Analysis
-
max time kernel
162s -
max time network
201s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 20:25
Static task
static1
Behavioral task
behavioral1
Sample
0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exe
Resource
win10v2004-20230220-en
General
-
Target
0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exe
-
Size
1.2MB
-
MD5
0f5f2551642ae2b534ec800aac04c028
-
SHA1
021ae956a1beacf4619f0d35ec96e6c60d757336
-
SHA256
0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969
-
SHA512
13bee95c7218010d03ce63091afe93c3103a4e755a479b2477187d1a514e6eab2344efc859871badd6bc1608163e7413cd8288ee5e3151ae01da9e3c268c5dc4
-
SSDEEP
24576:7yCU2225pdBcmt9KRdke42WF0vgzl8RID:uFLK2l4jF+
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z20300970.exez69341043.exez48705590.exes08333485.exe1.exet59162453.exepid process 544 z20300970.exe 520 z69341043.exe 1244 z48705590.exe 1856 s08333485.exe 432 1.exe 1736 t59162453.exe -
Loads dropped DLL 13 IoCs
Processes:
0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exez20300970.exez69341043.exez48705590.exes08333485.exe1.exet59162453.exepid process 860 0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exe 544 z20300970.exe 544 z20300970.exe 520 z69341043.exe 520 z69341043.exe 1244 z48705590.exe 1244 z48705590.exe 1244 z48705590.exe 1856 s08333485.exe 1856 s08333485.exe 432 1.exe 1244 z48705590.exe 1736 t59162453.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z20300970.exez69341043.exez48705590.exe0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z20300970.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z69341043.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z69341043.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z48705590.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z48705590.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z20300970.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s08333485.exedescription pid process Token: SeDebugPrivilege 1856 s08333485.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exez20300970.exez69341043.exez48705590.exes08333485.exedescription pid process target process PID 860 wrote to memory of 544 860 0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exe z20300970.exe PID 860 wrote to memory of 544 860 0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exe z20300970.exe PID 860 wrote to memory of 544 860 0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exe z20300970.exe PID 860 wrote to memory of 544 860 0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exe z20300970.exe PID 860 wrote to memory of 544 860 0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exe z20300970.exe PID 860 wrote to memory of 544 860 0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exe z20300970.exe PID 860 wrote to memory of 544 860 0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exe z20300970.exe PID 544 wrote to memory of 520 544 z20300970.exe z69341043.exe PID 544 wrote to memory of 520 544 z20300970.exe z69341043.exe PID 544 wrote to memory of 520 544 z20300970.exe z69341043.exe PID 544 wrote to memory of 520 544 z20300970.exe z69341043.exe PID 544 wrote to memory of 520 544 z20300970.exe z69341043.exe PID 544 wrote to memory of 520 544 z20300970.exe z69341043.exe PID 544 wrote to memory of 520 544 z20300970.exe z69341043.exe PID 520 wrote to memory of 1244 520 z69341043.exe z48705590.exe PID 520 wrote to memory of 1244 520 z69341043.exe z48705590.exe PID 520 wrote to memory of 1244 520 z69341043.exe z48705590.exe PID 520 wrote to memory of 1244 520 z69341043.exe z48705590.exe PID 520 wrote to memory of 1244 520 z69341043.exe z48705590.exe PID 520 wrote to memory of 1244 520 z69341043.exe z48705590.exe PID 520 wrote to memory of 1244 520 z69341043.exe z48705590.exe PID 1244 wrote to memory of 1856 1244 z48705590.exe s08333485.exe PID 1244 wrote to memory of 1856 1244 z48705590.exe s08333485.exe PID 1244 wrote to memory of 1856 1244 z48705590.exe s08333485.exe PID 1244 wrote to memory of 1856 1244 z48705590.exe s08333485.exe PID 1244 wrote to memory of 1856 1244 z48705590.exe s08333485.exe PID 1244 wrote to memory of 1856 1244 z48705590.exe s08333485.exe PID 1244 wrote to memory of 1856 1244 z48705590.exe s08333485.exe PID 1856 wrote to memory of 432 1856 s08333485.exe 1.exe PID 1856 wrote to memory of 432 1856 s08333485.exe 1.exe PID 1856 wrote to memory of 432 1856 s08333485.exe 1.exe PID 1856 wrote to memory of 432 1856 s08333485.exe 1.exe PID 1856 wrote to memory of 432 1856 s08333485.exe 1.exe PID 1856 wrote to memory of 432 1856 s08333485.exe 1.exe PID 1856 wrote to memory of 432 1856 s08333485.exe 1.exe PID 1244 wrote to memory of 1736 1244 z48705590.exe t59162453.exe PID 1244 wrote to memory of 1736 1244 z48705590.exe t59162453.exe PID 1244 wrote to memory of 1736 1244 z48705590.exe t59162453.exe PID 1244 wrote to memory of 1736 1244 z48705590.exe t59162453.exe PID 1244 wrote to memory of 1736 1244 z48705590.exe t59162453.exe PID 1244 wrote to memory of 1736 1244 z48705590.exe t59162453.exe PID 1244 wrote to memory of 1736 1244 z48705590.exe t59162453.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exe"C:\Users\Admin\AppData\Local\Temp\0bdb02f37b7b7cfd3e303779cd3d4199c54b268fb9294363e81e44ff6cbbf969.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z20300970.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z20300970.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z69341043.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z69341043.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z48705590.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z48705590.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s08333485.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s08333485.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:432
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t59162453.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t59162453.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1736
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5ad772ffe2c623e57757a9f4f6253b071
SHA1ec4465fe4f2426e64eb5d67bffd448e061511dac
SHA256b872dc46e76c26f0a050fb28af2dbbe01f89400d5ec18f9ec10859ea8c28d292
SHA512c66571374ab7d422ec2ef0559e630a94b3571ed5bf2f818269dc0526384b4e97e61c6d19431d867b82ac7c5a448dc047cbf1fa6350675c78c6f80cd36c446ffd
-
Filesize
1.0MB
MD5ad772ffe2c623e57757a9f4f6253b071
