Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 11:24
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
General
-
Target
file.exe
-
Size
1.2MB
-
MD5
023d3bca7189e060948462621169d20b
-
SHA1
ad089dbbfee1e2f10f1be1fabcf93d2281d80583
-
SHA256
9db10dca22b6e4b610d74316f7a94f758d32f077666c0b775e9f0f13234f30ff
-
SHA512
777547cb87f41903b4a942c3583236f07ed6904d25e738a0114b7cb52416c3dc12ee40269517ae586b9bf34d62442de5ebcfe21859555f3bac0a01787a941104
-
SSDEEP
24576:+y7lGgOgwLsQVt8QHPb4DqSz5hAMcZw+HVoFswm6ISEcyVO:N7WG+8QvbIpFcBzwm6eV
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1iJ97bX7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1iJ97bX7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1iJ97bX7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1iJ97bX7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1iJ97bX7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1iJ97bX7.exe -
Executes dropped EXE 5 IoCs
pid Process 2316 PX2Rb47.exe 1668 Fn1zo90.exe 2724 yF7Zx44.exe 2308 1iJ97bX7.exe 2580 2Nh6091.exe -
Loads dropped DLL 14 IoCs
pid Process 3044 file.exe 2316 PX2Rb47.exe 2316 PX2Rb47.exe 1668 Fn1zo90.exe 1668 Fn1zo90.exe 2724 yF7Zx44.exe 2724 yF7Zx44.exe 2308 1iJ97bX7.exe 2724 yF7Zx44.exe 2580 2Nh6091.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 1iJ97bX7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1iJ97bX7.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" yF7Zx44.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" PX2Rb47.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Fn1zo90.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2580 set thread context of 2988 2580 2Nh6091.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 1320 2580 WerFault.exe 32 2824 2988 WerFault.exe 33 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2308 1iJ97bX7.exe 2308 1iJ97bX7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2308 1iJ97bX7.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2316 3044 file.exe 28 PID 3044 wrote to memory of 2316 3044 file.exe 28 PID 3044 wrote to memory of 2316 3044 file.exe 28 PID 3044 wrote to memory of 2316 3044 file.exe 28 PID 3044 wrote to memory of 2316 3044 file.exe 28 PID 3044 wrote to memory of 2316 3044 file.exe 28 PID 3044 wrote to memory of 2316 3044 file.exe 28 PID 2316 wrote to memory of 1668 2316 PX2Rb47.exe 29 PID 2316 wrote to memory of 1668 2316 PX2Rb47.exe 29 PID 2316 wrote to memory of 1668 2316 PX2Rb47.exe 29 PID 2316 wrote to memory of 1668 2316 PX2Rb47.exe 29 PID 2316 wrote to memory of 1668 2316 PX2Rb47.exe 29 PID 2316 wrote to memory of 1668 2316 PX2Rb47.exe 29 PID 2316 wrote to memory of 1668 2316 PX2Rb47.exe 29 PID 1668 wrote to memory of 2724 1668 Fn1zo90.exe 30 PID 1668 wrote to memory of 2724 1668 Fn1zo90.exe 30 PID 1668 wrote to memory of 2724 1668 Fn1zo90.exe 30 PID 1668 wrote to memory of 2724 1668 Fn1zo90.exe 30 PID 1668 wrote to memory of 2724 1668 Fn1zo90.exe 30 PID 1668 wrote to memory of 2724 1668 Fn1zo90.exe 30 PID 1668 wrote to memory of 2724 1668 Fn1zo90.exe 30 PID 2724 wrote to memory of 