Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2023, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
02532399.exe
Resource
win7-20230220-en
General
-
Target
02532399.exe
-
Size
576KB
-
MD5
7f7d2c9ee52d38bde19e0ce6b3c393c6
-
SHA1
0ba30440f86b0327611e8611984dad78d84f6230
-
SHA256
fa6c52d3367a4db4f2cb6dc8d3dc9d548289adb065a601bf33905706b8297aba
-
SHA512
9124159cad755750d7fff45a70c1e1a1cd0818838019c95ab8b2151f4312bf785a6c4a26f57154b849b1e9c37e16a0434fc8036a68c7466f2b4987bf5babe9e3
-
SSDEEP
12288:iMr5y90MOfThgZqCBMhSW3tveCTKby/UDGBzE3CYWSdj9NaYtXGsW6JT+:/y5OflQO3tveCHUDGxE3bjrhG5Ma
Malware Config
Extracted
redline
diza
83.97.73.130:19061
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
rovno
83.97.73.130:19061
-
auth_value
88306b072bfae0d9e44ed86a222b439d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g8307286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g8307286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g8307286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g8307286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g8307286.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g8307286.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation h0036801.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 9 IoCs
pid Process 1932 x5015031.exe 2304 x1300132.exe 4504 f8042094.exe 224 g8307286.exe 552 h0036801.exe 1436 rugen.exe 2972 i3867567.exe 1648 rugen.exe 3916 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 2216 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g8307286.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 02532399.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 02532399.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5015031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5015031.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1300132.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1300132.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4744 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4504 f8042094.exe 4504 f8042094.exe 224 g8307286.exe 224 g8307286.exe 2972 i3867567.exe 2972 i3867567.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4504 f8042094.exe Token: SeDebugPrivilege 224 g8307286.exe Token: SeDebugPrivilege 2972 i3867567.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 552 h0036801.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2924 wrote to memory of 1932 2924 02532399.exe 82 PID 2924 wrote to memory of 1932 2924 02532399.exe 82 PID 2924 wrote to memory of 1932 2924 02532399.exe 82 PID 1932 wrote to memory of 2304 1932 x5015031.exe 83 PID 1932 wrote to memory of 2304 1932 x5015031.exe 83 PID 1932 wrote to memory of 2304 1932 x5015031.exe 83 PID 2304 wrote to memory of 4504 2304 x1300132.exe 84 PID 2304 wrote to memory of 4504 2304 x1300132.exe 84 PID 2304 wrote to memory of 4504 2304 x1300132.exe 84 PID 2304 wrote to memory of 224 2304 x1300132.exe 89 PID 2304 wrote to memory of 224 2304 x1300132.exe 89 PID 1932 wrote to memory of 552 1932 x5015031.exe 92 PID 1932 wrote to memory of 552 1932 x5015031.exe 92 PID 1932 wrote to memory of 552 1932 x5015031.exe 92 PID 552 wrote to memory of 1436 552 h0036801.exe 93 PID 552 wrote to memory of 1436 552 h0036801.exe 93 PID 552 wrote to memory of 1436 552 h0036801.exe 93 PID 2924 wrote to memory of 2972 2924 02532399.exe 94 PID 2924 wrote to memory of 2972 2924 02532399.exe 94 PID 2924 wrote to memory of 2972 2924 02532399.exe 94 PID 1436 wrote to memory of 4744 1436 rugen.exe 96 PID 1436 wrote to memory of 4744 1436 rugen.exe 96 PID 1436 wrote to memory of 4744 1436 rugen.exe 96 PID 1436 wrote to memory of 3980 1436 rugen.exe 98 PID 1436 wrote to memory of 3980 1436 rugen.exe 98 PID 1436 wrote to memory of 3980 1436 rugen.exe 98 PID 3980 wrote to memory of 3184 3980 cmd.exe 100 PID 3980 wrote to memory of 3184 3980 cmd.exe 100 PID 3980 wrote to memory of 3184 3980 cmd.exe 100 PID 3980 wrote to memory of 4572 3980 cmd.exe 101 PID 3980 wrote to memory of 4572 3980 cmd.exe 101 PID 3980 wrote to memory of 4572 3980 cmd.exe 101 PID 3980 wrote to memory of 2836 3980 cmd.exe 102 PID 3980 wrote to memory of 2836 3980 cmd.exe 102 PID 3980 wrote to memory of 2836 3980 cmd.exe 102 PID 3980 wrote to memory of 3356 3980 cmd.exe 103 PID 3980 wrote to memory of 3356 3980 cmd.exe 103 PID 3980 wrote to memory of 3356 3980 cmd.exe 103 PID 3980 wrote to memory of 3220 3980 cmd.exe 104 PID 3980 wrote to memory of 3220 3980 cmd.exe 104 PID 3980 wrote to memory of 3220 3980 cmd.exe 104 PID 3980 wrote to memory of 3344 3980 cmd.exe 105 PID 3980 wrote to memory of 3344 3980 cmd.exe 105 PID 3980 wrote to memory of 3344 3980 cmd.exe 105 PID 1436 wrote to memory of 2216 1436 rugen.exe 107 PID 1436 wrote to memory of 2216 1436 rugen.exe 107 PID 1436 wrote to memory of 2216 1436 rugen.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\02532399.exe"C:\Users\Admin\AppData\Local\Temp\02532399.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5015031.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5015031.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1300132.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1300132.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8042094.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8042094.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8307286.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8307286.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0036801.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0036801.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F5⤵
- Creates scheduled task(s)
PID:4744
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3184
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"6⤵PID:4572
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E6⤵PID:2836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3356
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"6⤵PID:3220
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E6⤵PID:3344
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2216
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3867567.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3867567.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:1648
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:3916
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD58b768ec68c04140eb36b795dda1298f0
SHA1d8b39f36e34557f5d94bc862a21986071e91e6d7
SHA2567b1c4e0f18887449f8ad6d81b03647a7b6535f257334f1215958bd99885f8d81
SHA512c08eee0f0dd4f28b9726ac30edcb1110e632705ae6c1ad49a18d3ea65d5d7d82d216800b8ee327128d109a34608f1fd95b5534f29fd31b05a737cee8ba9e4bb9
-
Filesize
205KB
MD58b768ec68c04140eb36b795dda1298f0
SHA1d8b39f36e34557f5d94bc862a21986071e91e6d7
SHA2567b1c4e0f18887449f8ad6d81b03647a7b6535f257334f1215958bd99885f8d81
SHA512c08eee0f0dd4f28b9726ac30edcb1110e632705ae6c1ad49a18d3ea65d5d7d82d216800b8ee327128d109a34608f1fd95b5534f29fd31b05a737cee8ba9e4bb9
-
Filesize
205KB
MD58b768ec68c04140eb36b795dda1298f0
SHA1d8b39f36e34557f5d94bc862a21986071e91e6d7
SHA2567b1c4e0f18887449f8ad6d81b03647a7b6535f257334f1215958bd99885f8d81
SHA512c08eee0f0dd4f28b9726ac30edcb1110e632705ae6c1ad49a18d3ea65d5d7d82d216800b8ee327128d109a34608f1fd95b5534f29fd31b05a737cee8ba9e4bb9
-
Filesize
205KB
MD58b768ec68c04140eb36b795dda1298f0
SHA1d8b39f36e34557f5d94bc862a21986071e91e6d7
SHA2567b1c4e0f18887449f8ad6d81b03647a7b6535f257334f1215958bd99885f8d81
SHA512c08eee0f0dd4f28b9726ac30edcb1110e632705ae6c1ad49a18d3ea65d5d7d82d216800b8ee327128d109a34608f1fd95b5534f29fd31b05a737cee8ba9e4bb9
-
Filesize
205KB
MD58b768ec68c04140eb36b795dda1298f0
SHA1d8b39f36e34557f5d94bc862a21986071e91e6d7
SHA2567b1c4e0f18887449f8ad6d81b03647a7b6535f257334f1215958bd99885f8d81
