Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
422305732da33c482325fcc859fb9fd1d6b323116e053d299aefba3761bb6677.exe
Resource
win10v2004-20230703-en
General
-
Target
422305732da33c482325fcc859fb9fd1d6b323116e053d299aefba3761bb6677.exe
-
Size
703KB
-
MD5
027414c56938d934829856d63e0bffce
-
SHA1
460b351737458254f99637f6f3e7f3ff31dfd085
-
SHA256
422305732da33c482325fcc859fb9fd1d6b323116e053d299aefba3761bb6677
-
SHA512
d01b5652c96888e0beb2923e3d8bd6ea04f936ac5eda3a9d058ee9da7300392bf95adfc3a7ec8c01abb4eb9551d68ac40d451b3332874b2eaf9c7b57caa33815
-
SSDEEP
12288:UMrny90qfa5m6boOl2MiJ2+EwLvWSyWnMbTB:LyoFboOl2Mm2+niWO
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0008000000023211-26.dat healer behavioral1/files/0x0008000000023211-27.dat healer behavioral1/memory/224-28-0x0000000000860000-0x000000000086A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g7647545.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g7647545.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g7647545.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g7647545.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g7647545.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g7647545.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x000700000002320f-45.dat family_redline behavioral1/files/0x000700000002320f-46.dat family_redline behavioral1/memory/4648-47-0x0000000000A50000-0x0000000000A80000-memory.dmp family_redline -
Executes dropped EXE 9 IoCs
pid Process 4720 x5995394.exe 3588 x9269020.exe 4836 x5216081.exe 224 g7647545.exe 3608 h1348263.exe 2516 saves.exe 4648 i2349599.exe 4760 saves.exe 4628 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3544 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g7647545.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 422305732da33c482325fcc859fb9fd1d6b323116e053d299aefba3761bb6677.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5995394.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9269020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5216081.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4412 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 224 g7647545.exe 224 g7647545.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 224 g7647545.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1640 wrote to memory of 4720 1640 422305732da33c482325fcc859fb9fd1d6b323116e053d299aefba3761bb6677.exe 80 PID 1640 wrote to memory of 4720 1640 422305732da33c482325fcc859fb9fd1d6b323116e053d299aefba3761bb6677.exe 80 PID 1640 wrote to memory of 4720 1640 422305732da33c482325fcc859fb9fd1d6b323116e053d299aefba3761bb6677.exe 80 PID 4720 wrote to memory of 3588 4720 x5995394.exe 81 PID 4720 wrote to memory of 3588 4720 x5995394.exe 81 PID 4720 wrote to memory of 3588 4720 x5995394.exe 81 PID 3588 wrote to memory of 4836 3588 x9269020.exe 82 PID 3588 wrote to memory of 4836 3588 x9269020.exe 82 PID 3588 wrote to memory of 4836 3588 x9269020.exe 82 PID 4836 wrote to memory of 224 4836 x5216081.exe 83 PID 4836 wrote to memory of 224 4836 x5216081.exe 83 PID 4836 wrote to memory of 3608 4836 x5216081.exe 89 PID 4836 wrote to memory of 3608 4836 x5216081.exe 89 PID 4836 wrote to memory of 3608 4836 x5216081.exe 89 PID 3608 wrote to memory of 2516 3608 h1348263.exe 90 PID 3608 wrote to memory of 2516 3608 h1348263.exe 90 PID 3608 wrote to memory of 2516 3608 h1348263.exe 90 PID 3588 wrote to memory of 4648 3588 x9269020.exe 91 PID 3588 wrote to memory of 4648 3588 x9269020.exe 91 PID 3588 wrote to memory of 4648 3588 x9269020.exe 91 PID 2516 wrote to memory of 4412 2516 saves.exe 92 PID 2516 wrote to memory of 4412 2516 saves.exe 92 PID 2516 wrote to memory of 4412 2516 saves.exe 92 PID 2516 wrote to memory of 3816 2516 saves.exe 94 PID 2516 wrote to memory of 3816 2516 saves.exe 94 PID 2516 wrote to memory of 3816 2516 saves.exe 94 PID 3816 wrote to memory of 1444 3816 cmd.exe 96 PID 3816 wrote to memory of 1444 3816 cmd.exe 96 PID 3816 wrote to memory of 1444 3816 cmd.exe 96 PID 3816 wrote to memory of 3796 3816 cmd.exe 97 PID 3816 wrote to memory of 3796 3816 cmd.exe 97 PID 3816 wrote to memory of 3796 3816 cmd.exe 97 PID 3816 wrote to memory of 5072 3816 cmd.exe 98 PID 3816 wrote to memory of 5072 3816 cmd.exe 98 PID 3816 wrote to memory of 5072 3816 cmd.exe 98 PID 3816 wrote to memory of 4372 3816 cmd.exe 99 PID 3816 wrote to memory of 4372 3816 cmd.exe 99 PID 3816 wrote to memory of 4372 3816 cmd.exe 99 PID 3816 wrote to memory of 4024 3816 cmd.exe 100 PID 3816 wrote to memory of 4024 3816 cmd.exe 100 PID 3816 wrote to memory of 4024 3816 cmd.exe 100 PID 3816 wrote to memory of 3484 3816 cmd.exe 101 PID 3816 wrote to memory of 3484 3816 cmd.exe 101 PID 3816 wrote to memory of 3484 3816 cmd.exe 101 PID 2516 wrote to memory of 3544 2516 saves.exe 107 PID 2516 wrote to memory of 3544 2516 saves.exe 107 PID 2516 wrote to memory of 3544 2516 saves.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\422305732da33c482325fcc859fb9fd1d6b323116e053d299aefba3761bb6677.exe"C:\Users\Admin\AppData\Local\Temp\422305732da33c482325fcc859fb9fd1d6b323116e053d299aefba3761bb6677.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5995394.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5995394.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9269020.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9269020.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5216081.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5216081.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7647545.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7647545.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1348263.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1348263.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4412
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:3796
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:5072
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4372
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4024
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:3484
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3544
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2349599.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2349599.exe4⤵
- Executes dropped EXE
PID:4648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4760
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4628
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD58eb1725bfcaa7ed50308adee6a76e860
SHA12c800f5ba4739ade8544ed99e400925100429c7f
SHA256c748db2a4dcf7af5b4336b06176122e88dcd48a0095eca0c44ddc5bd4891353f
SHA512c22a7bf17bb53fe506c928e386dd2647826be49ee61357c71b65541535cb5aa0e41708420941cbd3e9bcae90d5fe4e79be48287ee839a15b197aa06f5f6d9d59
-
Filesize
599KB
MD58eb1725bfcaa7ed50308adee6a76e860
SHA12c800f5ba4739ade8544ed99e400925100429c7f
SHA256c748db2a4dcf7af5b4336b06176122e88dcd48a0095eca0c44ddc5bd4891353f
SHA512c22a7bf17bb53fe506c928e386dd2647826be49ee61357c71b65541535cb5aa0e41708420941cbd3e9bcae90d5fe4e79be48287ee839a15b197aa06f5f6d9d59
-
Filesize
433KB
MD51d8cd8d0863e81c874f93464ce24d9ca
SHA1a8350bae6c3c7e9def0096f4ca4a0be98c2441c2
SHA25636572547c2a47febf5531a686116f4cfae7a5d00ca7de71efb633b8398fb4691
SHA5127f85614f6d77be90c2c2698c249cb34945948805a2c32f691f845eae39b6083780654faf274209cb0537bab752c49d7cb52e17a4337a6dec2b4d65f78311e5b4
-
Filesize
433KB
MD51d8cd8d0863e81c874f93464ce24d9ca
SHA1a8350bae6c3c7e9def0096f4ca4a0be98c2441c2
SHA25636572547c2a47febf5531a686116f4cfae7a5d00ca7de71efb633b8398fb4691
SHA5127f85614f6d77be90c2c2698c249cb34945948805a2c32f691f845eae39b6083780654faf274209cb0537bab752c49d7cb52e17a4337a6dec2b4d65f78311e5b4
-
Filesize
174KB
MD5ecb5db92c559914a026cbe9596ebc552
SHA165607c42bae48f7e651d42d3be3e4ab834d62f12
SHA256bc0b46bfb4f57a4e1fb4b31854ad6ecc21deea3301c53c1125f224d54f98aa6d
SHA512d33535b84437f1bca3025e40678298f1d93ab121992e4a8003a3772b881687447f640e7ae4eaaf466209e173f1a0a3c4e3fa945fe35463d2a79575d5810d650f
-
Filesize
174KB
MD5ecb5db92c559914a026cbe9596ebc552
SHA165607c42bae48f7e651d42d3be3e4ab834d62f12
SHA256bc0b46bfb4f57a4e1fb4b31854ad6ecc21deea3301c53c1125f224d54f98aa6d
SHA512d33535b84437f1bca3025e40678298f1d93ab121992e4a8003a3772b881687447f640e7ae4eaaf466209e173f1a0a3c4e3fa945fe35463d2a79575d5810d650f
-
Filesize
277KB
MD5e1b303f4d8ba5e69d1147e4def721962
SHA1665f4091803b5d01607fd78a2c83b0a253d42090
SHA2565634a0f37d7cec040823b5c0a8387c9864aa982b547d6a8b05adfd1835f65228
SHA512804fca7d10d1a7a59f4b31937318a09625db70fc777e46065da8155b96412aacc44b685a3ef81f916bc621225159c5169d47d43f8eb53537762bcd3f7ede1435
-
Filesize
277KB
MD5e1b303f4d8ba5e69d1147e4def721962
SHA1665f4091803b5d01607fd78a2c83b0a253d42090
SHA2565634a0f37d7cec040823b5c0a8387c9864aa982b547d6a8b05adfd1835f65228
SHA512804fca7d10d1a7a59f4b31937318a09625db70fc777e46065da8155b96412aacc44b685a3ef81f916bc621225159c5169d47d43f8eb53537762bcd3f7ede1435
-
Filesize
15KB
MD5f81f6b37983d6bfe10d495426bbb284e
SHA11da43285b753b8fc6c774356912f460dd50c66d1
SHA256222f17dd178bfc4e249088016e38b9c9779d291077d144609cd67dc5b93c3693
SHA51271be4d8b99eac30cae8d80c6f6ecddabdf6334c391688119006c5dbca5855f2008df13a52714d71f7e37494166fe771bb5215b4a5e76fc818eff0f552c197032
-
Filesize
15KB
MD5f81f6b37983d6bfe10d495426bbb284e
SHA11da43285b753b8fc6c774356912f460dd50c66d1
SHA256222f17dd178bfc4e249088016e38b9c9779d291077d144609cd67dc5b93c3693
SHA51271be4d8b99eac30cae8d80c6f6ecddabdf6334c391688119006c5dbca5855f2008df13a52714d71f7e37494166fe771bb5215b4a5e76fc818eff0f552c197032
-
Filesize
322KB
MD5e969e09cedfe23970a4a530b1941f0a5
SHA1862ce7d53b804c4915b8eb19384ed2a2f7309080
SHA256c5ae68fea37263d7ecad56f17b4c14ee17df5203618eee4fcfa82ae5cc2e50c7
SHA51264aacbab7ff1f9dbe4f8d8e500ae743ffda7934d48c0b19e6440c419c7f561240eaab90b2c7e101a941ed61a9785d22f4b26ac4e6267c80d2d408ea6d417f88e
-
Filesize
322KB
MD5e969e09cedfe23970a4a530b1941f0a5
SHA1862ce7d53b804c4915b8eb19384ed2a2f7309080
SHA256c5ae68fea37263d7ecad56f17b4c14ee17df5203618eee4fcfa82ae5cc2e50c7
SHA51264aacbab7ff1f9dbe4f8d8e500ae743ffda7934d48c0b19e6440c419c7f561240eaab90b2c7e101a941ed61a9785d22f4b26ac4e6267c80d2d408ea6d417f88e
-
Filesize
322KB
MD5e969e09cedfe23970a4a530b1941f0a5
SHA1862ce7d53b804c4915b8eb19384ed2a2f7309080
SHA256c5ae68fea37263d7ecad56f17b4c14ee17df5203618eee4fcfa82ae5cc2e50c7
SHA51264aacbab7ff1f9dbe4f8d8e500ae743ffda7934d48c0b19e6440c419c7f561240eaab90b2c7e101a941ed61a9785d22f4b26ac4e6267c80d2d408ea6d417f88e
-
Filesize
322KB
MD5e969e09cedfe23970a4a530b1941f0a5
SHA1862ce7d53b804c4915b8eb19384ed2a2f7309080
SHA256c5ae68fea37263d7ecad56f17b4c14ee17df5203618eee4fcfa82ae5cc2e50c7
SHA51264aacbab7ff1f9dbe4f8d8e500ae743ffda7934d48c0b19e6440c419c7f561240eaab90b2c7e101a941ed61a9785d22f4b26ac4e6267c80d2d408ea6d417f88e
-
Filesize
322KB
MD5e969e09cedfe23970a4a530b1941f0a5
SHA1862ce7d53b804c4915b8eb19384ed2a2f7309080
SHA256c5ae68fea37263d7ecad56f17b4c14ee17df5203618eee4fcfa82ae5cc2e50c7
SHA51264aacbab7ff1f9dbe4f8d8e500ae743ffda7934d48c0b19e6440c419c7f561240eaab90b2c7e101a941ed61a9785d22f4b26ac4e6267c80d2d408ea6d417f88e
-
Filesize
322KB
MD5e969e09cedfe23970a4a530b1941f0a5
SHA1862ce7d53b804c4915b8eb19384ed2a2f7309080
SHA256c5ae68fea37263d7ecad56f17b4c14ee17df5203618eee4fcfa82ae5cc2e50c7
SHA51264aacbab7ff1f9dbe4f8d8e500ae743ffda7934d48c0b19e6440c419c7f561240eaab90b2c7e101a941ed61a9785d22f4b26ac4e6267c80d2d408ea6d417f88e
-
Filesize
322KB
MD5e969e09cedfe23970a4a530b1941f0a5
SHA1862ce7d53b804c4915b8eb19384ed2a2f7309080
SHA256c5ae68fea37263d7ecad56f17b4c14ee17df5203618eee4fcfa82ae5cc2e50c7
SHA51264aacbab7ff1f9dbe4f8d8e500ae743ffda7934d48c0b19e6440c419c7f561240eaab90b2c7e101a941ed61a9785d22f4b26ac4e6267c80d2d408ea6d417f88e
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7