Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
84b7ca2b2249ee7d25a01c3809a7c56c291c8e9f820cdb1d2fd752354bcb5f30.exe
Resource
win10v2004-20230824-en
General
-
Target
84b7ca2b2249ee7d25a01c3809a7c56c291c8e9f820cdb1d2fd752354bcb5f30.exe
-
Size
704KB
-
MD5
b3afc2a6bcb501ed4a82f23483743f6c
-
SHA1
3c5ef7f81f80a36563ea96ecfc00d29a32964f18
-
SHA256
84b7ca2b2249ee7d25a01c3809a7c56c291c8e9f820cdb1d2fd752354bcb5f30
-
SHA512
582a756d39bd3d42d8df48aff56344b83b1c724629152ea8cf73695e6a60c406fa7e0c1b79184dbbb457bbf0619cc7eba9804f065e2c00b189273c8d2c85319f
-
SSDEEP
12288:6Mrly90yTlJgybOTXdbqZ2xLh3D+cW5xhVrIngRzhluuc+vXn1sHiX7U:vyFldOhdLhDSbhVrNb2N
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023011-26.dat healer behavioral1/files/0x0007000000023011-27.dat healer behavioral1/memory/2500-28-0x0000000000710000-0x000000000071A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g4287628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g4287628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g4287628.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g4287628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g4287628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g4287628.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 3056 x1713226.exe 1832 x9288632.exe 852 x9366264.exe 2500 g4287628.exe 436 h9546288.exe 4468 saves.exe 3624 i8376746.exe 2400 saves.exe 4556 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 1440 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g4287628.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1713226.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9288632.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9366264.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 84b7ca2b2249ee7d25a01c3809a7c56c291c8e9f820cdb1d2fd752354bcb5f30.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3816 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2500 g4287628.exe 2500 g4287628.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2500 g4287628.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3756 wrote to memory of 3056 3756 84b7ca2b2249ee7d25a01c3809a7c56c291c8e9f820cdb1d2fd752354bcb5f30.exe 87 PID 3756 wrote to memory of 3056 3756 84b7ca2b2249ee7d25a01c3809a7c56c291c8e9f820cdb1d2fd752354bcb5f30.exe 87 PID 3756 wrote to memory of 3056 3756 84b7ca2b2249ee7d25a01c3809a7c56c291c8e9f820cdb1d2fd752354bcb5f30.exe 87 PID 3056 wrote to memory of 1832 3056 x1713226.exe 88 PID 3056 wrote to memory of 1832 3056 x1713226.exe 88 PID 3056 wrote to memory of 1832 3056 x1713226.exe 88 PID 1832 wrote to memory of 852 1832 x9288632.exe 89 PID 1832 wrote to memory of 852 1832 x9288632.exe 89 PID 1832 wrote to memory of 852 1832 x9288632.exe 89 PID 852 wrote to memory of 2500 852 x9366264.exe 90 PID 852 wrote to memory of 2500 852 x9366264.exe 90 PID 852 wrote to memory of 436 852 x9366264.exe 91 PID 852 wrote to memory of 436 852 x9366264.exe 91 PID 852 wrote to memory of 436 852 x9366264.exe 91 PID 436 wrote to memory of 4468 436 h9546288.exe 92 PID 436 wrote to memory of 4468 436 h9546288.exe 92 PID 436 wrote to memory of 4468 436 h9546288.exe 92 PID 1832 wrote to memory of 3624 1832 x9288632.exe 93 PID 1832 wrote to memory of 3624 1832 x9288632.exe 93 PID 1832 wrote to memory of 3624 1832 x9288632.exe 93 PID 4468 wrote to memory of 3816 4468 saves.exe 94 PID 4468 wrote to memory of 3816 4468 saves.exe 94 PID 4468 wrote to memory of 3816 4468 saves.exe 94 PID 4468 wrote to memory of 3808 4468 saves.exe 96 PID 4468 wrote to memory of 3808 4468 saves.exe 96 PID 4468 wrote to memory of 3808 4468 saves.exe 96 PID 3808 wrote to memory of 1236 3808 cmd.exe 98 PID 3808 wrote to memory of 1236 3808 cmd.exe 98 PID 3808 wrote to memory of 1236 3808 cmd.exe 98 PID 3808 wrote to memory of 3020 3808 cmd.exe 99 PID 3808 wrote to