Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
ab16ff207b7c0121e36d788037bece93.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab16ff207b7c0121e36d788037bece93.html
Resource
win10v2004-20240226-en
General
-
Target
ab16ff207b7c0121e36d788037bece93.html
-
Size
22KB
-
MD5
ab16ff207b7c0121e36d788037bece93
-
SHA1
cebe7a8c727c9c3522a8ccd3e4bec23f360df5b8
-
SHA256
a659b979b2f502fb89f50bab045523281cf2077528bdbdc1db0edf548e8cf1d1
-
SHA512
9ee3371b0f66902190bdfe99d5fa014a10aa47a5f2de7205abbf2cdb6a6f507982c5078697b26adae35662261d986f361cf06473957605401728976369ffcdee
-
SSDEEP
384:peeLF2qkp018BiC6d/2bHzecef2LMbe6AScyjmSWn:4eB2U18ICHbTecefAMSD5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415259281" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05d3089056ada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af6000000000200000000001066000000010000200000007d2a9c6369f1b47600f96ef3102c8c6e42f8e0e7146afe5506234bf31da43f45000000000e800000000200002000000071a4f84c989c6ac7427b78c834f520b810a6b8cfc434fdcf83c212e9a3fe0e0690000000398816b3f7b7878e77fff62e02acbca2b90b6813f81da50aefa36053a84f507bc03337950d6f68fd20f5ed98c1ab7ebdf1967091d5c4ea801ded79812450413fdb0eaead5b91c1eb57203ad948a16c6d9c96694f9c1dcf7ddad79003944bc08209bcde4c9469925ddf2beec916dd34e5c490d987de11892f36de988b46b9b5e497a73f85a5e54f0169dc7f92ac39ce3b40000000982c37a067c7a06f3894e8d622c08887eca374d2859f3577304ea8be0bf668e9713aa89c6a1c349915b3043923abf0512df4dcb71700852eeeac3e8093d3961a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94E9CCA1-D5F8-11EE-A66F-5A791E92BC44} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af600000000020000000000106600000001000020000000b1aab4fb920c39db73a7c37c6a7848a210e80b65b2dd706df85797f4deb5d7a3000000000e8000000002000020000000d866502b7c93e346dc2aa12df9166cafb4f578fea45ece0e36a35d1bbffecc6120000000b21a3ec4b28eaa9cb178faeb03dd3b1a9c7cf14d3f7faef49e508727442aee584000000006c090ed8aedaf1f4aa5556b2111bfacedeee96a539c56ce2dd1f2c501f3aec4a228b4541f064257a808554ff714cb29b5f9db7abfd06225a6a2d7dda26e6fca iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2144 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2144 iexplore.exe 2144 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2584 2144 iexplore.exe 28 PID 2144 wrote to memory of 2584 2144 iexplore.exe 28 PID 2144 wrote to memory of 2584 2144 iexplore.exe 28 PID 2144 wrote to memory of 2584 2144 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ab16ff207b7c0121e36d788037bece93.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2144 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af8c0e2af455c3fd7c6ea2cf50c427be
SHA1a3eccc6ebab8f5159bd2a31266ea3333ba89891c
SHA256a7a1e0cf92398bcf9b258454aa29aca5cb7ce2d6af1852ee51ce6c32c68f904d
SHA51208d6c00c168ad56879e04e267503b3e268b89adba567e8ab92df227cbde4b9630d7fcb198aaf6a2ea1111cbe23bb5412bd3fdfa92163fe3e893682054b8f89bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55911efcc382f7d60641bcc68cd21a0f9
SHA148226751039e66d305dcfae151e0c0277c073317
SHA2568baf49877918f2732df7a9fcaa06554c20a85181c096d1288c4a84b4d74c0477
SHA512e7bc62cb2f6c94dda452551cffbd59fd1815dc9e42236dc6f3828c1921b668fcce72f2a361c52ba9be61db31fbf6ffdf0ac493c9a7fac52d7f86c81c107de38a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fde64b315b833b16b42a0a954487c955
SHA1160c24bf254cd57549e2a351ff07a749def414a7
SHA256183723212406c26ad3cf0203129a7e16ac4056dd59b2471e17aa050ccd01f9fc
SHA512d6715f8d7db9c100ee4f42ef9e217138969a831c414f735093d092186c2f52183c1bb397677539557c0cc5ae7228a0419ae2287944a56d6d50354e004b35bfa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c2b5474c3e0271cb0d32944035c7b24
SHA1c92cd72b66f6e646654e8127b9a7c94ea27183d8
SHA256c03c93e5ef37365efa3266e4fbc8936fad15b21af9e3df81a8be723b0ae374de
SHA51252103a74698be7c1b505990984cc96db305c68417dd34c290e63fcaf38b3ce405efa233c57a8f99b26f99694ff4dddfecb57d44b1bb11e1f0e4b162272e0d160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1ba17f21b6948109bc276ac7503d374
SHA1630af5acf58aed4b0de0a8ac914dfd51f83ba2c2
SHA256889a6bc96829277473796af66c0aa89236ed415d56bac84db48fdc8d961026d5
SHA51204b086963fd247b8044b8b48c7d3315259e436088a0c92ab06c030612eb17422ff07ac3fc0713a1ec3b811f4bdf8168b43c82151db44e430f10d7f129f8f6048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5948bc017bd0a4d6226b60d4f695b9c32
SHA167bda711fa43e58538362740184f89a4afe7a75b
SHA2566ba13b4dfab128bbf2a57381008bc683f9a7a3d2a162e32f9cdaf8c81c5bbd39
SHA512d22131f9b9d7b7fd6e0998afbded15e9df676ba64d4ec9a0351be4264de89778d9c051f7c7254a8db3655691a4f61ebdaee0a02ef68e905c4956b37b15bf0aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff0f7e2296567650c58d283354ef4450
SHA160850d78bf9b1bf50aef960abfcda080daf4634b
SHA25625738c679760f30412449f7dab5821f8ff6d9a49c099a54a5ae58dae9e263747
SHA512c2d5b5d11a469fedef06b80f447f43fc744b20109869bfd91843993548ff3d40e9d5ecf24027be7db304c57649abb768dbf8e47c38da8c09a3a16fa7435515b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571312a26042567a726273a0d723fb6bd
SHA14249da20839721c867f0efd57dd1ffee50460d11
SHA256e26bcf7d09cea2556741ac587040272e97879a87a2c86d71f4fa2332bc8ba314
SHA5125924257affc25862c1074079ce90079d9086944866242938f4f318fb59f704564a895e3799c4dad776e89f8dde9f67108fb2c15f7b58a785b2c92a4f6ace5587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5851827b13f7776a79af6e5f335dd8c0a
SHA15169ebf8041cdba9fa99413c002e91fc5f7b0ada
SHA256d135b13767cc607189d084fbabd9cc6e38dfa1f3069a2d174236e0bae159d986
SHA512e892cb5c9bd1d0c01922b625a0c64e5fdc8153d544ff2a7f5f46d6d3db0d435304f7c344f0d3a309c635811b8f3ebddea31b711103ce859410fe60fc1732f3a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef92cb4916123128226631be7befe0e8
SHA1f9a3c995e238a5051ba4c8981c4bcf089bb4e6b7
SHA2564d248e7ead919349318c63f180376a12ec509f9fad9815c6ada578ecacc699e8
SHA512c05c05715cea2b638aca16b57c78bcc01e55a60e0088ce75b277a09d0410135989ddb5578311d95af82d20ce265ec0853306dacf0b4d6266786dd24e62440806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acaacf35e129279f7822e18417b59bd1
SHA195f62d8d92843f3b01f0a7702a41531dde9e82ec
SHA25674789828b6d7e0f4f6e1d1d75932b11f3b02af7fafd11a4256f02cf9b2896bbc
SHA51207a3cba9c17b2e8caf115bd1391da5aeae8e842329c9e3a0e60887f6756d50390b34c26facfdc0fafe36ff4aecfbaddc1717fdd6a7e91065c85a56096e281995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f0479558afdaad6507a469e403ff12f
SHA1f9cc89fde0825472ae1dd731cc2c2546bb2624c2
SHA256d8d743895ba3c57869ebcaaab87184b6653cf424e7eb6a2a03ec4a3a758e83b4
SHA512e5cc520f11bdce5731e86c00838057009f9f8b0a28696cb2f44f5003ec1eb6bcb3f58b0fc6932f0f043b8ac5a1c5ee138d183d8b3fb27593b9d73f653436dbf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58556ac907dfcde94dcc2a6cafda5bdd9
SHA1a740a5553eb0357e1f79f2b118924a18dad1e0db
SHA256328646047be09f7f3ca4d2d5a8d099af0d7ae651588d8df470cda33238eb5e47
SHA5120f9c699dfe55fdbaeebc303983e026bcc20931b4bbf3e38acdcd080290d9ac6575c45e83c70c52fc678c687273649ae2d962ae1c3f4fd5f25128bb2384bebd58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560a1501f3ff4304db7f5a53b50d230bf
SHA1736fac41cde4f8d28cb2f3ef76bc1c4203197224
SHA2563c15e88ee1dd30b768b6c8d1490416c4d447bf61e84eaff7232d1340478b9bb3
SHA512025c23a923cfee948e98e2c75919d3c61d117e271bd0df68ef1ee72835de9612e836d25b165f9dc4bd5fc324ed190937bf1fab6080af96c27488ca30e36821bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f141d06f58cbb65121da633a4c120cf
SHA101b58c4236a779794de17686dae8422cbad598e2
SHA2569d3a650626ed7df8f8f05a81d13d17a746b903165fb2edc51314120faf10d34d
SHA512865c75ce6fd938f9859b246827669223a446e6aa993fc7903a3c24232c4f7c6e23453e78a4e12caae8de49585b8e6b7b4451c54dff56d6ef3c3998e07f6bf674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be1c099f5c1d1e801353569f9929eca1
SHA15db9400a8cf9108c5f2cf8d36cb219241ddbce1d
SHA25684b52c5c5f01043d38af0c4c8e09308af481360d27fb159f5e7d81f6359b1058
SHA512521f3b69f99f4ea0c13585aa65a550188a415d21d375bcff4beb45fd7b40165c8df3d6f3c09682ba550f9a9b6d60f0dc0aff6fc810f546709d25b0585f7b2f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504248d7f194b7f7adb0bbdbd3ac9462f
SHA12a3ca8b4b63215b926f46dff78b42978e5294315
SHA2568e051a2d7a8ab9186a67c5e4348c7660dc7df275e720c0b6fdeedead050cb33e
SHA5122d82af499299f9152cbaae5ef6f4608301936d689aac5e67b4ec2c0172fddb248d4d9ba326f7638e320f90890573af324409e675247a4d89759d694b490e08ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dae591c668a356340e5b73009575fa8
SHA1df8dd7fae18e90952203f73f7804a36f55ab49de
SHA256d4fb7884923f31c8e7d32a86b0e2c82e8629fbcfe310c5b5cdf85cdf9e2d12be
SHA512bb14ef1926469880ef4249d3f7061fbba9f3bc180383b6d86787ee622781779dc4aabda8aa08ff5c298e8d6e0836224b24aa3bb308114e837c9bc16321b4c06a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5366a1c97e303a824447c60a29ed49bdb
SHA1fc466c13948f1c2f80f9123e4b38b79cda1bb0aa
SHA2560c46e1f09c0db051ec964ccb90dbc540d8c2e635a1ced5804587c9bc165e6957
SHA512b192e76be3647bc3765f6c7061d49c4c3a0864ad01432fbc1c7e0bf2bf687b70d0f3b9f13528f27f1895f063736b6988288e0b7e98c73486b29e3f2e9b7847b9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63