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06