Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
e538197b7b5154f17ffc93b45cfbc82b7065ed16e2767.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e538197b7b5154f17ffc93b45cfbc82b7065ed16e2767.exe
Resource
win10v2004-20230703-en
General
-
Target
e538197b7b5154f17ffc93b45cfbc82b7065ed16e2767.exe
-
Size
704KB
-
MD5
73337423e405c3c0b71629c63c6f6cfd
-
SHA1
539742b03de3ff3740a3d8d743ec9714904cd047
-
SHA256
e538197b7b5154f17ffc93b45cfbc82b7065ed16e27679d52b4c23bff5457297
-
SHA512
08c84adacd15ba0172eef4096ef71d79666c2fae999ed76c6fc010c7ddf8cfa2cba19a0dc50f6ee989838509afd0ee5e67242696b8315b4e6be450ccd839a47a
-
SSDEEP
12288:hMrHy90j/L2EvY/JCfPeltFzHxjSGFJ7CnJYrHT9UmdcHtJj+nVPGK3R9dwuUP:myoL2EvYRC3elPrZzenJYrKmdcHTGRYP
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x00070000000231e9-26.dat healer behavioral2/files/0x00070000000231e9-27.dat healer behavioral2/memory/4472-28-0x0000000000F20000-0x0000000000F2A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g2355548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g2355548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g2355548.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g2355548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g2355548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g2355548.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/files/0x00060000000231e8-45.dat family_redline behavioral2/files/0x00060000000231e8-46.dat family_redline behavioral2/memory/4212-47-0x0000000000AE0000-0x0000000000B10000-memory.dmp family_redline -
Executes dropped EXE 9 IoCs
pid Process 4488 x1570722.exe 3776 x8068816.exe 712 x0106096.exe 4472 g2355548.exe 4784 h2529814.exe 4512 saves.exe 4212 i0273536.exe 1556 saves.exe 4716 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3800 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g2355548.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e538197b7b5154f17ffc93b45cfbc82b7065ed16e2767.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1570722.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8068816.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0106096.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1304 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4472 g2355548.exe 4472 g2355548.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4472 g2355548.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4400 wrote to memory of 4488 4400 e538197b7b5154f17ffc93b45cfbc82b7065ed16e2767.exe 81 PID 4400 wrote to memory of 4488 4400 e538197b7b5154f17ffc93b45cfbc82b7065ed16e2767.exe 81 PID 4400 wrote to memory of 4488 4400 e538197b7b5154f17ffc93b45cfbc82b7065ed16e2767.exe 81 PID 4488 wrote to memory of 3776 4488 x1570722.exe 82 PID 4488 wrote to memory of 3776 4488 x1570722.exe 82 PID 4488 wrote to memory of 3776 4488 x1570722.exe 82 PID 3776 wrote to memory of 712 3776 x8068816.exe 83 PID 3776 wrote to memory of 712 3776 x8068816.exe 83 PID 3776 wrote to memory of 712 3776 x8068816.exe 83 PID 712 wrote to memory of 4472 712 x0106096.exe 84 PID 712 wrote to memory of 4472 712 x0106096.exe 84 PID 712 wrote to memory of 4784 712 x0106096.exe 89 PID 712 wrote to memory of 4784 712 x0106096.exe 89 PID 712 wrote to memory of 4784 712 x0106096.exe 89 PID 4784 wrote to memory of 4512 4784 h2529814.exe 90 PID 4784 wrote to memory of 4512 4784 h2529814.exe 90 PID 4784 wrote to memory of 4512 4784 h2529814.exe 90 PID 3776 wrote to memory of 4212 3776 x8068816.exe 91 PID 3776 wrote to memory of 4212 3776 x8068816.exe 91 PID 3776 wrote to memory of 4212 3776 x8068816.exe 91 PID 4512 wrote to memory of 1304 4512 saves.exe 92 PID 4512 wrote to memory of 1304 4512 saves.exe 92 PID 4512 wrote to memory of 1304 4512 saves.exe 92 PID 4512 wrote to memory of 116 4512 saves.exe 94 PID 4512 wrote to memory of 116 4512 saves.exe 94 PID 4512 wrote to memory of 116 4512 saves.exe 94 PID 116 wrote to memory of 4776 116 cmd.exe 96 PID 116 wrote to memory of 4776 116 cmd.exe 96 PID 116 wrote to memory of 4776 116 cmd.exe 96 PID 116 wrote to memory of 4300 116 cmd.exe 97 PID 116 wrote to memory of 4300 116 cmd.exe 97 PID 116 wrote to memory of 4300 116 cmd.exe 97 PID 116 wrote to memory of 4828 116 cmd.exe 98 PID 116 wrote to memory of 4828 116 cmd.exe 98 PID 116 wrote to memory of 4828 116 cmd.exe 98 PID 116 wrote to memory of 1432 116 cmd.exe 99 PID 116 wrote to memory of 1432 116 cmd.exe 99 PID 116 wrote to memory of 1432 116 cmd.exe 99 PID 116 wrote to memory of 2956 116 cmd.exe 100 PID 116 wrote to memory of 2956 116 cmd.exe 100 PID 116 wrote to memory of 2956 116 cmd.exe 100 PID 116 wrote to memory of 4188 116 cmd.exe 101 PID 116 wrote to memory of 4188 116 cmd.exe 101 PID 116 wrote to memory of 4188 116 cmd.exe 101 PID 4512 wrote to memory of 3800 4512 saves.exe 108 PID 4512 wrote to memory of 3800 4512 saves.exe 108 PID 4512 wrote to memory of 3800 4512 saves.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\e538197b7b5154f17ffc93b45cfbc82b7065ed16e2767.exe"C:\Users\Admin\AppData\Local\Temp\e538197b7b5154f17ffc93b45cfbc82b7065ed16e2767.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1570722.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1570722.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8068816.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8068816.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0106096.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0106096.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2355548.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2355548.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2529814.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2529814.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1304
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4776
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4300
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1432
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:2956
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:4188
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3800
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0273536.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0273536.exe4⤵
- Executes dropped EXE
PID:4212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1556
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4716
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD5b7063840af93ff5607f2f43d165ea027
SHA1e966488fc2b91297cbc23d805c5131674eec4f26
SHA256f7ee624ae8048c37c7cfab5556222efa1400f469c3e27231119fc6614842c99b
SHA512508fc23310e67e54c546a41bc31d2f8509e6ccea2bb60d8192934dbdbd521304ad188c8b8b9060791167fc114bd8b757fd2fa5500b27bcafac68ce9ef9f89b43
-
Filesize
598KB
MD5b7063840af93ff5607f2f43d165ea027
SHA1e966488fc2b91297cbc23d805c5131674eec4f26
SHA256f7ee624ae8048c37c7cfab5556222efa1400f469c3e27231119fc6614842c99b
SHA512508fc23310e67e54c546a41bc31d2f8509e6ccea2bb60d8192934dbdbd521304ad188c8b8b9060791167fc114bd8b757fd2fa5500b27bcafac68ce9ef9f89b43
-
Filesize
433KB
MD5a4a923092857289c50b0c70acc57ac54
SHA14f008927745512c1ee0106882227a7a1eae55ce4
SHA256c4b6ce0f5743e77c2fbabd67f5a90c1bf32f03626e4f28a0c3abb2dc009fa7c4
SHA512f826a96361f752b95e63437c485bf5d2e9b9c78eeb29bece8d1a32b1da3d1fd552e7b273e9faf453529966245734a2b06bcbf199e93da24e5ab9a4c2c2267644
-
Filesize
433KB
MD5a4a923092857289c50b0c70acc57ac54
SHA14f008927745512c1ee0106882227a7a1eae55ce4
SHA256c4b6ce0f5743e77c2fbabd67f5a90c1bf32f03626e4f28a0c3abb2dc009fa7c4
SHA512f826a96361f752b95e63437c485bf5d2e9b9c78eeb29bece8d1a32b1da3d1fd552e7b273e9faf453529966245734a2b06bcbf199e93da24e5ab9a4c2c2267644
-
Filesize
173KB
MD5641f5fcb00cd79a329511b6c51612f17
SHA1ff7f9b1b70cecc9c80182a79f7bdcabf144d3666
SHA256e622e0c83658e8919f117b3d1a6a9c4fa17f6ee6b0cac61841a5d4f4ca8038c7
SHA512e29237cefe33b7cd69804cf0596ce277311b28a2381d02f225a7eb5bb62890f9b56af26c817a1ede264f8fd6f43d980b7e093d4ab8f4e3f79de5b393d66b1f3a
-
Filesize
173KB
MD5641f5fcb00cd79a329511b6c51612f17
SHA1ff7f9b1b70cecc9c80182a79f7bdcabf144d3666
SHA256e622e0c83658e8919f117b3d1a6a9c4fa17f6ee6b0cac61841a5d4f4ca8038c7
SHA512e29237cefe33b7cd69804cf0596ce277311b28a2381d02f225a7eb5bb62890f9b56af26c817a1ede264f8fd6f43d980b7e093d4ab8f4e3f79de5b393d66b1f3a
-
Filesize
277KB
MD55b9888994f6bc29fa5edbd9a9c3fbba6
SHA1398aeaa539226d833e1a500a3c992ad47b4663f4
SHA256fbe3464af200e6458c601373827c8ec413fd0e27d483d3bb0cdd0388532a3720
SHA512b9445e0ffb16993063e391cc2e717c349467b00ad14e723627abc827907cf25aa6d364824eefe93eae4069bce4e138206b36cf43fa6baf892ac9ff67e4309a0e
-
Filesize
277KB
MD55b9888994f6bc29fa5edbd9a9c3fbba6
SHA1398aeaa539226d833e1a500a3c992ad47b4663f4
SHA256fbe3464af200e6458c601373827c8ec413fd0e27d483d3bb0cdd0388532a3720
SHA512b9445e0ffb16993063e391cc2e717c349467b00ad14e723627abc827907cf25aa6d364824eefe93eae4069bce4e138206b36cf43fa6baf892ac9ff67e4309a0e
-
Filesize
15KB
MD5d491578fa930de6b5fc3c70e1996a744
SHA15d511ebf41b44e4468860a7d1d53ace5e73d04ac
SHA256bbb4a5460599100ce4f85246294ff2aa8f77addaca01eeeb29cc6e4d57b66fa4
SHA512a469c5179ebafdd06f910f906f6f0514334584a884298a01377bfeb9c3c0fd75d33f71503811b7d889b9faf38fc7e62b6df3dccd4835258055c1e5728490cabc
-
Filesize
15KB
MD5d491578fa930de6b5fc3c70e1996a744
SHA15d511ebf41b44e4468860a7d1d53ace5e73d04ac
SHA256bbb4a5460599100ce4f85246294ff2aa8f77addaca01eeeb29cc6e4d57b66fa4
SHA512a469c5179ebafdd06f910f906f6f0514334584a884298a01377bfeb9c3c0fd75d33f71503811b7d889b9faf38fc7e62b6df3dccd4835258055c1e5728490cabc
-
Filesize
321KB
MD52e6170cdac8b94db0bf67cfe98b2cb8d
SHA12344eb42b149f8989653d2ba949c8793d3b05237
SHA2568d62a98b747ddf17cfb45b192c9af832f3d9b7652672466d42ebd4056635e3f6
SHA5127287145cc4eaf51685b6d9ae778ead7f92c76e182feb2379a6f238480b5ad28b0eaa2e2977fb89e05a7bad213f24ab38b0db392b67603031d6f1cc64233ec676
-
Filesize
321KB
MD52e6170cdac8b94db0bf67cfe98b2cb8d
SHA12344eb42b149f8989653d2ba949c8793d3b05237
SHA2568d62a98b747ddf17cfb45b192c9af832f3d9b7652672466d42ebd4056635e3f6
SHA5127287145cc4eaf51685b6d9ae778ead7f92c76e182feb2379a6f238480b5ad28b0eaa2e2977fb89e05a7bad213f24ab38b0db392b67603031d6f1cc64233ec676
-
Filesize
321KB
MD52e6170cdac8b94db0bf67cfe98b2cb8d
SHA12344eb42b149f8989653d2ba949c8793d3b05237
SHA2568d62a98b747ddf17cfb45b192c9af832f3d9b7652672466d42ebd4056635e3f6
SHA5127287145cc4eaf51685b6d9ae778ead7f92c76e182feb2379a6f238480b5ad28b0eaa2e2977fb89e05a7bad213f24ab38b0db392b67603031d6f1cc64233ec676
-
Filesize
321KB
MD52e6170cdac8b94db0bf67cfe98b2cb8d
SHA12344eb42b149f8989653d2ba949c8793d3b05237
SHA2568d62a98b747ddf17cfb45b192c9af832f3d9b7652672466d42ebd4056635e3f6
SHA5127287145cc4eaf51685b6d9ae778ead7f92c76e182feb2379a6f238480b5ad28b0eaa2e2977fb89e05a7bad213f24ab38b0db392b67603031d6f1cc64233ec676
-
Filesize
321KB
MD52e6170cdac8b94db0bf67cfe98b2cb8d
SHA12344eb42b149f8989653d2ba949c8793d3b05237
SHA2568d62a98b747ddf17cfb45b192c9af832f3d9b7652672466d42ebd4056635e3f6
SHA5127287145cc4eaf51685b6d9ae778ead7f92c76e182feb2379a6f238480b5ad28b0eaa2e2977fb89e05a7bad213f24ab38b0db392b67603031d6f1cc64233ec676
-
Filesize
321KB
MD52e6170cdac8b94db0bf67cfe98b2cb8d
SHA12344eb42b149f8989653d2ba949c8793d3b05237
SHA2568d62a98b747ddf17cfb45b192c9af832f3d9b7652672466d42ebd4056635e3f6
SHA5127287145cc4eaf51685b6d9ae778ead7f92c76e182feb2379a6f238480b5ad28b0eaa2e2977fb89e05a7bad213f24ab38b0db392b67603031d6f1cc64233ec676
-
Filesize
321KB
MD52e6170cdac8b94db0bf67cfe98b2cb8d
SHA12344eb42b149f8989653d2ba949c8793d3b05237
SHA2568d62a98b747ddf17cfb45b192c9af832f3d9b7652672466d42ebd4056635e3f6
SHA5127287145cc4eaf51685b6d9ae778ead7f92c76e182feb2379a6f238480b5ad28b0eaa2e2977fb89e05a7bad213f24ab38b0db392b67603031d6f1cc64233ec676
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7