Analysis
-
max time kernel
154s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
5933be31c0d00548526ba3abe74f75b00618177de5ff9d98c956461e0d471ac7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5933be31c0d00548526ba3abe74f75b00618177de5ff9d98c956461e0d471ac7.exe
Resource
win10v2004-20230220-en
General
-
Target
5933be31c0d00548526ba3abe74f75b00618177de5ff9d98c956461e0d471ac7.exe
-
Size
943KB
-
MD5
d39d202e1f4848759808f99c29785805
-
SHA1
1fc1d83b66dc659ccc05a42ed9128e2f85b5c9f1
-
SHA256
5933be31c0d00548526ba3abe74f75b00618177de5ff9d98c956461e0d471ac7
-
SHA512
6711e9b0816f7592b7e47869b7c38ae17603b2e787a54675b8e3f8182a512d61004108e846a93847d38c745884831d7af27962d3c3a0efb737f79213ba2b3376
-
SSDEEP
24576:1ySEL1mkK1BhSC16ztsQzg7hBCKD2O85gj1cvO:QLIkKTf1cWQsEKyQjC
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/376-1045-0x0000000009C50000-0x000000000A268000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 29189269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" w34tu17.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 29189269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 29189269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 29189269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" w34tu17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" w34tu17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" w34tu17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" w34tu17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 29189269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 29189269.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation xqiFx93.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 1636 za007482.exe 1884 za138758.exe 3228 29189269.exe 3916 w34tu17.exe 3768 xqiFx93.exe 792 oneetx.exe 376 ys238192.exe 2492 oneetx.exe 1728 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4112 rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 29189269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 29189269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" w34tu17.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" za138758.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5933be31c0d00548526ba3abe74f75b00618177de5ff9d98c956461e0d471ac7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5933be31c0d00548526ba3abe74f75b00618177de5ff9d98c956461e0d471ac7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za007482.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za007482.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za138758.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3452 3916 WerFault.exe 86 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3228 29189269.exe 3228 29189269.exe 3916 w34tu17.exe 3916 w34tu17.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3228 29189269.exe Token: SeDebugPrivilege 3916 w34tu17.exe Token: SeDebugPrivilege 376 ys238192.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3768 xqiFx93.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4344 wrote to memory of 1636 4344 5933be31c0d00548526ba3abe74f75b00618177de5ff9d98c956461e0d471ac7.exe 83 PID 4344 wrote to memory of 1636 4344 5933be31c0d00548526ba3abe74f75b00618177de5ff9d98c956461e0d471ac7.exe 83 PID 4344 wrote to memory of 1636 4344 5933be31c0d00548526ba3abe74f75b00618177de5ff9d98c956461e0d471ac7.exe 83 PID 1636 wrote to memory of 1884 1636 za007482.exe 84 PID 1636 wrote to memory of 1884 1636 za007482.exe 84 PID 1636 wrote to memory of 1884 1636 za007482.exe 84 PID 1884 wrote to memory of 3228 1884 za138758.exe 85 PID 1884 wrote to memory of 3228 1884 za138758.exe 85 PID 1884 wrote to memory of 3228 1884 za138758.exe 85 PID 1884 wrote to memory of 3916 1884 za138758.exe 86 PID 1884 wrote to memory of 3916 1884 za138758.exe 86 PID 1884 wrote to memory of 3916 1884 za138758.exe 86 PID 1636 wrote to memory of 3768 1636 za007482.exe 90 PID 1636 wrote to memory of 3768 1636 za007482.exe 90 PID 1636 wrote to memory of 3768 1636 za007482.exe 90 PID 3768 wrote to memory of 792 3768 xqiFx93.exe 91 PID 3768 wrote to memory of 792 3768 xqiFx93.exe 91 PID 3768 wrote to memory of 792 3768 xqiFx93.exe 91 PID 4344 wrote to memory of 376 4344 5933be31c0d00548526ba3abe74f75b00618177de5ff9d98c956461e0d471ac7.exe 92 PID 4344 wrote to memory of 376 4344 5933be31c0d00548526ba3abe74f75b00618177de5ff9d98c956461e0d471ac7.exe 92 PID 4344 wrote to memory of 376 4344 5933be31c0d00548526ba3abe74f75b00618177de5ff9d98c956461e0d471ac7.exe 92 PID 792 wrote to memory of 760 792 oneetx.exe 93 PID 792 wrote to memory of 760 792 oneetx.exe 93 PID 792 wrote to memory of 760 792 oneetx.exe 93 PID 792 wrote to memory of 4112 792 oneetx.exe 96 PID 792 wrote to memory of 4112 792 oneetx.exe 96 PID 792 wrote to memory of 4112 792 oneetx.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\5933be31c0d00548526ba3abe74f75b00618177de5ff9d98c956461e0d471ac7.exe"C:\Users\Admin\AppData\Local\Temp\5933be31c0d00548526ba3abe74f75b00618177de5ff9d98c956461e0d471ac7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za007482.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za007482.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za138758.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za138758.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\29189269.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\29189269.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w34tu17.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w34tu17.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 10845⤵
- Program crash
PID:3452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xqiFx93.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xqiFx93.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F5⤵
- Creates scheduled task(s)
PID:760
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4112
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys238192.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys238192.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3916 -ip 39161⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:2492
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:1728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
347KB
MD58f5bf41f9c19eeacf3db87eb3289e863
SHA1e4a084c5b441830d340586adf7467130bb0cdfa9
SHA256d7fee12b8639d46c1706add26ef397d6e79bb023b6876816311ab15510b7fbe9
SHA51252f7270fd1a46d0fcaf1723ead94800db3d262921761333bf3e3d03e1061b975b39e3e12a96f021861ba62a533796b7b9922b8edef7159514468604359b81401
-
Filesize
347KB
MD58f5bf41f9c19eeacf3db87eb3289e863
SHA1e4a084c5b441830d340586adf7467130bb0cdfa9
SHA256d7fee12b8639d46c1706add26ef397d6e79bb023b6876816311ab15510b7fbe9
SHA51252f7270fd1a46d0fcaf1723ead94800db3d262921761333bf3e3d03e1061b975b39e3e12a96f021861ba62a533796b7b9922b8edef7159514468604359b81401
-
Filesize
589KB
MD53576696025a605fd3070fff6e9a65430
SHA19c3659d4429fb8b056bbb9ef815baf8f4dd3add4
SHA25634f677ca331a1a987bcc43817cc0782cee3326f36d55d64c35e4943f07de8cf2
SHA512a9bc04cd0f92ea8ab8575ed0a6c8e8e999a31a3e05523a38b342c889cf3162197834b8777d691b6600bb4a2746cdcfd7dbc0c42535ff059f309252ca96706493
-
Filesize
589KB
MD53576696025a605fd3070fff6e9a65430
SHA19c3659d4429fb8b056bbb9ef815baf8f4dd3add4
SHA25634f677ca331a1a987bcc43817cc0782cee3326f36d55d64c35e4943f07de8cf2
SHA512a9bc04cd0f92ea8ab8575ed0a6c8e8e999a31a3e05523a38b342c889cf3162197834b8777d691b6600bb4a2746cdcfd7dbc0c42535ff059f309252ca96706493
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
229KB
MD53308051ded87b1863a8d92925202c4b3
SHA17834ddc23e7976b07118fb580ae38234466dbdfb
SHA25613b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4
SHA512f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc
-
Filesize
407KB
MD5cc13d16abeae039a48ac3117907ebfa6
SHA13fa91798729f51fbfe9e27f752ce68e0b18dff77
SHA256d05548ab38f19cb658a4b004262ffe9f88ae5e2dd72944a43ffdf8f85a876893
SHA5126b5c31450777b67fbd2ed8c80a93c07d366408c621f57c947bd96815ea56a1609a931e2425cc4b3b8e3f803dbaeba572e06a3b5770b4c25019c233096bf9bb35
-
Filesize
407KB
MD5cc13d16abeae039a48ac3117907ebfa6
SHA13fa91798729f51fbfe9e27f752ce68e0b18dff77
SHA256d05548ab38f19cb658a4b004262ffe9f88ae5e2dd72944a43ffdf8f85a876893
SHA5126b5c31450777b67fbd2ed8c80a93c07d366408c621f57c947bd96815ea56a1609a931e2425cc4b3b8e3f803dbaeba572e06a3b5770b4c25019c233096bf9bb35
-
Filesize
176KB
MD52b71f4b18ac8214a2bff547b6ce2f64f
SHA1b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5
SHA256f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc
SHA51233518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177
-
Filesize
176KB
MD52b71f4b18ac8214a2bff547b6ce2f64f
SHA1b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5
SHA256f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc
SHA51233518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177
-
Filesize
265KB
MD50356e9fc3e84d3783b677a695271640e
SHA1c61d2abdef324a6ab4e6ce47e53984283e5fd504
SHA256d77eb00bbdf4d9639eded89b33a82c68017b039f4d7198c1997a147782064d16
SHA512358072a2df0e07ed1dfc3c7a828ab317069f40cf7d416e9a26d18c9daa71d9d6f2ae1276c972208ff36fe43c9fc7257b37e6e1925b9b136536ae480ed564830d
-
Filesize
265KB
MD50356e9fc3e84d3783b677a695271640e
SHA1c61d2abdef324a6ab4e6ce47e53984283e5fd504
SHA256d77eb00bbdf4d9639eded89b33a82c68017b039f4d7198c1997a147782064d16
SHA512358072a2df0e07ed1dfc3c7a828ab317069f40cf7d416e9a26d18c9daa71d9d6f2ae1276c972208ff36fe43c9fc7257b37e6e1925b9b136536ae480ed564830d
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5