Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 08:34
Static task
static1
Behavioral task
behavioral1
Sample
e93cde5f00a9af5f9358bc96a1e97fb71684f0caf64b084f61e6d9fa47883188.exe
Resource
win10v2004-20230824-en
General
-
Target
e93cde5f00a9af5f9358bc96a1e97fb71684f0caf64b084f61e6d9fa47883188.exe
-
Size
705KB
-
MD5
8a4393c2f3260c835dd1e328ae4f555f
-
SHA1
7a8cdb742b8404c60699ad23abaa1cd3f0b770b0
-
SHA256
e93cde5f00a9af5f9358bc96a1e97fb71684f0caf64b084f61e6d9fa47883188
-
SHA512
68d3b7ae82dc97c9b8a16557198ec20bd92c8574fe3f848f98c5096050ed482c03d5a2022a3b5b44d2ec058d2255f21234e28dbc3d3fdf5742692ca61b6ea54f
-
SSDEEP
12288:NMr3y90J5Ify16KaFNpxCEv4lyWzwt+c37UhPqx0+R+MEUCN+dGIa:eycIRKIDClyBsc37UKPEUCN+dLa
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023005-26.dat healer behavioral1/files/0x0007000000023005-27.dat healer behavioral1/memory/3188-29-0x0000000000E90000-0x0000000000E9A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g9571191.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g9571191.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g9571191.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g9571191.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g9571191.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g9571191.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 4168 x4539626.exe 3700 x9344589.exe 5072 x2004960.exe 3188 g9571191.exe 2412 h7647754.exe 4976 saves.exe 2948 i6735092.exe 2940 saves.exe 3344 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4172 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g9571191.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9344589.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x2004960.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e93cde5f00a9af5f9358bc96a1e97fb71684f0caf64b084f61e6d9fa47883188.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4539626.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5092 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3188 g9571191.exe 3188 g9571191.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3188 g9571191.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 5112 wrote to memory of 4168 5112 e93cde5f00a9af5f9358bc96a1e97fb71684f0caf64b084f61e6d9fa47883188.exe 84 PID 5112 wrote to memory of 4168 5112 e93cde5f00a9af5f9358bc96a1e97fb71684f0caf64b084f61e6d9fa47883188.exe 84 PID 5112 wrote to memory of 4168 5112 e93cde5f00a9af5f9358bc96a1e97fb71684f0caf64b084f61e6d9fa47883188.exe 84 PID 4168 wrote to memory of 3700 4168 x4539626.exe 85 PID 4168 wrote to memory of 3700 4168 x4539626.exe 85 PID 4168 wrote to memory of 3700 4168 x4539626.exe 85 PID 3700 wrote to memory of 5072 3700 x9344589.exe 86 PID 3700 wrote to memory of 5072 3700 x9344589.exe 86 PID 3700 wrote to memory of 5072 3700 x9344589.exe 86 PID 5072 wrote to memory of 3188 5072 x2004960.exe 87 PID 5072 wrote to memory of 3188 5072 x2004960.exe 87 PID 5072 wrote to memory of 2412 5072 x2004960.exe 88 PID 5072 wrote to memory of 2412 5072 x2004960.exe 88 PID 5072 wrote to memory of 2412 5072 x2004960.exe 88 PID 2412 wrote to memory of 4976 2412 h7647754.exe 89 PID 2412 wrote to memory of 4976 2412 h7647754.exe 89 PID 2412 wrote to memory of 4976 2412 h7647754.exe 89 PID 3700 wrote to memory of 2948 3700 x9344589.exe 90 PID 3700 wrote to memory of 2948 3700 x9344589.exe 90 PID 3700 wrote to memory of 2948 3700 x9344589.exe 90 PID 4976 wrote to memory of 5092 4976 saves.exe 91 PID 4976 wrote to memory of 5092 4976 saves.exe 91 PID 4976 wrote to memory of 5092 4976 saves.exe 91 PID 4976 wrote to memory of 3412 4976 saves.exe 93 PID 4976 wrote to memory of 3412 4976 saves.exe 93 PID 4976 wrote to memory of 3412 4976 saves.exe 93 PID 3412 wrote to memory of 448 3412 cmd.exe 95 PID 3412 wrote to memory of 448 3412 cmd.exe 95 PID 3412 wrote to memory of 448 3412 cmd.exe 95 PID 3412 wrote to memory of 4100 3412 cmd.exe 96 PID 3412 wrote to memory of 4100 3412 cmd.exe 96 PID 3412 wrote to memory of 4100 3412 cmd.exe 96 PID 3412 wrote to memory of 4876 3412 cmd.exe 97 PID 3412 wrote to memory of 4876 3412 cmd.exe 97 PID 3412 wrote to memory of 4876 3412 cmd.exe 97 PID 3412 wrote to memory of 4144 3412 cmd.exe 98 PID 3412 wrote to memory of 4144 3412 cmd.exe 98 PID 3412 wrote to memory of 4144 3412 cmd.exe 98 PID 3412 wrote to memory of 5032 3412 cmd.exe 99 PID 3412 wrote to memory of 5032 3412 cmd.exe 99 PID 3412 wrote to memory of 5032 3412 cmd.exe 99 PID 3412 wrote to memory of 2920 3412 cmd.exe 100 PID 3412 wrote to memory of 2920 3412 cmd.exe 100 PID 3412 wrote to memory of 2920 3412 cmd.exe 100 PID 4976 wrote to memory of 4172 4976 saves.exe 104 PID 4976 wrote to memory of 4172 4976 saves.exe 104 PID 4976 wrote to memory of 4172 4976 saves.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\e93cde5f00a9af5f9358bc96a1e97fb71684f0caf64b084f61e6d9fa47883188.exe"C:\Users\Admin\AppData\Local\Temp\e93cde5f00a9af5f9358bc96a1e97fb71684f0caf64b084f61e6d9fa47883188.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4539626.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4539626.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9344589.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9344589.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2004960.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2004960.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9571191.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9571191.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7647754.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7647754.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:5092
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:448
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4144
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:5032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:2920
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4172
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6735092.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6735092.exe4⤵
- Executes dropped EXE
PID:2948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2940
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3344
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5f72a7fb93dbdff7f4ec01c8b08a2595d
SHA153efe7cc5c62bcbd448bf4f06d64cee48701312c
SHA25611bfe275664b54a3d3c1d885d96b5f14c1aa2f7ef7df851d9d7283b9ec61493b
SHA512150e8b817afda2634ea5964e22352dfd695520cffce0cc9357808541ea7bf273fd6d00080376f282a7459a23cc49f891c4f08e19a8659b87cd286f50d1985b34
-
Filesize
599KB
MD5f72a7fb93dbdff7f4ec01c8b08a2595d
SHA153efe7cc5c62bcbd448bf4f06d64cee48701312c
SHA25611bfe275664b54a3d3c1d885d96b5f14c1aa2f7ef7df851d9d7283b9ec61493b
SHA512150e8b817afda2634ea5964e22352dfd695520cffce0cc9357808541ea7bf273fd6d00080376f282a7459a23cc49f891c4f08e19a8659b87cd286f50d1985b34
-
Filesize
433KB
MD5f1d5984e86679ea0f4c88271958fb9e2
SHA16c8dfb8f71f4206e8c05f03a7d573728e0f82639
SHA256497171b364ee305de3f7dd8d4832a19c7c4588df328206733a1239b54cdf830d
SHA512ddbc346cfe76a3ab314b5138a0d28ae7d7f4080144b49b9ae045e2acc90bbe90426b7176299ec5503f82866c664f0b8c251ec3c26c793e1aa7f63b5084a9901b
-
Filesize
433KB
MD5f1d5984e86679ea0f4c88271958fb9e2
SHA16c8dfb8f71f4206e8c05f03a7d573728e0f82639
SHA256497171b364ee305de3f7dd8d4832a19c7c4588df328206733a1239b54cdf830d
SHA512ddbc346cfe76a3ab314b5138a0d28ae7d7f4080144b49b9ae045e2acc90bbe90426b7176299ec5503f82866c664f0b8c251ec3c26c793e1aa7f63b5084a9901b
-
Filesize
174KB
MD509502a4855bad5e088620e3d16bb3f72
SHA14446f80dff7352c84393e958e30c855f291f2167
SHA256ac755f21c046268391b6c932b89d756ba7af947ecfa0249b05ffd4947bffdfff
SHA512c0324bd4fa309773db726cba7106c952460108c283937146e3faffee0e23765f17f699ca31c2d54f35317589255801f04a7a18245775e4f191b8f773b2b32e5a
-
Filesize
174KB
MD509502a4855bad5e088620e3d16bb3f72
SHA14446f80dff7352c84393e958e30c855f291f2167
SHA256ac755f21c046268391b6c932b89d756ba7af947ecfa0249b05ffd4947bffdfff
SHA512c0324bd4fa309773db726cba7106c952460108c283937146e3faffee0e23765f17f699ca31c2d54f35317589255801f04a7a18245775e4f191b8f773b2b32e5a
-
Filesize
277KB
MD52bf2e064534b185a4e68b79141aaff18
SHA132a9d594ff162edc7fd56f54861910f61bc90704
SHA25663fe9d0549f84e818cd769c54cabae768635f8de6cbc3aea65bd5e4a6fe24d9a
SHA5124db5e3f1695eefe753e86009b040843148be3599c8be3b76ab1c8060f9f62350fa004d7241dd2afea6fef692eb71fd0cd0e77d286c78f88c697119b123f1d5e0
-
Filesize
277KB
MD52bf2e064534b185a4e68b79141aaff18
SHA132a9d594ff162edc7fd56f54861910f61bc90704
SHA25663fe9d0549f84e818cd769c54cabae768635f8de6cbc3aea65bd5e4a6fe24d9a
SHA5124db5e3f1695eefe753e86009b040843148be3599c8be3b76ab1c8060f9f62350fa004d7241dd2afea6fef692eb71fd0cd0e77d286c78f88c697119b123f1d5e0
-
Filesize
16KB
MD5fb1a3655977120f98c50e27f5ec03fc1
SHA1a1c53f8381cd290c2d5bf8964813d10a89e550a1
SHA256e3bcdfd6904ad473eee378a00f4dacfeadbb438017c0c3fa0b2b2e1dff7bf497
SHA512f591bca29f8f7b25e00c46a17ab5ba7b30ce9d64a85b23d0f78bd27458b267aa7cca92370795b53d20e23d88a673038841785c383d41f3bacd997e63c7a6a138
-
Filesize
16KB
MD5fb1a3655977120f98c50e27f5ec03fc1
SHA1a1c53f8381cd290c2d5bf8964813d10a89e550a1
SHA256e3bcdfd6904ad473eee378a00f4dacfeadbb438017c0c3fa0b2b2e1dff7bf497
SHA512f591bca29f8f7b25e00c46a17ab5ba7b30ce9d64a85b23d0f78bd27458b267aa7cca92370795b53d20e23d88a673038841785c383d41f3bacd997e63c7a6a138
-
Filesize
323KB
MD5f6f2054f528566cc79780e3f4931cbe3
SHA1aa19ab63dd7152ec1356c5c56e0e10e1ed6cb0b5
SHA256ebd2aab6f540ab3999ef88f19097ce1687ea5280233c458e9eb7fc718e4edbe2
SHA51263cfa9f18377bbe5ce42d8e03c0aa4bd228dd727fd65933add9a8dfb95000b544d515621fe4fecd09e8d1a4e19458738f6a40bcc25fd6ef296b19b36edf186c6
-
Filesize
323KB
MD5f6f2054f528566cc79780e3f4931cbe3
SHA1aa19ab63dd7152ec1356c5c56e0e10e1ed6cb0b5
SHA256ebd2aab6f540ab3999ef88f19097ce1687ea5280233c458e9eb7fc718e4edbe2
SHA51263cfa9f18377bbe5ce42d8e03c0aa4bd228dd727fd65933add9a8dfb95000b544d515621fe4fecd09e8d1a4e19458738f6a40bcc25fd6ef296b19b36edf186c6
-
Filesize
323KB
MD5f6f2054f528566cc79780e3f4931cbe3
SHA1aa19ab63dd7152ec1356c5c56e0e10e1ed6cb0b5
SHA256ebd2aab6f540ab3999ef88f19097ce1687ea5280233c458e9eb7fc718e4edbe2
SHA51263cfa9f18377bbe5ce42d8e03c0aa4bd228dd727fd65933add9a8dfb95000b544d515621fe4fecd09e8d1a4e19458738f6a40bcc25fd6ef296b19b36edf186c6
-
Filesize
323KB
MD5f6f2054f528566cc79780e3f4931cbe3
SHA1aa19ab63dd7152ec1356c5c56e0e10e1ed6cb0b5
SHA256ebd2aab6f540ab3999ef88f19097ce1687ea5280233c458e9eb7fc718e4edbe2
SHA51263cfa9f18377bbe5ce42d8e03c0aa4bd228dd727fd65933add9a8dfb95000b544d515621fe4fecd09e8d1a4e19458738f6a40bcc25fd6ef296b19b36edf186c6
-
Filesize
323KB
MD5f6f2054f528566cc79780e3f4931cbe3
SHA1aa19ab63dd7152ec1356c5c56e0e10e1ed6cb0b5
SHA256ebd2aab6f540ab3999ef88f19097ce1687ea5280233c458e9eb7fc718e4edbe2
SHA51263cfa9f18377bbe5ce42d8e03c0aa4bd228dd727fd65933add9a8dfb95000b544d515621fe4fecd09e8d1a4e19458738f6a40bcc25fd6ef296b19b36edf186c6
-
Filesize
323KB
MD5f6f2054f528566cc79780e3f4931cbe3
SHA1aa19ab63dd7152ec1356c5c56e0e10e1ed6cb0b5
SHA256ebd2aab6f540ab3999ef88f19097ce1687ea5280233c458e9eb7fc718e4edbe2
SHA51263cfa9f18377bbe5ce42d8e03c0aa4bd228dd727fd65933add9a8dfb95000b544d515621fe4fecd09e8d1a4e19458738f6a40bcc25fd6ef296b19b36edf186c6
-
Filesize
323KB
MD5f6f2054f528566cc79780e3f4931cbe3
SHA1aa19ab63dd7152ec1356c5c56e0e10e1ed6cb0b5
SHA256ebd2aab6f540ab3999ef88f19097ce1687ea5280233c458e9eb7fc718e4edbe2
SHA51263cfa9f18377bbe5ce42d8e03c0aa4bd228dd727fd65933add9a8dfb95000b544d515621fe4fecd09e8d1a4e19458738f6a40bcc25fd6ef296b19b36edf186c6
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7