Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-02-2023 00:45
Static task
static1
Behavioral task
behavioral1
Sample
93ab751d42cd05e18d7ac221eb0b066b61fccc97c6f81c531fbf0b89e75f16b8.exe
Resource
win10v2004-20220812-en
General
-
Target
93ab751d42cd05e18d7ac221eb0b066b61fccc97c6f81c531fbf0b89e75f16b8.exe
-
Size
797KB
-
MD5
8fe820f6412029c457400e035c9defae
-
SHA1
4ccd2701ecc1554464b3b934f31867bbbbf3d1ed
-
SHA256
93ab751d42cd05e18d7ac221eb0b066b61fccc97c6f81c531fbf0b89e75f16b8
-
SHA512
cc462f810e8e0df4686d08f1b58dd62acfa8c30198e4e518c616312b393402a6282cc3448c76aba0ba4e4e1a7639bc66074c674aef7ce526a40a12321db1be8d
-
SSDEEP
24576:5y+clmVpx8V/LFdF8DBH/gCZUJvFIIvb8w4:s+wUOZ/F8dfgIUJVvb8
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" fii42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" fii42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" fii42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" fii42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" fii42.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection fii42.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation bEU14nE.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 9 IoCs
pid Process 1112 gYA12Ro.exe 924 gCF96Yq.exe 3792 aBU10KG.exe 4832 bEU14nE.exe 3924 mnolyk.exe 3156 dSq0574.exe 3460 fii42.exe 4424 mnolyk.exe 2284 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 1312 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" fii42.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce gYA12Ro.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" gYA12Ro.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce gCF96Yq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" gCF96Yq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 93ab751d42cd05e18d7ac221eb0b066b61fccc97c6f81c531fbf0b89e75f16b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 93ab751d42cd05e18d7ac221eb0b066b61fccc97c6f81c531fbf0b89e75f16b8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4480 3156 WerFault.exe 85 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1748 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3792 aBU10KG.exe 3792 aBU10KG.exe 3156 dSq0574.exe 3156 dSq0574.exe 3460 fii42.exe 3460 fii42.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3792 aBU10KG.exe Token: SeDebugPrivilege 3156 dSq0574.exe Token: SeDebugPrivilege 3460 fii42.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1112 1032 93ab751d42cd05e18d7ac221eb0b066b61fccc97c6f81c531fbf0b89e75f16b8.exe 79 PID 1032 wrote to memory of 1112 1032 93ab751d42cd05e18d7ac221eb0b066b61fccc97c6f81c531fbf0b89e75f16b8.exe 79 PID 1032 wrote to memory of 1112 1032 93ab751d42cd05e18d7ac221eb0b066b61fccc97c6f81c531fbf0b89e75f16b8.exe 79 PID 1112 wrote to memory of 924 1112 gYA12Ro.exe 80 PID 1112 wrote to memory of 924 1112 gYA12Ro.exe 80 PID 1112 wrote to memory of 924 1112 gYA12Ro.exe 80 PID 924 wrote to memory of 3792 924 gCF96Yq.exe 81 PID 924 wrote to memory of 3792 924 gCF96Yq.exe 81 PID 924 wrote to memory of 3792 924 gCF96Yq.exe 81 PID 924 wrote to memory of 4832 924 gCF96Yq.exe 82 PID 924 wrote to memory of 4832 924 gCF96Yq.exe 82 PID 924 wrote to memory of 4832 924 gCF96Yq.exe 82 PID 4832 wrote to memory of 3924 4832 bEU14nE.exe 84 PID 4832 wrote to memory of 3924 4832 bEU14nE.exe 84 PID 4832 wrote to memory of 3924 4832 bEU14nE.exe 84 PID 1112 wrote to memory of 3156 1112 gYA12Ro.exe 85 PID 1112 wrote to memory of 3156 1112 gYA12Ro.exe 85 PID 1112 wrote to memory of 3156 1112 gYA12Ro.exe 85 PID 3924 wrote to memory of 1748 3924 mnolyk.exe 86 PID 3924 wrote to memory of 1748 3924 mnolyk.exe 86 PID 3924 wrote to memory of 1748 3924 mnolyk.exe 86 PID 3924 wrote to memory of 1620 3924 mnolyk.exe 88 PID 3924 wrote to memory of 1620 3924 mnolyk.exe 88 PID 3924 wrote to memory of 1620 3924 mnolyk.exe 88 PID 1620 wrote to memory of 4284 1620 cmd.exe 90 PID 1620 wrote to memory of 4284 1620 cmd.exe 90 PID 1620 wrote to memory of 4284 1620 cmd.exe 90 PID 1620 wrote to memory of 2436 1620 cmd.exe 91 PID 1620 wrote to memory of 2436 1620 cmd.exe 91 PID 1620 wrote to memory of 2436 1620 cmd.exe 91 PID 1620 wrote to memory of 220 1620 cmd.exe 92 PID 1620 wrote to memory of 220 1620 cmd.exe 92 PID 1620 wrote to memory of 220 1620 cmd.exe 92 PID 1620 wrote to memory of 3964 1620 cmd.exe 93 PID 1620 wrote to memory of 3964 1620 cmd.exe 93 PID 1620 wrote to memory of 3964 1620 cmd.exe 93 PID 1620 wrote to memory of 2004 1620 cmd.exe 94 PID 1620 wrote to memory of 2004 1620 cmd.exe 94 PID 1620 wrote to memory of 2004 1620 cmd.exe 94 PID 1620 wrote to memory of 4340 1620 cmd.exe 95 PID 1620 wrote to memory of 4340 1620 cmd.exe 95 PID 1620 wrote to memory of 4340 1620 cmd.exe 95 PID 1032 wrote to memory of 3460 1032 93ab751d42cd05e18d7ac221eb0b066b61fccc97c6f81c531fbf0b89e75f16b8.exe 99 PID 1032 wrote to memory of 3460 1032 93ab751d42cd05e18d7ac221eb0b066b61fccc97c6f81c531fbf0b89e75f16b8.exe 99 PID 3924 wrote to memory of 1312 3924 mnolyk.exe 101 PID 3924 wrote to memory of 1312 3924 mnolyk.exe 101 PID 3924 wrote to memory of 1312 3924 mnolyk.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\93ab751d42cd05e18d7ac221eb0b066b61fccc97c6f81c531fbf0b89e75f16b8.exe"C:\Users\Admin\AppData\Local\Temp\93ab751d42cd05e18d7ac221eb0b066b61fccc97c6f81c531fbf0b89e75f16b8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gYA12Ro.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gYA12Ro.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gCF96Yq.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gCF96Yq.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aBU10KG.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aBU10KG.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3792
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bEU14nE.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bEU14nE.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:1748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4284
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:2436
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3964
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:N"7⤵PID:2004
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:R" /E7⤵PID:4340
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main6⤵
- Loads dropped DLL
PID:1312
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dSq0574.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dSq0574.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 15604⤵
- Program crash
PID:4480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fii42.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fii42.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3156 -ip 31561⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:4424
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:2284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
693KB
MD58d870a7fc95096a5ed3fbb348fe710f7
SHA1e34f62e5722dd84297bbbcffd8f2323e01f3fb22
SHA25675bd7897c7226ac589701dec99f8152d5d224106b28ceb8deb8c6319c186586a
SHA51224675f4fafa1071d0a50749ff29b34175833a7df6402209a15ff64e8602f4adfdbc30733af0cdb66a479462e23b6264e924161795c1a434c993062607278e6cf
-
Filesize
693KB
MD58d870a7fc95096a5ed3fbb348fe710f7
SHA1e34f62e5722dd84297bbbcffd8f2323e01f3fb22
SHA25675bd7897c7226ac589701dec99f8152d5d224106b28ceb8deb8c6319c186586a
SHA51224675f4fafa1071d0a50749ff29b34175833a7df6402209a15ff64e8602f4adfdbc30733af0cdb66a479462e23b6264e924161795c1a434c993062607278e6cf
-
Filesize
485KB
MD5b6bb42f4aa9721285b43a6adc19072b5
SHA1dedc3f102b1fe01f7dbf458b93d0515e8ea23031
SHA25675ca46cc315ec8fa53a488a1508573649f03ee7668568b6dcac411811addac59
SHA512effa55712327b441c34025ecd2ea095aef7d6dbcb09de5891b2a4a1ee29af89a5827ba02ffb57bd77c6c680e8eca906ea68ecdd7f94fa6752dddadbcc20d8e64
-
Filesize
485KB
MD5b6bb42f4aa9721285b43a6adc19072b5
SHA1dedc3f102b1fe01f7dbf458b93d0515e8ea23031
SHA25675ca46cc315ec8fa53a488a1508573649f03ee7668568b6dcac411811addac59
SHA512effa55712327b441c34025ecd2ea095aef7d6dbcb09de5891b2a4a1ee29af89a5827ba02ffb57bd77c6c680e8eca906ea68ecdd7f94fa6752dddadbcc20d8e64
-
Filesize
286KB
MD5dd59a06486fde4ea42875fa3feff05a9
SHA1000cd4f9f5c5b7387c2dc783de0578c0e103ea53
SHA2568b86f473c4f07919e9a0b98cb2ff13c0879290f955972f0a5c1c263ee43c7cdb
SHA5120fc69151f94d5afaa31e85180bb798ed51183e6c0ee641173a3a4f41355d488e739b31f5fd4992c9928c5510efbd1b0657dd9fb62a9e3ee2a9a4249b2ece2d07
-
Filesize
286KB
MD5dd59a06486fde4ea42875fa3feff05a9
SHA1000cd4f9f5c5b7387c2dc783de0578c0e103ea53
SHA2568b86f473c4f07919e9a0b98cb2ff13c0879290f955972f0a5c1c263ee43c7cdb
SHA5120fc69151f94d5afaa31e85180bb798ed51183e6c0ee641173a3a4f41355d488e739b31f5fd4992c9928c5510efbd1b0657dd9fb62a9e3ee2a9a4249b2ece2d07
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
89KB
MD5c79b74d8fec5e7e2ba2f1789fd582a15
SHA178a1e5d99dbaccc5e07b125e1dfb280112cb3128
SHA256b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3
SHA5120debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba
-
Filesize
89KB
MD5c79b74d8fec5e7e2ba2f1789fd582a15
SHA178a1e5d99dbaccc5e07b125e1dfb280112cb3128
SHA256b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3
SHA5120debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba