Analysis
-
max time kernel
156s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 11:31
Static task
static1
Behavioral task
behavioral1
Sample
d260b0df5d7d1a9874999213fc97689a75b0e71a691cfde7d6592727296eb43a.exe
Resource
win10v2004-20230703-en
General
-
Target
d260b0df5d7d1a9874999213fc97689a75b0e71a691cfde7d6592727296eb43a.exe
-
Size
704KB
-
MD5
c95d357f9297d2af2417ae52c5d58dd2
-
SHA1
0f3bd7859b78b76b6459029cc46ebbd75a211aa9
-
SHA256
d260b0df5d7d1a9874999213fc97689a75b0e71a691cfde7d6592727296eb43a
-
SHA512
22c95af784f9061de7ed13e334e7c1f2aa855e6ab1a5691ec31539449bbbed5975905e256816af24c88a249316b0ec9e4605bf440be1b5b37908cf9fceda3d89
-
SSDEEP
12288:gMrLy90tuPlpeML9Rxdy2KsD8lfVmyqdwGf9tkke6uC8k2AM:7y0u9IML9R78HmvFt5iQC
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000002320a-26.dat healer behavioral1/files/0x000700000002320a-27.dat healer behavioral1/memory/2680-28-0x0000000000DC0000-0x0000000000DCA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g8723200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g8723200.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g8723200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g8723200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g8723200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g8723200.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x0006000000023206-45.dat family_redline behavioral1/files/0x0006000000023206-46.dat family_redline behavioral1/memory/1508-48-0x0000000000290000-0x00000000002C0000-memory.dmp family_redline -
Executes dropped EXE 9 IoCs
pid Process 3100 x9066359.exe 872 x3842570.exe 3228 x0076290.exe 2680 g8723200.exe 1348 h1774532.exe 3648 saves.exe 1508 i6534584.exe 4700 saves.exe 3988 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4308 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g8723200.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3842570.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0076290.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d260b0df5d7d1a9874999213fc97689a75b0e71a691cfde7d6592727296eb43a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9066359.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3960 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2680 g8723200.exe 2680 g8723200.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2680 g8723200.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1556 wrote to memory of 3100 1556 d260b0df5d7d1a9874999213fc97689a75b0e71a691cfde7d6592727296eb43a.exe 83 PID 1556 wrote to memory of 3100 1556 d260b0df5d7d1a9874999213fc97689a75b0e71a691cfde7d6592727296eb43a.exe 83 PID 1556 wrote to memory of 3100 1556 d260b0df5d7d1a9874999213fc97689a75b0e71a691cfde7d6592727296eb43a.exe 83 PID 3100 wrote to memory of 872 3100 x9066359.exe 84 PID 3100 wrote to memory of 872 3100 x9066359.exe 84 PID 3100 wrote to memory of 872 3100 x9066359.exe 84 PID 872 wrote to memory of 3228 872 x3842570.exe 85 PID 872 wrote to memory of 3228 872 x3842570.exe 85 PID 872 wrote to memory of 3228 872 x3842570.exe 85 PID 3228 wrote to memory of 2680 3228 x0076290.exe 86 PID 3228 wrote to memory of 2680 3228 x0076290.exe 86 PID 3228 wrote to memory of 1348 3228 x0076290.exe 94 PID 3228 wrote to memory of 1348 3228 x0076290.exe 94 PID 3228 wrote to memory of 1348 3228 x0076290.exe 94 PID 1348 wrote to memory of 3648 1348 h1774532.exe 95 PID 1348 wrote to memory of 3648 1348 h1774532.exe 95 PID 1348 wrote to memory of 3648 1348 h1774532.exe 95 PID 872 wrote to memory of 1508 872 x3842570.exe 97 PID 872 wrote to memory of 1508 872 x3842570.exe 97 PID 872 wrote to memory of 1508 872 x3842570.exe 97 PID 3648 wrote to memory of 3960 3648 saves.exe 98 PID 3648 wrote to memory of 3960 3648 saves.exe 98 PID 3648 wrote to memory of 3960 3648 saves.exe 98 PID 3648 wrote to memory of 4036 3648 saves.exe 100 PID 3648 wrote to memory of 4036 3648 saves.exe 100 PID 3648 wrote to memory of 4036 3648 saves.exe 100 PID 4036 wrote to memory of 1164 4036 cmd.exe 103 PID 4036 wrote to memory of 1164 4036 cmd.exe 103 PID 4036 wrote to memory of 1164 4036 cmd.exe 103 PID 4036 wrote to memory of 3224 4036 cmd.exe 102 PID 4036 wrote to memory of 3224 4036 cmd.exe 102 PID 4036 wrote to memory of 3224 4036 cmd.exe 102 PID 4036 wrote to memory of 1736 4036 cmd.exe 104 PID 4036 wrote to memory of 1736 4036 cmd.exe 104 PID 4036 wrote to memory of 1736 4036 cmd.exe 104 PID 4036 wrote to memory of 4800 4036 cmd.exe 105 PID 4036 wrote to memory of 4800 4036 cmd.exe 105 PID 4036 wrote to memory of 4800 4036 cmd.exe 105 PID 4036 wrote to memory of 4488 4036 cmd.exe 106 PID 4036 wrote to memory of 4488 4036 cmd.exe 106 PID 4036 wrote to memory of 4488 4036 cmd.exe 106 PID 4036 wrote to memory of 2628 4036 cmd.exe 107 PID 4036 wrote to memory of 2628 4036 cmd.exe 107 PID 4036 wrote to memory of 2628 4036 cmd.exe 107 PID 3648 wrote to memory of 4308 3648 saves.exe 110 PID 3648 wrote to memory of 4308 3648 saves.exe 110 PID 3648 wrote to memory of 4308 3648 saves.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\d260b0df5d7d1a9874999213fc97689a75b0e71a691cfde7d6592727296eb43a.exe"C:\Users\Admin\AppData\Local\Temp\d260b0df5d7d1a9874999213fc97689a75b0e71a691cfde7d6592727296eb43a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9066359.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9066359.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3842570.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3842570.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0076290.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0076290.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8723200.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8723200.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1774532.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1774532.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:3960
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:3224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1164
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:1736
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4800
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4488
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:2628
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4308
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6534584.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6534584.exe4⤵
- Executes dropped EXE
PID:1508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4700
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3988
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD543647cbca9c3855a73687956508f0f09
SHA1833878f949caa0e573f167ba800d8b5179d7ea69
SHA2563aeff9631e9b02b53a651ec0e861c0a5a271b8d9ffe09b1bda31245a950a5eb8
SHA512fdf4e55aa85bb6e5be4922910065f00f75b550a75455c308ed5e250ccea8b0c286bbe5159e66ab99150ffc8b6ec80ace4da946904ea427eeae5afb19c6443930
-
Filesize
598KB
MD543647cbca9c3855a73687956508f0f09
SHA1833878f949caa0e573f167ba800d8b5179d7ea69
SHA2563aeff9631e9b02b53a651ec0e861c0a5a271b8d9ffe09b1bda31245a950a5eb8
SHA512fdf4e55aa85bb6e5be4922910065f00f75b550a75455c308ed5e250ccea8b0c286bbe5159e66ab99150ffc8b6ec80ace4da946904ea427eeae5afb19c6443930
-
Filesize
432KB
MD594d2a2a32d270d63334d49675447005f
SHA1985fd6d578976f638df470ba24f619bdd70a3c16
SHA256ea3edcbbf502ba0e8abf25138675bc138e41410079b3982b9252ce15259ba1b8
SHA5121ea33ad3f6393ca742ceaad8f3d7a290ccd28f5b72639723801ac9a9ed013f3d775d3e1061a389ebe50a2e1eff469abe3679e50bc67554d43257329e42f202fe
-
Filesize
432KB
MD594d2a2a32d270d63334d49675447005f
SHA1985fd6d578976f638df470ba24f619bdd70a3c16
SHA256ea3edcbbf502ba0e8abf25138675bc138e41410079b3982b9252ce15259ba1b8
SHA5121ea33ad3f6393ca742ceaad8f3d7a290ccd28f5b72639723801ac9a9ed013f3d775d3e1061a389ebe50a2e1eff469abe3679e50bc67554d43257329e42f202fe
-
Filesize
173KB
MD54683988b8ac775fdf7d25e91f2f55285
