Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 14:04
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
General
-
Target
file.exe
-
Size
1.2MB
-
MD5
9da1cecf7697d9fea854a01e67034695
-
SHA1
a36bdef6961eccac9d3d7913e5873ecc05cfa8a4
-
SHA256
7c135dbebf3ef7b2c6ee89bdf72f572a8091491bc17d44a39e379cf6bcfbc52d
-
SHA512
c2b49dcd6329600d2eacee4543308876f938baca08a6817f883de058a298d05a99de49496218ee3c36f01dd4f3ce5f75e4a3b2f6b3ff9a81ba69601f832f31f7
-
SSDEEP
24576:Zyb5w5Vp9qC+EbFyhYAMWJ0zQl2s8YegazU7YDCk:MSp9qpKAfqzQlJSHzU0DC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1lr08VH4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1lr08VH4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1lr08VH4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1lr08VH4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1lr08VH4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1lr08VH4.exe -
Executes dropped EXE 5 IoCs
pid Process 2620 vz5Sf90.exe 2732 Ge3Gr49.exe 2680 cu4nz73.exe 2308 1lr08VH4.exe 2356 2jp4899.exe -
Loads dropped DLL 14 IoCs
pid Process 2888 file.exe 2620 vz5Sf90.exe 2620 vz5Sf90.exe 2732 Ge3Gr49.exe 2732 Ge3Gr49.exe 2680 cu4nz73.exe 2680 cu4nz73.exe 2308 1lr08VH4.exe 2680 cu4nz73.exe 2356 2jp4899.exe 2848 WerFault.exe 2848 WerFault.exe 2848 WerFault.exe 2848 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 1lr08VH4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1lr08VH4.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vz5Sf90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Ge3Gr49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" cu4nz73.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2356 set thread context of 1760 2356 2jp4899.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2848 2356 WerFault.exe 32 2960 1760 WerFault.exe 33 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2308 1lr08VH4.exe 2308 1lr08VH4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2308 1lr08VH4.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2620 2888 file.exe 28 PID 2888 wrote to memory of 2620 2888 file.exe 28 PID 2888 wrote to memory of 2620 2888 file.exe 28 PID 2888 wrote to memory of 2620 2888 file.exe 28 PID 2888 wrote to memory of 2620 2888 file.exe 28 PID 2888 wrote to memory of 2620 2888 file.exe 28 PID 2888 wrote to memory of 2620 2888 file.exe 28 PID 2620 wrote to memory of 2732 2620 vz5Sf90.exe 29 PID 2620 wrote to memory of 2732 2620 vz5Sf90.exe 29 PID 2620 wrote to memory of 2732 2620 vz5Sf90.exe 29 PID 2620 wrote to memory of 2732 2620 vz5Sf90.exe 29 PID 2620 wrote to memory of 2732 2620 vz5Sf90.exe 29 PID 2620 wrote to memory of 2732 2620 vz5Sf90.exe 29 PID 2620 wrote to memory of 2732 2620 vz5Sf90.exe 29 PID 2732 wrote to memory of 2680 2732 Ge3Gr49.exe 30 PID 2732 wrote to memory of 2680 2732 Ge3Gr49.exe 30 PID 2732 wrote to memory of 2680 2732 Ge3Gr49.exe 30 PID 2732 wrote to memory of 2680 2732 Ge3Gr49.exe 30 PID 2732 wrote to memory of 2680 2732 Ge3Gr49.exe 30 PID 2732 wrote to memory of 2680 2732 Ge3Gr49.exe 30 PID 2732 wrote to memory of 2680 2732 Ge3Gr49.exe 30 PID 2680 wrote to memory of 2308 2680 cu4nz73.exe 31 PID 2680 wrote to memory of 2308 2680 cu4nz73.exe 31 PID 2680 wrote to memory of 2308 2680 cu4nz73.exe 31 PID 2680 wrote to memory of 2308 2680 cu4nz73.exe 31 PID 2680 wrote to memory of 2308 2680 cu4nz73.exe 31 PID 2680 wrote to memory of 2308 2680 cu4nz73.exe 31 PID 2680 wrote to memory of 2308 2680 cu4nz73.exe 31 PID 2680 wrote to memory of 2356 2680 cu4nz73.exe 32 PID 2680 wrote to memory of 2356 2680 cu4nz73.exe 32 PID 2680 wrote to memory of 2356 2680 cu4nz73.exe 32 PID 2680 wrote to memory of 2356 2680 cu4nz73.exe 32 PID 2680 wrote to memory of 2356 2680 cu4nz73.exe 32 PID 2680 wrote to memory of 2356 2680 cu4nz73.exe 32 PID 2680 wrote to memory of 2356 2680 cu4nz73.exe 32 PID 2356 wrote to memory of 1760 2356 2jp4899.exe 33 PID 2356 wrote to memory of 1760 2356 2jp4899.exe 33 PID 2356 wrote to memory of 1760 2356 2jp4899.exe 33 PID 2356 wrote to memory of 1760 2356 2jp4899.exe 33 PID 2356 wrote to memory of 1760 2356 2jp4899.exe 33 PID 2356 wrote to memory of 1760 2356 2jp4899.exe 33 PID 2356 wrote to memory of 1760 2356 2jp4899.exe 33 PID 2356 wrote to memory of 1760 2356 2jp4899.exe 33 PID 2356 wrote to memory of 1760 2356 2jp4899.exe 33 PID 2356 wrote to memory of 1760 2356 2jp4899.exe 33 PID 2356 wrote to memory of 1760 2356 2jp4899.exe 33 PID 2356 wrote to memory of 1760 2356 2jp4899.exe 33 PID 2356 wrote to memory of 1760 2356 2jp4899.exe 33 PID 2356 wrote to memory of 1760 2356 2jp4899.exe 33 PID 2356 wrote to memory of 2848 2356 2jp4899.exe 34 PID 2356 wrote to memory of 2848 2356 2jp4899.exe 34 PID 2356 wrote to memory of 2848 2356 2jp4899.exe 34 PID 2356 wrote to memory of 2848 2356 2jp4899.exe 34 PID 2356 wrote to memory of 2848 2356 2jp4899.exe 34 PID 2356 wrote to memory of 2848 2356 2jp4899.exe 34 PID 2356 wrote to memory of 2848 2356 2jp4899.exe 34 PID 1760 wrote to memory of 2960 1760 AppLaunch.exe 35 PID 1760 wrote to memory of 2960 1760 AppLaunch.exe 35 PID 1760 wrote to memory of 2960 1760 AppLaunch.exe 35 PID 1760 wrote to memory of 2960 1760 AppLaunch.exe 35 PID 1760 wrote to memory of 2960 1760 AppLaunch.exe 35 PID 1760 wrote to memory of 2960 1760 AppLaunch.exe 35 PID 1760 wrote to memory of 2960 1760 AppLaunch.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vz5Sf90.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vz5Sf90.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ge3Gr49.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ge3Gr49.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cu4nz73.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cu4nz73.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1lr08VH4.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1lr08VH4.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jp4899.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jp4899.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 2687⤵
- Program crash
PID:2960
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:2848
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD570276a3283b89323493d36715dcd37a6
