Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
1f4c3f83e7f485f5a28a1e58cf779bc33d3de57d7342f0e4f33cc9fdfd6f7111.exe
Resource
win10v2004-20230703-en
General
-
Target
1f4c3f83e7f485f5a28a1e58cf779bc33d3de57d7342f0e4f33cc9fdfd6f7111.exe
-
Size
704KB
-
MD5
11aaad513a498eead2cb6f32a470a25b
-
SHA1
de7cf77bd4986c045e6ab5a4b2f694633acc6c0c
-
SHA256
1f4c3f83e7f485f5a28a1e58cf779bc33d3de57d7342f0e4f33cc9fdfd6f7111
-
SHA512
275129a29f8d637b4d3835aafbd5ebc37273ed66ca48e1960f976d862d97624a08d773480cb0521b9f04934c9e2b06eea623f0f3857d031e5d15786585664452
-
SSDEEP
12288:tMrJy90ahxzFPJYmiAKTrNxbUKe0g7Kk7alpbUm49R+ptFEFH:0y3xzRo9xQJ0g7KBN49cpYFH
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023247-26.dat healer behavioral1/files/0x0007000000023247-27.dat healer behavioral1/memory/4168-28-0x0000000000B60000-0x0000000000B6A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g0413331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g0413331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g0413331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g0413331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g0413331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g0413331.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 1040 x9669902.exe 952 x7189434.exe 3800 x5288011.exe 4168 g0413331.exe 4540 h8797437.exe 1732 saves.exe 3980 i6960369.exe 4904 saves.exe 1812 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4728 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g0413331.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1f4c3f83e7f485f5a28a1e58cf779bc33d3de57d7342f0e4f33cc9fdfd6f7111.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9669902.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7189434.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5288011.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1100 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4168 g0413331.exe 4168 g0413331.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4168 g0413331.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3004 wrote to memory of 1040 3004 1f4c3f83e7f485f5a28a1e58cf779bc33d3de57d7342f0e4f33cc9fdfd6f7111.exe 82 PID 3004 wrote to memory of 1040 3004 1f4c3f83e7f485f5a28a1e58cf779bc33d3de57d7342f0e4f33cc9fdfd6f7111.exe 82 PID 3004 wrote to memory of 1040 3004 1f4c3f83e7f485f5a28a1e58cf779bc33d3de57d7342f0e4f33cc9fdfd6f7111.exe 82 PID 1040 wrote to memory of 952 1040 x9669902.exe 83 PID 1040 wrote to memory of 952 1040 x9669902.exe 83 PID 1040 wrote to memory of 952 1040 x9669902.exe 83 PID 952 wrote to memory of 3800 952 x7189434.exe 84 PID 952 wrote to memory of 3800 952 x7189434.exe 84 PID 952 wrote to memory of 3800 952 x7189434.exe 84 PID 3800 wrote to memory of 4168 3800 x5288011.exe 85 PID 3800 wrote to memory of 4168 3800 x5288011.exe 85 PID 3800 wrote to memory of 4540 3800 x5288011.exe 91 PID 3800 wrote to memory of 4540 3800 x5288011.exe 91 PID 3800 wrote to memory of 4540 3800 x5288011.exe 91 PID 4540 wrote to memory of 1732 4540 h8797437.exe 92 PID 4540 wrote to memory of 1732 4540 h8797437.exe 92 PID 4540 wrote to memory of 1732 4540 h8797437.exe 92 PID 952 wrote to memory of 3980 952 x7189434.exe 93 PID 952 wrote to memory of 3980 952 x7189434.exe 93 PID 952 wrote to memory of 3980 952 x7189434.exe 93 PID 1732 wrote to memory of 1100 1732 saves.exe 94 PID 1732 wrote to memory of 1100 1732 saves.exe 94 PID 1732 wrote to memory of 1100 1732 saves.exe 94 PID 1732 wrote to memory of 4740 1732 saves.exe 96 PID 1732 wrote to memory of 4740 1732 saves.exe 96 PID 1732 wrote to memory of 4740 1732 saves.exe 96 PID 4740 wrote to memory of 3468 4740 cmd.exe 98 PID 4740 wrote to memory of 3468 4740 cmd.exe 98 PID 4740 wrote to memory of 3468 4740 cmd.exe 98 PID 4740 wrote to memory of 4456 4740 cmd.exe 99 