Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2023, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
04d64ae10c0b908413d5249cbab7e5ac255085a6e45b8.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
04d64ae10c0b908413d5249cbab7e5ac255085a6e45b8.exe
Resource
win10v2004-20230703-en
General
-
Target
04d64ae10c0b908413d5249cbab7e5ac255085a6e45b8.exe
-
Size
831KB
-
MD5
a61483df0ef958d987234bbde747e64f
-
SHA1
587c8ed47708ec9afc23c4c4d5aad94cd44072a3
-
SHA256
04d64ae10c0b908413d5249cbab7e5ac255085a6e45b8fe16d3f6bc9cfddb2e6
-
SHA512
4cf223ad9c2df1ee251af2ec3d2850077b7bb684a00a4884ece463abbc84b2f75d5a2368b8c52f336c00930868c3e0ba09722a83664f5a25d9368b5e4f6462eb
-
SSDEEP
24576:fyUHKNuMW2XBj2XkvzZzsDKf7NCt3Qp0N8ZpkyR:qUqYMW2xjUkv1YKf7NonN8wy
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
dugin
77.91.124.73:19071
-
auth_value
7c3e46e091100fd26a6076996d374c28
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x0006000000023245-171.dat healer behavioral2/files/0x0006000000023245-172.dat healer behavioral2/memory/4180-173-0x00000000004B0000-0x00000000004BA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h7109409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h7109409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h7109409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h7109409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h7109409.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h7109409.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 2744 x1552911.exe 764 x3608284.exe 784 x8636255.exe 3928 g6369051.exe 4712 saves.exe 4180 h7109409.exe 2256 i7030659.exe 2972 saves.exe 1696 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 1156 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h7109409.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 04d64ae10c0b908413d5249cbab7e5ac255085a6e45b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1552911.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3608284.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8636255.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2124 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4940 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4180 h7109409.exe 4180 h7109409.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4180 h7109409.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3356 wrote to memory of 2744 3356 04d64ae10c0b908413d5249cbab7e5ac255085a6e45b8.exe 83 PID 3356 wrote to memory of 2744 3356 04d64ae10c0b908413d5249cbab7e5ac255085a6e45b8.exe 83 PID 3356 wrote to memory of 2744 3356 04d64ae10c0b908413d5249cbab7e5ac255085a6e45b8.exe 83 PID 2744 wrote to memory of 764 2744 x1552911.exe 84 PID 2744 wrote to memory of 764 2744 x1552911.exe 84 PID 2744 wrote to memory of 764 2744 x1552911.exe 84 PID 764 wrote to memory of 784 764 x3608284.exe 85 PID 764 wrote to memory of 784 764 x3608284.exe 85 PID 764 wrote to memory of 784 764 x3608284.exe 85 PID 784 wrote to memory of 3928 784 x8636255.exe 86 PID 784 wrote to memory of 3928 784 x8636255.exe 86 PID 784 wrote to memory of 3928 784 x8636255.exe 86 PID 3928 wrote to memory of 4712 3928 g6369051.exe 88 PID 3928 wrote to memory of 4712 3928 g6369051.exe 88 PID 3928 wrote to memory of 4712 3928 g6369051.exe 88 PID 784 wrote to memory of 4180 784 x8636255.exe 89 PID 784 wrote to memory of 4180 784 x8636255.exe 89 PID 4712 wrote to memory of 4940 4712 saves.exe 90 PID 4712 wrote to memory of 4940 4712 saves.exe 90 PID 4712 wrote to memory of 4940 4712 saves.exe 90 PID 4712 wrote to memory of 2520 4712 saves.exe 92 PID 4712 wrote to memory of 2520 4712 saves.exe 92 PID 4712 wrote to memory of 2520 4712 saves.exe 92 PID 2520 wrote to memory of 4416 2520 cmd.exe 94 PID 2520 wrote to memory of 4416 2520 cmd.exe 94 PID 2520 wrote to memory of 4416 2520 cmd.exe 94 PID 2520 wrote to memory of 3080 2520 cmd.exe 95 PID 2520 wrote to memory of 3080 2520 cmd.exe 95 PID 2520 wrote to memory of 3080 2520 cmd.exe 95 PID 2520 wrote to memory of 4668 2520 cmd.exe 96 PID 2520 wrote to memory of 4668 2520 cmd.exe 96 PID 2520 wrote to memory of 4668 2520 cmd.exe 96 PID 2520 wrote to memory of 4700 2520 cmd.exe 97 PID 2520 wrote to memory of 4700 2520 cmd.exe 97 PID 2520 wrote to memory of 4700 2520 cmd.exe 97 PID 2520 wrote to memory of 1380 2520 cmd.exe 98 PID 2520 wrote to memory of 1380 2520 cmd.exe 98 PID 2520 wrote to memory of 1380 2520 cmd.exe 98 PID 2520 wrote to memory of 3124 2520 cmd.exe 99 PID 2520 wrote to memory of 3124 2520 cmd.exe 99 PID 2520 wrote to memory of 3124 2520 cmd.exe 99 PID 764 wrote to memory of 2256 764 x3608284.exe 104 PID 764 wrote to memory of 2256 764 x3608284.exe 104 PID 764 wrote to memory of 2256 764 x3608284.exe 104 PID 4712 wrote to memory of 1156 4712 saves.exe 111 PID 4712 wrote to memory of 1156 4712 saves.exe 111 PID 4712 wrote to memory of 1156 4712 saves.