SHA1e001501c927b2c9c861245d7ba8ee6a111cb38f1
SHA256d7c5528dd22366535a35e095a9975042281b5d7ee875dc4fa86d6c16f4606d5c
SHA512364a3868f14053eac1f90c7bb58f8032c2136dc8f83d3b52db70c7296b91f13063a4a328f82a7601b2cfd08e79571e7f2c366fae15d3ed359b7d4714af817fb5
-
Filesize
1.0MB
MD570276a3283b89323493d36715dcd37a6
SHA1e001501c927b2c9c861245d7ba8ee6a111cb38f1
SHA256d7c5528dd22366535a35e095a9975042281b5d7ee875dc4fa86d6c16f4606d5c
SHA512364a3868f14053eac1f90c7bb58f8032c2136dc8f83d3b52db70c7296b91f13063a4a328f82a7601b2cfd08e79571e7f2c366fae15d3ed359b7d4714af817fb5
-
Filesize
744KB
MD5bd482d8ccefbb511b7c14817c174619b
SHA123d0bd597726387f3efb5e5d7f1949250fa4f60e
SHA256b84e93b22256809e5241bcee59acc31b9865bdae579891d641826e1e159b15f7
SHA51207f6d45da2b34949c843dad1d125569ba9cc52601eaa3d45eee7c327aa058cb9a6ab2265509d1dbf59bc16e68860bf77313e0f04e015a86bc74f87a608207fbe
-
Filesize
744KB
MD5bd482d8ccefbb511b7c14817c174619b
SHA123d0bd597726387f3efb5e5d7f1949250fa4f60e
SHA256b84e93b22256809e5241bcee59acc31b9865bdae579891d641826e1e159b15f7
SHA51207f6d45da2b34949c843dad1d125569ba9cc52601eaa3d45eee7c327aa058cb9a6ab2265509d1dbf59bc16e68860bf77313e0f04e015a86bc74f87a608207fbe
-
Filesize
493KB
MD556c9df7d6d0aad2e1d07719e953acffa
SHA172ef85c62a94e0977b7f9f5384ddef6f95a64e75
SHA25627e38995cd3a28ba8ab2e254bfe5346fa672b5be55f3f0a3037683679b1867ac
SHA5120b6ad9190b79f8e5aad03ba01a4ccb9fc11cff2c1a6e030694b89bc30f710914674f3610e7ce7c24b83b5af86c4a0f24a025c80d8b863b139e291d585f19a5aa
-
Filesize
493KB
MD556c9df7d6d0aad2e1d07719e953acffa
SHA172ef85c62a94e0977b7f9f5384ddef6f95a64e75
SHA25627e38995cd3a28ba8ab2e254bfe5346fa672b5be55f3f0a3037683679b1867ac
SHA5120b6ad9190b79f8e5aad03ba01a4ccb9fc11cff2c1a6e030694b89bc30f710914674f3610e7ce7c24b83b5af86c4a0f24a025c80d8b863b139e291d585f19a5aa
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
448KB
MD5218046ecb246024529d46697c6016a0b
SHA13c19e905606b34e3242d0ed4c9e04e00bfe7fe13
SHA256434b3313a82426766e5c6f1c0bb48cbc9fb59fd37949b0e11b639970bf9f1b40
SHA512365ff6e93caf3cccf50743a5c053833552bd9bf5265afaf58a69d80dfdda6a6fad085ae305b16ec042c00a1595065eee64df5b525aec4d8b87b98a5c5033eba6
-
Filesize
448KB
MD5218046ecb246024529d46697c6016a0b
SHA13c19e905606b34e3242d0ed4c9e04e00bfe7fe13
SHA256434b3313a82426766e5c6f1c0bb48cbc9fb59fd37949b0e11b639970bf9f1b40
SHA512365ff6e93caf3cccf50743a5c053833552bd9bf5265afaf58a69d80dfdda6a6fad085ae305b16ec042c00a1595065eee64df5b525aec4d8b87b98a5c5033eba6
-
Filesize
1.0MB
MD570276a3283b89323493d36715dcd37a6
SHA1e001501c927b2c9c861245d7ba8ee6a111cb38f1
SHA256d7c5528dd22366535a35e095a9975042281b5d7ee875dc4fa86d6c16f4606d5c
SHA512364a3868f14053eac1f90c7bb58f8032c2136dc8f83d3b52db70c7296b91f13063a4a328f82a7601b2cfd08e79571e7f2c366fae15d3ed359b7d4714af817fb5
-
Filesize
1.0MB
MD570276a3283b89323493d36715dcd37a6
SHA1e001501c927b2c9c861245d7ba8ee6a111cb38f1
SHA256d7c5528dd22366535a35e095a9975042281b5d7ee875dc4fa86d6c16f4606d5c
SHA512364a3868f14053eac1f90c7bb58f8032c2136dc8f83d3b52db70c7296b91f13063a4a328f82a7601b2cfd08e79571e7f2c366fae15d3ed359b7d4714af817fb5
-
Filesize
744KB
MD5bd482d8ccefbb511b7c14817c174619b
SHA123d0bd597726387f3efb5e5d7f1949250fa4f60e
SHA256b84e93b22256809e5241bcee59acc31b9865bdae579891d641826e1e159b15f7
SHA51207f6d45da2b34949c843dad1d125569ba9cc52601eaa3d45eee7c327aa058cb9a6ab2265509d1dbf59bc16e68860bf77313e0f04e015a86bc74f87a608207fbe
-
Filesize
744KB
MD5bd482d8ccefbb511b7c14817c174619b
SHA123d0bd597726387f3efb5e5d7f1949250fa4f60e
SHA256b84e93b22256809e5241bcee59acc31b9865bdae579891d641826e1e159b15f7
SHA51207f6d45da2b34949c843dad1d125569ba9cc52601eaa3d45eee7c327aa058cb9a6ab2265509d1dbf59bc16e68860bf77313e0f04e015a86bc74f87a608207fbe
-
Filesize
493KB
MD556c9df7d6d0aad2e1d07719e953acffa
SHA172ef85c62a94e0977b7f9f5384ddef6f95a64e75
SHA25627e38995cd3a28ba8ab2e254bfe5346fa672b5be55f3f0a3037683679b1867ac
SHA5120b6ad9190b79f8e5aad03ba01a4ccb9fc11cff2c1a6e030694b89bc30f710914674f3610e7ce7c24b83b5af86c4a0f24a025c80d8b863b139e291d585f19a5aa
-
Filesize
493KB
MD556c9df7d6d0aad2e1d07719e953acffa
SHA172ef85c62a94e0977b7f9f5384ddef6f95a64e75
SHA25627e38995cd3a28ba8ab2e254bfe5346fa672b5be55f3f0a3037683679b1867ac
SHA5120b6ad9190b79f8e5aad03ba01a4ccb9fc11cff2c1a6e030694b89bc30f710914674f3610e7ce7c24b83b5af86c4a0f24a025c80d8b863b139e291d585f19a5aa
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
448KB
MD5218046ecb246024529d46697c6016a0b
SHA13c19e905606b34e3242d0ed4c9e04e00bfe7fe13
SHA256434b3313a82426766e5c6f1c0bb48cbc9fb59fd37949b0e11b639970bf9f1b40
SHA512365ff6e93caf3cccf50743a5c053833552bd9bf5265afaf58a69d80dfdda6a6fad085ae305b16ec042c00a1595065eee64df5b525aec4d8b87b98a5c5033eba6
-
Filesize
448KB
MD5218046ecb246024529d46697c6016a0b
SHA13c19e905606b34e3242d0ed4c9e04e00bfe7fe13
SHA256434b3313a82426766e5c6f1c0bb48cbc9fb59fd37949b0e11b639970bf9f1b40
SHA512365ff6e93caf3cccf50743a5c053833552bd9bf5265afaf58a69d80dfdda6a6fad085ae305b16ec042c00a1595065eee64df5b525aec4d8b87b98a5c5033eba6
-
Filesize
448KB
MD5218046ecb246024529d46697c6016a0b
SHA13c19e905606b34e3242d0ed4c9e04e00bfe7fe13
SHA256434b3313a82426766e5c6f1c0bb48cbc9fb59fd37949b0e11b639970bf9f1b40
SHA512365ff6e93caf3cccf50743a5c053833552bd9bf5265afaf58a69d80dfdda6a6fad085ae305b16ec042c00a1595065eee64df5b525aec4d8b87b98a5c5033eba6
-
Filesize
448KB
MD5218046ecb246024529d46697c6016a0b
SHA13c19e905606b34e3242d0ed4c9e04e00bfe7fe13
SHA256434b3313a82426766e5c6f1c0bb48cbc9fb59fd37949b0e11b639970bf9f1b40
SHA512365ff6e93caf3cccf50743a5c053833552bd9bf5265afaf58a69d80dfdda6a6fad085ae305b16ec042c00a1595065eee64df5b525aec4d8b87b98a5c5033eba6
-
Filesize
448KB
MD5218046ecb246024529d46697c6016a0b
SHA13c19e905606b34e3242d0ed4c9e04e00bfe7fe13
SHA256434b3313a82426766e5c6f1c0bb48cbc9fb59fd37949b0e11b639970bf9f1b40
SHA512365ff6e93caf3cccf50743a5c053833552bd9bf5265afaf58a69d80dfdda6a6fad085ae305b16ec042c00a1595065eee64df5b525aec4d8b87b98a5c5033eba6
-
Filesize
448KB
MD5218046ecb246024529d46697c6016a0b
SHA13c19e905606b34e3242d0ed4c9e04e00bfe7fe13
SHA256434b3313a82426766e5c6f1c0bb48cbc9fb59fd37949b0e11b639970bf9f1b40
SHA512365ff6e93caf3cccf50743a5c053833552bd9bf5265afaf58a69d80dfdda6a6fad085ae305b16ec042c00a1595065eee64df5b525aec4d8b87b98a5c5033eba6