Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
0e91729762a97b36edb41be0de46aa10425187f3c63221962a0108330218f29f.exe
Resource
win10v2004-20230703-en
General
-
Target
0e91729762a97b36edb41be0de46aa10425187f3c63221962a0108330218f29f.exe
-
Size
731KB
-
MD5
5b14772cac7013adc52cf9d16e2759e6
-
SHA1
090498bc02297315b09f1506f2fb4ea4d0d405fa
-
SHA256
0e91729762a97b36edb41be0de46aa10425187f3c63221962a0108330218f29f
-
SHA512
fbe5a20f844732c98da54eb032e017965c394a540432daa4ddfc22537d7aba1771f69fd085a578422aac7f05dc0db42e703e3b35261f2ae09980c1a2326ea6e0
-
SSDEEP
12288:mMr9y90KIDkUMj3vyh+MCqnTt1kg7o1b21SYDjeNtHhclG4f5efGQKTOXJVr:Py/IbqMCqnLkg7o1b2MYDjeNtB+NfQQC
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
dugin
77.91.124.73:19071
-
auth_value
7c3e46e091100fd26a6076996d374c28
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023231-159.dat healer behavioral1/files/0x0007000000023231-160.dat healer behavioral1/memory/4520-161-0x00000000000C0000-0x00000000000CA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l1855682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l1855682.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection l1855682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l1855682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l1855682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l1855682.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 4524 y3996751.exe 4992 y7720692.exe 2320 y4637883.exe 4520 l1855682.exe 1668 m8791707.exe 4316 saves.exe 2008 n6908472.exe 3020 saves.exe 1652 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3860 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" l1855682.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y4637883.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0e91729762a97b36edb41be0de46aa10425187f3c63221962a0108330218f29f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3996751.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y7720692.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2712 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1604 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4520 l1855682.exe 4520 l1855682.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4520 l1855682.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3780 wrote to memory of 4524 3780 0e91729762a97b36edb41be0de46aa10425187f3c63221962a0108330218f29f.exe 83 PID 3780 wrote to memory of 4524 3780 0e91729762a97b36edb41be0de46aa10425187f3c63221962a0108330218f29f.exe 83 PID 3780 wrote to memory of 4524 3780 0e91729762a97b36edb41be0de46aa10425187f3c63221962a0108330218f29f.exe 83 PID 4524 wrote to memory of 4992 4524 y3996751.exe 84 PID 4524 wrote to memory of 4992 4524 y3996751.exe 84 PID 4524 wrote to memory of 4992 4524 y3996751.exe 84 PID 4992 wrote to memory of 2320 4992 y7720692.exe 85 PID 4992 wrote to memory of 2320 4992 y7720692.exe 85 PID 4992 wrote to memory of 2320 4992 y7720692.exe 85 PID 2320 wrote to memory of 4520 2320 y4637883.exe 86 PID 2320 wrote to memory of 4520 2320 y4637883.exe 86 PID 2320 wrote to memory of 1668 2320 y4637883.exe 91 PID 2320 wrote to memory of 1668 2320 y4637883.exe 91 PID 2320 wrote to memory of 1668 2320 y4637883.exe 91 PID 1668 wrote to memory of 4316 1668 m8791707.exe 92 PID 1668 wrote to memory of 4316 1668 m8791707.exe 92 PID 1668 wrote to memory of 4316 1668 m8791707.exe 92 PID 4992 wrote to memory of 2008 4992 y7720692.exe 93 PID 4992 wrote to memory of 2008 4992 y7720692.exe 93 PID 4992 wrote to memory of 2008 4992 y7720692.exe 93 PID 4316 wrote to memory of 1604 4316 saves.exe 94 PID 4316 wrote to memory of 1604 4316 saves.exe 94 PID 4316 wrote to memory of 1604 4316 saves.exe 94 PID 4316 wrote to memory of 1208 4316 saves.exe 96 PID 4316 wrote to memory of 1208 4316 saves.exe 96 PID 4316 wrote to memory of 1208 4316 saves.exe 96 PID 1208 wrote to memory of 3040 1208 cmd.exe 98 PID 1208 wrote to memory of 3040 1208 cmd.exe 98 PID 1208 wrote to memory of 3040 1208 cmd.exe 98 PID 1208 wrote to memory of 4832 1208 cmd.exe 99 PID 1208 wrote to memory of 4832 1208 cmd.exe 99 PID 1208 wrote to memory of 4832 1208 cmd.exe 99 PID 1208 wrote to memory of 1056 1208 cmd.exe 100 PID 1208 wrote to memory of 1056 1208 cmd.exe 100 PID 1208 wrote to memory of 1056 1208 cmd.exe 100 PID 1208 wrote to memory of 3972 1208 cmd.exe 101 PID 1208 wrote to memory of 3972 1208 cmd.exe 101 PID 1208 wrote to memory of 3972 1208 cmd.exe 101 PID 1208 wrote to memory of 4204 1208 cmd.exe 102 PID 1208 wrote to memory of 4204 1208 cmd.exe 102 PID 1208 wrote to memory of 4204 1208 cmd.exe 102 PID 1208 wrote to memory of 5116 1208 cmd.exe 103 PID 1208 wrote to memory of 5116 1208 cmd.exe 103 PID 1208 wrote to memory of 5116 1208 cmd.exe 103 PID 4316 wrote to memory of 3860 4316 saves.exe 109 PID 4316 wrote to memory of 3860 4316 saves.exe 109 PID 4316 wrote to memory of 3860 4316 saves.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e91729762a97b36edb41be0de46aa10425187f3c63221962a0108330218f29f.exe"C:\Users\Admin\AppData\Local\Temp\0e91729762a97b36edb41be0de46aa10425187f3c63221962a0108330218f29f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3996751.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3996751.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7720692.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7720692.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4637883.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4637883.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1855682.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1855682.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m8791707.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m8791707.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1604
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3040
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:1056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3972
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4204
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:5116
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3860
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n6908472.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n6908472.exe4⤵
- Executes dropped EXE
PID:2008
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3020
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1652
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2712
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5e0201faf5141e7753410a4f9beaf808a
SHA1f722576d651473f7e8cce9a87bf881dc0a04c5f2
SHA25623da646394c0ac27fb66a887e9be2e625f8ffa1c3f54f9290736c4674236403d
SHA512b34881771dc5af8735ef90c65f35f17cd4dd2d5663bd8a0c34e3cbd5f9313ec7a17be615bda0dcb8352d17a4f0762e62cd6daa474e4f55c316dc0fae029b4662
-
Filesize
599KB
MD5e0201faf5141e7753410a4f9beaf808a
SHA1f722576d651473f7e8cce9a87bf881dc0a04c5f2
SHA25623da646394c0ac27fb66a887e9be2e625f8ffa1c3f54f9290736c4674236403d
SHA512b34881771dc5af8735ef90c65f35f17cd4dd2d5663bd8a0c34e3cbd5f9313ec7a17be615bda0dcb8352d17a4f0762e62cd6daa474e4f55c316dc0fae029b4662
-
Filesize
433KB
MD5e4fda04ed4a3279f85389cabc1672b10
SHA105833b6df09715e17e97a6893a23db03bc157ed3
SHA25689bbde5f29bf955429e825a732ac1fc42809d03e1c864f9bf22edae420f7ed3d
SHA5122b024bd9d934dd76ef432b77eed588e5190a37288abff57824d85c24692f8e878f15fb2998d34e3493c8be791efc66e40066e54c1469baadc0fb879d3d541fb1
-
Filesize
433KB
MD5e4fda04ed4a3279f85389cabc1672b10
SHA105833b6df09715e17e97a6893a23db03bc157ed3
SHA25689bbde5f29bf955429e825a732ac1fc42809d03e1c864f9bf22edae420f7ed3d
SHA5122b024bd9d934dd76ef432b77eed588e5190a37288abff57824d85c24692f8e878f15fb2998d34e3493c8be791efc66e40066e54c1469baadc0fb879d3d541fb1
-
Filesize
173KB
MD55d7274c25749a5c1bd6cb19146ed12f2
SHA1e00041a27dabaf192b5c7b40694e64118f25d8a6
SHA2566b1da0348a367cde676d3ecc723eef1f00f88c55f9373c3126cc4699dc51bb07
SHA512ef672d628bab3909d16285104f198a3d9e536badf2c2649553e516c97044cf58466e409157cddfd296a49336b09973f55567748131bb5edb47761fd82af9b5eb
-
Filesize
173KB
MD55d7274c25749a5c1bd6cb19146ed12f2
SHA1e00041a27dabaf192b5c7b40694e64118f25d8a6
SHA2566b1da0348a367cde676d3ecc723eef1f00f88c55f9373c3126cc4699dc51bb07
SHA512ef672d628bab3909d16285104f198a3d9e536badf2c2649553e516c97044cf58466e409157cddfd296a49336b09973f55567748131bb5edb47761fd82af9b5eb
-
Filesize
277KB
MD5c00a9976d8af57e217a4bcdbb92fce17
SHA1fad3aad2ca6f1fd40d86e0afa94de379a460a405
SHA2569d20072dba8e218fcc36c0914e37cbbeba93ffd278576d928e652118ea27460a
SHA5127cd55d2d14df1b43d143be2ebb35c7bd431a4c73a11d872a776d038f73bf0d77e27ff853a7f215cf8e38c0354396254375db2f2eecefeb281a10f46eb416994a
-
Filesize
277KB
MD5c00a9976d8af57e217a4bcdbb92fce17
SHA1fad3aad2ca6f1fd40d86e0afa94de379a460a405
SHA2569d20072dba8e218fcc36c0914e37cbbeba93ffd278576d928e652118ea27460a
SHA5127cd55d2d14df1b43d143be2ebb35c7bd431a4c73a11d872a776d038f73bf0d77e27ff853a7f215cf8e38c0354396254375db2f2eecefeb281a10f46eb416994a
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7