Analysis
-
max time kernel
129s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 20:21
Static task
static1
Behavioral task
behavioral1
Sample
083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exe
Resource
win10v2004-20230220-en
General
-
Target
083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exe
-
Size
1.2MB
-
MD5
e7d8f19931cc2564db61b7951ec1cde9
-
SHA1
fcd48509298f10e0cd448f6671b12f27f4373b28
-
SHA256
083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1
-
SHA512
f4c2b61d66190901caf26f5381f60e68a773469305c2c73ae7c6a1e6d6c2b9909264e28110a3ee716b299d1a73ad16144b280b19720dd37cc64e415768b3a16c
-
SSDEEP
24576:uyKqo4/Jn9nPSIW+wfcnS0UZnBILXyqRN9LifWQS8rxpgCF8x5xwsImG/Z2A:9z1Sd+HnDaBwXNve8c8DesImGZ2
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z00933170.exez48428592.exez50484218.exes65870308.exe1.exet40571111.exepid process 1352 z00933170.exe 972 z48428592.exe 1048 z50484218.exe 1756 s65870308.exe 560 1.exe 588 t40571111.exe -
Loads dropped DLL 13 IoCs
Processes:
083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exez00933170.exez48428592.exez50484218.exes65870308.exe1.exet40571111.exepid process 1760 083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exe 1352 z00933170.exe 1352 z00933170.exe 972 z48428592.exe 972 z48428592.exe 1048 z50484218.exe 1048 z50484218.exe 1048 z50484218.exe 1756 s65870308.exe 1756 s65870308.exe 560 1.exe 1048 z50484218.exe 588 t40571111.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exez00933170.exez48428592.exez50484218.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z00933170.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z00933170.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z48428592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z48428592.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z50484218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z50484218.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s65870308.exedescription pid process Token: SeDebugPrivilege 1756 s65870308.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exez00933170.exez48428592.exez50484218.exes65870308.exedescription pid process target process PID 1760 wrote to memory of 1352 1760 083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exe z00933170.exe PID 1760 wrote to memory of 1352 1760 083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exe z00933170.exe PID 1760 wrote to memory of 1352 1760 083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exe z00933170.exe PID 1760 wrote to memory of 1352 1760 083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exe z00933170.exe PID 1760 wrote to memory of 1352 1760 083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exe z00933170.exe PID 1760 wrote to memory of 1352 1760 083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exe z00933170.exe PID 1760 wrote to memory of 1352 1760 083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exe z00933170.exe PID 1352 wrote to memory of 972 1352 z00933170.exe z48428592.exe PID 1352 wrote to memory of 972 1352 z00933170.exe z48428592.exe PID 1352 wrote to memory of 972 1352 z00933170.exe z48428592.exe PID 1352 wrote to memory of 972 1352 z00933170.exe z48428592.exe PID 1352 wrote to memory of 972 1352 z00933170.exe z48428592.exe PID 1352 wrote to memory of 972 1352 z00933170.exe z48428592.exe PID 1352 wrote to memory of 972 1352 z00933170.exe z48428592.exe PID 972 wrote to memory of 1048 972 z48428592.exe z50484218.exe PID 972 wrote to memory of 1048 972 z48428592.exe z50484218.exe PID 972 wrote to memory of 1048 972 z48428592.exe z50484218.exe PID 972 wrote to memory of 1048 972 z48428592.exe z50484218.exe PID 972 wrote to memory of 1048 972 z48428592.exe z50484218.exe PID 972 wrote to memory of 1048 972 z48428592.exe z50484218.exe PID 972 wrote to memory of 1048 972 z48428592.exe z50484218.exe PID 1048 wrote to memory of 1756 1048 z50484218.exe s65870308.exe PID 1048 wrote to memory of 1756 1048 z50484218.exe s65870308.exe PID 1048 wrote to memory of 1756 1048 z50484218.exe s65870308.exe PID 1048 wrote to memory of 1756 1048 z50484218.exe s65870308.exe PID 1048 wrote to memory of 1756 1048 z50484218.exe s65870308.exe PID 1048 wrote to memory of 1756 1048 z50484218.exe s65870308.exe PID 1048 wrote to memory of 1756 1048 z50484218.exe s65870308.exe PID 1756 wrote to memory of 560 1756 s65870308.exe 1.exe PID 1756 wrote to memory of 560 1756 s65870308.exe 1.exe PID 1756 wrote to memory of 560 1756 s65870308.exe 1.exe PID 1756 wrote to memory of 560 1756 s65870308.exe 1.exe PID 1756 wrote to memory of 560 1756 s65870308.exe 1.exe PID 1756 wrote to memory of 560 1756 s65870308.exe 1.exe PID 1756 wrote to memory of 560 1756 s65870308.exe 1.exe PID 1048 wrote to memory of 588 1048 z50484218.exe t40571111.exe PID 1048 wrote to memory of 588 1048 z50484218.exe t40571111.exe PID 1048 wrote to memory of 588 1048 z50484218.exe t40571111.exe PID 1048 wrote to memory of 588 1048 z50484218.exe t40571111.exe PID 1048 wrote to memory of 588 1048 z50484218.exe t40571111.exe PID 1048 wrote to memory of 588 1048 z50484218.exe t40571111.exe PID 1048 wrote to memory of 588 1048 z50484218.exe t40571111.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exe"C:\Users\Admin\AppData\Local\Temp\083f5a7c7d43231a95ceac1a50fe9af1422a8c2327031b79718d3b5ff1617ee1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z00933170.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z00933170.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z48428592.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z48428592.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z50484218.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z50484218.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s65870308.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s65870308.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:560
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t40571111.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t40571111.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:588
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD53b4def32ee6b676094f0223832505f20
SHA1cc87b5bd35a8190238652b093f41984b9eeee896
SHA2561c201681c9d41c412af6153f4023803c91c1d80578520b339ebe018ab7fac549
SHA51297fad4c134de1d00178967edfae20c64b545e3e3c0d0daca2ec005434f8afac3a75cf9d448e65ee961261c5bbb8d5221c2ee83b853ef2d18cdfc5d895f493fef
-
Filesize
1.0MB
MD53b4def32ee6b676094f0223832505f20
SHA1cc87b5bd35a8190238652b093f41984b9eeee896
SHA2561c201681c9d41c412af6153f4023803c91c1d80578520b339ebe018ab7fac549
SHA51297fad4c134de1d00178967edfae20c64b545e3e3c0d0daca2ec005434f8afac3a75cf9d448e65ee961261c5bbb8d5221c2ee83b853ef2d18cdfc5d895f493fef
-
Filesize
765KB
MD57959d8e1f436a4f29e2a6c5ab54ed654
SHA12b7432412f4474777d61e5b60f777e061afe5a2f
SHA256f6122c92d535980de2ae8e7a3a877750d86fcaa5c8bbf64cf3ecf7e04e34f686
SHA512136c2f456e64b15eb56199fd1e05945a9361e068f458be242084f8def3ca64adf8ed9bf5368562d88fac6742fab92c79812606225a4530c32be82547a8b9a4fa
-
Filesize
765KB
MD57959d8e1f436a4f29e2a6c5ab54ed654
SHA12b7432412f4474777d61e5b60f777e061afe5a2f
SHA256f6122c92d535980de2ae8e7a3a877750d86fcaa5c8bbf64cf3ecf7e04e34f686
SHA512136c2f456e64b15eb56199fd1e05945a9361e068f458be242084f8def3ca64adf8ed9bf5368562d88fac6742fab92c79812606225a4530c32be82547a8b9a4fa
-
Filesize
581KB
MD5ddad1beae5cec8e913b116ccdb3f4ebf
SHA117b89c608a139089e20fdbf52efef4a2e656ac32
SHA256d5536e6eeae9bcd3e15180109f26b2aac8e69ca9f4ec59657c38115116d273de
SHA5127664aef1b19ff7d24054adc386e9e14eaa1db47359fb561b95f6453f447e901cf4d54fa86344d3eb5b9d2b6fecea5785ce42f77ad9000063eabd5cdf8fca7d0a
-
Filesize
581KB
MD5ddad1beae5cec8e913b116ccdb3f4ebf
SHA117b89c608a139089e20fdbf52efef4a2e656ac32
SHA256d5536e6eeae9bcd3e15180109f26b2aac8e69ca9f4ec59657c38115116d273de
SHA5127664aef1b19ff7d24054adc386e9e14eaa1db47359fb561b95f6453f447e901cf4d54fa86344d3eb5b9d2b6fecea5785ce42f77ad9000063eabd5cdf8fca7d0a
-
Filesize
582KB
MD5706024f2f23b00fd4ab7975de5a4753e
SHA106a5941f69e9cbe722dab41afff5ed1bca7a36cd
SHA2566f1aadc5da5464c0931369c667a3084e56dc4d39d6d94fbb7c8be8fe895c9e55
SHA512c7d57df16de47a51eb621502308058dd7c4606cc7b021ca83436e79b0cf2a2a72390ea393590b4fa6e7b3eca94f7bec61d35f9b39ffe67c018c3bf7b6d53a578
-
Filesize
582KB
MD5706024f2f23b00fd4ab7975de5a4753e
SHA106a5941f69e9cbe722dab41afff5ed1bca7a36cd
SHA2566f1aadc5da5464c0931369c667a3084e56dc4d39d6d94fbb7c8be8fe895c9e55
SHA512c7d57df16de47a51eb621502308058dd7c4606cc7b021ca83436e79b0cf2a2a72390ea393590b4fa6e7b3eca94f7bec61d35f9b39ffe67c018c3bf7b6d53a578
-
Filesize
582KB
MD5706024f2f23b00fd4ab7975de5a4753e
SHA106a5941f69e9cbe722dab41afff5ed1bca7a36cd
SHA2566f1aadc5da5464c0931369c667a3084e56dc4d39d6d94fbb7c8be8fe895c9e55
SHA512c7d57df16de47a51eb621502308058dd7c4606cc7b021ca83436e79b0cf2a2a72390ea393590b4fa6e7b3eca94f7bec61d35f9b39ffe67c018c3bf7b6d53a578
-
Filesize
169KB
MD542748d8a71c8dabd66891079b221e4e1
SHA1558f21d9ef6046d3f927a4a9785c71f8e493841d
SHA256634b323447ee5b1b7e13f3e67c2641d84057e972301356381ace73e87b9605e9
SHA512c40698b9d4db765d0451e8b34307c4c19cd191feec9a1f59f4e11530870dea36fbbb9950c3612c864ce0400170fd4e2551609c1db21f9fbec493ef31c64696b5
-
Filesize
169KB
MD542748d8a71c8dabd66891079b221e4e1
SHA1558f21d9ef6046d3f927a4a9785c71f8e493841d
SHA256634b323447ee5b1b7e13f3e67c2641d84057e972301356381ace73e87b9605e9
SHA512c40698b9d4db765d0451e8b34307c4c19cd191feec9a1f59f4e11530870dea36fbbb9950c3612c864ce0400170fd4e2551609c1db21f9fbec493ef31c64696b5
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD53b4def32ee6b676094f0223832505f20
SHA1cc87b5bd35a8190238652b093f41984b9eeee896
SHA2561c201681c9d41c412af6153f4023803c91c1d80578520b339ebe018ab7fac549
SHA51297fad4c134de1d00178967edfae20c64b545e3e3c0d0daca2ec005434f8afac3a75cf9d448e65ee961261c5bbb8d5221c2ee83b853ef2d18cdfc5d895f493fef
-
Filesize
1.0MB
MD53b4def32ee6b676094f0223832505f20
SHA1cc87b5bd35a8190238652b093f41984b9eeee896
SHA2561c201681c9d41c412af6153f4023803c91c1d80578520b339ebe018ab7fac549
SHA51297fad4c134de1d00178967edfae20c64b545e3e3c0d0daca2ec005434f8afac3a75cf9d448e65ee961261c5bbb8d5221c2ee83b853ef2d18cdfc5d895f493fef
-
Filesize
765KB
MD57959d8e1f436a4f29e2a6c5ab54ed654
SHA12b7432412f4474777d61e5b60f777e061afe5a2f
SHA256f6122c92d535980de2ae8e7a3a877750d86fcaa5c8bbf64cf3ecf7e04e34f686
SHA512136c2f456e64b15eb56199fd1e05945a9361e068f458be242084f8def3ca64adf8ed9bf5368562d88fac6742fab92c79812606225a4530c32be82547a8b9a4fa
-
Filesize
765KB
MD57959d8e1f436a4f29e2a6c5ab54ed654
SHA12b7432412f4474777d61e5b60f777e061afe5a2f
SHA256f6122c92d535980de2ae8e7a3a877750d86fcaa5c8bbf64cf3ecf7e04e34f686
SHA512136c2f456e64b15eb56199fd1e05945a9361e068f458be242084f8def3ca64adf8ed9bf5368562d88fac6742fab92c79812606225a4530c32be82547a8b9a4fa
-
Filesize
581KB
MD5ddad1beae5cec8e913b116ccdb3f4ebf
SHA117b89c608a139089e20fdbf52efef4a2e656ac32
SHA256d5536e6eeae9bcd3e15180109f26b2aac8e69ca9f4ec59657c38115116d273de
SHA5127664aef1b19ff7d24054adc386e9e14eaa1db47359fb561b95f6453f447e901cf4d54fa86344d3eb5b9d2b6fecea5785ce42f77ad9000063eabd5cdf8fca7d0a
-
Filesize
581KB
MD5ddad1beae5cec8e913b116ccdb3f4ebf
SHA117b89c608a139089e20fdbf52efef4a2e656ac32
SHA256d5536e6eeae9bcd3e15180109f26b2aac8e69ca9f4ec59657c38115116d273de
SHA5127664aef1b19ff7d24054adc386e9e14eaa1db47359fb561b95f6453f447e901cf4d54fa86344d3eb5b9d2b6fecea5785ce42f77ad9000063eabd5cdf8fca7d0a
-
Filesize
582KB
MD5706024f2f23b00fd4ab7975de5a4753e
SHA106a5941f69e9cbe722dab41afff5ed1bca7a36cd
SHA2566f1aadc5da5464c0931369c667a3084e56dc4d39d6d94fbb7c8be8fe895c9e55
SHA512c7d57df16de47a51eb621502308058dd7c4606cc7b021ca83436e79b0cf2a2a72390ea393590b4fa6e7b3eca94f7bec61d35f9b39ffe67c018c3bf7b6d53a578
-
Filesize
582KB
MD5706024f2f23b00fd4ab7975de5a4753e
SHA106a5941f69e9cbe722dab41afff5ed1bca7a36cd
SHA2566f1aadc5da5464c0931369c667a3084e56dc4d39d6d94fbb7c8be8fe895c9e55
SHA512c7d57df16de47a51eb621502308058dd7c4606cc7b021ca83436e79b0cf2a2a72390ea393590b4fa6e7b3eca94f7bec61d35f9b39ffe67c018c3bf7b6d53a578
-
Filesize
582KB
MD5706024f2f23b00fd4ab7975de5a4753e
SHA106a5941f69e9cbe722dab41afff5ed1bca7a36cd
SHA2566f1aadc5da5464c0931369c667a3084e56dc4d39d6d94fbb7c8be8fe895c9e55
SHA512c7d57df16de47a51eb621502308058dd7c4606cc7b021ca83436e79b0cf2a2a72390ea393590b4fa6e7b3eca94f7bec61d35f9b39ffe67c018c3bf7b6d53a578
-
Filesize
169KB
MD542748d8a71c8dabd66891079b221e4e1
SHA1558f21d9ef6046d3f927a4a9785c71f8e493841d
SHA256634b323447ee5b1b7e13f3e67c2641d84057e972301356381ace73e87b9605e9
SHA512c40698b9d4db765d0451e8b34307c4c19cd191feec9a1f59f4e11530870dea36fbbb9950c3612c864ce0400170fd4e2551609c1db21f9fbec493ef31c64696b5
-
Filesize
169KB
MD542748d8a71c8dabd66891079b221e4e1
SHA1558f21d9ef6046d3f927a4a9785c71f8e493841d
SHA256634b323447ee5b1b7e13f3e67c2641d84057e972301356381ace73e87b9605e9
SHA512c40698b9d4db765d0451e8b34307c4c19cd191feec9a1f59f4e11530870dea36fbbb9950c3612c864ce0400170fd4e2551609c1db21f9fbec493ef31c64696b5
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf