Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-02-2025 18:21
Static task
static1
Behavioral task
behavioral1
Sample
PO#4590OQ.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
PO#4590OQ.exe
Resource
win10v2004-20241007-en
General
-
Target
PO#4590OQ.exe
-
Size
1.3MB
-
MD5
7f7068a82f43b3e5769e26fab1faa7da
-
SHA1
237a64bbd29b1ef2ab180b57f3ad0b3a8fc9328c
-
SHA256
9851d62bf33dbe25f0502a068bde8acabdb58fe5230a31ac0942efe685f1f54b
-
SHA512
b7b4d6ca01093cb6365aa79c2119d55b9b6d25ffb7065101a7a891da0eb5842393284c9e46d021f94645220eb5357d88f454970839dcea4c8d2f11492f19b21c
-
SSDEEP
24576:5we0qDl5kbFWwASTXbsAAD4XNMEZZKO1p5UYeiysUJGcj23a2tjXQHwtk:5wNqDl5koRSPJAeOESO1bUYeiysUAcj/
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2280 powershell.exe 2260 powershell.exe 2940 powershell.exe 2908 powershell.exe -
Executes dropped EXE 4 IoCs
pid Process 2080 ._cache_PO#4590OQ.exe 1764 Synaptics.exe 868 Synaptics.exe 3024 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2004 PO#4590OQ.exe 2004 PO#4590OQ.exe 2004 PO#4590OQ.exe 868 Synaptics.exe 868 Synaptics.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_PO#4590OQ.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_PO#4590OQ.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_PO#4590OQ.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" PO#4590OQ.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org 8 reallyfreegeoip.org 9 reallyfreegeoip.org 19 reallyfreegeoip.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2604 set thread context of 2004 2604 PO#4590OQ.exe 35 PID 1764 set thread context of 868 1764 Synaptics.exe 44 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO#4590OQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO#4590OQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_PO#4590OQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2848 schtasks.exe 2316 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2960 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2604 PO#4590OQ.exe 2604 PO#4590OQ.exe 2604 PO#4590OQ.exe 2604 PO#4590OQ.exe 2604 PO#4590OQ.exe 2604 PO#4590OQ.exe 2604 PO#4590OQ.exe 2604 PO#4590OQ.exe 2604 PO#4590OQ.exe 2604 PO#4590OQ.exe 2604 PO#4590OQ.exe 2604 PO#4590OQ.exe 2940 powershell.exe 2908 powershell.exe 2080 ._cache_PO#4590OQ.exe 1764 Synaptics.exe 1764 Synaptics.exe 1764 Synaptics.exe 1764 Synaptics.exe 1764 Synaptics.exe 1764 Synaptics.exe 1764 Synaptics.exe 1764 Synaptics.exe 1764 Synaptics.exe 1764 Synaptics.exe 1764 Synaptics.exe 2280 powershell.exe 2260 powershell.exe 1764 Synaptics.exe 3024 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2604 PO#4590OQ.exe Token: SeDebugPrivilege 2940 powershell.exe Token: SeDebugPrivilege 2908 powershell.exe Token: SeDebugPrivilege 2080 ._cache_PO#4590OQ.exe Token: SeDebugPrivilege 1764 Synaptics.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeDebugPrivilege 2260 powershell.exe Token: SeDebugPrivilege 3024 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2960 EXCEL.EXE -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2940 2604 PO#4590OQ.exe 29 PID 2604 wrote to memory of 2940 2604 PO#4590OQ.exe 29 PID 2604 wrote to memory of 2940 2604 PO#4590OQ.exe 29 PID 2604 wrote to memory of 2940 2604 PO#4590OQ.exe 29 PID 2604 wrote to memory of 2908 2604 PO#4590OQ.exe 31 PID 2604 wrote to memory of 2908 2604 PO#4590OQ.exe 31 PID 2604 wrote to memory of 2908 2604 PO#4590OQ.exe 31 PID 2604 wrote to memory of 2908 2604 PO#4590OQ.exe 31 PID 2604 wrote to memory of 2848 2604 PO#4590OQ.exe 33 PID 2604 wrote to memory of 2848 2604 PO#4590OQ.exe 33 PID 2604 wrote to memory of 2848 2604 PO#4590OQ.exe 33 PID 2604 wrote to memory of 2848 2604 PO#4590OQ.exe 33 PID 2604 wrote to memory of 2004 2604 PO#4590OQ.exe 35 PID 2604 wrote to memory of 2004 2604 PO#4590OQ.exe 35 PID 2604 wrote to memory of 2004 2604 PO#4590OQ.exe 35 PID 2604 wrote to memory of 2004 2604 PO#4590OQ.exe 35 PID 2604 wrote to memory of 2004 2604 PO#4590OQ.exe 35 PID 2604 wrote to memory of 2004 2604 PO#4590OQ.exe 35 PID 2604 wrote to memory of 2004 2604 PO#4590OQ.exe 35 PID 2604 wrote to memory of 2004 2604 PO#4590OQ.exe 35 PID 2604 wrote to memory of 2004 2604 PO#4590OQ.exe 35 PID 2604 wrote to memory of 2004 2604 PO#4590OQ.exe 35 PID 2604 wrote to memory of 2004 2604 PO#4590OQ.exe 35 PID 2604 wrote to memory of 2004 2604 PO#4590OQ.exe 35 PID 2004 wrote to memory of 2080 2004 PO#4590OQ.exe 36 PID 2004 wrote to memory of 2080 2004 PO#4590OQ.exe 36 PID 2004 wrote to memory of 2080 2004 PO#4590OQ.exe 36 PID 2004 wrote to memory of 2080 2004 PO#4590OQ.exe 36 PID 2004 wrote to memory of 1764 2004 PO#4590OQ.exe 37 PID 2004 wrote to memory of 1764 2004 PO#4590OQ.exe 37 PID 2004 wrote to memory of 1764 2004 PO#4590OQ.exe 37 PID 2004 wrote to memory of 1764 2004 PO#4590OQ.exe 37 PID 1764 wrote to memory of 2280 1764 Synaptics.exe 38 PID 1764 wrote to memory of 2280 1764 Synaptics.exe 38 PID 1764 wrote to memory of 2280 1764 Synaptics.exe 38 PID 1764 wrote to memory of 2280 1764 Synaptics.exe 38 PID 1764 wrote to memory of 2260 1764 Synaptics.exe 40 PID 1764 wrote to memory of 2260 1764 Synaptics.exe 40 PID 1764 wrote to memory of 2260 1764 Synaptics.exe 40 PID 1764 wrote to memory of 2260 1764 Synaptics.exe 40 PID 1764 wrote to memory of 2316 1764 Synaptics.exe 42 PID 1764 wrote to memory of 2316 1764 Synaptics.exe 42 PID 1764 wrote to memory of 2316 1764 Synaptics.exe 42 PID 1764 wrote to memory of 2316 1764 Synaptics.exe 42 PID 1764 wrote to memory of 868 1764 Synaptics.exe 44 PID 1764 wrote to memory of 868 1764 Synaptics.exe 44 PID 1764 wrote to memory of 868 1764 Synaptics.exe 44 PID 1764 wrote to memory of 868 1764 Synaptics.exe 44 PID 1764 wrote to memory of 868 1764 Synaptics.exe 44 PID 1764 wrote to memory of 868 1764 Synaptics.exe 44 PID 1764 wrote to memory of 868 1764 Synaptics.exe 44 PID 1764 wrote to memory of 868 1764 Synaptics.exe 44 PID 1764 wrote to memory of 868 1764 Synaptics.exe 44 PID 1764 wrote to memory of 868 1764 Synaptics.exe 44 PID 1764 wrote to memory of 868 1764 Synaptics.exe 44 PID 1764 wrote to memory of 868 1764 Synaptics.exe 44 PID 868 wrote to memory of 3024 868 Synaptics.exe 45 PID 868 wrote to memory of 3024 868 Synaptics.exe 45 PID 868 wrote to memory of 3024 868 Synaptics.exe 45 PID 868 wrote to memory of 3024 868 Synaptics.exe 45 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO#4590OQ.exe"C:\Users\Admin\AppData\Local\Temp\PO#4590OQ.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PO#4590OQ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\KLToLsNsEmafCb.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KLToLsNsEmafCb" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA9B.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\PO#4590OQ.exe"C:\Users\Admin\AppData\Local\Temp\PO#4590OQ.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\._cache_PO#4590OQ.exe"C:\Users\Admin\AppData\Local\Temp\._cache_PO#4590OQ.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\KLToLsNsEmafCb.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KLToLsNsEmafCb" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA515.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2316
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3024
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2960
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD57f7068a82f43b3e5769e26fab1faa7da
SHA1237a64bbd29b1ef2ab180b57f3ad0b3a8fc9328c
SHA2569851d62bf33dbe25f0502a068bde8acabdb58fe5230a31ac0942efe685f1f54b
SHA512b7b4d6ca01093cb6365aa79c2119d55b9b6d25ffb7065101a7a891da0eb5842393284c9e46d021f94645220eb5357d88f454970839dcea4c8d2f11492f19b21c
-
Filesize
21KB
MD56d22b01fba857c80d43d7b47a83b1972
SHA1149584d774547e67c174651e26e44e4bb010d977
SHA256fb83cf7b0d7fe3b4a9512e4002032ba15dab90fd89e09bba7ee1718d8d975d0d
SHA5120794e941cd3162360bdd1c87b18d66359d1a4c68d9d465a70bdd4a2fe435c8d6c0d26f0e07982206d2d636bb846f9d18806f854057bec21336ada8627f7f431a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1KB
MD5393a2eadf27fb82b9aca881d4837d483
SHA199817e7db95f47544fa430696829bcd7780476eb
SHA256815750bc460f8bb220427daf07c3cd71c825799a69371d930483aa5d72f14c9c
SHA51253c3721eff31cb18e2b51a9a73be9d3407145d93526cb031230cdd14b1cbdd144e06de3b3555db7640dda0ccf42f8ce59115694d076c980120e939d2f1d855c3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EFBZQP7FXAU3ANXY98CZ.temp
Filesize7KB
MD56b99e8b782fb3652ea9e61b10bdb84bd
SHA1e2329e789bf9f300583a258d0a2407136c56a860
SHA256e0db4c976022cb00e9f1e6b85e250b62e165f5cd56a1d0840e5e24967fb8542e
SHA512501757411d44f0ad0e8e142e7d16e1af6d1c40ac1142ed82474d9469ee7d485ef578baef6221a19a66c97b848d3e6febf0416d6056dfceda728180308325d8ed
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD593faef22b5acae216c4a48d46e1d893f
SHA1357bcd39eb2f5d2944c7de14283552b94050bc56
SHA25630c4daf6d51a1d0f8238b1a6b12f2c0d9826a5603e27f51b9dbde5ed0bd37752
SHA51277a2ec8eee5a1ffe4f7c91a12ad7dce330fa1c3d6d71f3e8d50bd875f1797790b2b37514e94cce6e7180a10c070fe519c9c70307d2e6e002312e146fa60eee01
-
Filesize
91KB
MD5b45e3c4c10da3da0c69e2f90dc3dfb10
SHA161a36473ced38978793a9af1aea1fc528eebe457
SHA256b6fe518ed8ca7ee32f79bb5dd52ab8250cc595d1aa8daec123cef383c6b0bdb6
SHA51244d0c2e0904702dd22c92004415ef3c821bf63de0fb0cc6d7cca41eab36f32531530dd5fdb48017fc5405c7554ae6387514ef3f4e74eea4b36a14d587742e15b