Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2023, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
4d8c0e0fb847546b62f289b52e1e3b0fcd422d01d3b480495fec6c9b6f58929e.exe
Resource
win10v2004-20230220-en
General
-
Target
4d8c0e0fb847546b62f289b52e1e3b0fcd422d01d3b480495fec6c9b6f58929e.exe
-
Size
1.1MB
-
MD5
38433902f114dceea8ce4ad909f7e19a
-
SHA1
fcffb00a29abecb2940eb9fd99b190f9c5a1ec21
-
SHA256
4d8c0e0fb847546b62f289b52e1e3b0fcd422d01d3b480495fec6c9b6f58929e
-
SHA512
174fd9cd33f6ac22b8d68f039f33c3dd02eb0ffb3520707fcbf7097e70966c75dffbd81daa59902238e98ad1330ddbd98bd8aee6115bf5b3b3f692bcb2691419
-
SSDEEP
24576:SycIv4+Matsxz67VJ1UKzhrV2bjDzSivsTU5D2Z/J1:5WH3xWRJ1U8bUDzXvsTUJ2Z/J
Malware Config
Extracted
redline
linda
185.161.248.75:4132
-
auth_value
21cdc21d041667b9c1679f88a1146770
Extracted
redline
horor
185.161.248.75:4132
-
auth_value
b8d506fe48db15c38fb031d07f42d529
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o1468673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o1468673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o1468673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o1468673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o1468673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o1468673.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation s6898711.exe -
Executes dropped EXE 10 IoCs
pid Process 1328 z6710588.exe 4568 z6063623.exe 1304 o1468673.exe 1376 p1782449.exe 1500 r1990973.exe 4300 r1990973.exe 3836 s6898711.exe 4976 s6898711.exe 3168 legends.exe 3144 legends.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o1468673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o1468673.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6710588.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6710588.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6063623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6063623.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4d8c0e0fb847546b62f289b52e1e3b0fcd422d01d3b480495fec6c9b6f58929e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4d8c0e0fb847546b62f289b52e1e3b0fcd422d01d3b480495fec6c9b6f58929e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1500 set thread context of 4300 1500 r1990973.exe 95 PID 3836 set thread context of 4976 3836 s6898711.exe 98 PID 3168 set thread context of 3144 3168 legends.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3176 1376 WerFault.exe 91 4952 3144 WerFault.exe 100 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1304 o1468673.exe 1304 o1468673.exe 4300 r1990973.exe 4300 r1990973.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1304 o1468673.exe Token: SeDebugPrivilege 1500 r1990973.exe Token: SeDebugPrivilege 3836 s6898711.exe Token: SeDebugPrivilege 3168 legends.exe Token: SeDebugPrivilege 4300 r1990973.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4976 s6898711.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3144 legends.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1328 1924 4d8c0e0fb847546b62f289b52e1e3b0fcd422d01d3b480495fec6c9b6f58929e.exe 82 PID 1924 wrote to memory of 1328 1924 4d8c0e0fb847546b62f289b52e1e3b0fcd422d01d3b480495fec6c9b6f58929e.exe 82 PID 1924 wrote to memory of 1328 1924 4d8c0e0fb847546b62f289b52e1e3b0fcd422d01d3b480495fec6c9b6f58929e.exe 82 PID 1328 wrote to memory of 4568 1328 z6710588.exe 83 PID 1328 wrote to memory of 4568 1328 z6710588.exe 83 PID 1328 wrote to memory of 4568 1328 z6710588.exe 83 PID 4568 wrote to memory of 1304 4568 z6063623.exe 84 PID 4568 wrote to memory of 1304 4568 z6063623.exe 84 PID 4568 wrote to memory of 1304 4568 z6063623.exe 84 PID 4568 wrote to memory of 1376 4568 z6063623.exe 91 PID 4568 wrote to memory of 1376 4568 z6063623.exe 91 PID 4568 wrote to memory of 1376 4568 z6063623.exe 91 PID 1328 wrote to memory of 1500 1328 z6710588.exe 94 PID 1328 wrote to memory of 1500 1328 z6710588.exe 94 PID 1328 wrote to memory of 1500 1328 z6710588.exe 94 PID 1500 wrote to memory of 4300 1500 r1990973.exe 95 PID 1500 wrote to memory of 4300 1500 r1990973.exe 95 PID 1500 wrote to memory of 4300 1500 r1990973.exe 95 PID 1500 wrote to memory of 4300 1500 r1990973.exe 95 PID 1500 wrote to memory of 4300 1500 r1990973.exe 95 PID 1500 wrote to memory of 4300 1500 r1990973.exe 95 PID 1500 wrote to memory of 4300 1500 r1990973.exe 95 PID 1500 wrote to memory of 4300 1500 r1990973.exe 95 PID 1924 wrote to memory of 3836 1924 4d8c0e0fb847546b62f289b52e1e3b0fcd422d01d3b480495fec6c9b6f58929e.exe 97 PID 1924 wrote to memory of 3836 1924 4d8c0e0fb847546b62f289b52e1e3b0fcd422d01d3b480495fec6c9b6f58929e.exe 97 PID 1924 wrote to memory of 3836 1924 4d8c0e0fb847546b62f289b52e1e3b0fcd422d01d3b480495fec6c9b6f58929e.exe 97 PID 3836 wrote to memory of 4976 3836 s6898711.exe 98 PID 3836 wrote to memory of 4976 3836 s6898711.exe 98 PID 3836 wrote to memory of 4976 3836 s6898711.exe 98 PID 3836 wrote to memory of 4976 3836 s6898711.exe 98 PID 3836 wrote to memory of 4976 3836 s6898711.exe 98 PID 3836 wrote to memory of 4976 3836 s6898711.exe 98 PID 3836 wrote to memory of 4976 3836 s6898711.exe 98 PID 3836 wrote to memory of 4976 3836 s6898711.exe 98 PID 3836 wrote to memory of 4976 3836 s6898711.exe 98 PID 3836 wrote to memory of 4976 3836 s6898711.exe 98 PID 4976 wrote to memory of 3168 4976 s6898711.exe 99 PID 4976 wrote to memory of 3168 4976 s6898711.exe 99 PID 4976 wrote to memory of 3168 4976 s6898711.exe 99 PID 3168 wrote to memory of 3144 3168 legends.exe 100 PID 3168 wrote to memory of 3144 3168 legends.exe 100 PID 3168 wrote to memory of 3144 3168 legends.exe 100 PID 3168 wrote to memory of 3144 3168 legends.exe 100 PID 3168 wrote to memory of 3144 3168 legends.exe 100 PID 3168 wrote to memory of 3144 3168 legends.exe 100 PID 3168 wrote to memory of 3144 3168 legends.exe 100 PID 3168 wrote to memory of 3144 3168 legends.exe 100 PID 3168 wrote to memory of 3144 3168 legends.exe 100 PID 3168 wrote to memory of 3144 3168 legends.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d8c0e0fb847546b62f289b52e1e3b0fcd422d01d3b480495fec6c9b6f58929e.exe"C:\Users\Admin\AppData\Local\Temp\4d8c0e0fb847546b62f289b52e1e3b0fcd422d01d3b480495fec6c9b6f58929e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6710588.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6710588.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6063623.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6063623.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1468673.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1468673.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1782449.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1782449.exe4⤵
- Executes dropped EXE
PID:1376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 9285⤵
- Program crash
PID:3176
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1990973.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1990973.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1990973.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1990973.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6898711.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6898711.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6898711.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6898711.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 126⤵
- Program crash
PID:4952
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1376 -ip 13761⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3144 -ip 31441⤵PID:3616
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
962KB
MD5ce559f3ff33c9e9084e5c67c1daf4efe
SHA1869a46b96d95d7438983240c58aae138aaea60db
SHA256a60ecae873b9f0bf3f65de9713aa57b73ec8345624f3a3e2de727572f9d353a4
SHA5123ac8837baac0e0b697890f1ab0f0666df99d12574e64770807850a4eed24aa692d6d282131b2b20e524bd2ec27bcb3792965d8bce813e7b89130e4d9451ed24a
-
Filesize
962KB
MD5ce559f3ff33c9e9084e5c67c1daf4efe
SHA1869a46b96d95d7438983240c58aae138aaea60db
SHA256a60ecae873b9f0bf3f65de9713aa57b73ec8345624f3a3e2de727572f9d353a4
SHA5123ac8837baac0e0b697890f1ab0f0666df99d12574e64770807850a4eed24aa692d6d282131b2b20e524bd2ec27bcb3792965d8bce813e7b89130e4d9451ed24a
-
Filesize
962KB
MD5ce559f3ff33c9e9084e5c67c1daf4efe
SHA1869a46b96d95d7438983240c58aae138aaea60db
SHA256a60ecae873b9f0bf3f65de9713aa57b73ec8345624f3a3e2de727572f9d353a4
SHA5123ac8837baac0e0b697890f1ab0f0666df99d12574e64770807850a4eed24aa692d6d282131b2b20e524bd2ec27bcb3792965d8bce813e7b89130e4d9451ed24a
-
Filesize
962KB
MD5ce559f3ff33c9e9084e5c67c1daf4efe
SHA1869a46b96d95d7438983240c58aae138aaea60db
SHA256a60ecae873b9f0bf3f65de9713aa57b73ec8345624f3a3e2de727572f9d353a4
SHA5123ac8837baac0e0b697890f1ab0f0666df99d12574e64770807850a4eed24aa692d6d282131b2b20e524bd2ec27bcb3792965d8bce813e7b89130e4d9451ed24a
-
Filesize
962KB
MD5ce559f3ff33c9e9084e5c67c1daf4efe
SHA1869a46b96d95d7438983240c58aae138aaea60db
SHA256a60ecae873b9f0bf3f65de9713aa57b73ec8345624f3a3e2de727572f9d353a4
SHA5123ac8837baac0e0b697890f1ab0f0666df99d12574e64770807850a4eed24aa692d6d282131b2b20e524bd2ec27bcb3792965d8bce813e7b89130e4d9451ed24a
-
Filesize
962KB
MD5ce559f3ff33c9e9084e5c67c1daf4efe
SHA1869a46b96d95d7438983240c58aae138aaea60db
SHA256a60ecae873b9f0bf3f65de9713aa57b73ec8345624f3a3e2de727572f9d353a4
SHA5123ac8837baac0e0b697890f1ab0f0666df99d12574e64770807850a4eed24aa692d6d282131b2b20e524bd2ec27bcb3792965d8bce813e7b89130e4d9451ed24a
-
Filesize
962KB
MD5ce559f3ff33c9e9084e5c67c1daf4efe
SHA1869a46b96d95d7438983240c58aae138aaea60db
SHA256a60ecae873b9f0bf3f65de9713aa57b73ec8345624f3a3e2de727572f9d353a4
SHA5123ac8837baac0e0b697890f1ab0f0666df99d12574e64770807850a4eed24aa692d6d282131b2b20e524bd2ec27bcb3792965d8bce813e7b89130e4d9451ed24a
-
Filesize
702KB
MD584a43bd01017ba42a01d137322da8e99
SHA13208441654f165d52840422f9eb133e71d10e230
SHA2561971901303e0ad30b51f90cc0ee995604abfb9cfa6a24e700ce8ace0ab587b51
SHA5120c02a1539cfd585530910b1087fc95191201f22080a975a9d859a618e3922c2842ef9a5a6cd130334ccc14a5ec9838122a3ac08699b433723be5b8e40a489f64
-
Filesize
702KB
MD584a43bd01017ba42a01d137322da8e99
SHA13208441654f165d52840422f9eb133e71d10e230
SHA2561971901303e0ad30b51f90cc0ee995604abfb9cfa6a24e700ce8ace0ab587b51
SHA5120c02a1539cfd585530910b1087fc95191201f22080a975a9d859a618e3922c2842ef9a5a6cd130334ccc14a5ec9838122a3ac08699b433723be5b8e40a489f64
-
Filesize
903KB
MD5f2d1c7d55c5a9401e8ca6af3e30903e4
SHA193c35dd62ca8d997ae4726ce46bf61948c382f0e
SHA256b0721f88456333c22d1190451bdbbeeb922ace13edeff6f5760c42d461ff8372
SHA512cc426ff24fce1f529e6438464321e8a70f68cb442c7fcbdc016787880d75c5533bd1b46416c365d9dbce6e68da1c1360193669621a15a5652178976fb39eb795
-
Filesize
903KB
MD5f2d1c7d55c5a9401e8ca6af3e30903e4
SHA193c35dd62ca8d997ae4726ce46bf61948c382f0e
SHA256b0721f88456333c22d1190451bdbbeeb922ace13edeff6f5760c42d461ff8372
SHA512cc426ff24fce1f529e6438464321e8a70f68cb442c7fcbdc016787880d75c5533bd1b46416c365d9dbce6e68da1c1360193669621a15a5652178976fb39eb795
-
Filesize
903KB
MD5f2d1c7d55c5a9401e8ca6af3e30903e4
SHA193c35dd62ca8d997ae4726ce46bf61948c382f0e
SHA256b0721f88456333c22d1190451bdbbeeb922ace13edeff6f5760c42d461ff8372
SHA512cc426ff24fce1f529e6438464321e8a70f68cb442c7fcbdc016787880d75c5533bd1b46416c365d9dbce6e68da1c1360193669621a15a5652178976fb39eb795
-
Filesize
305KB
MD533881f1f68ad7dbfa738adce1447a790
SHA106fc5feb7665d15f54762bd8a1d7d969158a5b26
SHA2560d75e57de046524deb6946fa8f511dd8b8096e19da2cdfc765866e6b25fe0358
SHA5127fec9e080e83c77348e52febd9b9cf689f83fbecb9cd12e8464f8b87f692fb621116f2b3e1b49b907c8ec570cb74e4220ca52b5095c2ab6e7640912c183da1e0
-
Filesize
305KB
MD533881f1f68ad7dbfa738adce1447a790
SHA106fc5feb7665d15f54762bd8a1d7d969158a5b26
SHA2560d75e57de046524deb6946fa8f511dd8b8096e19da2cdfc765866e6b25fe0358
SHA5127fec9e080e83c77348e52febd9b9cf689f83fbecb9cd12e8464f8b87f692fb621116f2b3e1b49b907c8ec570cb74e4220ca52b5095c2ab6e7640912c183da1e0
-
Filesize
184KB
MD538dedbce91565e9fed66fe76844e600b
SHA1ead8ce5a380cadf3e769967c8ec603838ee2a887
SHA2565e696bf4eb344caeee1263fd1f0d659c55d662cecb314e1936c8f8ebd87ec3b2
SHA512d1ed80077fbde0573a412f98b99b5a622e8e032fce7b8aeb37de464fa8653dca63ce29c0628604326a61e7bba529afa0fcd96ffa93c1eeff2304d67935d3b953
-
Filesize
184KB
MD538dedbce91565e9fed66fe76844e600b
SHA1ead8ce5a380cadf3e769967c8ec603838ee2a887
SHA2565e696bf4eb344caeee1263fd1f0d659c55d662cecb314e1936c8f8ebd87ec3b2
SHA512d1ed80077fbde0573a412f98b99b5a622e8e032fce7b8aeb37de464fa8653dca63ce29c0628604326a61e7bba529afa0fcd96ffa93c1eeff2304d67935d3b953
-
Filesize
145KB
MD5da18e0e0d4664915884794f109e3cf20
SHA187fae961354869412269400936021da9e64bee98
SHA256e4ccc39ae89f73c78d108cf7058ac9a9411919a8cab722e7bd0b5b3e558b45b4
SHA512d0aaa75b26bde94745bfd80f0108c5f06f23acb59025f40eedf7bdc43f84086f0acd5bb72ab366b80418f18dea492fe348943b994515bed691bd828f8413001d
-
Filesize
145KB
MD5da18e0e0d4664915884794f109e3cf20
SHA187fae961354869412269400936021da9e64bee98
SHA256e4ccc39ae89f73c78d108cf7058ac9a9411919a8cab722e7bd0b5b3e558b45b4
SHA512d0aaa75b26bde94745bfd80f0108c5f06f23acb59025f40eedf7bdc43f84086f0acd5bb72ab366b80418f18dea492fe348943b994515bed691bd828f8413001d