memory of 3020 3808 cmd.exe 99 PID 3808 wrote to memory of 3020 3808 cmd.exe 99 PID 3808 wrote to memory of 2148 3808 cmd.exe 100 PID 3808 wrote to memory of 2148 3808 cmd.exe 100 PID 3808 wrote to memory of 2148 3808 cmd.exe 100 PID 3808 wrote to memory of 1360 3808 cmd.exe 101 PID 3808 wrote to memory of 1360 3808 cmd.exe 101 PID 3808 wrote to memory of 1360 3808 cmd.exe 101 PID 3808 wrote to memory of 1264 3808 cmd.exe 102 PID 3808 wrote to memory of 1264 3808 cmd.exe 102 PID 3808 wrote to memory of 1264 3808 cmd.exe 102 PID 3808 wrote to memory of 760 3808 cmd.exe 103 PID 3808 wrote to memory of 760 3808 cmd.exe 103 PID 3808 wrote to memory of 760 3808 cmd.exe 103 PID 4468 wrote to memory of 1440 4468 saves.exe 107 PID 4468 wrote to memory of 1440 4468 saves.exe 107 PID 4468 wrote to memory of 1440 4468 saves.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\84b7ca2b2249ee7d25a01c3809a7c56c291c8e9f820cdb1d2fd752354bcb5f30.exe"C:\Users\Admin\AppData\Local\Temp\84b7ca2b2249ee7d25a01c3809a7c56c291c8e9f820cdb1d2fd752354bcb5f30.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1713226.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1713226.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9288632.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9288632.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9366264.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9366264.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4287628.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4287628.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9546288.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9546288.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:3816
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1236
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:3020
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2148
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1360
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:1264
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:760
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:1440
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8376746.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8376746.exe4⤵
- Executes dropped EXE
PID:3624
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2400
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4556
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5f6d69f70c35bb09ec976ecdc588bfbcf
SHA13da63766bf86b533c5b155b7cded9f03e880d407
SHA2568e94c39699384edd084233d120dbfba722426732b821af64dd8274604dbd3752
SHA5126d7b00b86ac194a3ff134a2801272b920a187928d43ffe4364307d0d68b1557cf07b75b9270ecea887b347e41b0cbcbff47a5b120d583c566706cd8dc51757a0
-
Filesize
599KB
MD5f6d69f70c35bb09ec976ecdc588bfbcf
SHA13da63766bf86b533c5b155b7cded9f03e880d407
SHA2568e94c39699384edd084233d120dbfba722426732b821af64dd8274604dbd3752
SHA5126d7b00b86ac194a3ff134a2801272b920a187928d43ffe4364307d0d68b1557cf07b75b9270ecea887b347e41b0cbcbff47a5b120d583c566706cd8dc51757a0
-
Filesize
433KB
MD57f157cb3af76351c8fa2e394f8989bca
SHA11f418ddafe887e39a0663c41024cd50fe2a3c309
SHA256998b788bef43588ed3cca1ec26af4738f0b431d869e563d7a5838d8361dc36f8
SHA51236f710d8138c453b86ed5248a68bdc5436453c6a2470a66cd66bb3bd9ef7db24d19f9681b4e4901480ff122f34af802c092d90dbd921d2f95612cc0c08ae9d61
-
Filesize
433KB
MD57f157cb3af76351c8fa2e394f8989bca
SHA11f418ddafe887e39a0663c41024cd50fe2a3c309
SHA256998b788bef43588ed3cca1ec26af4738f0b431d869e563d7a5838d8361dc36f8
SHA51236f710d8138c453b86ed5248a68bdc5436453c6a2470a66cd66bb3bd9ef7db24d19f9681b4e4901480ff122f34af802c092d90dbd921d2f95612cc0c08ae9d61
-
Filesize
174KB
MD5634b2034b1a191e3eb5a447e6aeaebc8
SHA184dbf0dbbeed39aef836979d5d8c711b45f239f2
SHA2565f979fc8361e40e74d6e7da31e7996d557bde2f3f4145a27017df11cbb9a8645
