Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 20:24
Static task
static1
Behavioral task
behavioral1
Sample
0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe
Resource
win10v2004-20230220-en
General
-
Target
0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe
-
Size
1.5MB
-
MD5
00ebe38ee1733d76518f76305c6543ab
-
SHA1
f54a19ea108809118e5cb73f7d30723388e8dd86
-
SHA256
0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700
-
SHA512
0c026e5b928f4ac8a527f1eba2241eb239cd3b3cfc9f2b0125b32ef1ec83c2b34f0dd5c3d7193e83fe782c338036cf34a5e4e8d1d40accffdd51c9d7cc306e49
-
SSDEEP
24576:2ysTDq+3UjlsfjPKVoY6DpZp01YAX0adOiiu0s5Zf+xNEMXrAZ66:FoDq+3nf26YIZp06AXIiysaLEOZ
Malware Config
Extracted
redline
max
185.161.248.73:4164
-
auth_value
efb1499709a5d08ed1ddf71cff71211f
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a98532674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a98532674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a98532674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a98532674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a98532674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a98532674.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 1232 i07930430.exe 1512 i41481659.exe 752 i58734986.exe 320 i09453305.exe 532 a98532674.exe 1352 b04622328.exe -
Loads dropped DLL 12 IoCs
pid Process 1728 0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe 1232 i07930430.exe 1232 i07930430.exe 1512 i41481659.exe 1512 i41481659.exe 752 i58734986.exe 752 i58734986.exe 320 i09453305.exe 320 i09453305.exe 532 a98532674.exe 320 i09453305.exe 1352 b04622328.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features a98532674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a98532674.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" i58734986.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i07930430.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i07930430.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i41481659.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i41481659.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i58734986.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i09453305.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" i09453305.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 532 a98532674.exe 532 a98532674.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 532 a98532674.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1232 1728 0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe 28 PID 1728 wrote to memory of 1232 1728 0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe 28 PID 1728 wrote to memory of 1232 1728 0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe 28 PID 1728 wrote to memory of 1232 1728 0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe 28 PID 1728 wrote to memory of 1232 1728 0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe 28 PID 1728 wrote to memory of 1232 1728 0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe 28 PID 1728 wrote to memory of 1232 1728 0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe 28 PID 1232 wrote to memory of 1512 1232 i07930430.exe 29 PID 1232 wrote to memory of 1512 1232 i07930430.exe 29 PID 1232 wrote to memory of 1512 1232 i07930430.exe 29 PID 1232 wrote to memory of 1512 1232 i07930430.exe 29 PID 1232 wrote to memory of 1512 1232 i07930430.exe 29 PID 1232 wrote to memory of 1512 1232 i07930430.exe 29 PID 1232 wrote to memory of 1512 1232 i07930430.exe 29 PID 1512 wrote to memory of 752 1512 i41481659.exe 30 PID 1512 wrote to memory of 752 1512 i41481659.exe 30 PID 1512 wrote to memory of 752 1512 i41481659.exe 30 PID 1512 wrote to memory of 752 1512 i41481659.exe 30 PID 1512 wrote to memory of 752 1512 i41481659.exe 30 PID 1512 wrote to memory of 752 1512 i41481659.exe 30 PID 1512 wrote to memory of 752 1512 i41481659.exe 30 PID 752 wrote to memory of 320 752 i58734986.exe 31 PID 752 wrote to memory of 320 752 i58734986.exe 31 PID 752 wrote to memory of 320 752 i58734986.exe 31 PID 752 wrote to memory of 320 752 i58734986.exe 31 PID 752 wrote to memory of 320 752 i58734986.exe 31 PID 752 wrote to memory of 320 752 i58734986.exe 31 PID 752 wrote to memory of 320 752 i58734986.exe 31 PID 320 wrote to memory of 532 320 i09453305.exe 32 PID 320 wrote to memory of 532 320 i09453305.exe 32 PID 320 wrote to memory of 532 320 i09453305.exe 32 PID 320 wrote to memory of 532 320 i09453305.exe 32 PID 320 wrote to memory of 532 320 i09453305.exe 32 PID 320 wrote to memory of 532 320 i09453305.exe 32 PID 320 wrote to memory of 532 320 i09453305.exe 32 PID 320 wrote to memory of 1352 320 i09453305.exe 33 PID 320 wrote to memory of 1352 320 i09453305.exe 33 PID 320 wrote to memory of 1352 320 i09453305.exe 33 PID 320 wrote to memory of 1352 320 i09453305.exe 33 PID 320 wrote to memory of 1352 320 i09453305.exe 33 PID 320 wrote to memory of 1352 320 i09453305.exe 33 PID 320 wrote to memory of 1352 320 i09453305.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe"C:\Users\Admin\AppData\Local\Temp\0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i07930430.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i07930430.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i41481659.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i41481659.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i58734986.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i58734986.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i09453305.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i09453305.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a98532674.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a98532674.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b04622328.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b04622328.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1352
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD57db1ac7c2f9d84fe7b11df33d9b65259
SHA1ff41dfc211fbf4239dda95c705e6d479006cb402
SHA256a81fdc3be528b464d464b74542d690ecd502ac503788c495c1c60f5526a192cd
SHA5126b348156e4965a082e812ea952f5d68ddb1afb7be14c6b33facf580ece1a73a352a20a5f58f13456b748edee6a9c73ebb130ac9f704cf99374e2a72c00d2bd59
-
Filesize
1.2MB
MD57db1ac7c2f9d84fe7b11df33d9b65259
SHA1ff41dfc211fbf4239dda95c705e6d479006cb402
SHA256a81fdc3be528b464d464b74542d690ecd502ac503788c495c1c60f5526a192cd
SHA5126b348156e4965a082e812ea952f5d68ddb1afb7be14c6b33facf580ece1a73a352a20a5f58f13456b748edee6a9c73ebb130ac9f704cf99374e2a72c00d2bd59
-
Filesize
1.1MB
MD5b425b4a9f016d95cddc22b8e6543deb6
SHA1a0b49db5b5e17a8add44d3b3eeb3fdab03659858
