Analysis
-
max time kernel
162s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/02/2023, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
e210df449fba09bc407fc5360ad70984396cbdca4ae206c302addc75b5d25843.exe
Resource
win10v2004-20220812-en
General
-
Target
e210df449fba09bc407fc5360ad70984396cbdca4ae206c302addc75b5d25843.exe
-
Size
796KB
-
MD5
8079507b5cb7fcf4fd1fca209de5da4d
-
SHA1
4f4d69811ab820638b3006784f35e8305135af59
-
SHA256
e210df449fba09bc407fc5360ad70984396cbdca4ae206c302addc75b5d25843
-
SHA512
5b2c94716ba852d2e0e2b49f323b110f1c59a25d5683ed6c41cefe76a45aad25cc4a05cb0ec13094b9fd2122ba09bc7ffdc462f611b4f0aa60c83cf0f45a7117
-
SSDEEP
12288:AMrYy90Oc4iEXSc5+AfSAtzR1S3QrOReJJKK2GUsTl3yN/x6SvaRo8Htdmj2r1p4:IyY4JXSeaO7SAHJKK2fkyN/ISvwHGyI
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" fXz60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" fXz60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection fXz60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" fXz60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" fXz60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" fXz60.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation bfl25at.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 9 IoCs
pid Process 4352 gXC73FB.exe 4108 gTM69qs.exe 4240 ata56kn.exe 4448 bfl25at.exe 3632 mnolyk.exe 3964 dAx4598.exe 4624 fXz60.exe 4632 mnolyk.exe 3268 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 424 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" fXz60.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e210df449fba09bc407fc5360ad70984396cbdca4ae206c302addc75b5d25843.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce gXC73FB.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" gXC73FB.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce gTM69qs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" gTM69qs.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e210df449fba09bc407fc5360ad70984396cbdca4ae206c302addc75b5d25843.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4616 3964 WerFault.exe 86 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4072 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4240 ata56kn.exe 4240 ata56kn.exe 3964 dAx4598.exe 3964 dAx4598.exe 4624 fXz60.exe 4624 fXz60.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4240 ata56kn.exe Token: SeDebugPrivilege 3964 dAx4598.exe Token: SeDebugPrivilege 4624 fXz60.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1324 wrote to memory of 4352 1324 e210df449fba09bc407fc5360ad70984396cbdca4ae206c302addc75b5d25843.exe 80 PID 1324 wrote to memory of 4352 1324 e210df449fba09bc407fc5360ad70984396cbdca4ae206c302addc75b5d25843.exe 80 PID 1324 wrote to memory of 4352 1324 e210df449fba09bc407fc5360ad70984396cbdca4ae206c302addc75b5d25843.exe 80 PID 4352 wrote to memory of 4108 4352 gXC73FB.exe 81 PID 4352 wrote to memory of 4108 4352 gXC73FB.exe 81 PID 4352 wrote to memory of 4108 4352 gXC73FB.exe 81 PID 4108 wrote to memory of 4240 4108 gTM69qs.exe 82 PID 4108 wrote to memory of 4240 4108 gTM69qs.exe 82 PID 4108 wrote to memory of 4240 4108 gTM69qs.exe 82 PID 4108 wrote to memory of 4448 4108 gTM69qs.exe 84 PID 4108 wrote to memory of 4448 4108 gTM69qs.exe 84 PID 4108 wrote to memory of 4448 4108 gTM69qs.exe 84 PID 4448 wrote to memory of 3632 4448 bfl25at.exe 85 PID 4448 wrote to memory of 3632 4448 bfl25at.exe 85 PID 4448 wrote to memory of 3632 4448 bfl25at.exe 85 PID 4352 wrote to memory of 3964 4352 gXC73FB.exe 86 PID 4352 wrote to memory of 3964 4352 gXC73FB.exe 86 PID 4352 wrote to memory of 3964 4352 gXC73FB.exe 86 PID 3632 wrote to memory of 4072 3632 mnolyk.exe 87 PID 3632 wrote to memory of 4072 3632 mnolyk.exe 87 PID 3632 wrote to memory of 4072 3632 mnolyk.exe 87 PID 3632 wrote to memory of 4148 3632 mnolyk.exe 89 PID 3632 wrote to memory of 4148 3632 mnolyk.exe 89 PID 3632 wrote to memory of 4148 3632 mnolyk.exe 89 PID 4148 wrote to memory of 4052 4148 cmd.exe 91 PID 4148 wrote to memory of 4052 4148 cmd.exe 91 PID 4148 wrote to memory of 4052 4148 cmd.exe 91 PID 4148 wrote to memory of 864 4148 cmd.exe 92 PID 4148 wrote to memory of 864 4148 cmd.exe 92 PID 4148 wrote to memory of 864 4148 cmd.exe 92 PID 4148 wrote to memory of 1912 4148 cmd.exe 93 PID 4148 wrote to memory of 1912 4148 cmd.exe 93 PID 4148 wrote to memory of 1912 4148 cmd.exe 93 PID 4148 wrote to memory of 3824 4148 cmd.exe 94 PID 4148 wrote to memory of 3824 4148 cmd.exe 94 PID 4148 wrote to memory of 3824 4148 cmd.exe 94 PID 4148 wrote to memory of 2180 4148 cmd.exe 95 PID 4148 wrote to memory of 2180 4148 cmd.exe 95 PID 4148 wrote to memory of 2180 4148 cmd.exe 95 PID 4148 wrote to memory of 3228 4148 cmd.exe 96 PID 4148 wrote to memory of 3228 4148 cmd.exe 96 PID 4148 wrote to memory of 3228 4148 cmd.exe 96 PID 1324 wrote to memory of 4624 1324 e210df449fba09bc407fc5360ad70984396cbdca4ae206c302addc75b5d25843.exe 100 PID 1324 wrote to memory of 4624 1324 e210df449fba09bc407fc5360ad70984396cbdca4ae206c302addc75b5d25843.exe 100 PID 3632 wrote to memory of 424 3632 mnolyk.exe 105 PID 3632 wrote to memory of 424 3632 mnolyk.exe 105 PID 3632 wrote to memory of 424 3632 mnolyk.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\e210df449fba09bc407fc5360ad70984396cbdca4ae206c302addc75b5d25843.exe"C:\Users\Admin\AppData\Local\Temp\e210df449fba09bc407fc5360ad70984396cbdca4ae206c302addc75b5d25843.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gXC73FB.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gXC73FB.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gTM69qs.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gTM69qs.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ata56kn.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ata56kn.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bfl25at.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bfl25at.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:4072
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4052
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:864
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:1912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3824
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:N"7⤵PID:2180
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:R" /E7⤵PID:3228
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main6⤵
- Loads dropped DLL
PID:424
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dAx4598.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dAx4598.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 13364⤵
- Program crash
PID:4616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fXz60.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fXz60.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3964 -ip 39641⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:4632
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:3268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
692KB
MD55a8296d6088c00903861283d29f46939
SHA1eea6b9eaaf27e1815cdf7eabf4c9fe8e05c43d9c
SHA2569d93b2708e782687d1874e1fadb1850d7d1b148d560a3b26f19111b16142e354
SHA5127c2de6c8205378cef7c7e2cbaac58e1ef9d09beb2f8ba66600150d69f36f02dc2884e3afa9c6e27e3fe2a183d5284c61bbf7f4e57802629a24c9125313710b44
-
Filesize
692KB
MD55a8296d6088c00903861283d29f46939
SHA1eea6b9eaaf27e1815cdf7eabf4c9fe8e05c43d9c
SHA2569d93b2708e782687d1874e1fadb1850d7d1b148d560a3b26f19111b16142e354
SHA5127c2de6c8205378cef7c7e2cbaac58e1ef9d09beb2f8ba66600150d69f36f02dc2884e3afa9c6e27e3fe2a183d5284c61bbf7f4e57802629a24c9125313710b44
-
Filesize
479KB
MD5025cb38b9df5a2aad5c56de55d8d5e91
SHA13e208fb7cd6c718268a272e349daa206d7af8989
SHA256f1aff3dc1d39ee6806207754202fc9694115dcf9cd0a2423c8413195d9907804
SHA512f2b72666ac2d098c280a34238eb07d3dc363dcd12225ceddecb2a8626ae2e556883259c6623f92b9b613d16c764c38485155c846eabe48fd150a0e70e5dc944f
-
Filesize
479KB
MD5025cb38b9df5a2aad5c56de55d8d5e91
SHA13e208fb7cd6c718268a272e349daa206d7af8989
SHA256f1aff3dc1d39ee6806207754202fc9694115dcf9cd0a2423c8413195d9907804
SHA512f2b72666ac2d098c280a34238eb07d3dc363dcd12225ceddecb2a8626ae2e556883259c6623f92b9b613d16c764c38485155c846eabe48fd150a0e70e5dc944f
-
Filesize
286KB
MD53bc20804c204de39db5d595a78179022
SHA12646789852415e4b0b7a465d6b1e58dcda00088b
SHA256d9b1b69272b699c6bf2c5308fc8798abee4522033e24bc60b5f3cd8786fa826d
SHA512ca651d908bb064e605003419bc0d24279b451df0c190c559195601b7505961f8a7f671846495cb8ac6b915913a1b06a555a6062410845817de7fe219df1e6905
-
Filesize
286KB
MD53bc20804c204de39db5d595a78179022
SHA12646789852415e4b0b7a465d6b1e58dcda00088b
SHA256d9b1b69272b699c6bf2c5308fc8798abee4522033e24bc60b5f3cd8786fa826d
SHA512ca651d908bb064e605003419bc0d24279b451df0c190c559195601b7505961f8a7f671846495cb8ac6b915913a1b06a555a6062410845817de7fe219df1e6905
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
89KB
MD5c79b74d8fec5e7e2ba2f1789fd582a15
SHA178a1e5d99dbaccc5e07b125e1dfb280112cb3128
SHA256b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3
SHA5120debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba
-
Filesize
89KB
MD5c79b74d8fec5e7e2ba2f1789fd582a15
SHA178a1e5d99dbaccc5e07b125e1dfb280112cb3128
SHA256b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3
SHA5120debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba