Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
18/08/2023, 12:48
Static task
static1
Behavioral task
behavioral1
Sample
47a5d9c25e3d03c8f526ba05b07bcc82e6d28977d1dd8a13944e6ab81879cbe0.exe
Resource
win10-20230703-en
General
-
Target
47a5d9c25e3d03c8f526ba05b07bcc82e6d28977d1dd8a13944e6ab81879cbe0.exe
-
Size
730KB
-
MD5
b53ed974059cfbe005fda6446393f0dc
-
SHA1
3f6c1f94f82aae3a072a1c084f38acbae247f35c
-
SHA256
47a5d9c25e3d03c8f526ba05b07bcc82e6d28977d1dd8a13944e6ab81879cbe0
-
SHA512
51c025741fff4ed99a602e470d65b3082aa93752c2faca2f80d1c4dce38bc9e4fe0cb7efa56d260b36fa2612510b5162ab2aabe65a420265ccdda4bf8581b53f
-
SSDEEP
12288:NMrWy90bL0IBs8t+Uu8Lrti2bsFzSfES6SUAKc6e720oKRNpXbp77NZM8wdMV65V:nyjIBsDAgr+jR72vKvpV5a8wymx1
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
dugin
77.91.124.73:19071
-
auth_value
7c3e46e091100fd26a6076996d374c28
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000600000001b012-154.dat healer behavioral1/files/0x000600000001b012-153.dat healer behavioral1/memory/3724-155-0x0000000000200000-0x000000000020A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h1130688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h1130688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h1130688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h1130688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h1130688.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 1940 x2588844.exe 3824 x8251484.exe 3816 x1897140.exe 4552 g5374694.exe 4576 saves.exe 3724 h1130688.exe 356 i2202619.exe 1916 saves.exe 3112 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 192 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h1130688.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 47a5d9c25e3d03c8f526ba05b07bcc82e6d28977d1dd8a13944e6ab81879cbe0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2588844.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8251484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1897140.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3724 h1130688.exe 3724 h1130688.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3724 h1130688.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3292 wrote to memory of 1940 3292 47a5d9c25e3d03c8f526ba05b07bcc82e6d28977d1dd8a13944e6ab81879cbe0.exe 70 PID 3292 wrote to memory of 1940 3292 47a5d9c25e3d03c8f526ba05b07bcc82e6d28977d1dd8a13944e6ab81879cbe0.exe 70 PID 3292 wrote to memory of 1940 3292 47a5d9c25e3d03c8f526ba05b07bcc82e6d28977d1dd8a13944e6ab81879cbe0.exe 70 PID 1940 wrote to memory of 3824 1940 x2588844.exe 71 PID 1940 wrote to memory of 3824 1940 x2588844.exe 71 PID 1940 wrote to memory of 3824 1940 x2588844.exe 71 PID 3824 wrote to memory of 3816 3824 x8251484.exe 72 PID 3824 wrote to memory of 3816 3824 x8251484.exe 72 PID 3824 wrote to memory of 3816 3824 x8251484.exe 72 PID 3816 wrote to memory of 4552 3816 x1897140.exe 73 PID 3816 wrote to memory of 4552 3816 x1897140.exe 73 PID 3816 wrote to memory of 4552 3816 x1897140.exe 73 PID 4552 wrote to memory of 4576 4552 g5374694.exe 74 PID 4552 wrote to memory of 4576 4552 g5374694.exe 74 PID 4552 wrote to memory of 4576 4552 g5374694.exe 74 PID 3816 wrote to memory of 3724 3816 x1897140.exe 75 PID 3816 wrote to memory of 3724 3816 x1897140.exe 75 PID 4576 wrote to memory of 2596 4576 saves.exe 76 PID 4576 wrote to memory of 2596 4576 saves.exe 76 PID 4576 wrote to memory of 2596 4576 saves.exe 76 PID 4576 wrote to memory of 2876 4576 saves.exe 78 PID 4576 wrote to memory of 2876 4576 saves.exe 78 PID 4576 wrote to memory of 2876 4576 saves.exe 78 PID 2876 wrote to memory of 2424 2876 cmd.exe 80 PID 2876 wrote to memory of 2424 2876 cmd.exe 80 PID 2876 wrote to memory of 2424 2876 cmd.exe 80 PID 2876 wrote to memory of 820 2876 cmd.exe 81 PID 2876 wrote to memory of 820 2876 cmd.exe 81 PID 2876 wrote to memory of 820 2876 cmd.exe 81 PID 2876 wrote to memory of 1776 2876 cmd.exe 82 PID 2876 wrote to memory of 1776 2876 cmd.exe 82 PID 2876 wrote to memory of 1776 2876 cmd.exe 82 PID 2876 wrote to memory of 3744 2876 cmd.exe 83 PID 2876 wrote to memory of 3744 2876 cmd.exe 83 PID 2876 wrote to memory of 3744 2876 cmd.exe 83 PID 2876 wrote to memory of 4452 2876 cmd.exe 84 PID 2876 wrote to memory of 4452 2876 cmd.exe 84 PID 2876 wrote to memory of 4452 2876 cmd.exe 84 PID 2876 wrote to memory of 1464 2876 cmd.exe 85 PID 2876 wrote to memory of 1464 2876 cmd.exe 85 PID 2876 wrote to memory of 1464 2876 cmd.exe 85 PID 3824 wrote to memory of 356 3824 x8251484.exe 86 PID 3824 wrote to memory of 356 3824 x8251484.exe 86 PID 3824 wrote to memory of 356 3824 x8251484.exe 86 PID 4576 wrote to memory of 192 4576 saves.exe 88 PID 4576 wrote to memory of 192 4576 saves.exe 88 PID 4576 wrote to memory of 192 4576 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\47a5d9c25e3d03c8f526ba05b07bcc82e6d28977d1dd8a13944e6ab81879cbe0.exe"C:\Users\Admin\AppData\Local\Temp\47a5d9c25e3d03c8f526ba05b07bcc82e6d28977d1dd8a13944e6ab81879cbe0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2588844.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2588844.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8251484.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8251484.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1897140.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1897140.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5374694.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5374694.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:2596
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2424
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:820
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:1776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:1464
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:192
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1130688.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1130688.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2202619.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2202619.exe4⤵
- Executes dropped EXE
PID:356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1916
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3112
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD5d8decacecc949a96a156a5ec8a21d1ab
SHA1d0c8128272a1aa56a4eca3fd4a6261eaf3d7c4d7
SHA2560241a7a4ae79a70af86c97848c619c79c3780120ddd729bc7b52aa423cde8c96
SHA5126431ba7d8cbf207a1b1af2bc5b612281925d117040e470ae71f51885e229189637c61d87c6d58ee446d45f107ff610913bf3557e078520adb6ed6780ac8fda93
-
Filesize
598KB
MD5d8decacecc949a96a156a5ec8a21d1ab
SHA1d0c8128272a1aa56a4eca3fd4a6261eaf3d7c4d7
SHA2560241a7a4ae79a70af86c97848c619c79c3780120ddd729bc7b52aa423cde8c96
SHA5126431ba7d8cbf207a1b1af2bc5b612281925d117040e470ae71f51885e229189637c61d87c6d58ee446d45f107ff610913bf3557e078520adb6ed6780ac8fda93
-
Filesize
432KB
MD5e034c008670ab045971cf19ea8b1d30e
SHA107342e28994ccdbcbd5362027650ee8f49d6f0c6
SHA2564831d213597bc89ba9c14779a52911cb36228f04821d51c88e0cf686dd84f5f0
SHA5122d47540b91e7fcaa4d9b8305a930ee0955c54c1a5a8bb2444504f2b699edea708595615c5651398ff3cf0983332ebb7b398110473a5cf541ae6d7a74c2651296
-
Filesize
432KB
MD5e034c008670ab045971cf19ea8b1d30e
SHA107342e28994ccdbcbd5362027650ee8f49d6f0c6
SHA2564831d213597bc89ba9c14779a52911cb36228f04821d51c88e0cf686dd84f5f0
SHA5122d47540b91e7fcaa4d9b8305a930ee0955c54c1a5a8bb2444504f2b699edea708595615c5651398ff3cf0983332ebb7b398110473a5cf541ae6d7a74c2651296
-
Filesize
173KB
MD56eab46bd96656ba4a5fa1fa038a3d7b4
SHA1d75af4c3108d683e2650d87d6977efe9fab426c0
SHA256161f1f06dca303e1cce42eee52ed6fc3373ec3988e3bb4f3f3ba4796b314745e
SHA512bf1110a34a08281e7809fc3503fe5dedb1da7bebc4aa99782fddd997974fe26a4c339e0384787b2dab9c74060886fa7c766b11a2346143ffccab51c5e4e975a8
-
Filesize
173KB
MD56eab46bd96656ba4a5fa1fa038a3d7b4
SHA1d75af4c3108d683e2650d87d6977efe9fab426c0
SHA256161f1f06dca303e1cce42eee52ed6fc3373ec3988e3bb4f3f3ba4796b314745e
SHA512bf1110a34a08281e7809fc3503fe5dedb1da7bebc4aa99782fddd997974fe26a4c339e0384787b2dab9c74060886fa7c766b11a2346143ffccab51c5e4e975a8
-
Filesize
276KB
MD55952a6092cad3f555c347e9fafcdbea9
SHA1372d583bf69f1a4cd19cf7dd1050f527f5d1fc90
SHA2568e07614793c4ffdb45181cf1116596d21add351560f65c7bbf03f41bd7ba56fd
SHA512f122b3d0850d235d3e7aeb700fcc58e6744ffc726f37f75f8b3c8418e135af5f0280afc09a70dc27c7f54dfb1f3160a56b1ae2ebce86762827f9a93a06e82d72
-
Filesize
276KB
MD55952a6092cad3f555c347e9fafcdbea9
SHA1372d583bf69f1a4cd19cf7dd1050f527f5d1fc90
SHA2568e07614793c4ffdb45181cf1116596d21add351560f65c7bbf03f41bd7ba56fd
SHA512f122b3d0850d235d3e7aeb700fcc58e6744ffc726f37f75f8b3c8418e135af5f0280afc09a70dc27c7f54dfb1f3160a56b1ae2ebce86762827f9a93a06e82d72
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b