PID 4740 wrote to memory of 4456 4740 cmd.exe 99 PID 4740 wrote to memory of 4456 4740 cmd.exe 99 PID 4740 wrote to memory of 848 4740 cmd.exe 100 PID 4740 wrote to memory of 848 4740 cmd.exe 100 PID 4740 wrote to memory of 848 4740 cmd.exe 100 PID 4740 wrote to memory of 2052 4740 cmd.exe 101 PID 4740 wrote to memory of 2052 4740 cmd.exe 101 PID 4740 wrote to memory of 2052 4740 cmd.exe 101 PID 4740 wrote to memory of 4316 4740 cmd.exe 102 PID 4740 wrote to memory of 4316 4740 cmd.exe 102 PID 4740 wrote to memory of 4316 4740 cmd.exe 102 PID 4740 wrote to memory of 2068 4740 cmd.exe 103 PID 4740 wrote to memory of 2068 4740 cmd.exe 103 PID 4740 wrote to memory of 2068 4740 cmd.exe 103 PID 1732 wrote to memory of 4728 1732 saves.exe 110 PID 1732 wrote to memory of 4728 1732 saves.exe 110 PID 1732 wrote to memory of 4728 1732 saves.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f4c3f83e7f485f5a28a1e58cf779bc33d3de57d7342f0e4f33cc9fdfd6f7111.exe"C:\Users\Admin\AppData\Local\Temp\1f4c3f83e7f485f5a28a1e58cf779bc33d3de57d7342f0e4f33cc9fdfd6f7111.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9669902.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9669902.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7189434.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7189434.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5288011.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5288011.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0413331.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0413331.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8797437.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8797437.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1100
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3468
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4456
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:848
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2052
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:2068
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4728
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6960369.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6960369.exe4⤵
- Executes dropped EXE
PID:3980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4904
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1812
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD5d0d0aee1e9cf0e1b949321b2f4fb2ecd
SHA1beb09b003056dec83027cb23f05302165b6ea42c
SHA256d8efbcf9d3ff78857f02c36e81c786827169c8ced1e9a7881a5caea54b659549
SHA512e177e99fec914428f6005b76d5ca4b841469969b82b5dd896768558bd24ce09c192b3b05ffef65b73ee7689fdde3a6b7928d3581f5787f7bc23feddf20d179d3
-
Filesize
598KB
MD5d0d0aee1e9cf0e1b949321b2f4fb2ecd
SHA1beb09b003056dec83027cb23f05302165b6ea42c
SHA256d8efbcf9d3ff78857f02c36e81c786827169c8ced1e9a7881a5caea54b659549
SHA512e177e99fec914428f6005b76d5ca4b841469969b82b5dd896768558bd24ce09c192b3b05ffef65b73ee7689fdde3a6b7928d3581f5787f7bc23feddf20d179d3
-
Filesize
433KB
MD529c2371ffd7d434da074ef2826038696
SHA14e205754218c5d50eb6301c6c65aff30ce29663f
SHA2567b72d2a64b734c7fffbfdf863321af99f7b303af5954b8e1918ce904e34240cb
SHA5124d2ae747ab29dbcf90c93bd33777f75f0c2b679540a04e8b415ae0f86c3845b264f6f317327e0648cd37d08ecd2622669960597e7a740051aa1aa7ee4053d9f2
-
Filesize
433KB
MD529c2371ffd7d434da074ef2826038696
SHA14e205754218c5d50eb6301c6c65aff30ce29663f
SHA2567b72d2a64b734c7fffbfdf863321af99f7b303af5954b8e1918ce904e34240cb
SHA5124d2ae747ab29dbcf90c93bd33777f75f0c2b679540a04e8b415ae0f86c3845b264f6f317327e0648cd37d08ecd2622669960597e7a740051aa1aa7ee4053d9f2
-
Filesize
174KB
MD524aad1ab57cbe644e73083acffccbb39
SHA106b341cb193649cb778e99aeca5c58ec05145a40
SHA2568972fb0fb5d5d105e0eb7cf6c4c70cf53bda31d07d8307dbc87ee5205d9980e1
SHA512f5500d9a6e027837dccd7e1ec76e923ea1bd832580085285016f69136c132bed3c48817944ad3d97f5b7e7064121c5220cf532760e11aeb05f28f02e32c804e8
-
Filesize
174KB
MD524aad1ab57cbe644e73083acffccbb39
SHA106b341cb193649cb778e99aeca5c58ec05145a40
SHA2568972fb0fb5d5d105e0eb7cf6c4c70cf53bda31d07d8307dbc87ee5205d9980e1
SHA512f5500d9a6e027837dccd7e1ec76e923ea1bd832580085285016f69136c132bed3c48817944ad3d97f5b7e7064121c5220cf532760e11aeb05f28f02e32c804e8
-
Filesize
277KB
MD57c3c2d18c83ba69f47ff49224590d09d
SHA10e4b00aa53eb876219ff00362043ea7db5c5a499
SHA256c3872b9f72a2e5ae12771cad44a769fd1a07d41afc1190d262d61e4734ba9272
SHA512e1833a85f7642e006ac530e7746937d37f989dbe168b0188d9e1c7b58b6e28a085130685e81555cb84ec8335b038495ec0941b86f72453d2e7e6e5a87fb97729
-
Filesize
277KB
MD57c3c2d18c83ba69f47ff49224590d09d
SHA10e4b00aa53eb876219ff00362043ea7db5c5a499
SHA256c3872b9f72a2e5ae12771cad44a769fd1a07d41afc1190d262d61e4734ba9272
SHA512e1833a85f7642e006ac530e7746937d37f989dbe168b0188d9e1c7b58b6e28a085130685e81555cb84ec8335b038495ec0941b86f72453d2e7e6e5a87fb97729
-
Filesize
15KB
MD5ea2d6404ecbf174c88ae9b94bed2e416
SHA1ed3be3619394471a38db71a1683c14a67d53061e
SHA2563becce19329bb91f08e97e3af89679d44e0dcb1faac2c9af721cb56e8945ca28
SHA5125f786b8fc5e2608e288bf0832df2a37f2b3bbef1fa7236dcffa170756092f1f7198defab6a11bbe1b0ddee84856cde83c15a98a60efaaa2a11044e9b4e612c08
-
Filesize
15KB
MD5ea2d6404ecbf174c88ae9b94bed2e416
SHA1ed3be3619394471a38db71a1683c14a67d53061e
SHA2563becce19329bb91f08e97e3af89679d44e0dcb1faac2c9af721cb56e8945ca28
SHA5125f786b8fc5e2608e288bf0832df2a37f2b3bbef1fa7236dcffa170756092f1f7198defab6a11bbe1b0ddee84856cde83c15a98a60efaaa2a11044e9b4e612c08
-
Filesize
323KB
MD52cf8a41f366d7707c7fa71bbd45b3c6e
SHA1d0a936029c369d7d1da1b59fefcf498d930bae92
SHA25625d70796ff24d4e87531fd15e2a1bb1f0f6b9811a8c2a4cd22efbba140850c44
SHA512e6851fade5eb3e268bdb87c2ded84fa9549602eef4d5da9059e7e8b7c58c1c71059f8f167b87c2886251982e612c92c98aa5be19dcc5828b204b8a52b7ee2155
-
Filesize
323KB
MD52cf8a41f366d7707c7fa71bbd45b3c6e
SHA1d0a936029c369d7d1da1b59fefcf498d930bae92
SHA25625d70796ff24d4e87531fd15e2a1bb1f0f6b9811a8c2a4cd22efbba140850c44
SHA512e6851fade5eb3e268bdb87c2ded84fa9549602eef4d5da9059e7e8b7c58c1c71059f8f167b87c2886251982e612c92c98aa5be19dcc5828b204b8a52b7ee2155
-
Filesize
323KB
MD52cf8a41f366d7707c7fa71bbd45b3c6e
SHA1d0a936029c369d7d1da1b59fefcf498d930bae92
SHA25625d70796ff24d4e87531fd15e2a1bb1f0f6b9811a8c2a4cd22efbba140850c44
SHA512e6851fade5eb3e268bdb87c2ded84fa9549602eef4d5da9059e7e8b7c58c1c71059f8f167b87c2886251982e612c92c98aa5be19dcc5828b204b8a52b7ee2155
-
Filesize
323KB
MD52cf8a41f366d7707c7fa71bbd45b3c6e
SHA1d0a936029c369d7d1da1b59fefcf498d930bae92
SHA25625d70796ff24d4e87531fd15e2a1bb1f0f6b9811a8c2a4cd22efbba140850c44
SHA512e6851fade5eb3e268bdb87c2ded84fa9549602eef4d5da9059e7e8b7c58c1c71059f8f167b87c2886251982e612c92c98aa5be19dcc5828b204b8a52b7ee2155
-
Filesize
323KB
MD52cf8a41f366d7707c7fa71bbd45b3c6e
SHA1d0a936029c369d7d1da1b59fefcf498d930bae92
SHA25625d70796ff24d4e87531fd15e2a1bb1f0f6b9811a8c2a4cd22efbba140850c44
SHA512e6851fade5eb3e268bdb87c2ded84fa9549602eef4d5da9059e7e8b7c58c1c71059f8f167b87c2886251982e612c92c98aa5be19dcc5828b204b8a52b7ee2155
-
Filesize
323KB
MD52cf8a41f366d7707c7fa71bbd45b3c6e
SHA1d0a936029c369d7d1da1b59fefcf498d930bae92
SHA25625d70796ff24d4e87531fd15e2a1bb1f0f6b9811a8c2a4cd22efbba140850c44
SHA512e6851fade5eb3e268bdb87c2ded84fa9549602eef4d5da9059e7e8b7c58c1c71059f8f167b87c2886251982e612c92c98aa5be19dcc5828b204b8a52b7ee2155
-
Filesize
323KB
MD52cf8a41f366d7707c7fa71bbd45b3c6e
SHA1d0a936029c369d7d1da1b59fefcf498d930bae92
SHA25625d70796ff24d4e87531fd15e2a1bb1f0f6b9811a8c2a4cd22efbba140850c44
SHA512e6851fade5eb3e268bdb87c2ded84fa9549602eef4d5da9059e7e8b7c58c1c71059f8f167b87c2886251982e612c92c98aa5be19dcc5828b204b8a52b7ee2155
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7