SHA2566ffb2299ae539c576f6ba0cdbad6062151aa0745c720f3ff39ab123cf802c313
SHA512302d06fab11fb6ad2a5ca233c782b3cffeba3c5ace9ceef68cb0d081ada79113ca88a21cdf1e4230c23164cbf67d88da2f40b2e5662e62d1ae31722ab8b88b21
-
Filesize
1.1MB
MD5b425b4a9f016d95cddc22b8e6543deb6
SHA1a0b49db5b5e17a8add44d3b3eeb3fdab03659858
SHA2566ffb2299ae539c576f6ba0cdbad6062151aa0745c720f3ff39ab123cf802c313
SHA512302d06fab11fb6ad2a5ca233c782b3cffeba3c5ace9ceef68cb0d081ada79113ca88a21cdf1e4230c23164cbf67d88da2f40b2e5662e62d1ae31722ab8b88b21
-
Filesize
590KB
MD5fa5c4cc610eb9b882dd49d57c91e856f
SHA1169442ac3feb1988ff88b9e5dfbbb1ff634f6ad3
SHA256dfab72691cbfd39913f7694be89071b3dc98c1873b95855b42c1f1191fca1ccb
SHA5124d84ad07e051c84305194f086c9358f21b1615f78cd5c6a64d4e3cb69cf7f27336d6cea7027eaad2ad96e9b96f78378a9038df62053099dfa6b97608c4a75513
-
Filesize
590KB
MD5fa5c4cc610eb9b882dd49d57c91e856f
SHA1169442ac3feb1988ff88b9e5dfbbb1ff634f6ad3
SHA256dfab72691cbfd39913f7694be89071b3dc98c1873b95855b42c1f1191fca1ccb
SHA5124d84ad07e051c84305194f086c9358f21b1615f78cd5c6a64d4e3cb69cf7f27336d6cea7027eaad2ad96e9b96f78378a9038df62053099dfa6b97608c4a75513
-
Filesize
310KB
MD5cdfb76668c1a0de0e545275331661b73
SHA17b96af1982fd27323468a5f74345c2de046a734a
SHA2560dea7ae46714df770e3674c6ae78f5f93abe886b0b45f0df02cfd694e356a415
SHA512bb5cdeff4fe687f746b63203b0e15ed6ce97dc6c8731640458d4872dbd9271573c9f21de46511dd019b75373546acd989ab76c34d4fd2ba4d5059138097e01f6
-
Filesize
310KB
MD5cdfb76668c1a0de0e545275331661b73
SHA17b96af1982fd27323468a5f74345c2de046a734a
SHA2560dea7ae46714df770e3674c6ae78f5f93abe886b0b45f0df02cfd694e356a415
SHA512bb5cdeff4fe687f746b63203b0e15ed6ce97dc6c8731640458d4872dbd9271573c9f21de46511dd019b75373546acd989ab76c34d4fd2ba4d5059138097e01f6
-
Filesize
177KB
MD50e70e336b50840a9ddc7817fc0caf63b
SHA11666ebb4448cecb7a21f32b340441878f1fb720e
SHA2560b96476ad431e92c5e7121f2d6cfae50d05f5eef14ba878f0d9550567e15ad70
SHA5120c7b5b78575005bf600f069eca4e570f8b2b00f24b8594ea1032c1c77b7a8c03c11acc5dbcd8d2fc39775db020363696de8033a9fccf020a9ac8d7f36dad376e
-
Filesize
177KB
MD50e70e336b50840a9ddc7817fc0caf63b
SHA11666ebb4448cecb7a21f32b340441878f1fb720e
SHA2560b96476ad431e92c5e7121f2d6cfae50d05f5eef14ba878f0d9550567e15ad70
SHA5120c7b5b78575005bf600f069eca4e570f8b2b00f24b8594ea1032c1c77b7a8c03c11acc5dbcd8d2fc39775db020363696de8033a9fccf020a9ac8d7f36dad376e
-
Filesize
168KB
MD5fb50afd3a9e83d1ce7932914cf8e3534
SHA1fd996173a34c311485b4a9671d6fde3392ae2843
SHA256498842af0fbff25318307ae68f5e0afbd2dc067e37d871b8dd5834592a36c720
SHA512f0efa77feb8bb33c556b61d20e3598ed1271366b587ff449de3455a544b9bd2673548a4ccc5e87164a7c47001b7ecd2ae353ec507ef10794fdb2bee26513f6ab
-
Filesize
168KB
MD5fb50afd3a9e83d1ce7932914cf8e3534
SHA1fd996173a34c311485b4a9671d6fde3392ae2843
SHA256498842af0fbff25318307ae68f5e0afbd2dc067e37d871b8dd5834592a36c720
SHA512f0efa77feb8bb33c556b61d20e3598ed1271366b587ff449de3455a544b9bd2673548a4ccc5e87164a7c47001b7ecd2ae353ec507ef10794fdb2bee26513f6ab
-
Filesize
1.2MB
MD57db1ac7c2f9d84fe7b11df33d9b65259
SHA1ff41dfc211fbf4239dda95c705e6d479006cb402
SHA256a81fdc3be528b464d464b74542d690ecd502ac503788c495c1c60f5526a192cd
SHA5126b348156e4965a082e812ea952f5d68ddb1afb7be14c6b33facf580ece1a73a352a20a5f58f13456b748edee6a9c73ebb130ac9f704cf99374e2a72c00d2bd59
-
Filesize
1.2MB
MD57db1ac7c2f9d84fe7b11df33d9b65259
SHA1ff41dfc211fbf4239dda95c705e6d479006cb402
SHA256a81fdc3be528b464d464b74542d690ecd502ac503788c495c1c60f5526a192cd
SHA5126b348156e4965a082e812ea952f5d68ddb1afb7be14c6b33facf580ece1a73a352a20a5f58f13456b748edee6a9c73ebb130ac9f704cf99374e2a72c00d2bd59
-
Filesize
1.1MB
MD5b425b4a9f016d95cddc22b8e6543deb6
SHA1a0b49db5b5e17a8add44d3b3eeb3fdab03659858
SHA2566ffb2299ae539c576f6ba0cdbad6062151aa0745c720f3ff39ab123cf802c313
SHA512302d06fab11fb6ad2a5ca233c782b3cffeba3c5ace9ceef68cb0d081ada79113ca88a21cdf1e4230c23164cbf67d88da2f40b2e5662e62d1ae31722ab8b88b21
-
Filesize
1.1MB
MD5b425b4a9f016d95cddc22b8e6543deb6
SHA1a0b49db5b5e17a8add44d3b3eeb3fdab03659858
SHA2566ffb2299ae539c576f6ba0cdbad6062151aa0745c720f3ff39ab123cf802c313
SHA512302d06fab11fb6ad2a5ca233c782b3cffeba3c5ace9ceef68cb0d081ada79113ca88a21cdf1e4230c23164cbf67d88da2f40b2e5662e62d1ae31722ab8b88b21
-
Filesize
590KB
MD5fa5c4cc610eb9b882dd49d57c91e856f
SHA1169442ac3feb1988ff88b9e5dfbbb1ff634f6ad3
SHA256dfab72691cbfd39913f7694be89071b3dc98c1873b95855b42c1f1191fca1ccb
SHA5124d84ad07e051c84305194f086c9358f21b1615f78cd5c6a64d4e3cb69cf7f27336d6cea7027eaad2ad96e9b96f78378a9038df62053099dfa6b97608c4a75513
-
Filesize
590KB
MD5fa5c4cc610eb9b882dd49d57c91e856f
SHA1169442ac3feb1988ff88b9e5dfbbb1ff634f6ad3
SHA256dfab72691cbfd39913f7694be89071b3dc98c1873b95855b42c1f1191fca1ccb
SHA5124d84ad07e051c84305194f086c9358f21b1615f78cd5c6a64d4e3cb69cf7f27336d6cea7027eaad2ad96e9b96f78378a9038df62053099dfa6b97608c4a75513
-
Filesize
310KB
MD5cdfb76668c1a0de0e545275331661b73
SHA17b96af1982fd27323468a5f74345c2de046a734a
SHA2560dea7ae46714df770e3674c6ae78f5f93abe886b0b45f0df02cfd694e356a415
SHA512bb5cdeff4fe687f746b63203b0e15ed6ce97dc6c8731640458d4872dbd9271573c9f21de46511dd019b75373546acd989ab76c34d4fd2ba4d5059138097e01f6
-
Filesize
310KB
MD5cdfb76668c1a0de0e545275331661b73
SHA17b96af1982fd27323468a5f74345c2de046a734a
SHA2560dea7ae46714df770e3674c6ae78f5f93abe886b0b45f0df02cfd694e356a415
SHA512bb5cdeff4fe687f746b63203b0e15ed6ce97dc6c8731640458d4872dbd9271573c9f21de46511dd019b75373546acd989ab76c34d4fd2ba4d5059138097e01f6
-
Filesize
177KB
MD50e70e336b50840a9ddc7817fc0caf63b
SHA11666ebb4448cecb7a21f32b340441878f1fb720e
SHA2560b96476ad431e92c5e7121f2d6cfae50d05f5eef14ba878f0d9550567e15ad70
SHA5120c7b5b78575005bf600f069eca4e570f8b2b00f24b8594ea1032c1c77b7a8c03c11acc5dbcd8d2fc39775db020363696de8033a9fccf020a9ac8d7f36dad376e
-
Filesize
177KB
MD50e70e336b50840a9ddc7817fc0caf63b
SHA11666ebb4448cecb7a21f32b340441878f1fb720e
SHA2560b96476ad431e92c5e7121f2d6cfae50d05f5eef14ba878f0d9550567e15ad70
SHA5120c7b5b78575005bf600f069eca4e570f8b2b00f24b8594ea1032c1c77b7a8c03c11acc5dbcd8d2fc39775db020363696de8033a9fccf020a9ac8d7f36dad376e
-
Filesize
168KB
MD5fb50afd3a9e83d1ce7932914cf8e3534
SHA1fd996173a34c311485b4a9671d6fde3392ae2843
SHA256498842af0fbff25318307ae68f5e0afbd2dc067e37d871b8dd5834592a36c720
SHA512f0efa77feb8bb33c556b61d20e3598ed1271366b587ff449de3455a544b9bd2673548a4ccc5e87164a7c47001b7ecd2ae353ec507ef10794fdb2bee26513f6ab
-
Filesize
168KB
MD5fb50afd3a9e83d1ce7932914cf8e3534
SHA1fd996173a34c311485b4a9671d6fde3392ae2843
SHA256498842af0fbff25318307ae68f5e0afbd2dc067e37d871b8dd5834592a36c720
SHA512f0efa77feb8bb33c556b61d20e3598ed1271366b587ff449de3455a544b9bd2673548a4ccc5e87164a7c47001b7ecd2ae353ec507ef10794fdb2bee26513f6ab