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\04d64ae10c0b908413d5249cbab7e5ac255085a6e45b8.exe"C:\Users\Admin\AppData\Local\Temp\04d64ae10c0b908413d5249cbab7e5ac255085a6e45b8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1552911.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1552911.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3608284.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3608284.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8636255.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8636255.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6369051.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6369051.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4940
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4416
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:3080
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4700
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:1380
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:3124
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:1156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7109409.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7109409.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7030659.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7030659.exe4⤵
- Executes dropped EXE
PID:2256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2972
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1696
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2124
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD53e30f667fc10203e9baf058a517b2ce0
SHA1c948ca4f5d1e24e4cbde5a214abcf729634aaf6a
SHA256ad00ce908191a496c5a58f979fca771d5647711ded7b1692f981053e7dd16141
SHA5129aa5484f7f1583d11a4f96b021b2f067c3610b7370ad334a6df9deafdefd6fae3c9ba30c1332b16a723d3d9245a084fd5eaec71c884ea0ff145d35040660714a
-
Filesize
598KB
MD53e30f667fc10203e9baf058a517b2ce0
SHA1c948ca4f5d1e24e4cbde5a214abcf729634aaf6a
SHA256ad00ce908191a496c5a58f979fca771d5647711ded7b1692f981053e7dd16141
SHA5129aa5484f7f1583d11a4f96b021b2f067c3610b7370ad334a6df9deafdefd6fae3c9ba30c1332b16a723d3d9245a084fd5eaec71c884ea0ff145d35040660714a
-
Filesize
432KB
MD5c1e63ee85a0d5399e58b093e3d2b2452
SHA1c283f7d1b17af2e4d61c4df1e7c9cc3a0849482c
SHA256365ae006dfe0a66f8d86d88d88d4b6b0f43ec631664f89b4ae79a1436861e7c9
SHA512f0cc9eb49f0cdd8277b27b907e096ccc6c9cae02f4d1608dba5bd43e715b217ab9939d88497057a1fd7b5c93245c865d595a622efd76c19aca33c70735b3022f
-
Filesize
432KB
MD5c1e63ee85a0d5399e58b093e3d2b2452
SHA1c283f7d1b17af2e4d61c4df1e7c9cc3a0849482c
SHA256365ae006dfe0a66f8d86d88d88d4b6b0f43ec631664f89b4ae79a1436861e7c9
SHA512f0cc9eb49f0cdd8277b27b907e096ccc6c9cae02f4d1608dba5bd43e715b217ab9939d88497057a1fd7b5c93245c865d595a622efd76c19aca33c70735b3022f
-
Filesize
174KB
MD5aa00a4d5f7b547ab8ab8f38f6a622a12
SHA1b1b62ab6d756a69c5ade0da35ccba75a93a50ee6
SHA256b4d9cb3d4606a376b9827367c26da5f891154b632a07d904d876746d2cfffc5d
SHA51267a796a54e5edcda755a81a5535f340b0e62d13970a421343bec9ea82dea9b98ed3c7932e52056ce9251bc7095dfbe40ed0ab5b1978275eb4ab1d744fe3b64e7
-
Filesize
174KB
MD5aa00a4d5f7b547ab8ab8f38f6a622a12
SHA1b1b62ab6d756a69c5ade0da35ccba75a93a50ee6
SHA256b4d9cb3d4606a376b9827367c26da5f891154b632a07d904d876746d2cfffc5d
SHA51267a796a54e5edcda755a81a5535f340b0e62d13970a421343bec9ea82dea9b98ed3c7932e52056ce9251bc7095dfbe40ed0ab5b1978275eb4ab1d744fe3b64e7
-
Filesize
276KB
MD5f8bfbf984f86f5ffb7d9ef6738ed9b21
SHA1a9956eb0352084d2109c9854c9ba3d5486428ec7
SHA2561124ba6bac181441d23d855a3970567c76877e0c2202215a01b4c31e62adbfcd
SHA5122b79d3e6464768f003aa6241c7eba52319b170f03582e35337999ce563ae0f417b3799648db571b2b00318333e42305bca8dd0373c7fbe67761488714c849aac
-
Filesize
276KB
MD5f8bfbf984f86f5ffb7d9ef6738ed9b21
SHA1a9956eb0352084d2109c9854c9ba3d5486428ec7
SHA2561124ba6bac181441d23d855a3970567c76877e0c2202215a01b4c31e62adbfcd
SHA5122b79d3e6464768f003aa6241c7eba52319b170f03582e35337999ce563ae0f417b3799648db571b2b00318333e42305bca8dd0373c7fbe67761488714c849aac
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7