SHA15b4ab36280b54249278797f63074ea9d2355bb60
SHA25666a5b3ef6aade48157f501ebefa83ba11223025e787b182f9f944cc551fb36bd
SHA512c9ac17f7b4b663a6a2a4535b659c2518a946bc0644750546cb83fcddfbf4d1ddf14cf35857d2885c3a00a9c93772673b32bacdf71d1f495cfe7870651f34e394
-
Filesize
173KB
MD54683988b8ac775fdf7d25e91f2f55285
SHA15b4ab36280b54249278797f63074ea9d2355bb60
SHA25666a5b3ef6aade48157f501ebefa83ba11223025e787b182f9f944cc551fb36bd
SHA512c9ac17f7b4b663a6a2a4535b659c2518a946bc0644750546cb83fcddfbf4d1ddf14cf35857d2885c3a00a9c93772673b32bacdf71d1f495cfe7870651f34e394
-
Filesize
276KB
MD5e61b29fee1bf1ab607270606807a8b98
SHA1c6c360ff0ffcf6dc43e7a3c656b7d0ccc6763d65
SHA25676cc7a97a3bdf67e087bbe3fce22bbeb83ce831618b542f7f3763cfae3842d08
SHA5120dea0fa12e497a281c25e6d1775299dc9754dccdb4d4ce2bc331dceb7171434271cc359f409bff2f0017ff95df06d3df712699a1b10bf8c808830888a32a3c6e
-
Filesize
276KB
MD5e61b29fee1bf1ab607270606807a8b98
SHA1c6c360ff0ffcf6dc43e7a3c656b7d0ccc6763d65
SHA25676cc7a97a3bdf67e087bbe3fce22bbeb83ce831618b542f7f3763cfae3842d08
SHA5120dea0fa12e497a281c25e6d1775299dc9754dccdb4d4ce2bc331dceb7171434271cc359f409bff2f0017ff95df06d3df712699a1b10bf8c808830888a32a3c6e
-
Filesize
15KB
MD51e5208492a70370568b1070b49a632d6
SHA156553a8fea2a502fb944f9b32cd33b0bd8dd6a58
SHA256d8b4803ad258e64d7486e706c37936ec37479ac9b67243a1bbbe3be21ea99357
SHA512d68da0e6000499df0ed7a2c9ff9369708051bebf5df72398cb6278931653dca6a6b96fd1acf67c5ad89caa535b02bc4c323abe8e1b8a77e546e4f4451aa10136
-
Filesize
15KB
MD51e5208492a70370568b1070b49a632d6
SHA156553a8fea2a502fb944f9b32cd33b0bd8dd6a58
SHA256d8b4803ad258e64d7486e706c37936ec37479ac9b67243a1bbbe3be21ea99357
SHA512d68da0e6000499df0ed7a2c9ff9369708051bebf5df72398cb6278931653dca6a6b96fd1acf67c5ad89caa535b02bc4c323abe8e1b8a77e546e4f4451aa10136
-
Filesize
322KB
MD5eddc359f7bc601544f456ba0c174af0b
SHA175abc968ffb20e98dba57c82ac06a36a8a5c80e3
SHA2564595729cfbcf53399d87e7126088383c41c9a4a8c4c9f6e42fde751cfa22b28e
SHA5129a5900ab3c6895b8789c8883e6f19f3e09bbd2022562945287200cdd724a7d68d92f88d048141f0ce3e3fb59b09da84e305b5f0469c48f5461cf188c15743979
-
Filesize
322KB
MD5eddc359f7bc601544f456ba0c174af0b
SHA175abc968ffb20e98dba57c82ac06a36a8a5c80e3
SHA2564595729cfbcf53399d87e7126088383c41c9a4a8c4c9f6e42fde751cfa22b28e
SHA5129a5900ab3c6895b8789c8883e6f19f3e09bbd2022562945287200cdd724a7d68d92f88d048141f0ce3e3fb59b09da84e305b5f0469c48f5461cf188c15743979
-
Filesize
322KB
MD5eddc359f7bc601544f456ba0c174af0b
SHA175abc968ffb20e98dba57c82ac06a36a8a5c80e3
SHA2564595729cfbcf53399d87e7126088383c41c9a4a8c4c9f6e42fde751cfa22b28e
SHA5129a5900ab3c6895b8789c8883e6f19f3e09bbd2022562945287200cdd724a7d68d92f88d048141f0ce3e3fb59b09da84e305b5f0469c48f5461cf188c15743979
-
Filesize
322KB
MD5eddc359f7bc601544f456ba0c174af0b
SHA175abc968ffb20e98dba57c82ac06a36a8a5c80e3
SHA2564595729cfbcf53399d87e7126088383c41c9a4a8c4c9f6e42fde751cfa22b28e
SHA5129a5900ab3c6895b8789c8883e6f19f3e09bbd2022562945287200cdd724a7d68d92f88d048141f0ce3e3fb59b09da84e305b5f0469c48f5461cf188c15743979
-
Filesize
322KB
MD5eddc359f7bc601544f456ba0c174af0b
SHA175abc968ffb20e98dba57c82ac06a36a8a5c80e3
SHA2564595729cfbcf53399d87e7126088383c41c9a4a8c4c9f6e42fde751cfa22b28e
SHA5129a5900ab3c6895b8789c8883e6f19f3e09bbd2022562945287200cdd724a7d68d92f88d048141f0ce3e3fb59b09da84e305b5f0469c48f5461cf188c15743979
-
Filesize
322KB
MD5eddc359f7bc601544f456ba0c174af0b
SHA175abc968ffb20e98dba57c82ac06a36a8a5c80e3
SHA2564595729cfbcf53399d87e7126088383c41c9a4a8c4c9f6e42fde751cfa22b28e
SHA5129a5900ab3c6895b8789c8883e6f19f3e09bbd2022562945287200cdd724a7d68d92f88d048141f0ce3e3fb59b09da84e305b5f0469c48f5461cf188c15743979
-
Filesize
322KB
MD5eddc359f7bc601544f456ba0c174af0b
SHA175abc968ffb20e98dba57c82ac06a36a8a5c80e3
SHA2564595729cfbcf53399d87e7126088383c41c9a4a8c4c9f6e42fde751cfa22b28e
SHA5129a5900ab3c6895b8789c8883e6f19f3e09bbd2022562945287200cdd724a7d68d92f88d048141f0ce3e3fb59b09da84e305b5f0469c48f5461cf188c15743979
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7