Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2023, 23:28
Static task
static1
Behavioral task
behavioral1
Sample
638b96d9ebd3a08a17e72c9cf03e6fd14b035863c87bc729303a880c78b63865.exe
Resource
win10v2004-20230703-en
General
-
Target
638b96d9ebd3a08a17e72c9cf03e6fd14b035863c87bc729303a880c78b63865.exe
-
Size
730KB
-
MD5
c85763d9f898c78b2e6ee836b8143605
-
SHA1
f3d10f2268ba438e7fb682c1efc10cd5b408e940
-
SHA256
638b96d9ebd3a08a17e72c9cf03e6fd14b035863c87bc729303a880c78b63865
-
SHA512
773d64caf0f644c5da1494aeef094ab5f4bf96bb4d74e2f8e0d8b4a148be686e145a0dca59e2900f6e307d2908361c0330b20f3f726ea24e9a9c81f3fcbf51c3
-
SSDEEP
12288:1Mr/y907aaUbFqMM4J1xjnxYqmkCrCIskVK5Je74qxKRGWXtp7pUZUzOZrP/:6ypxq94J7LukCrCILWQ74CK4Wv+WzOd3
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
maga
77.91.124.54:19071
-
auth_value
9dd7a0be219be9b6228dc9b4e112b812
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0006000000023222-171.dat healer behavioral1/files/0x0006000000023222-172.dat healer behavioral1/memory/2268-173-0x00000000009B0000-0x00000000009BA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h7032735.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h7032735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h7032735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h7032735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h7032735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h7032735.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 2260 x1638447.exe 4580 x8470084.exe 428 x1179798.exe 4408 g6755709.exe 2208 saves.exe 2268 h7032735.exe 3224 i8451629.exe 2568 saves.exe 4176 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 1312 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h7032735.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1179798.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 638b96d9ebd3a08a17e72c9cf03e6fd14b035863c87bc729303a880c78b63865.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1638447.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8470084.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1884 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2268 h7032735.exe 2268 h7032735.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2268 h7032735.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4272 wrote to memory of 2260 4272 638b96d9ebd3a08a17e72c9cf03e6fd14b035863c87bc729303a880c78b63865.exe 82 PID 4272 wrote to memory of 2260 4272 638b96d9ebd3a08a17e72c9cf03e6fd14b035863c87bc729303a880c78b63865.exe 82 PID 4272 wrote to memory of 2260 4272 638b96d9ebd3a08a17e72c9cf03e6fd14b035863c87bc729303a880c78b63865.exe 82 PID 2260 wrote to memory of 4580 2260 x1638447.exe 83 PID 2260 wrote to memory of 4580 2260 x1638447.exe 83 PID 2260 wrote to memory of 4580 2260 x1638447.exe 83 PID 4580 wrote to memory of 428 4580 x8470084.exe 84 PID 4580 wrote to memory of 428 4580 x8470084.exe 84 PID 4580 wrote to memory of 428 4580 x8470084.exe 84 PID 428 wrote to memory of 4408 428 x1179798.exe 85 PID 428 wrote to memory of 4408 428 x1179798.exe 85 PID 428 wrote to memory of 4408 428 x1179798.exe 85 PID 4408 wrote to memory of 2208 4408 g6755709.exe 86 PID 4408 wrote to memory of 2208 4408 g6755709.exe 86 PID 4408 wrote to memory of 2208 4408 g6755709.exe 86 PID 428 wrote to memory of 2268 428 x1179798.exe 87 PID 428 wrote to memory of 2268 428 x1179798.exe 87 PID 2208 wrote to memory of 1884 2208 saves.exe 88 PID 2208 wrote to memory of 1884 2208 saves.exe 88 PID 2208 wrote to memory of 1884 2208 saves.exe 88 PID 2208 wrote to memory of 3100 2208 saves.exe 89 PID 2208 wrote to memory of 3100 2208 saves.exe 89 PID 2208 wrote to memory of 3100 2208 saves.exe 89 PID 3100 wrote to memory of 3464 3100 cmd.exe 92 PID 3100 wrote to memory of 3464 3100 cmd.exe 92 PID 3100 wrote to memory of 3464 3100 cmd.exe 92 PID 3100 wrote to memory of 2992 3100 cmd.exe 93 PID 3100 wrote to memory of 2992 3100 cmd.exe 93 PID 3100 wrote to memory of 2992 3100 cmd.exe 93 PID 3100 wrote to memory of 4284 3100 cmd.exe 95 PID 3100 wrote to memory of 4284 3100 cmd.exe 95 PID 3100 wrote to memory of 4284 3100 cmd.exe 95 PID 3100 wrote to memory of 2212 3100 cmd.exe 96 PID 3100 wrote to memory of 2212 3100 cmd.exe 96 PID 3100 wrote to memory of 2212 3100 cmd.exe 96 PID 3100 wrote to memory of 1624 3100 cmd.exe 97 PID 3100 wrote to memory of 1624 3100 cmd.exe 97 PID 3100 wrote to memory of 1624 3100 cmd.exe 97 PID 3100 wrote to memory of 3452 3100 cmd.exe 98 PID 3100 wrote to memory of 3452 3100 cmd.exe 98 PID 3100 wrote to memory of 3452 3100 cmd.exe 98 PID 4580 wrote to memory of 3224 4580 x8470084.exe 106 PID 4580 wrote to memory of 3224 4580 x8470084.exe 106 PID 4580 wrote to memory of 3224 4580 x8470084.exe 106 PID 2208 wrote to memory of 1312 2208 saves.exe 110 PID 2208 wrote to memory of 1312 2208 saves.exe 110 PID 2208 wrote to memory of 1312 2208 saves.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\638b96d9ebd3a08a17e72c9cf03e6fd14b035863c87bc729303a880c78b63865.exe"C:\Users\Admin\AppData\Local\Temp\638b96d9ebd3a08a17e72c9cf03e6fd14b035863c87bc729303a880c78b63865.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1638447.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1638447.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8470084.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8470084.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1179798.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1179798.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6755709.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6755709.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1884
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3464
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:2992
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4284
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2212
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:1624
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:3452
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:1312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7032735.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7032735.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8451629.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8451629.exe4⤵
- Executes dropped EXE
PID:3224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2568
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4176
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD5dcec1abe4cc4f13aa724a16f5f69208a
SHA1f74cf22ba1c25959a5571ef2f27f23d55ec0e170
SHA2563e60c0ec4add0339ecfa63b59189b2bded10214732911a8bf18b22a2c991529f
SHA512ab84fcd126956b27b193daf5540c98dcf9fd8d13c58959405ca61653e8df3ac7a73ee6fb8c28695c1cc265d824ad0ada73bc4ed66285968884eb6cf623083552
-
Filesize
598KB
MD5dcec1abe4cc4f13aa724a16f5f69208a
SHA1f74cf22ba1c25959a5571ef2f27f23d55ec0e170
SHA2563e60c0ec4add0339ecfa63b59189b2bded10214732911a8bf18b22a2c991529f
SHA512ab84fcd126956b27b193daf5540c98dcf9fd8d13c58959405ca61653e8df3ac7a73ee6fb8c28695c1cc265d824ad0ada73bc4ed66285968884eb6cf623083552
-
Filesize
432KB
MD5841944021f2d1064f514b2619babe668
SHA117d0dbfd69c42eea6f4b2ef027f75a918aebb0db
SHA2563ea8fae09c764877c6b83e73f368f3ff6a9c66aa5323f71b0cc789b3dede6d17
SHA512d72bb73dd15ba54835744c696447d2f2d179dfa266f96b566f797152f15f1d297ad5709cd4e5ab2e960a5cf99db7c8369d85c316b3fa5b77fec888712150f160
-
Filesize
432KB
MD5841944021f2d1064f514b2619babe668
SHA117d0dbfd69c42eea6f4b2ef027f75a918aebb0db
SHA2563ea8fae09c764877c6b83e73f368f3ff6a9c66aa5323f71b0cc789b3dede6d17
SHA512d72bb73dd15ba54835744c696447d2f2d179dfa266f96b566f797152f15f1d297ad5709cd4e5ab2e960a5cf99db7c8369d85c316b3fa5b77fec888712150f160
-
Filesize
174KB
MD52a08434d07095e1f5eec7f58e836a278
SHA175d3ef2d0dd69926eee7234425b8dfa9019eb985
SHA25692c7e4f1ccf2ab478902c155d14d0814a79fa7a31cb94ecf4232f4cb194a8c11
SHA512ad4ec722d1478adcec66ce10c78d6369747d97f624867b4fdace0a9f29c495983ff3a13c2d62ef4d7afc56c1dfd3334ac3c75cb1e9989cf4c51ba43f46a0478c
-
Filesize
174KB
MD52a08434d07095e1f5eec7f58e836a278
SHA175d3ef2d0dd69926eee7234425b8dfa9019eb985
SHA25692c7e4f1ccf2ab478902c155d14d0814a79fa7a31cb94ecf4232f4cb194a8c11
SHA512ad4ec722d1478adcec66ce10c78d6369747d97f624867b4fdace0a9f29c495983ff3a13c2d62ef4d7afc56c1dfd3334ac3c75cb1e9989cf4c51ba43f46a0478c
-
Filesize
276KB
MD55607cd6c1c1559dbeaeaa743f3da9802
SHA1f9e5bfed6b72a8ce75960714d7a3cbcf83b38de6
SHA256a179da69c8131e4334b4f0f1e5b12b9d73b748d46e8fe681b0f4a6efd2c3a37f
SHA5121fa25751598485e3b57020c487584390bb40e001d1cefec4b3b13a8e3fedb8971c4043926d58ff88bc9d51c1c423831c57402084836fe935112beaf40eccbfd5
-
Filesize
276KB
MD55607cd6c1c1559dbeaeaa743f3da9802
SHA1f9e5bfed6b72a8ce75960714d7a3cbcf83b38de6
SHA256a179da69c8131e4334b4f0f1e5b12b9d73b748d46e8fe681b0f4a6efd2c3a37f
SHA5121fa25751598485e3b57020c487584390bb40e001d1cefec4b3b13a8e3fedb8971c4043926d58ff88bc9d51c1c423831c57402084836fe935112beaf40eccbfd5
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7