SHA512c08eee0f0dd4f28b9726ac30edcb1110e632705ae6c1ad49a18d3ea65d5d7d82d216800b8ee327128d109a34608f1fd95b5534f29fd31b05a737cee8ba9e4bb9
-
Filesize
254KB
MD553960d5f73b3dcb460bb2d2cde688301
SHA1f6dc38a817707a0772876e1e1af990ebf4026dd0
SHA256c02bea7be62a2bfa040be1d36ab0a8b9e27572b1ed9dcbff8ece5c37d7bfddba
SHA512066d6d510ab1b181eb0f49a68417dbda45194d03e7deaf17a61976da2b8050eb23b8e3093f08d1af7eef3da619d0e662c1d28cd37d150da0fd283b54909f8106
-
Filesize
254KB
MD553960d5f73b3dcb460bb2d2cde688301
SHA1f6dc38a817707a0772876e1e1af990ebf4026dd0
SHA256c02bea7be62a2bfa040be1d36ab0a8b9e27572b1ed9dcbff8ece5c37d7bfddba
SHA512066d6d510ab1b181eb0f49a68417dbda45194d03e7deaf17a61976da2b8050eb23b8e3093f08d1af7eef3da619d0e662c1d28cd37d150da0fd283b54909f8106
-
Filesize
377KB
MD5d7af356b3e1545c9bc333076555bc570
SHA1d9b8858cc29f6b00c9de4ce6bbd7813b87cb468e
SHA256d53e9f5c4e360d9d993e8d56a3723247011dc105c1e5836f3c0d1dc2ee4acc35
SHA512fe0f9eff580d55dc30b3e27c2d7b4014472f933c6c5fcd93f02b8590ba1b08fb0d271a200013b06044c31156626157eda40878952b14b8006db8dcf51f76b861
-
Filesize
377KB
MD5d7af356b3e1545c9bc333076555bc570
SHA1d9b8858cc29f6b00c9de4ce6bbd7813b87cb468e
SHA256d53e9f5c4e360d9d993e8d56a3723247011dc105c1e5836f3c0d1dc2ee4acc35
SHA512fe0f9eff580d55dc30b3e27c2d7b4014472f933c6c5fcd93f02b8590ba1b08fb0d271a200013b06044c31156626157eda40878952b14b8006db8dcf51f76b861
-
Filesize
205KB
MD58b768ec68c04140eb36b795dda1298f0
SHA1d8b39f36e34557f5d94bc862a21986071e91e6d7
SHA2567b1c4e0f18887449f8ad6d81b03647a7b6535f257334f1215958bd99885f8d81
SHA512c08eee0f0dd4f28b9726ac30edcb1110e632705ae6c1ad49a18d3ea65d5d7d82d216800b8ee327128d109a34608f1fd95b5534f29fd31b05a737cee8ba9e4bb9
-
Filesize
205KB
MD58b768ec68c04140eb36b795dda1298f0
SHA1d8b39f36e34557f5d94bc862a21986071e91e6d7
SHA2567b1c4e0f18887449f8ad6d81b03647a7b6535f257334f1215958bd99885f8d81
SHA512c08eee0f0dd4f28b9726ac30edcb1110e632705ae6c1ad49a18d3ea65d5d7d82d216800b8ee327128d109a34608f1fd95b5534f29fd31b05a737cee8ba9e4bb9
-
Filesize
206KB
MD540f057179795c4cc1ec38f56dca92ac2
SHA1cdbb40a167c79bca58ed46c243c28152e66666eb
SHA256078056ee2910c6fb9fb4f4e91aa9de4173568fa2de7252e022a1ce96323b3214
SHA51281d835304618b926822b25a36dc5aa72930e71d890be12358a1a6d6c1a81c7a25f38de75d4e65de7ff5c57d6e6be4de414bcd3a865c31c25d5fafa303e6f9d0b
-
Filesize
206KB
MD540f057179795c4cc1ec38f56dca92ac2
SHA1cdbb40a167c79bca58ed46c243c28152e66666eb
SHA256078056ee2910c6fb9fb4f4e91aa9de4173568fa2de7252e022a1ce96323b3214
SHA51281d835304618b926822b25a36dc5aa72930e71d890be12358a1a6d6c1a81c7a25f38de75d4e65de7ff5c57d6e6be4de414bcd3a865c31c25d5fafa303e6f9d0b
-
Filesize
172KB
MD50d3c38020f446e17b35134ff3adff70c
SHA109f06360095fff12f09b6edd82ebdb9050e5f91a
SHA256845ecf5db41e0b1890ffc6e97fcd5f59ed924719159b82e89c72957125040ec1
SHA512b49f0189bec6ca2467949509cc6c35d03b590d979df8537a1d2a04a84e69f56d7394d1d073c5c9733ce16e05d5e3e695fec3a5a610c050d026501020c6dcb0d3
-
Filesize
172KB
MD50d3c38020f446e17b35134ff3adff70c
SHA109f06360095fff12f09b6edd82ebdb9050e5f91a
SHA256845ecf5db41e0b1890ffc6e97fcd5f59ed924719159b82e89c72957125040ec1
SHA512b49f0189bec6ca2467949509cc6c35d03b590d979df8537a1d2a04a84e69f56d7394d1d073c5c9733ce16e05d5e3e695fec3a5a610c050d026501020c6dcb0d3
-
Filesize
11KB
MD5e8ed1f81397f5f52efbbeb3d4e4c11a2
SHA1db8f98b1d64afa55ca3702a0aa99aee275121080
SHA25637f44c0ef6d51e0d14c1e542015bd61890e740e0867f6212b90a56452627355f
SHA51272af2dd2ca0169c85f430a0b0e3f0adc34e3bca50853a99564caa56a377005821b10bb6519c397dd5d08f6a835442fb9370d6d566508f8d256de4c470311b2d4
-
Filesize
11KB
MD5e8ed1f81397f5f52efbbeb3d4e4c11a2
SHA1db8f98b1d64afa55ca3702a0aa99aee275121080
SHA25637f44c0ef6d51e0d14c1e542015bd61890e740e0867f6212b90a56452627355f
SHA51272af2dd2ca0169c85f430a0b0e3f0adc34e3bca50853a99564caa56a377005821b10bb6519c397dd5d08f6a835442fb9370d6d566508f8d256de4c470311b2d4
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5