Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 11:55
Static task
static1
Behavioral task
behavioral1
Sample
c667040b052c17f9c6df87ac332643442aa2bbf4b74e64e7d01284e63755c7c2.exe
Resource
win10v2004-20230703-en
General
-
Target
c667040b052c17f9c6df87ac332643442aa2bbf4b74e64e7d01284e63755c7c2.exe
-
Size
731KB
-
MD5
893c60483cc214d2c8efc9017a533abb
-
SHA1
9fb0044229867dc46776c662ebb82106d4a9b955
-
SHA256
c667040b052c17f9c6df87ac332643442aa2bbf4b74e64e7d01284e63755c7c2
-
SHA512
9ef1fa2a734ee858eba9728292cf1cfd83d34693ff404c1577665e1091bbf0244181476a5a89ba856650021d31ed7a2219717ae70f028549c6f6daedfedbdb7e
-
SSDEEP
12288:YMrfy901hNyyiRqR6EvOW+9dntdvrFK05uCaLzHReODMPr8iFL5oEKLiehC78VY7:XyO8zTxvp3N5sfHReODMPr8iJCEDehmj
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
dugin
77.91.124.73:19071
-
auth_value
7c3e46e091100fd26a6076996d374c28
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000002320a-159.dat healer behavioral1/files/0x000700000002320a-160.dat healer behavioral1/memory/3208-161-0x0000000000BF0000-0x0000000000BFA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l4301557.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l4301557.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection l4301557.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l4301557.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l4301557.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l4301557.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 2884 y2185346.exe 212 y9384324.exe 3204 y7072172.exe 3208 l4301557.exe 4908 m5493737.exe 3780 saves.exe 3616 n9099232.exe 4744 saves.exe 2576 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4836 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" l4301557.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c667040b052c17f9c6df87ac332643442aa2bbf4b74e64e7d01284e63755c7c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2185346.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y9384324.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y7072172.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1508 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3208 l4301557.exe 3208 l4301557.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3208 l4301557.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2884 2448 c667040b052c17f9c6df87ac332643442aa2bbf4b74e64e7d01284e63755c7c2.exe 83 PID 2448 wrote to memory of 2884 2448 c667040b052c17f9c6df87ac332643442aa2bbf4b74e64e7d01284e63755c7c2.exe 83 PID 2448 wrote to memory of 2884 2448 c667040b052c17f9c6df87ac332643442aa2bbf4b74e64e7d01284e63755c7c2.exe 83 PID 2884 wrote to memory of 212 2884 y2185346.exe 84 PID 2884 wrote to memory of 212 2884 y2185346.exe 84 PID 2884 wrote to memory of 212 2884 y2185346.exe 84 PID 212 wrote to memory of 3204 212 y9384324.exe 85 PID 212 wrote to memory of 3204 212 y9384324.exe 85 PID 212 wrote to memory of 3204 212 y9384324.exe 85 PID 3204 wrote to memory of 3208 3204 y7072172.exe 86 PID 3204 wrote to memory of 3208 3204 y7072172.exe 86 PID 3204 wrote to memory of 4908 3204 y7072172.exe 94 PID 3204 wrote to memory of 4908 3204 y7072172.exe 94 PID 3204 wrote to memory of 4908 3204 y7072172.exe 94 PID 4908 wrote to memory of 3780 4908 m5493737.exe 95 PID 4908 wrote to memory of 3780 4908 m5493737.exe 95 PID 4908 wrote to memory of 3780 4908 m5493737.exe 95 PID 212 wrote to memory of 3616 212 y9384324.exe 96 PID 212 wrote to memory of 3616 212 y9384324.exe 96 PID 212 wrote to memory of 3616 212 y9384324.exe 96 PID 3780 wrote to memory of 1508 3780 saves.exe 98 PID 3780 wrote to memory of 1508 3780 saves.exe 98 PID 3780 wrote to memory of 1508 3780 saves.exe 98 PID 3780 wrote to memory of 4048 3780 saves.exe 100 PID 3780 wrote to memory of 4048 3780 saves.exe 100 PID 3780 wrote to memory of 4048 3780 saves.exe 100 PID 4048 wrote to memory of 2256 4048 cmd.exe 102 PID 4048 wrote to memory of 2256 4048 cmd.exe 102 PID 4048 wrote to memory of 2256 4048 cmd.exe 102 PID 4048 wrote to memory of 1496 4048 cmd.exe 103 PID 4048 wrote to memory of 1496 4048 cmd.exe 103 PID 4048 wrote to memory of 1496 4048 cmd.exe 103 PID 4048 wrote to memory of 2688 4048 cmd.exe 104 PID 4048 wrote to memory of 2688 4048 cmd.exe 104 PID 4048 wrote to memory of 2688 4048 cmd.exe 104 PID 4048 wrote to memory of 4352 4048 cmd.exe 105 PID 4048 wrote to memory of 4352 4048 cmd.exe 105 PID 4048 wrote to memory of 4352 4048 cmd.exe 105 PID 4048 wrote to memory of 4804 4048 cmd.exe 106 PID 4048 wrote to memory of 4804 4048 cmd.exe 106 PID 4048 wrote to memory of 4804 4048 cmd.exe 106 PID 4048 wrote to memory of 3908 4048 cmd.exe 107 PID 4048 wrote to memory of 3908 4048 cmd.exe 107 PID 4048 wrote to memory of 3908 4048 cmd.exe 107 PID 3780 wrote to memory of 4836 3780 saves.exe 110 PID 3780 wrote to memory of 4836 3780 saves.exe 110 PID 3780 wrote to memory of 4836 3780 saves.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\c667040b052c17f9c6df87ac332643442aa2bbf4b74e64e7d01284e63755c7c2.exe"C:\Users\Admin\AppData\Local\Temp\c667040b052c17f9c6df87ac332643442aa2bbf4b74e64e7d01284e63755c7c2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2185346.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2185346.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9384324.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9384324.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7072172.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7072172.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l4301557.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l4301557.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m5493737.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m5493737.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1508
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2256
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:1496
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4352
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4804
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:3908
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4836
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n9099232.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n9099232.exe4⤵
- Executes dropped EXE
PID:3616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4744
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2576
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5cf338574399c17e2c3297bb792efd6de
SHA1996b5d84fc46aba464db69e9f647d571b9bae665
SHA2560e7867255381a43eb7bf26d9b1ca191defdc5368f05b7419d100c99957d5f134
SHA512b31976e95a8ad60017148b3bd3f5c93bdd69b77e92e1d1f9856a4c622aedacb1213c0908cb9a64055a85e19b272bb3574da89ca450e28efc13faf656c0cd3a8c
-
Filesize
599KB
MD5cf338574399c17e2c3297bb792efd6de
SHA1996b5d84fc46aba464db69e9f647d571b9bae665
SHA2560e7867255381a43eb7bf26d9b1ca191defdc5368f05b7419d100c99957d5f134
SHA512b31976e95a8ad60017148b3bd3f5c93bdd69b77e92e1d1f9856a4c622aedacb1213c0908cb9a64055a85e19b272bb3574da89ca450e28efc13faf656c0cd3a8c
-
Filesize
433KB
MD568128a7848df848e3f7daa54ff33c415
SHA1f4d263cbffe44cca5eb34c23a78eec2cdfcb4525
SHA256f5ec8e11a77b23c409e9978fdcaaf99c2c03670888435c9cd01042ff2e13c680
SHA512ea4556660c98ed2b489347a9fc96061e919fcd787e6b54b4f445bfa4088edb6f92b6cd80cc9d3fcf998d553adcf89573bb1d928ec18ce3f95004ce6f62023474
-
Filesize
433KB
MD568128a7848df848e3f7daa54ff33c415
SHA1f4d263cbffe44cca5eb34c23a78eec2cdfcb4525
SHA256f5ec8e11a77b23c409e9978fdcaaf99c2c03670888435c9cd01042ff2e13c680
SHA512ea4556660c98ed2b489347a9fc96061e919fcd787e6b54b4f445bfa4088edb6f92b6cd80cc9d3fcf998d553adcf89573bb1d928ec18ce3f95004ce6f62023474
-
Filesize
173KB
MD5638abe9126632c9dcb24f21b2a0424db
SHA14a6a4678900a220ddbeed305e4e2453c7a06ac0f
SHA2560d5836579ebe8a6e455026f31aa19112a22e2bef50d6cef5c62afc401f3f6267
SHA512200a24ba19eef65ac1e3fcb93b144f98f5edded02e2fbda2d0885ab87fe0059bc8bb15c24451da35245a95b9497c4e63d0b1b29154ea685e8ddfa14ba134f38d
-
Filesize
173KB
MD5638abe9126632c9dcb24f21b2a0424db
SHA14a6a4678900a220ddbeed305e4e2453c7a06ac0f
SHA2560d5836579ebe8a6e455026f31aa19112a22e2bef50d6cef5c62afc401f3f6267
SHA512200a24ba19eef65ac1e3fcb93b144f98f5edded02e2fbda2d0885ab87fe0059bc8bb15c24451da35245a95b9497c4e63d0b1b29154ea685e8ddfa14ba134f38d
-
Filesize
277KB
MD580ab02e52d2ea1f6e018af7178f5c7cf
SHA1268e9807dfc604c33bd6e50ae062f0cbedcd789c
SHA2560abbb2af11727ff424af7c2e288384fa194932eaedcf7a08912593ecb9c50dda
SHA512bf4fbabc9fb627b82e03f83998f9f8bf2130930c04245d8869f495c5f4bf6b6b042f7d0010da28a79b82b9acc811bdc8a76d44d84930bc1c428016f3def832c4
-
Filesize
277KB
MD580ab02e52d2ea1f6e018af7178f5c7cf
SHA1268e9807dfc604c33bd6e50ae062f0cbedcd789c
SHA2560abbb2af11727ff424af7c2e288384fa194932eaedcf7a08912593ecb9c50dda
SHA512bf4fbabc9fb627b82e03f83998f9f8bf2130930c04245d8869f495c5f4bf6b6b042f7d0010da28a79b82b9acc811bdc8a76d44d84930bc1c428016f3def832c4
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7