Analysis
-
max time kernel
161s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 21:19
Static task
static1
Behavioral task
behavioral1
Sample
35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe
Resource
win10v2004-20230220-en
General
-
Target
35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe
-
Size
1.2MB
-
MD5
abf5cb16d786913afbbad2b42f758e50
-
SHA1
2fe9268bcb1df6e2d189cd3e4046584d08771698
-
SHA256
35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0
-
SHA512
b91c83f2ce99137c789ed851b273ae3d112b29f40907df7873201ef04248dc3d33b4f8eb36e61c0b5e91d2b3b4a7b71bffcb7c0470fa5d43e2b5a6fa6ee8bd6d
-
SSDEEP
24576:3ynd4zqpMoijd5092OJF3Efk6NzHLeMZVvFFMgvSK5RznpjikjC/enlL2:C2zq/46956fkezHqSV/526lL
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z11160280.exez37104015.exez71421568.exes89253813.exe1.exet01721911.exepid process 540 z11160280.exe 516 z37104015.exe 2016 z71421568.exe 1492 s89253813.exe 1500 1.exe 1908 t01721911.exe -
Loads dropped DLL 13 IoCs
Processes:
35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exez11160280.exez37104015.exez71421568.exes89253813.exe1.exet01721911.exepid process 1940 35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe 540 z11160280.exe 540 z11160280.exe 516 z37104015.exe 516 z37104015.exe 2016 z71421568.exe 2016 z71421568.exe 2016 z71421568.exe 1492 s89253813.exe 1492 s89253813.exe 1500 1.exe 2016 z71421568.exe 1908 t01721911.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z11160280.exez37104015.exez71421568.exe35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z11160280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z11160280.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z37104015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z37104015.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z71421568.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z71421568.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s89253813.exedescription pid process Token: SeDebugPrivilege 1492 s89253813.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exez11160280.exez37104015.exez71421568.exes89253813.exedescription pid process target process PID 1940 wrote to memory of 540 1940 35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe z11160280.exe PID 1940 wrote to memory of 540 1940 35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe z11160280.exe PID 1940 wrote to memory of 540 1940 35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe z11160280.exe PID 1940 wrote to memory of 540 1940 35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe z11160280.exe PID 1940 wrote to memory of 540 1940 35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe z11160280.exe PID 1940 wrote to memory of 540 1940 35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe z11160280.exe PID 1940 wrote to memory of 540 1940 35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe z11160280.exe PID 540 wrote to memory of 516 540 z11160280.exe z37104015.exe PID 540 wrote to memory of 516 540 z11160280.exe z37104015.exe PID 540 wrote to memory of 516 540 z11160280.exe z37104015.exe PID 540 wrote to memory of 516 540 z11160280.exe z37104015.exe PID 540 wrote to memory of 516 540 z11160280.exe z37104015.exe PID 540 wrote to memory of 516 540 z11160280.exe z37104015.exe PID 540 wrote to memory of 516 540 z11160280.exe z37104015.exe PID 516 wrote to memory of 2016 516 z37104015.exe z71421568.exe PID 516 wrote to memory of 2016 516 z37104015.exe z71421568.exe PID 516 wrote to memory of 2016 516 z37104015.exe z71421568.exe PID 516 wrote to memory of 2016 516 z37104015.exe z71421568.exe PID 516 wrote to memory of 2016 516 z37104015.exe z71421568.exe PID 516 wrote to memory of 2016 516 z37104015.exe z71421568.exe PID 516 wrote to memory of 2016 516 z37104015.exe z71421568.exe PID 2016 wrote to memory of 1492 2016 z71421568.exe s89253813.exe PID 2016 wrote to memory of 1492 2016 z71421568.exe s89253813.exe PID 2016 wrote to memory of 1492 2016 z71421568.exe s89253813.exe PID 2016 wrote to memory of 1492 2016 z71421568.exe s89253813.exe PID 2016 wrote to memory of 1492 2016 z71421568.exe s89253813.exe PID 2016 wrote to memory of 1492 2016 z71421568.exe s89253813.exe PID 2016 wrote to memory of 1492 2016 z71421568.exe s89253813.exe PID 1492 wrote to memory of 1500 1492 s89253813.exe 1.exe PID 1492 wrote to memory of 1500 1492 s89253813.exe 1.exe PID 1492 wrote to memory of 1500 1492 s89253813.exe 1.exe PID 1492 wrote to memory of 1500 1492 s89253813.exe 1.exe PID 1492 wrote to memory of 1500 1492 s89253813.exe 1.exe PID 1492 wrote to memory of 1500 1492 s89253813.exe 1.exe PID 1492 wrote to memory of 1500 1492 s89253813.exe 1.exe PID 2016 wrote to memory of 1908 2016 z71421568.exe t01721911.exe PID 2016 wrote to memory of 1908 2016 z71421568.exe t01721911.exe PID 2016 wrote to memory of 1908 2016 z71421568.exe t01721911.exe PID 2016 wrote to memory of 1908 2016 z71421568.exe t01721911.exe PID 2016 wrote to memory of 1908 2016 z71421568.exe t01721911.exe PID 2016 wrote to memory of 1908 2016 z71421568.exe t01721911.exe PID 2016 wrote to memory of 1908 2016 z71421568.exe t01721911.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe"C:\Users\Admin\AppData\Local\Temp\35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z11160280.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z11160280.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z37104015.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z37104015.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z71421568.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z71421568.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s89253813.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s89253813.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1500
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t01721911.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t01721911.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1908
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5798392d0fc02a28f797ed102c6a1658e
SHA11d83695c149104b0c4a730efcae51bdbbf87a56a
SHA256740d920cdf3d39e27e31cf93ae4ae23ce8f8c0136b903c07fedb8bd7608e0398
SHA512e988e24753b6bb3ccd70c8f4195ed359b431544171bbe19e544e66fae9d3cbad0ad59038f4fd99e4e4d88c2279a0149e83846561f3d097feddf9d8951dbeb21f
-
Filesize
1.0MB
MD5798392d0fc02a28f797ed102c6a1658e
SHA11d83695c149104b0c4a730efcae51bdbbf87a56a
SHA256740d920cdf3d39e27e31cf93ae4ae23ce8f8c0136b903c07fedb8bd7608e0398
SHA512e988e24753b6bb3ccd70c8f4195ed359b431544171bbe19e544e66fae9d3cbad0ad59038f4fd99e4e4d88c2279a0149e83846561f3d097feddf9d8951dbeb21f
-
Filesize
761KB
MD570d1cc95441ea4fcf88bafc72f97e5da
SHA117c39529f4a8d19f6144e962b386e61b125b01f1
SHA2569de37aa8950a31ca6ffe09ac018dacb97f7b7d32fb841bc61e18010e5a81918c
SHA512e9bd4f062a40349524ca9733034ee91af20f8c840e3d0e010b1595d693796088ec9d26ec4b1135b05a60384e8ec87bb2749fe6beea978af459f554debad5fa3e
-
Filesize
761KB
MD570d1cc95441ea4fcf88bafc72f97e5da
SHA117c39529f4a8d19f6144e962b386e61b125b01f1
SHA2569de37aa8950a31ca6ffe09ac018dacb97f7b7d32fb841bc61e18010e5a81918c
SHA512e9bd4f062a40349524ca9733034ee91af20f8c840e3d0e010b1595d693796088ec9d26ec4b1135b05a60384e8ec87bb2749fe6beea978af459f554debad5fa3e
-
Filesize
578KB
MD56e72117a239c33ed47fc7667dd7ea12a
SHA1f2ac77e04833f6ce2b90c0328779fc31086c8194
SHA256c2c318482ca0e76afe2ab5275e2b594228bd3d3c1924651f68f46c1b3338ae9b
SHA5129080f0c9455b3c134881afec1122fa0529fce0124398233838e60705ce1676fda679a2714a3f543e9fa208733984d1c1a768be6a6c1eac2901a21ffefb42b10d
-
Filesize
578KB
MD56e72117a239c33ed47fc7667dd7ea12a
SHA1f2ac77e04833f6ce2b90c0328779fc31086c8194
SHA256c2c318482ca0e76afe2ab5275e2b594228bd3d3c1924651f68f46c1b3338ae9b
SHA5129080f0c9455b3c134881afec1122fa0529fce0124398233838e60705ce1676fda679a2714a3f543e9fa208733984d1c1a768be6a6c1eac2901a21ffefb42b10d
-
Filesize
575KB
MD588d69bd797522173cd58442e31ce9205
SHA195ba323ce4ce4467fe334397b22b12322f008ef6
SHA2561c73dd38d328d66812f0256512ca1e2cc801187d306b04f357c7ea4e4d761a66
SHA512fc49a2d5dd70ef82b2817e1af02058ed954d367b9501365a2fd65db313f8bbede724f1e4c0af48c0aac4b59573884c6a1eabffc20728f2599c56273f16e5038d
-
Filesize
575KB
MD588d69bd797522173cd58442e31ce9205
SHA195ba323ce4ce4467fe334397b22b12322f008ef6
SHA2561c73dd38d328d66812f0256512ca1e2cc801187d306b04f357c7ea4e4d761a66
SHA512fc49a2d5dd70ef82b2817e1af02058ed954d367b9501365a2fd65db313f8bbede724f1e4c0af48c0aac4b59573884c6a1eabffc20728f2599c56273f16e5038d
-
Filesize
575KB
MD588d69bd797522173cd58442e31ce9205
SHA195ba323ce4ce4467fe334397b22b12322f008ef6
SHA2561c73dd38d328d66812f0256512ca1e2cc801187d306b04f357c7ea4e4d761a66
SHA512fc49a2d5dd70ef82b2817e1af02058ed954d367b9501365a2fd65db313f8bbede724f1e4c0af48c0aac4b59573884c6a1eabffc20728f2599c56273f16e5038d
-
Filesize
169KB
MD503a42a3f0507cd841e8f015cac8be9b5
SHA13dff275e93ced5521d4f91a716f4af5bc6751b83
SHA2567d454ffabe86f8a099f4684baa2c7558513b40a6f818912ea375f9c4c54220e2
SHA512362a1718760c4a05635d86430ff0483ff58493a75fa23f892923bebb39923a1d92218c50200a29a41ce6ddd2ff5b28411d3d5255dfac204990becb83ad20564e
-
Filesize
169KB
MD503a42a3f0507cd841e8f015cac8be9b5
SHA13dff275e93ced5521d4f91a716f4af5bc6751b83
SHA2567d454ffabe86f8a099f4684baa2c7558513b40a6f818912ea375f9c4c54220e2
SHA512362a1718760c4a05635d86430ff0483ff58493a75fa23f892923bebb39923a1d92218c50200a29a41ce6ddd2ff5b28411d3d5255dfac204990becb83ad20564e
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD5798392d0fc02a28f797ed102c6a1658e
SHA11d83695c149104b0c4a730efcae51bdbbf87a56a
SHA256740d920cdf3d39e27e31cf93ae4ae23ce8f8c0136b903c07fedb8bd7608e0398
SHA512e988e24753b6bb3ccd70c8f4195ed359b431544171bbe19e544e66fae9d3cbad0ad59038f4fd99e4e4d88c2279a0149e83846561f3d097feddf9d8951dbeb21f
-
Filesize
1.0MB
MD5798392d0fc02a28f797ed102c6a1658e
SHA11d83695c149104b0c4a730efcae51bdbbf87a56a
SHA256740d920cdf3d39e27e31cf93ae4ae23ce8f8c0136b903c07fedb8bd7608e0398
SHA512e988e24753b6bb3ccd70c8f4195ed359b431544171bbe19e544e66fae9d3cbad0ad59038f4fd99e4e4d88c2279a0149e83846561f3d097feddf9d8951dbeb21f
-
Filesize
761KB
MD570d1cc95441ea4fcf88bafc72f97e5da
SHA117c39529f4a8d19f6144e962b386e61b125b01f1
SHA2569de37aa8950a31ca6ffe09ac018dacb97f7b7d32fb841bc61e18010e5a81918c
SHA512e9bd4f062a40349524ca9733034ee91af20f8c840e3d0e010b1595d693796088ec9d26ec4b1135b05a60384e8ec87bb2749fe6beea978af459f554debad5fa3e
-
Filesize
761KB
MD570d1cc95441ea4fcf88bafc72f97e5da
SHA117c39529f4a8d19f6144e962b386e61b125b01f1
SHA2569de37aa8950a31ca6ffe09ac018dacb97f7b7d32fb841bc61e18010e5a81918c
SHA512e9bd4f062a40349524ca9733034ee91af20f8c840e3d0e010b1595d693796088ec9d26ec4b1135b05a60384e8ec87bb2749fe6beea978af459f554debad5fa3e
-
Filesize
578KB
MD56e72117a239c33ed47fc7667dd7ea12a
SHA1f2ac77e04833f6ce2b90c0328779fc31086c8194
SHA256c2c318482ca0e76afe2ab5275e2b594228bd3d3c1924651f68f46c1b3338ae9b
SHA5129080f0c9455b3c134881afec1122fa0529fce0124398233838e60705ce1676fda679a2714a3f543e9fa208733984d1c1a768be6a6c1eac2901a21ffefb42b10d
-
Filesize
578KB
MD56e72117a239c33ed47fc7667dd7ea12a
SHA1f2ac77e04833f6ce2b90c0328779fc31086c8194
SHA256c2c318482ca0e76afe2ab5275e2b594228bd3d3c1924651f68f46c1b3338ae9b
SHA5129080f0c9455b3c134881afec1122fa0529fce0124398233838e60705ce1676fda679a2714a3f543e9fa208733984d1c1a768be6a6c1eac2901a21ffefb42b10d
-
Filesize
575KB
MD588d69bd797522173cd58442e31ce9205
SHA195ba323ce4ce4467fe334397b22b12322f008ef6
SHA2561c73dd38d328d66812f0256512ca1e2cc801187d306b04f357c7ea4e4d761a66
SHA512fc49a2d5dd70ef82b2817e1af02058ed954d367b9501365a2fd65db313f8bbede724f1e4c0af48c0aac4b59573884c6a1eabffc20728f2599c56273f16e5038d
-
Filesize
575KB
MD588d69bd797522173cd58442e31ce9205
SHA195ba323ce4ce4467fe334397b22b12322f008ef6
SHA2561c73dd38d328d66812f0256512ca1e2cc801187d306b04f357c7ea4e4d761a66
SHA512fc49a2d5dd70ef82b2817e1af02058ed954d367b9501365a2fd65db313f8bbede724f1e4c0af48c0aac4b59573884c6a1eabffc20728f2599c56273f16e5038d
-
Filesize
575KB
MD588d69bd797522173cd58442e31ce9205
SHA195ba323ce4ce4467fe334397b22b12322f008ef6
SHA2561c73dd38d328d66812f0256512ca1e2cc801187d306b04f357c7ea4e4d761a66
SHA512fc49a2d5dd70ef82b2817e1af02058ed954d367b9501365a2fd65db313f8bbede724f1e4c0af48c0aac4b59573884c6a1eabffc20728f2599c56273f16e5038d
-
Filesize
169KB
MD503a42a3f0507cd841e8f015cac8be9b5
SHA13dff275e93ced5521d4f91a716f4af5bc6751b83
SHA2567d454ffabe86f8a099f4684baa2c7558513b40a6f818912ea375f9c4c54220e2
SHA512362a1718760c4a05635d86430ff0483ff58493a75fa23f892923bebb39923a1d92218c50200a29a41ce6ddd2ff5b28411d3d5255dfac204990becb83ad20564e
-
Filesize
169KB
MD503a42a3f0507cd841e8f015cac8be9b5
SHA13dff275e93ced5521d4f91a716f4af5bc6751b83
SHA2567d454ffabe86f8a099f4684baa2c7558513b40a6f818912ea375f9c4c54220e2
SHA512362a1718760c4a05635d86430ff0483ff58493a75fa23f892923bebb39923a1d92218c50200a29a41ce6ddd2ff5b28411d3d5255dfac204990becb83ad20564e
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf