Analysis
-
max time kernel
137s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
0fa4c1cc86f83a97d8491a34ba0a233ac387790b554876a19b9fe2cddbefd1ca.exe
Resource
win10v2004-20230703-en
General
-
Target
0fa4c1cc86f83a97d8491a34ba0a233ac387790b554876a19b9fe2cddbefd1ca.exe
-
Size
730KB
-
MD5
d215a42f7cd3df3c69f8e466522f0c50
-
SHA1
76e2f6c450fccc6b2773ef70e620f967484d074f
-
SHA256
0fa4c1cc86f83a97d8491a34ba0a233ac387790b554876a19b9fe2cddbefd1ca
-
SHA512
39d771e5c0bb08a464742df2b4f48397a23c29661567301f1b48b6ebd5e79aae58d3606da69f202d658f47f0222bde60bed633e6abd09b538a76f23715729773
-
SSDEEP
12288:AMrwy900wr++0eEsotVSciDc6TQyfkebHK/Xe7wugKRLFXRp76FoBfNx5l3uu:AyVwIzPSPfTQQDsO7wbKVF7Lx3
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
dugin
77.91.124.73:19071
-
auth_value
7c3e46e091100fd26a6076996d374c28
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00060000000230d1-171.dat healer behavioral1/files/0x00060000000230d1-172.dat healer behavioral1/memory/1588-173-0x0000000000120000-0x000000000012A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h1001022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h1001022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h1001022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h1001022.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h1001022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h1001022.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 4704 x5398588.exe 2184 x8789765.exe 4236 x1491841.exe 4244 g3663213.exe 4184 saves.exe 1588 h1001022.exe 4056 i5340151.exe 2284 saves.exe 4620 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 2756 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h1001022.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8789765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1491841.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0fa4c1cc86f83a97d8491a34ba0a233ac387790b554876a19b9fe2cddbefd1ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5398588.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 772 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1588 h1001022.exe 1588 h1001022.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1588 h1001022.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4804 wrote to memory of 4704 4804 0fa4c1cc86f83a97d8491a34ba0a233ac387790b554876a19b9fe2cddbefd1ca.exe 80 PID 4804 wrote to memory of 4704 4804 0fa4c1cc86f83a97d8491a34ba0a233ac387790b554876a19b9fe2cddbefd1ca.exe 80 PID 4804 wrote to memory of 4704 4804 0fa4c1cc86f83a97d8491a34ba0a233ac387790b554876a19b9fe2cddbefd1ca.exe 80 PID 4704 wrote to memory of 2184 4704 x5398588.exe 81 PID 4704 wrote to memory of 2184 4704 x5398588.exe 81 PID 4704 wrote to memory of 2184 4704 x5398588.exe 81 PID 2184 wrote to memory of 4236 2184 x8789765.exe 82 PID 2184 wrote to memory of 4236 2184 x8789765.exe 82 PID 2184 wrote to memory of 4236 2184 x8789765.exe 82 PID 4236 wrote to memory of 4244 4236 x1491841.exe 83 PID 4236 wrote to memory of 4244 4236 x1491841.exe 83 PID 4236 wrote to memory of 4244 4236 x1491841.exe 83 PID 4244 wrote to memory of 4184 4244 g3663213.exe 84 PID 4244 wrote to memory of 4184 4244 g3663213.exe 84 PID 4244 wrote to memory of 4184 4244 g3663213.exe 84 PID 4236 wrote to memory of 1588 4236 x1491841.exe 85 PID 4236 wrote to memory of 1588 4236 x1491841.exe 85 PID 4184 wrote to memory of 772 4184 saves.exe 86 PID 4184 wrote to memory of 772 4184 saves.exe 86 PID 4184 wrote to memory of 772 4184 saves.exe 86 PID 4184 wrote to memory of 3932 4184 saves.exe 88 PID 4184 wrote to memory of 3932 4184 saves.exe 88 PID 4184 wrote to memory of 3932 4184 saves.exe 88 PID 3932 wrote to memory of 2100 3932 cmd.exe 90 PID 3932 wrote to memory of 2100 3932 cmd.exe 90 PID 3932 wrote to memory of 2100 3932 cmd.exe 90 PID 3932 wrote to memory of 2136 3932 cmd.exe 91 PID 3932 wrote to memory of 2136 3932 cmd.exe 91 PID 3932 wrote to memory of 2136 3932 cmd.exe 91 PID 3932 wrote to memory of 4036 3932 cmd.exe 92 PID 3932 wrote to memory of 4036 3932 cmd.exe 92 PID 3932 wrote to memory of 4036 3932 cmd.exe 92 PID 3932 wrote to memory of 2664 3932 cmd.exe 93 PID 3932 wrote to memory of 2664 3932 cmd.exe 93 PID 3932 wrote to memory of 2664 3932 cmd.exe 93 PID 3932 wrote to memory of 1880 3932 cmd.exe 94 PID 3932 wrote to memory of 1880 3932 cmd.exe 94 PID 3932 wrote to memory of 1880 3932 cmd.exe 94 PID 3932 wrote to memory of 3880 3932 cmd.exe 95 PID 3932 wrote to memory of 3880 3932 cmd.exe 95 PID 3932 wrote to memory of 3880 3932 cmd.exe 95 PID 2184 wrote to memory of 4056 2184 x8789765.exe 104 PID 2184 wrote to memory of 4056 2184 x8789765.exe 104 PID 2184 wrote to memory of 4056 2184 x8789765.exe 104 PID 4184 wrote to memory of 2756 4184 saves.exe 108 PID 4184 wrote to memory of 2756 4184 saves.exe 108 PID 4184 wrote to memory of 2756 4184 saves.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fa4c1cc86f83a97d8491a34ba0a233ac387790b554876a19b9fe2cddbefd1ca.exe"C:\Users\Admin\AppData\Local\Temp\0fa4c1cc86f83a97d8491a34ba0a233ac387790b554876a19b9fe2cddbefd1ca.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5398588.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5398588.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8789765.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8789765.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1491841.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1491841.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3663213.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3663213.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:772
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:2136
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2664
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:1880
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:3880
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:2756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1001022.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1001022.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i5340151.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i5340151.exe4⤵
- Executes dropped EXE
PID:4056
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2284
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4620
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD56b8858c8d5f66505dbe15f0daa61d185
SHA1780092da13a19dbfb087c536f14921dfd64e1954
SHA2568190ee027cdf3760203a9ba3c1bf0976f36bf2d696de9e55e4f892ca0994e00c
SHA512341e3c89766e6fdb78368af0f507c137700a0b6795ad6a46640f60e1b47d3cdc7dff1e320ddbbf14e236e0298c7055783bfe4ac137fa8b357238938d0f550b41
-
Filesize
598KB
MD56b8858c8d5f66505dbe15f0daa61d185
SHA1780092da13a19dbfb087c536f14921dfd64e1954
SHA2568190ee027cdf3760203a9ba3c1bf0976f36bf2d696de9e55e4f892ca0994e00c
SHA512341e3c89766e6fdb78368af0f507c137700a0b6795ad6a46640f60e1b47d3cdc7dff1e320ddbbf14e236e0298c7055783bfe4ac137fa8b357238938d0f550b41
-
Filesize
432KB
MD5001a86400bafb423582080ba43251f45
SHA195c73a6686d941f7c5cfbbce66db415e1a33acc8
SHA256353e87a3b361ed9ddc436fbe33dfa0bc5c5e722a074ce2b38c8c24d8284b408b
SHA512d0fb2fa8bf87e517bef9a05fc80016002fc22de2f73b57d51dd2f4b3dabcc2f57cd62e80b8c6b5627e22470a93740d67549ff2825c80f3ee41bc17f2e3e037a3
-
Filesize
432KB
MD5001a86400bafb423582080ba43251f45
SHA195c73a6686d941f7c5cfbbce66db415e1a33acc8
SHA256353e87a3b361ed9ddc436fbe33dfa0bc5c5e722a074ce2b38c8c24d8284b408b
SHA512d0fb2fa8bf87e517bef9a05fc80016002fc22de2f73b57d51dd2f4b3dabcc2f57cd62e80b8c6b5627e22470a93740d67549ff2825c80f3ee41bc17f2e3e037a3
-
Filesize
173KB
MD5cffa72198f2abac57005e9b53ccb535f
SHA13bda6506586a89d3643dcf50cfc88793721d9839
SHA2563171ebe639a774ad4ce1a8a330d9baf9e7daf1dd339f2dabc41b3d9097228508
SHA5127f299b1a66a4b537ff7e4cbad4744e78d190690e0b5b753e7375dc258dbf3ce24d3c73979a93ffd3bea59a212d343bcc3a37d61543ad0a3ddd1bea10a29ed630
-
Filesize
173KB
MD5cffa72198f2abac57005e9b53ccb535f
SHA13bda6506586a89d3643dcf50cfc88793721d9839
SHA2563171ebe639a774ad4ce1a8a330d9baf9e7daf1dd339f2dabc41b3d9097228508
SHA5127f299b1a66a4b537ff7e4cbad4744e78d190690e0b5b753e7375dc258dbf3ce24d3c73979a93ffd3bea59a212d343bcc3a37d61543ad0a3ddd1bea10a29ed630
-
Filesize
276KB
MD5e1783d301b087959d65fdba62fbc8b0e
SHA1f03d700eccf347aca3195ab7d11c1a523a93f469
SHA256be50bc22df535b93182d8cdfc115764fe187fc3893ea63cda9309d229df72f13
SHA5121e95d84b633318d1a594ccada7bbb0a8f57975024073c30d287671e835181ba34c1072a6f3579b3967d09c4bb7a73f479ab1b194d93c248acc892543b0716cb5
-
Filesize
276KB
MD5e1783d301b087959d65fdba62fbc8b0e
SHA1f03d700eccf347aca3195ab7d11c1a523a93f469
SHA256be50bc22df535b93182d8cdfc115764fe187fc3893ea63cda9309d229df72f13
SHA5121e95d84b633318d1a594ccada7bbb0a8f57975024073c30d287671e835181ba34c1072a6f3579b3967d09c4bb7a73f479ab1b194d93c248acc892543b0716cb5
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7