SHA512cb5f3db3374ef99b664f294ba268958ccce11a611bed9552a31acda207f8e0d47625ccfbf972e651d4c7af22f5719ff4e94557cafde2e31487d8e8588c972943
-
Filesize
174KB
MD5634b2034b1a191e3eb5a447e6aeaebc8
SHA184dbf0dbbeed39aef836979d5d8c711b45f239f2
SHA2565f979fc8361e40e74d6e7da31e7996d557bde2f3f4145a27017df11cbb9a8645
SHA512cb5f3db3374ef99b664f294ba268958ccce11a611bed9552a31acda207f8e0d47625ccfbf972e651d4c7af22f5719ff4e94557cafde2e31487d8e8588c972943
-
Filesize
277KB
MD5580f127dfeb6fff79e8461d7895c623f
SHA187195d0ac46991a38c2fbbe92c580f966624bc5d
SHA25676d2570964775ada86fa62f14538b9e33aabb94b41f7597407495d509f61178e
SHA512d221b043a931f720c784819ab86215d86dfb6afdc1d9cd554ff00352928ba5a8c9549485092c1c68e28b5115ece0217622910d2c3a5ab9b3f6ba16e73f063f66
-
Filesize
277KB
MD5580f127dfeb6fff79e8461d7895c623f
SHA187195d0ac46991a38c2fbbe92c580f966624bc5d
SHA25676d2570964775ada86fa62f14538b9e33aabb94b41f7597407495d509f61178e
SHA512d221b043a931f720c784819ab86215d86dfb6afdc1d9cd554ff00352928ba5a8c9549485092c1c68e28b5115ece0217622910d2c3a5ab9b3f6ba16e73f063f66
-
Filesize
16KB
MD5ca958b12b8a24f3afb7fefb302f40a5c
SHA136b8c3e1420b9f2f2d00997727e99ae7ce2a6d58
SHA25603278f3b1a4edbc2db70e14e1a7706c6f25dc182c9dbc1972b5e33b313c2f4f4
SHA51271c6ddb07e14135d6642abd8640c7f6c8a2ff036ab708fa6c5aaa931df750e802f51dc9e4845a8b582e7ffd8a4a4635ca85dfe09a9901cf54f6308cfafec0b5f
-
Filesize
16KB
MD5ca958b12b8a24f3afb7fefb302f40a5c
SHA136b8c3e1420b9f2f2d00997727e99ae7ce2a6d58
SHA25603278f3b1a4edbc2db70e14e1a7706c6f25dc182c9dbc1972b5e33b313c2f4f4
SHA51271c6ddb07e14135d6642abd8640c7f6c8a2ff036ab708fa6c5aaa931df750e802f51dc9e4845a8b582e7ffd8a4a4635ca85dfe09a9901cf54f6308cfafec0b5f
-
Filesize
323KB
MD5bcf434ed301a186d71644f863a922a34
SHA15350615212dc6524a0f5acc9ce30dcfb3519bf5d
SHA256a134a29607f43595fbc8c18d470aee028081cca067e8c372d790ec7ec5f6259e
SHA512df1d8084bcd99f6dfd26b3e6764a0e83d310e3248b74aa506eb8314e5a52c18b305de05c8e7346ff6e5947c2169ea9b3d8e65d440a0c1bf68597d5182711cae3
-
Filesize
323KB
MD5bcf434ed301a186d71644f863a922a34
SHA15350615212dc6524a0f5acc9ce30dcfb3519bf5d
SHA256a134a29607f43595fbc8c18d470aee028081cca067e8c372d790ec7ec5f6259e
SHA512df1d8084bcd99f6dfd26b3e6764a0e83d310e3248b74aa506eb8314e5a52c18b305de05c8e7346ff6e5947c2169ea9b3d8e65d440a0c1bf68597d5182711cae3
-
Filesize
323KB
MD5bcf434ed301a186d71644f863a922a34
SHA15350615212dc6524a0f5acc9ce30dcfb3519bf5d
SHA256a134a29607f43595fbc8c18d470aee028081cca067e8c372d790ec7ec5f6259e
SHA512df1d8084bcd99f6dfd26b3e6764a0e83d310e3248b74aa506eb8314e5a52c18b305de05c8e7346ff6e5947c2169ea9b3d8e65d440a0c1bf68597d5182711cae3
-
Filesize
323KB
MD5bcf434ed301a186d71644f863a922a34
SHA15350615212dc6524a0f5acc9ce30dcfb3519bf5d
SHA256a134a29607f43595fbc8c18d470aee028081cca067e8c372d790ec7ec5f6259e
SHA512df1d8084bcd99f6dfd26b3e6764a0e83d310e3248b74aa506eb8314e5a52c18b305de05c8e7346ff6e5947c2169ea9b3d8e65d440a0c1bf68597d5182711cae3
-
Filesize
323KB
MD5bcf434ed301a186d71644f863a922a34
SHA15350615212dc6524a0f5acc9ce30dcfb3519bf5d
SHA256a134a29607f43595fbc8c18d470aee028081cca067e8c372d790ec7ec5f6259e
SHA512df1d8084bcd99f6dfd26b3e6764a0e83d310e3248b74aa506eb8314e5a52c18b305de05c8e7346ff6e5947c2169ea9b3d8e65d440a0c1bf68597d5182711cae3
-
Filesize
323KB
MD5bcf434ed301a186d71644f863a922a34
SHA15350615212dc6524a0f5acc9ce30dcfb3519bf5d
SHA256a134a29607f43595fbc8c18d470aee028081cca067e8c372d790ec7ec5f6259e
SHA512df1d8084bcd99f6dfd26b3e6764a0e83d310e3248b74aa506eb8314e5a52c18b305de05c8e7346ff6e5947c2169ea9b3d8e65d440a0c1bf68597d5182711cae3
-
Filesize
323KB
MD5bcf434ed301a186d71644f863a922a34
SHA15350615212dc6524a0f5acc9ce30dcfb3519bf5d
SHA256a134a29607f43595fbc8c18d470aee028081cca067e8c372d790ec7ec5f6259e
SHA512df1d8084bcd99f6dfd26b3e6764a0e83d310e3248b74aa506eb8314e5a52c18b305de05c8e7346ff6e5947c2169ea9b3d8e65d440a0c1bf68597d5182711cae3
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7