Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 09:33
Static task
static1
Behavioral task
behavioral1
Sample
0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe
Resource
win7-20240215-en
General
-
Target
0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe
-
Size
598KB
-
MD5
e4855693722de3856421b1b6920ba54d
-
SHA1
9c50313f3b6d84a2b063d0acca64417bfe283d6d
-
SHA256
0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe
-
SHA512
5373fc8ac2839520492ac6fa03758ad9781c7a840b9091dba4e3b0f197519e7343de434f2e10ff55e85be8eea1f6f425e4b2f6a343b374852011c02ad70fbba5
-
SSDEEP
12288:DsUwIuFHm5rgI6nU3jmUd0/ubH8dFZwB/aJ/0S:dduFIonUz0/umF6Vmj
Malware Config
Signatures
-
OutSteel batch script 1 IoCs
Detects batch script dropped by OutSteel
Processes:
resource yara_rule behavioral2/files/0x000900000002310f-5.dat outsteel_batch_script -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exedescription ioc Process File opened (read-only) \??\h: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\k: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\n: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\p: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\q: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\r: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\s: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\b: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\i: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\m: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\o: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\t: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\v: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\x: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\z: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\y: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\e: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\g: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\u: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\w: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\a: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\j: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe File opened (read-only) \??\l: 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1156-2-0x0000000004840000-0x000000000491D000-memory.dmp autoit_exe behavioral2/memory/1156-3-0x0000000000400000-0x0000000002C06000-memory.dmp autoit_exe behavioral2/memory/1156-6-0x0000000000400000-0x0000000002C06000-memory.dmp autoit_exe behavioral2/memory/1156-7-0x0000000004840000-0x000000000491D000-memory.dmp autoit_exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4140 1156 WerFault.exe 84 -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid Process 4820 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid Process Token: SeDebugPrivilege 4820 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exedescription pid Process procid_target PID 1156 wrote to memory of 4952 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 88 PID 1156 wrote to memory of 4952 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 88 PID 1156 wrote to memory of 4952 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 88 PID 1156 wrote to memory of 3052 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 90 PID 1156 wrote to memory of 3052 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 90 PID 1156 wrote to memory of 3052 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 90 PID 1156 wrote to memory of 4780 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 92 PID 1156 wrote to memory of 4780 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 92 PID 1156 wrote to memory of 4780 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 92 PID 1156 wrote to memory of 3936 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 94 PID 1156 wrote to memory of 3936 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 94 PID 1156 wrote to memory of 3936 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 94 PID 1156 wrote to memory of 4764 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 98 PID 1156 wrote to memory of 4764 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 98 PID 1156 wrote to memory of 4764 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 98 PID 1156 wrote to memory of 1028 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 100 PID 1156 wrote to memory of 1028 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 100 PID 1156 wrote to memory of 1028 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 100 PID 1156 wrote to memory of 3688 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 102 PID 1156 wrote to memory of 3688 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 102 PID 1156 wrote to memory of 3688 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 102 PID 1156 wrote to memory of 2156 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 104 PID 1156 wrote to memory of 2156 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 104 PID 1156 wrote to memory of 2156 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 104 PID 1156 wrote to memory of 4532 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 107 PID 1156 wrote to memory of 4532 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 107 PID 1156 wrote to memory of 4532 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 107 PID 1156 wrote to memory of 2840 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 110 PID 1156 wrote to memory of 2840 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 110 PID 1156 wrote to memory of 2840 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 110 PID 1156 wrote to memory of 2520 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 112 PID 1156 wrote to memory of 2520 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 112 PID 1156 wrote to memory of 2520 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 112 PID 1156 wrote to memory of 3164 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 114 PID 1156 wrote to memory of 3164 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 114 PID 1156 wrote to memory of 3164 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 114 PID 1156 wrote to memory of 4244 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 116 PID 1156 wrote to memory of 4244 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 116 PID 1156 wrote to memory of 4244 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 116 PID 1156 wrote to memory of 2212 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 118 PID 1156 wrote to memory of 2212 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 118 PID 1156 wrote to memory of 2212 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 118 PID 1156 wrote to memory of 4916 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 120 PID 1156 wrote to memory of 4916 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 120 PID 1156 wrote to memory of 4916 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 120 PID 1156 wrote to memory of 3440 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 122 PID 1156 wrote to memory of 3440 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 122 PID 1156 wrote to memory of 3440 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 122 PID 1156 wrote to memory of 1876 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 124 PID 1156 wrote to memory of 1876 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 124 PID 1156 wrote to memory of 1876 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 124 PID 1156 wrote to memory of 2360 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 126 PID 1156 wrote to memory of 2360 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 126 PID 1156 wrote to memory of 2360 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 126 PID 1156 wrote to memory of 4576 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 128 PID 1156 wrote to memory of 4576 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 128 PID 1156 wrote to memory of 4576 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 128 PID 1156 wrote to memory of 4728 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 130 PID 1156 wrote to memory of 4728 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 130 PID 1156 wrote to memory of 4728 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 130 PID 1156 wrote to memory of 4224 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 132 PID 1156 wrote to memory of 4224 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 132 PID 1156 wrote to memory of 4224 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 132 PID 1156 wrote to memory of 4908 1156 0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe 134
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe"C:\Users\Admin\AppData\Local\Temp\0e1e2f87699a24d1d7b0d984c3622971028a0cafaf665c791c70215f76c7c8fe.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A2⤵PID:4952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A2⤵PID:3052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A2⤵PID:4780
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:3936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A2⤵PID:4764
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A2⤵PID:1028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A2⤵PID:3688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:2156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A2⤵PID:4532
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A2⤵PID:2840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A2⤵PID:2520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A2⤵PID:3164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A2⤵PID:4244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A2⤵PID:2212
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A2⤵PID:4916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A2⤵PID:3440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A2⤵PID:1876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.doc" /S /B /A2⤵PID:2360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.pdf" /S /B /A2⤵PID:4576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.ppt" /S /B /A2⤵PID:4728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.dot" /S /B /A2⤵PID:4224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.xl" /S /B /A2⤵PID:4908
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.csv" /S /B /A2⤵PID:3436
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.rtf" /S /B /A2⤵PID:3456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.dot" /S /B /A2⤵PID:2396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.mdb" /S /B /A2⤵PID:3044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.accdb" /S /B /A2⤵PID:4876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.pot" /S /B /A2⤵PID:1668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.pps" /S /B /A2⤵PID:3100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.ppa" /S /B /A2⤵PID:4568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.rar" /S /B /A2⤵PID:2692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.zip" /S /B /A2⤵PID:4936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.tar" /S /B /A2⤵PID:840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "f:\*.7z" /S /B /A2⤵PID:4236
-
-
C:\Windows\SysWOW64\cmd.execmd /c start /min r.bat2⤵PID:4136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K r.bat3⤵PID:3468
-
C:\Windows\SysWOW64\cmd.execmd /min /c del "C:\Users\Admin\AppData\Local\Temp\r.bat"4⤵PID:2612
-
-
C:\Windows\SysWOW64\taskkill.exeTaskkill /IM cmd.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 18002⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1156 -ip 11561⤵PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256B
MD5247b66f7f0a0cf9608613ef7b2ef16c8
SHA174e800d60a5f4b78d6f915064653b1dcdc56c4e0
SHA256d82b4c757010ff02a446a165fef433c996a4a7d69984ef25a6f832e643d295ce
SHA512a6b5c27c2a81490f98403c9ee464e6e24c73c27bd6996f1b0a2f001921c685e3f60e0fb057371958b6570de5f981b58f9256d90021b2daa619294a955ea74432