Analysis
-
max time kernel
106s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2023 21:09
Static task
static1
Behavioral task
behavioral1
Sample
b8cbe1a0f4b022446d865f5d63484e21.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b8cbe1a0f4b022446d865f5d63484e21.exe
Resource
win10v2004-20220812-en
General
-
Target
b8cbe1a0f4b022446d865f5d63484e21.exe
-
Size
722KB
-
MD5
b8cbe1a0f4b022446d865f5d63484e21
-
SHA1
1e1487bf69281ed93652b3342e5e55ad0df7b267
-
SHA256
28db02b7d3597fe78b61868c211761309b742a8ec9257c1c2bafaaab051235d9
-
SHA512
6424b8e974b7842110cf136f3c13a7feb3e08f67bd0c93b81c1b15ed65c05a80145f157959a176003865900e124a27d0b7c978f3d6b4432e504f4ec1ee215991
-
SSDEEP
12288:FMrcy90oUYaiysNjREg8V+XsgMETSCrwGBMD537859mS/CGLSdrRxpLrm5TG:RybGiyYRErV+XME3wGuDd78vBSdVa5TG
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
193.233.20.4/t6r48nSa/index.php
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection rQs74Zg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rQs74Zg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rQs74Zg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rQs74Zg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rQs74Zg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rQs74Zg.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation mfm04.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 9 IoCs
pid Process 4864 sGh99mO.exe 4204 swH90Ua.exe 1584 klM64Tx.exe 4300 mfm04.exe 4468 mnolyk.exe 4176 nyR11xl.exe 800 rQs74Zg.exe 3420 mnolyk.exe 2996 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 2760 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rQs74Zg.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce swH90Ua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" swH90Ua.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b8cbe1a0f4b022446d865f5d63484e21.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b8cbe1a0f4b022446d865f5d63484e21.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sGh99mO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sGh99mO.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4880 4176 WerFault.exe 89 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2804 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1584 klM64Tx.exe 1584 klM64Tx.exe 4176 nyR11xl.exe 4176 nyR11xl.exe 800 rQs74Zg.exe 800 rQs74Zg.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1584 klM64Tx.exe Token: SeDebugPrivilege 4176 nyR11xl.exe Token: SeDebugPrivilege 800 rQs74Zg.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4864 4972 b8cbe1a0f4b022446d865f5d63484e21.exe 80 PID 4972 wrote to memory of 4864 4972 b8cbe1a0f4b022446d865f5d63484e21.exe 80 PID 4972 wrote to memory of 4864 4972 b8cbe1a0f4b022446d865f5d63484e21.exe 80 PID 4864 wrote to memory of 4204 4864 sGh99mO.exe 81 PID 4864 wrote to memory of 4204 4864 sGh99mO.exe 81 PID 4864 wrote to memory of 4204 4864 sGh99mO.exe 81 PID 4204 wrote to memory of 1584 4204 swH90Ua.exe 82 PID 4204 wrote to memory of 1584 4204 swH90Ua.exe 82 PID 4204 wrote to memory of 1584 4204 swH90Ua.exe 82 PID 4204 wrote to memory of 4300 4204 swH90Ua.exe 87 PID 4204 wrote to memory of 4300 4204 swH90Ua.exe 87 PID 4204 wrote to memory of 4300 4204 swH90Ua.exe 87 PID 4300 wrote to memory of 4468 4300 mfm04.exe 88 PID 4300 wrote to memory of 4468 4300 mfm04.exe 88 PID 4300 wrote to memory of 4468 4300 mfm04.exe 88 PID 4864 wrote to memory of 4176 4864 sGh99mO.exe 89 PID 4864 wrote to memory of 4176 4864 sGh99mO.exe 89 PID 4864 wrote to memory of 4176 4864 sGh99mO.exe 89 PID 4468 wrote to memory of 2804 4468 mnolyk.exe 90 PID 4468 wrote to memory of 2804 4468 mnolyk.exe 90 PID 4468 wrote to memory of 2804 4468 mnolyk.exe 90 PID 4468 wrote to memory of 2316 4468 mnolyk.exe 91 PID 4468 wrote to memory of 2316 4468 mnolyk.exe 91 PID 4468 wrote to memory of 2316 4468 mnolyk.exe 91 PID 2316 wrote to memory of 3812 2316 cmd.exe 94 PID 2316 wrote to memory of 3812 2316 cmd.exe 94 PID 2316 wrote to memory of 3812 2316 cmd.exe 94 PID 2316 wrote to memory of 2696 2316 cmd.exe 95 PID 2316 wrote to memory of 2696 2316 cmd.exe 95 PID 2316 wrote to memory of 2696 2316 cmd.exe 95 PID 2316 wrote to memory of 1212 2316 cmd.exe 96 PID 2316 wrote to memory of 1212 2316 cmd.exe 96 PID 2316 wrote to memory of 1212 2316 cmd.exe 96 PID 2316 wrote to memory of 3828 2316 cmd.exe 97 PID 2316 wrote to memory of 3828 2316 cmd.exe 97 PID 2316 wrote to memory of 3828 2316 cmd.exe 97 PID 2316 wrote to memory of 1544 2316 cmd.exe 98 PID 2316 wrote to memory of 1544 2316 cmd.exe 98 PID 2316 wrote to memory of 1544 2316 cmd.exe 98 PID 2316 wrote to memory of 724 2316 cmd.exe 99 PID 2316 wrote to memory of 724 2316 cmd.exe 99 PID 2316 wrote to memory of 724 2316 cmd.exe 99 PID 4972 wrote to memory of 800 4972 b8cbe1a0f4b022446d865f5d63484e21.exe 104 PID 4972 wrote to memory of 800 4972 b8cbe1a0f4b022446d865f5d63484e21.exe 104 PID 4468 wrote to memory of 2760 4468 mnolyk.exe 107 PID 4468 wrote to memory of 2760 4468 mnolyk.exe 107 PID 4468 wrote to memory of 2760 4468 mnolyk.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8cbe1a0f4b022446d865f5d63484e21.exe"C:\Users\Admin\AppData\Local\Temp\b8cbe1a0f4b022446d865f5d63484e21.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sGh99mO.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sGh99mO.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\swH90Ua.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\swH90Ua.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\klM64Tx.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\klM64Tx.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mfm04.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mfm04.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:2804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:2696
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:1212
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3828
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"7⤵PID:1544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E7⤵PID:724
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2760
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nyR11xl.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nyR11xl.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 13404⤵
- Program crash
PID:4880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rQs74Zg.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rQs74Zg.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4176 -ip 41761⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:3420
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:2996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
618KB
MD5fa5a3c4d9b1f0bfad969062ae01748b3
SHA1b75c87e7e2eb69b7c09907eef0ec7d25addef619
SHA2560b5ff4bec24e164bb92fa81dc447a2323d162bbeda9bf68abb9a1579407427e7
SHA512959da21b7600a5d34fe284601bac06fea5805600d774161619712581880284c3991176648f8eec45bc73c70053e872299ea903879a9623a7efe039c955497b0f
-
Filesize
618KB
MD5fa5a3c4d9b1f0bfad969062ae01748b3
SHA1b75c87e7e2eb69b7c09907eef0ec7d25addef619
SHA2560b5ff4bec24e164bb92fa81dc447a2323d162bbeda9bf68abb9a1579407427e7
SHA512959da21b7600a5d34fe284601bac06fea5805600d774161619712581880284c3991176648f8eec45bc73c70053e872299ea903879a9623a7efe039c955497b0f
-
Filesize
292KB
MD5e64d35111d67d5dfbccf0ee7cdbae4e4
SHA197115bf83e7b802b0a2fb9d2043c23011c7f3818
SHA256387ce7da8729de35647c1d3c5bb61dd8981cef3d26b898cdf6c24a527cc63574
SHA5125e82e3c026ed8f7b5ba0414a58e5fe67659b16ccf9be32f1d3f40fdc0cb69ba6f93a9994b016b107effb5a01ebdf0af04d19159a49a54d8f8b865797d21d3ca2
-
Filesize
292KB
MD5e64d35111d67d5dfbccf0ee7cdbae4e4
SHA197115bf83e7b802b0a2fb9d2043c23011c7f3818
SHA256387ce7da8729de35647c1d3c5bb61dd8981cef3d26b898cdf6c24a527cc63574
SHA5125e82e3c026ed8f7b5ba0414a58e5fe67659b16ccf9be32f1d3f40fdc0cb69ba6f93a9994b016b107effb5a01ebdf0af04d19159a49a54d8f8b865797d21d3ca2
-
Filesize
286KB
MD5f532e843d7c92f9ccca3a575a379ffa8
SHA120136dc1d519feaabe9e1771bf45e1060694eec2
SHA256e60a4534db8f9cf43cc0c3690dc2256d279ec69e1329c8a03563bc4ffb2c26e2
SHA5128fad04b901682289f13dfbc63a4b4152929c23942ba40d336c6de5a5dfd6a40df00de1149c9d73c9be9eb31bf3c25744fc7d2bdaa482d3c99dfa2f1c183ef171
-
Filesize
286KB
MD5f532e843d7c92f9ccca3a575a379ffa8
SHA120136dc1d519feaabe9e1771bf45e1060694eec2
SHA256e60a4534db8f9cf43cc0c3690dc2256d279ec69e1329c8a03563bc4ffb2c26e2
SHA5128fad04b901682289f13dfbc63a4b4152929c23942ba40d336c6de5a5dfd6a40df00de1149c9d73c9be9eb31bf3c25744fc7d2bdaa482d3c99dfa2f1c183ef171
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
236KB
MD5812b8d76e0cf1e825bbfcf787ebdd902
SHA19f981c60bb4195657340519e13f1422e5cc8967b
SHA2566513d8b8a66e7fe3a4d82164f24b61757dae9bc11db25517edc8bf0d00502f34
SHA5129a2b4081cdc46bcbede11a1933515d73577941d8878ac912f2ab5a699bcf3d0700a99f00791d95fd8e9a7e28e50e5ec96d47214b99eb597f92cf5be089f57bc7
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38
-
Filesize
89KB
MD54cf63b9a3e4bc0910af4d8baa5939238
SHA1361eea9bb65071ebf09d9598fe7a482e487b919f
SHA256dd82c0954f9047eb2a601aefa58eec94c79f71cab58f980a663ae3b8a54a63f9
SHA512177f101609bbdb7a3e423ecb2914b21d3fb91bf1e6267c4a30313b8ae0b5bc49659fc6ce1f1715649b8ee774022a9b045d886f2ba658ef065eefceedeaf7ee38