Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2023 03:53
Static task
static1
Behavioral task
behavioral1
Sample
ec56b20f9e3bd64d954897d2c69fcd0e98f0d163cfad1bb4a9d7720286e5676c.exe
Resource
win10v2004-20230824-en
General
-
Target
ec56b20f9e3bd64d954897d2c69fcd0e98f0d163cfad1bb4a9d7720286e5676c.exe
-
Size
703KB
-
MD5
081aa4fefbe7d0db79c15f1cce49eca7
-
SHA1
58fee48acac914bd9b438b49d663081b05bc80de
-
SHA256
ec56b20f9e3bd64d954897d2c69fcd0e98f0d163cfad1bb4a9d7720286e5676c
-
SHA512
b8645bbfd4e5aec90f3d1f0ab1e0404c0c06c48ab05e5efb36725fc18e7ef89a97f56b351b23328abf120936ca5db039c9f5c6e20020b817439511f8b564f36d
-
SSDEEP
12288:wMr5y90PV8JwKuenkTUdTnqnEL6KDkuPNeyUSx2ZNz:ZyQc3yTUFqE+KD1MyULNz
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000022ff2-27.dat healer behavioral1/files/0x0007000000022ff2-28.dat healer behavioral1/memory/2272-33-0x0000000000070000-0x000000000007A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g3761414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g3761414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g3761414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g3761414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g3761414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g3761414.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 1188 x2108896.exe 4372 x7372247.exe 1064 x6401005.exe 2272 g3761414.exe 740 h3865986.exe 2968 saves.exe 880 i3260831.exe 1344 saves.exe 4788 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3436 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g3761414.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ec56b20f9e3bd64d954897d2c69fcd0e98f0d163cfad1bb4a9d7720286e5676c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2108896.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7372247.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x6401005.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{3C31F0DB-EAFC-4537-B523-1DE2D9A9F475}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3260 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2272 g3761414.exe 2272 g3761414.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2272 g3761414.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 228 wrote to memory of 1188 228 ec56b20f9e3bd64d954897d2c69fcd0e98f0d163cfad1bb4a9d7720286e5676c.exe 86 PID 228 wrote to memory of 1188 228 ec56b20f9e3bd64d954897d2c69fcd0e98f0d163cfad1bb4a9d7720286e5676c.exe 86 PID 228 wrote to memory of 1188 228 ec56b20f9e3bd64d954897d2c69fcd0e98f0d163cfad1bb4a9d7720286e5676c.exe 86 PID 1188 wrote to memory of 4372 1188 x2108896.exe 87 PID 1188 wrote to memory of 4372 1188 x2108896.exe 87 PID 1188 wrote to memory of 4372 1188 x2108896.exe 87 PID 4372 wrote to memory of 1064 4372 x7372247.exe 88 PID 4372 wrote to memory of 1064 4372 x7372247.exe 88 PID 4372 wrote to memory of 1064 4372 x7372247.exe 88 PID 1064 wrote to memory of 2272 1064 x6401005.exe 89 PID 1064 wrote to memory of 2272 1064 x6401005.exe 89 PID 1064 wrote to memory of 740 1064 x6401005.exe 91 PID 1064 wrote to memory of 740 1064 x6401005.exe 91 PID 1064 wrote to memory of 740 1064 x6401005.exe 91 PID 740 wrote to memory of 2968 740 h3865986.exe 92 PID 740 wrote to memory of 2968 740 h3865986.exe 92 PID 740 wrote to memory of 2968 740 h3865986.exe 92 PID 4372 wrote to memory of 880 4372 x7372247.exe 93 PID 4372 wrote to memory of 880 4372 x7372247.exe 93 PID 4372 wrote to memory of 880 4372 x7372247.exe 93 PID 2968 wrote to memory of 3260 2968 saves.exe 94 PID 2968 wrote to memory of 3260 2968 saves.exe 94 PID 2968 wrote to memory of 3260 2968 saves.exe 94 PID 2968 wrote to memory of 5088 2968 saves.exe 96 PID 2968 wrote to memory of 5088 2968 saves.exe 96 PID 2968 wrote to memory of 5088 2968 saves.exe 96 PID 5088 wrote to memory of 1340 5088 cmd.exe 98 PID 5088 wrote to memory of 1340 5088 cmd.exe 98 PID 5088 wrote to memory of 1340 5088 cmd.exe 98 PID 5088 wrote to memory of 4252 5088 cmd.exe 99 PID 5088 wrote to memory of 4252 5088 cmd.exe 99 PID 5088 wrote to memory of 4252 5088 cmd.exe 99 PID 5088 wrote to memory of 1916 5088 cmd.exe 100 PID 5088 wrote to memory of 1916 5088 cmd.exe 100 PID 5088 wrote to memory of 1916 5088 cmd.exe 100 PID 5088 wrote to memory of 2488 5088 cmd.exe 101 PID 5088 wrote to memory of 2488 5088 cmd.exe 101 PID 5088 wrote to memory of 2488 5088 cmd.exe 101 PID 5088 wrote to memory of 324 5088 cmd.exe 102 PID 5088 wrote to memory of 324 5088 cmd.exe 102 PID 5088 wrote to memory of 324 5088 cmd.exe 102 PID 5088 wrote to memory of 2996 5088 cmd.exe 103 PID 5088 wrote to memory of 2996 5088 cmd.exe 103 PID 5088 wrote to memory of 2996 5088 cmd.exe 103 PID 2968 wrote to memory of 3436 2968 saves.exe 107 PID 2968 wrote to memory of 3436 2968 saves.exe 107 PID 2968 wrote to memory of 3436 2968 saves.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec56b20f9e3bd64d954897d2c69fcd0e98f0d163cfad1bb4a9d7720286e5676c.exe"C:\Users\Admin\AppData\Local\Temp\ec56b20f9e3bd64d954897d2c69fcd0e98f0d163cfad1bb4a9d7720286e5676c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2108896.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2108896.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7372247.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7372247.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6401005.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6401005.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3761414.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3761414.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3865986.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3865986.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:3260
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1340
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4252
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:1916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2488
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:324
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:2996
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3436
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i3260831.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i3260831.exe4⤵
- Executes dropped EXE
PID:880
-
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:3756
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1344
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4788
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD5f28619c22ac37ccb31eecec9ab9234b9
SHA1d684a093066553a6df16b18f0088aa3fa769dcde
SHA256649910208cf308fe9ac7c4f59ca82ac3f9caa97227700cb09cb181464575a51a
SHA512a91dfa1923832489779dfe36a62690caf805ea586f9f3ef401a187dc48ded6d3898a06e18b11b039339c974d2aeeb832dc4149cb1280b70ce175312c88abb632
-
Filesize
598KB
MD5f28619c22ac37ccb31eecec9ab9234b9
SHA1d684a093066553a6df16b18f0088aa3fa769dcde
SHA256649910208cf308fe9ac7c4f59ca82ac3f9caa97227700cb09cb181464575a51a
SHA512a91dfa1923832489779dfe36a62690caf805ea586f9f3ef401a187dc48ded6d3898a06e18b11b039339c974d2aeeb832dc4149cb1280b70ce175312c88abb632
-
Filesize
432KB
MD560c66562cbafe105b3c70937b95344e8
SHA10d33d4b54a1b4d8526496b5d285e48e14ca9c4fc
SHA256b8396f3adbfdcc243abf0ad1c9e94553e1079b2bc13078face0a6899a3d5e698
SHA512398a829f2250a797c8fa107a85d1a0ffdc8e0ac6ae34c6a1f04011725935b0bf0c650d567eedf409dbae4ffb320023dabc6d0154e8b10004c4f256cf0dc9cc53
-
Filesize
432KB
MD560c66562cbafe105b3c70937b95344e8
SHA10d33d4b54a1b4d8526496b5d285e48e14ca9c4fc
SHA256b8396f3adbfdcc243abf0ad1c9e94553e1079b2bc13078face0a6899a3d5e698
SHA512398a829f2250a797c8fa107a85d1a0ffdc8e0ac6ae34c6a1f04011725935b0bf0c650d567eedf409dbae4ffb320023dabc6d0154e8b10004c4f256cf0dc9cc53
-
Filesize
174KB
MD543da2960d8c4980f252024ce6ba628d1
SHA19b52153c667022a451961ff64c643ba96df70e25
SHA256069c5ff2cbe65c76563ffbb06e3b94b3822c4bef71ced955fb602c2a718870f3
SHA512ad82e0d17e766f61a60a4c7f530f190f292b093b7295e52193fdd769f46412aa692f704da12729eabd1c0c104c013bb252d8ce581d0ad89f29eec13d01e7b7a5
-
Filesize
174KB
MD543da2960d8c4980f252024ce6ba628d1
SHA19b52153c667022a451961ff64c643ba96df70e25
SHA256069c5ff2cbe65c76563ffbb06e3b94b3822c4bef71ced955fb602c2a718870f3
SHA512ad82e0d17e766f61a60a4c7f530f190f292b093b7295e52193fdd769f46412aa692f704da12729eabd1c0c104c013bb252d8ce581d0ad89f29eec13d01e7b7a5
-
Filesize
277KB
MD5abad031449be726908b90ed1fbe64902
SHA12423d023b2b147e18a32cdda831bae30aa0e9216
SHA2565d07d6ad95b1eac53e508a37618c69e9d3f215c4ce0690eb3c201a39ee5d054a
SHA51217700a6fb9b18bff9115e54a29d8929f11530d106009ac28e90493012c17bf8be5e8aac0da81c844bb516c71f46ff74cc03a8cae2c1ac10e27e822f344c0f2d4
-
Filesize
277KB
MD5abad031449be726908b90ed1fbe64902
SHA12423d023b2b147e18a32cdda831bae30aa0e9216
SHA2565d07d6ad95b1eac53e508a37618c69e9d3f215c4ce0690eb3c201a39ee5d054a
SHA51217700a6fb9b18bff9115e54a29d8929f11530d106009ac28e90493012c17bf8be5e8aac0da81c844bb516c71f46ff74cc03a8cae2c1ac10e27e822f344c0f2d4
-
Filesize
17KB
MD5fc2411903add2a4a35fb21ab15275990
SHA1229bfba3807d03078b609d69d041c9643f9dede7
SHA256f0648a2283ac43eb2c9300edcfa1633cfb3df3c6489497a19c4b0236e193c874
SHA512f641732df57fb50194464719bfe01e2bae5a564ea80bc51c8105818a6b06fd94a8fb84ece74477e6fbdc3ad4f0c4851dacab9c121bf762e9de41d63a02306760
-
Filesize
17KB
MD5fc2411903add2a4a35fb21ab15275990
SHA1229bfba3807d03078b609d69d041c9643f9dede7
SHA256f0648a2283ac43eb2c9300edcfa1633cfb3df3c6489497a19c4b0236e193c874
SHA512f641732df57fb50194464719bfe01e2bae5a564ea80bc51c8105818a6b06fd94a8fb84ece74477e6fbdc3ad4f0c4851dacab9c121bf762e9de41d63a02306760
-
Filesize
326KB
MD59b94b28f4e217ba717e666acf4939270
SHA13cafaf0e73acc856a33481869bc7a4b0ee6cdc3f
SHA256270cbf18de9e52c6f8c3a8792d6519973b5f12501477aa78f0a72e7c752b1a94
SHA512eca4c12ac1f7c807a62b5abe2da24971624f91ddcea08fb33e27f1ce586f0b13178f08b8176c292ab458f03096361c466b5ca50992127b59157564ee86a04e91
-
Filesize
326KB
MD59b94b28f4e217ba717e666acf4939270
SHA13cafaf0e73acc856a33481869bc7a4b0ee6cdc3f
SHA256270cbf18de9e52c6f8c3a8792d6519973b5f12501477aa78f0a72e7c752b1a94
SHA512eca4c12ac1f7c807a62b5abe2da24971624f91ddcea08fb33e27f1ce586f0b13178f08b8176c292ab458f03096361c466b5ca50992127b59157564ee86a04e91
-
Filesize
326KB
MD59b94b28f4e217ba717e666acf4939270
SHA13cafaf0e73acc856a33481869bc7a4b0ee6cdc3f
SHA256270cbf18de9e52c6f8c3a8792d6519973b5f12501477aa78f0a72e7c752b1a94
SHA512eca4c12ac1f7c807a62b5abe2da24971624f91ddcea08fb33e27f1ce586f0b13178f08b8176c292ab458f03096361c466b5ca50992127b59157564ee86a04e91
-
Filesize
326KB
MD59b94b28f4e217ba717e666acf4939270
SHA13cafaf0e73acc856a33481869bc7a4b0ee6cdc3f
SHA256270cbf18de9e52c6f8c3a8792d6519973b5f12501477aa78f0a72e7c752b1a94
SHA512eca4c12ac1f7c807a62b5abe2da24971624f91ddcea08fb33e27f1ce586f0b13178f08b8176c292ab458f03096361c466b5ca50992127b59157564ee86a04e91
-
Filesize
326KB
MD59b94b28f4e217ba717e666acf4939270
SHA13cafaf0e73acc856a33481869bc7a4b0ee6cdc3f
SHA256270cbf18de9e52c6f8c3a8792d6519973b5f12501477aa78f0a72e7c752b1a94
SHA512eca4c12ac1f7c807a62b5abe2da24971624f91ddcea08fb33e27f1ce586f0b13178f08b8176c292ab458f03096361c466b5ca50992127b59157564ee86a04e91
-
Filesize
326KB
MD59b94b28f4e217ba717e666acf4939270
SHA13cafaf0e73acc856a33481869bc7a4b0ee6cdc3f
SHA256270cbf18de9e52c6f8c3a8792d6519973b5f12501477aa78f0a72e7c752b1a94
SHA512eca4c12ac1f7c807a62b5abe2da24971624f91ddcea08fb33e27f1ce586f0b13178f08b8176c292ab458f03096361c466b5ca50992127b59157564ee86a04e91
-
Filesize
326KB
MD59b94b28f4e217ba717e666acf4939270
SHA13cafaf0e73acc856a33481869bc7a4b0ee6cdc3f
SHA256270cbf18de9e52c6f8c3a8792d6519973b5f12501477aa78f0a72e7c752b1a94
SHA512eca4c12ac1f7c807a62b5abe2da24971624f91ddcea08fb33e27f1ce586f0b13178f08b8176c292ab458f03096361c466b5ca50992127b59157564ee86a04e91
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7