2308 2724 yF7Zx44.exe 31 PID 2724 wrote to memory of 2308 2724 yF7Zx44.exe 31 PID 2724 wrote to memory of 2308 2724 yF7Zx44.exe 31 PID 2724 wrote to memory of 2308 2724 yF7Zx44.exe 31 PID 2724 wrote to memory of 2308 2724 yF7Zx44.exe 31 PID 2724 wrote to memory of 2308 2724 yF7Zx44.exe 31 PID 2724 wrote to memory of 2308 2724 yF7Zx44.exe 31 PID 2724 wrote to memory of 2580 2724 yF7Zx44.exe 32 PID 2724 wrote to memory of 2580 2724 yF7Zx44.exe 32 PID 2724 wrote to memory of 2580 2724 yF7Zx44.exe 32 PID 2724 wrote to memory of 2580 2724 yF7Zx44.exe 32 PID 2724 wrote to memory of 2580 2724 yF7Zx44.exe 32 PID 2724 wrote to memory of 2580 2724 yF7Zx44.exe 32 PID 2724 wrote to memory of 2580 2724 yF7Zx44.exe 32 PID 2580 wrote to memory of 2988 2580 2Nh6091.exe 33 PID 2580 wrote to memory of 2988 2580 2Nh6091.exe 33 PID 2580 wrote to memory of 2988 2580 2Nh6091.exe 33 PID 2580 wrote to memory of 2988 2580 2Nh6091.exe 33 PID 2580 wrote to memory of 2988 2580 2Nh6091.exe 33 PID 2580 wrote to memory of 2988 2580 2Nh6091.exe 33 PID 2580 wrote to memory of 2988 2580 2Nh6091.exe 33 PID 2580 wrote to memory of 2988 2580 2Nh6091.exe 33 PID 2580 wrote to memory of 2988 2580 2Nh6091.exe 33 PID 2580 wrote to memory of 2988 2580 2Nh6091.exe 33 PID 2580 wrote to memory of 2988 2580 2Nh6091.exe 33 PID 2580 wrote to memory of 2988 2580 2Nh6091.exe 33 PID 2580 wrote to memory of 2988 2580 2Nh6091.exe 33 PID 2580 wrote to memory of 2988 2580 2Nh6091.exe 33 PID 2988 wrote to memory of 2824 2988 AppLaunch.exe 35 PID 2988 wrote to memory of 2824 2988 AppLaunch.exe 35 PID 2988 wrote to memory of 2824 2988 AppLaunch.exe 35 PID 2988 wrote to memory of 2824 2988 AppLaunch.exe 35 PID 2988 wrote to memory of 2824 2988 AppLaunch.exe 35 PID 2988 wrote to memory of 2824 2988 AppLaunch.exe 35 PID 2988 wrote to memory of 2824 2988 AppLaunch.exe 35 PID 2580 wrote to memory of 1320 2580 2Nh6091.exe 34 PID 2580 wrote to memory of 1320 2580 2Nh6091.exe 34 PID 2580 wrote to memory of 1320 2580 2Nh6091.exe 34 PID 2580 wrote to memory of 1320 2580 2Nh6091.exe 34 PID 2580 wrote to memory of 1320 2580 2Nh6091.exe 34 PID 2580 wrote to memory of 1320 2580 2Nh6091.exe 34 PID 2580 wrote to memory of 1320 2580 2Nh6091.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PX2Rb47.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PX2Rb47.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Fn1zo90.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Fn1zo90.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\yF7Zx44.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\yF7Zx44.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1iJ97bX7.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1iJ97bX7.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Nh6091.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Nh6091.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 2687⤵
- Program crash
PID:2824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:1320
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD546105826d168252cca3269e7eec40861
SHA1abc468ce7a19d57129ed388d81949e25e68fecdc
SHA2562aef41679e58f43dd799be8dadadfaf458a3cdea2c9d0f779494a41a6ee46192
SHA512dee463721ff17767716315be07df177e6a662ff5612d49473ad9fd37d5620af73bb6cdfad81b4d283e83ad13685152131c60cad26858d25659b5e413a0bc255c
-
Filesize
1.0MB
MD546105826d168252cca3269e7eec40861
SHA1abc468ce7a19d57129ed388d81949e25e68fecdc
SHA2562aef41679e58f43dd799be8dadadfaf458a3cdea2c9d0f779494a41a6ee46192
SHA512dee463721ff17767716315be07df177e6a662ff5612d49473ad9fd37d5620af73bb6cdfad81b4d283e83ad13685152131c60cad26858d25659b5e413a0bc255c
-
Filesize
745KB
MD5a55bd068f4dfbc22bed84a32c655b4d0
SHA17607a086db61365d06299ae3da1fc247ae13c3e8
SHA25699fd10380f1f2cd2d28358da2bf3470a187f6096550f37d72ccbd7a89660fa32
SHA51249cb1426dbb602f6e793621541c7f97bc4e49748ae7b8e6956596df21178d0bda487a6e1a0d3519faa620a33463c6e642649754b67476c45c054a67288aa699f
-
Filesize
745KB
MD5a55bd068f4dfbc22bed84a32c655b4d0
SHA17607a086db61365d06299ae3da1fc247ae13c3e8
SHA25699fd10380f1f2cd2d28358da2bf3470a187f6096550f37d72ccbd7a89660fa32
SHA51249cb1426dbb602f6e793621541c7f97bc4e49748ae7b8e6956596df21178d0bda487a6e1a0d3519faa620a33463c6e642649754b67476c45c054a67288aa699f
-
Filesize
493KB
MD5e555de45372b545b5d13bbac24b73143
SHA13d7ba9177ffadbd11290d5f465fa8d7824eb4918
SHA2567574b2fe0a66b92e8869204d7e9a1029662ececfb6b522874f870ccf23efdef4
SHA51237c53f1e15239cd7058d15736d02d071824c75573a4dcc513428166abbfb2615c4bec48a2d3d1900da360467bb65af94e7d4d7b0611b72db3480b049954c0614
-
Filesize
493KB
MD5e555de45372b545b5d13bbac24b73143
SHA13d7ba9177ffadbd11290d5f465fa8d7824eb4918
SHA2567574b2fe0a66b92e8869204d7e9a1029662ececfb6b522874f870ccf23efdef4
SHA51237c53f1e15239cd7058d15736d02d071824c75573a4dcc513428166abbfb2615c4bec48a2d3d1900da360467bb65af94e7d4d7b0611b72db3480b049954c0614
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
447KB
MD5724f3f1f1bccaa9b80838684ddf6ea43
SHA1b8e85c67330d099d3bf619ff4c156ea9a59cf8c5
SHA256b49f5db3a0272c4a3b332b19b1fd58d592e10b70a7e25fa495ba3effdf15c629
SHA5129d9998c451f6e58764198a52bd4747ff874f0733b73108548c9e7c4a0420a816ecc095bcbd61980853169f3fcf68b60bbd59d8d3ca6a222eb9884c243977a91c
-
Filesize
447KB
MD5724f3f1f1bccaa9b80838684ddf6ea43
SHA1b8e85c67330d099d3bf619ff4c156ea9a59cf8c5
SHA256b49f5db3a0272c4a3b332b19b1fd58d592e10b70a7e25fa495ba3effdf15c629
SHA5129d9998c451f6e58764198a52bd4747ff874f0733b73108548c9e7c4a0420a816ecc095bcbd61980853169f3fcf68b60bbd59d8d3ca6a222eb9884c243977a91c
-
Filesize
1.0MB
MD546105826d168252cca3269e7eec40861
SHA1abc468ce7a19d57129ed388d81949e25e68fecdc
SHA2562aef41679e58f43dd799be8dadadfaf458a3cdea2c9d0f779494a41a6ee46192
SHA512dee463721ff17767716315be07df177e6a662ff5612d49473ad9fd37d5620af73bb6cdfad81b4d283e83ad13685152131c60cad26858d25659b5e413a0bc255c
-
Filesize
1.0MB
MD546105826d168252cca3269e7eec40861
SHA1abc468ce7a19d57129ed388d81949e25e68fecdc
SHA2562aef41679e58f43dd799be8dadadfaf458a3cdea2c9d0f779494a41a6ee46192
SHA512dee463721ff17767716315be07df177e6a662ff5612d49473ad9fd37d5620af73bb6cdfad81b4d283e83ad13685152131c60cad26858d25659b5e413a0bc255c
-
Filesize
745KB
MD5a55bd068f4dfbc22bed84a32c655b4d0
SHA17607a086db61365d06299ae3da1fc247ae13c3e8
SHA25699fd10380f1f2cd2d28358da2bf3470a187f6096550f37d72ccbd7a89660fa32
SHA51249cb1426dbb602f6e793621541c7f97bc4e49748ae7b8e6956596df21178d0bda487a6e1a0d3519faa620a33463c6e642649754b67476c45c054a67288aa699f
-
Filesize
745KB
MD5a55bd068f4dfbc22bed84a32c655b4d0
SHA17607a086db61365d06299ae3da1fc247ae13c3e8
SHA25699fd10380f1f2cd2d28358da2bf3470a187f6096550f37d72ccbd7a89660fa32
SHA51249cb1426dbb602f6e793621541c7f97bc4e49748ae7b8e6956596df21178d0bda487a6e1a0d3519faa620a33463c6e642649754b67476c45c054a67288aa699f
-
Filesize
493KB
MD5e555de45372b545b5d13bbac24b73143
SHA13d7ba9177ffadbd11290d5f465fa8d7824eb4918
SHA2567574b2fe0a66b92e8869204d7e9a1029662ececfb6b522874f870ccf23efdef4
SHA51237c53f1e15239cd7058d15736d02d071824c75573a4dcc513428166abbfb2615c4bec48a2d3d1900da360467bb65af94e7d4d7b0611b72db3480b049954c0614
-
Filesize
493KB
MD5e555de45372b545b5d13bbac24b73143
SHA13d7ba9177ffadbd11290d5f465fa8d7824eb4918
SHA2567574b2fe0a66b92e8869204d7e9a1029662ececfb6b522874f870ccf23efdef4
SHA51237c53f1e15239cd7058d15736d02d071824c75573a4dcc513428166abbfb2615c4bec48a2d3d1900da360467bb65af94e7d4d7b0611b72db3480b049954c0614
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
447KB
MD5724f3f1f1bccaa9b80838684ddf6ea43
SHA1b8e85c67330d099d3bf619ff4c156ea9a59cf8c5
SHA256b49f5db3a0272c4a3b332b19b1fd58d592e10b70a7e25fa495ba3effdf15c629
SHA5129d9998c451f6e58764198a52bd4747ff874f0733b73108548c9e7c4a0420a816ecc095bcbd61980853169f3fcf68b60bbd59d8d3ca6a222eb9884c243977a91c
-
Filesize
447KB
MD5724f3f1f1bccaa9b80838684ddf6ea43
SHA1b8e85c67330d099d3bf619ff4c156ea9a59cf8c5
SHA256b49f5db3a0272c4a3b332b19b1fd58d592e10b70a7e25fa495ba3effdf15c629
SHA5129d9998c451f6e58764198a52bd4747ff874f0733b73108548c9e7c4a0420a816ecc095bcbd61980853169f3fcf68b60bbd59d8d3ca6a222eb9884c243977a91c
-
Filesize
447KB
MD5724f3f1f1bccaa9b80838684ddf6ea43
SHA1b8e85c67330d099d3bf619ff4c156ea9a59cf8c5
SHA256b49f5db3a0272c4a3b332b19b1fd58d592e10b70a7e25fa495ba3effdf15c629
SHA5129d9998c451f6e58764198a52bd4747ff874f0733b73108548c9e7c4a0420a816ecc095bcbd61980853169f3fcf68b60bbd59d8d3ca6a222eb9884c243977a91c
-
Filesize
447KB
MD5724f3f1f1bccaa9b80838684ddf6ea43
SHA1b8e85c67330d099d3bf619ff4c156ea9a59cf8c5
SHA256b49f5db3a0272c4a3b332b19b1fd58d592e10b70a7e25fa495ba3effdf15c629
SHA5129d9998c451f6e58764198a52bd4747ff874f0733b73108548c9e7c4a0420a816ecc095bcbd61980853169f3fcf68b60bbd59d8d3ca6a222eb9884c243977a91c
-
Filesize
447KB
MD5724f3f1f1bccaa9b80838684ddf6ea43
SHA1b8e85c67330d099d3bf619ff4c156ea9a59cf8c5
SHA256b49f5db3a0272c4a3b332b19b1fd58d592e10b70a7e25fa495ba3effdf15c629
SHA5129d9998c451f6e58764198a52bd4747ff874f0733b73108548c9e7c4a0420a816ecc095bcbd61980853169f3fcf68b60bbd59d8d3ca6a222eb9884c243977a91c
-
Filesize
447KB
MD5724f3f1f1bccaa9b80838684ddf6ea43
SHA1b8e85c67330d099d3bf619ff4c156ea9a59cf8c5
SHA256b49f5db3a0272c4a3b332b19b1fd58d592e10b70a7e25fa495ba3effdf15c629
SHA5129d9998c451f6e58764198a52bd4747ff874f0733b73108548c9e7c4a0420a816ecc095bcbd61980853169f3fcf68b60bbd59d8d3ca6a222eb9884c243977a91c