SHA1ec4465fe4f2426e64eb5d67bffd448e061511dac
SHA256b872dc46e76c26f0a050fb28af2dbbe01f89400d5ec18f9ec10859ea8c28d292
SHA512c66571374ab7d422ec2ef0559e630a94b3571ed5bf2f818269dc0526384b4e97e61c6d19431d867b82ac7c5a448dc047cbf1fa6350675c78c6f80cd36c446ffd
-
Filesize
760KB
MD500aa113bf502626b1dc600db68f289cd
SHA1bd129a3e74b7465c321715e4955e2e93f21e3f1f
SHA2564ae9d3b25a0418c296ac7a9eeacb85071bd9d7913a8731e984a2b1d653670669
SHA512c28fc3e8e17d74f2497d014020c258f1fdbe20807816586c83e4433a6e8251f3818a516e6fa95984126997666f5dbb508d05918e7354213d0ad9e61ffdfe8ac2
-
Filesize
760KB
MD500aa113bf502626b1dc600db68f289cd
SHA1bd129a3e74b7465c321715e4955e2e93f21e3f1f
SHA2564ae9d3b25a0418c296ac7a9eeacb85071bd9d7913a8731e984a2b1d653670669
SHA512c28fc3e8e17d74f2497d014020c258f1fdbe20807816586c83e4433a6e8251f3818a516e6fa95984126997666f5dbb508d05918e7354213d0ad9e61ffdfe8ac2
-
Filesize
578KB
MD54d174e6ae0eed48c7b27b7e668e12d1c
SHA1002d7f3ad3cef1ca562eb2404a2716c60939a5d6
SHA256ccd8500f2f4bc60ef1bd7cf8367d1a393224b76bb2bd76e2146ecdec1847b428
SHA512c8c3ff122308bf51d80babe9e24ce8fffc0637be1f1e394054aa663550a8444d2c42decac2189a41a95958036bc92217f2ecb775b7cdb214e803814eea54b2fe
-
Filesize
578KB
MD54d174e6ae0eed48c7b27b7e668e12d1c
SHA1002d7f3ad3cef1ca562eb2404a2716c60939a5d6
SHA256ccd8500f2f4bc60ef1bd7cf8367d1a393224b76bb2bd76e2146ecdec1847b428
SHA512c8c3ff122308bf51d80babe9e24ce8fffc0637be1f1e394054aa663550a8444d2c42decac2189a41a95958036bc92217f2ecb775b7cdb214e803814eea54b2fe
-
Filesize
580KB
MD53c3b2ae6b8d7dbc52eec94c601f32785
SHA19ea2fce82070a70d095dda2eef749a359e4a00d1
SHA2565e0ce20ff092305adaf43d66c7151f6de781fb3864f07bd4776d8ae1d0aca95c
SHA51253049f1d3a9ab2e406f5aebad82423c35e9fb8a6f4d0e96c9057fadcb7d6dcb0b3669436b0b927cff36d5db08c5fecb0452fc8cde450bb9f016a8d88714e8839
-
Filesize
580KB
MD53c3b2ae6b8d7dbc52eec94c601f32785
SHA19ea2fce82070a70d095dda2eef749a359e4a00d1
SHA2565e0ce20ff092305adaf43d66c7151f6de781fb3864f07bd4776d8ae1d0aca95c
SHA51253049f1d3a9ab2e406f5aebad82423c35e9fb8a6f4d0e96c9057fadcb7d6dcb0b3669436b0b927cff36d5db08c5fecb0452fc8cde450bb9f016a8d88714e8839
-
Filesize
580KB
MD53c3b2ae6b8d7dbc52eec94c601f32785
SHA19ea2fce82070a70d095dda2eef749a359e4a00d1
SHA2565e0ce20ff092305adaf43d66c7151f6de781fb3864f07bd4776d8ae1d0aca95c
SHA51253049f1d3a9ab2e406f5aebad82423c35e9fb8a6f4d0e96c9057fadcb7d6dcb0b3669436b0b927cff36d5db08c5fecb0452fc8cde450bb9f016a8d88714e8839
-
Filesize
169KB
MD58de194d2be31c0b55b44ab6424127b12
SHA19b8ffcd6ee15abd0ebde3e6b501ee41665c43dba
SHA256918ef83ef4a05a7806da0cd9b89c871a8bc6d1d31d764c96c60f294e1e7fd364
SHA5125bcc4b579065e7447706ac400415461b7e22361467e6f00e04bf6133b9c414be4771a41c2c279c2ce59895dd7e0af7a8305cf1250c8d0b8d8aeea5664bfc2c3a
-
Filesize
169KB
MD58de194d2be31c0b55b44ab6424127b12
SHA19b8ffcd6ee15abd0ebde3e6b501ee41665c43dba
SHA256918ef83ef4a05a7806da0cd9b89c871a8bc6d1d31d764c96c60f294e1e7fd364
SHA5125bcc4b579065e7447706ac400415461b7e22361467e6f00e04bf6133b9c414be4771a41c2c279c2ce59895dd7e0af7a8305cf1250c8d0b8d8aeea5664bfc2c3a
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD5ad772ffe2c623e57757a9f4f6253b071
SHA1ec4465fe4f2426e64eb5d67bffd448e061511dac
SHA256b872dc46e76c26f0a050fb28af2dbbe01f89400d5ec18f9ec10859ea8c28d292
SHA512c66571374ab7d422ec2ef0559e630a94b3571ed5bf2f818269dc0526384b4e97e61c6d19431d867b82ac7c5a448dc047cbf1fa6350675c78c6f80cd36c446ffd
-
Filesize
1.0MB
MD5ad772ffe2c623e57757a9f4f6253b071
SHA1ec4465fe4f2426e64eb5d67bffd448e061511dac
SHA256b872dc46e76c26f0a050fb28af2dbbe01f89400d5ec18f9ec10859ea8c28d292
SHA512c66571374ab7d422ec2ef0559e630a94b3571ed5bf2f818269dc0526384b4e97e61c6d19431d867b82ac7c5a448dc047cbf1fa6350675c78c6f80cd36c446ffd
-
Filesize
760KB
MD500aa113bf502626b1dc600db68f289cd
SHA1bd129a3e74b7465c321715e4955e2e93f21e3f1f
SHA2564ae9d3b25a0418c296ac7a9eeacb85071bd9d7913a8731e984a2b1d653670669
SHA512c28fc3e8e17d74f2497d014020c258f1fdbe20807816586c83e4433a6e8251f3818a516e6fa95984126997666f5dbb508d05918e7354213d0ad9e61ffdfe8ac2
-
Filesize
760KB
MD500aa113bf502626b1dc600db68f289cd
SHA1bd129a3e74b7465c321715e4955e2e93f21e3f1f
SHA2564ae9d3b25a0418c296ac7a9eeacb85071bd9d7913a8731e984a2b1d653670669
SHA512c28fc3e8e17d74f2497d014020c258f1fdbe20807816586c83e4433a6e8251f3818a516e6fa95984126997666f5dbb508d05918e7354213d0ad9e61ffdfe8ac2
-
Filesize
578KB
MD54d174e6ae0eed48c7b27b7e668e12d1c
SHA1002d7f3ad3cef1ca562eb2404a2716c60939a5d6
SHA256ccd8500f2f4bc60ef1bd7cf8367d1a393224b76bb2bd76e2146ecdec1847b428
SHA512c8c3ff122308bf51d80babe9e24ce8fffc0637be1f1e394054aa663550a8444d2c42decac2189a41a95958036bc92217f2ecb775b7cdb214e803814eea54b2fe
-
Filesize
578KB
MD54d174e6ae0eed48c7b27b7e668e12d1c
SHA1002d7f3ad3cef1ca562eb2404a2716c60939a5d6
SHA256ccd8500f2f4bc60ef1bd7cf8367d1a393224b76bb2bd76e2146ecdec1847b428
SHA512c8c3ff122308bf51d80babe9e24ce8fffc0637be1f1e394054aa663550a8444d2c42decac2189a41a95958036bc92217f2ecb775b7cdb214e803814eea54b2fe
-
Filesize
580KB
MD53c3b2ae6b8d7dbc52eec94c601f32785
SHA19ea2fce82070a70d095dda2eef749a359e4a00d1
SHA2565e0ce20ff092305adaf43d66c7151f6de781fb3864f07bd4776d8ae1d0aca95c
SHA51253049f1d3a9ab2e406f5aebad82423c35e9fb8a6f4d0e96c9057fadcb7d6dcb0b3669436b0b927cff36d5db08c5fecb0452fc8cde450bb9f016a8d88714e8839
-
Filesize
580KB
MD53c3b2ae6b8d7dbc52eec94c601f32785
SHA19ea2fce82070a70d095dda2eef749a359e4a00d1
SHA2565e0ce20ff092305adaf43d66c7151f6de781fb3864f07bd4776d8ae1d0aca95c
SHA51253049f1d3a9ab2e406f5aebad82423c35e9fb8a6f4d0e96c9057fadcb7d6dcb0b3669436b0b927cff36d5db08c5fecb0452fc8cde450bb9f016a8d88714e8839
-
Filesize
580KB
MD53c3b2ae6b8d7dbc52eec94c601f32785
SHA19ea2fce82070a70d095dda2eef749a359e4a00d1
SHA2565e0ce20ff092305adaf43d66c7151f6de781fb3864f07bd4776d8ae1d0aca95c
SHA51253049f1d3a9ab2e406f5aebad82423c35e9fb8a6f4d0e96c9057fadcb7d6dcb0b3669436b0b927cff36d5db08c5fecb0452fc8cde450bb9f016a8d88714e8839
-
Filesize
169KB
MD58de194d2be31c0b55b44ab6424127b12
SHA19b8ffcd6ee15abd0ebde3e6b501ee41665c43dba
SHA256918ef83ef4a05a7806da0cd9b89c871a8bc6d1d31d764c96c60f294e1e7fd364
SHA5125bcc4b579065e7447706ac400415461b7e22361467e6f00e04bf6133b9c414be4771a41c2c279c2ce59895dd7e0af7a8305cf1250c8d0b8d8aeea5664bfc2c3a
-
Filesize
169KB
MD58de194d2be31c0b55b44ab6424127b12
SHA19b8ffcd6ee15abd0ebde3e6b501ee41665c43dba
SHA256918ef83ef4a05a7806da0cd9b89c871a8bc6d1d31d764c96c60f294e1e7fd364
SHA5125bcc4b579065e7447706ac400415461b7e22361467e6f00e04bf6133b9c414be4771a41c2c279c2ce59895dd7e0af7a8305cf1250c8d0b8d8aeea5664bfc2c3a
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf