Analysis
-
max time kernel
152s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2023 16:57
Static task
static1
Behavioral task
behavioral1
Sample
455b8457f31ece26e6a8ab7826deb745065432f3272dc029c6437157bae8ba24.exe
Resource
win10v2004-20230703-en
General
-
Target
455b8457f31ece26e6a8ab7826deb745065432f3272dc029c6437157bae8ba24.exe
-
Size
704KB
-
MD5
8fe020ce08e919338d39ce870e1142ff
-
SHA1
ce82969b6f12f94097fca72f0d7da099644bbb2b
-
SHA256
455b8457f31ece26e6a8ab7826deb745065432f3272dc029c6437157bae8ba24
-
SHA512
2b2284656aa722239e62a482c4c920823cdd81978703742103146fcdf9e3adc7ca15d05b1107e0196466706a01e90b9d1eb673f2590fcfd2bd3598c2ecd552f9
-
SSDEEP
12288:EMr1y90MG6ILV918gs+AM/aduqAkezrDbJNlaDioCSFcJL+tSTSd3:Byy6Y8V+AtIkeHfJN4u4XtSTSp
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0008000000023240-26.dat healer behavioral1/files/0x0008000000023240-27.dat healer behavioral1/memory/2684-28-0x00000000004E0000-0x00000000004EA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g6381562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g6381562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g6381562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g6381562.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g6381562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g6381562.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 4648 x3206710.exe 3000 x6859980.exe 3008 x5533895.exe 2684 g6381562.exe 4456 h1370236.exe 1268 saves.exe 3016 i7667261.exe 4880 saves.exe 2680 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4504 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g6381562.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 455b8457f31ece26e6a8ab7826deb745065432f3272dc029c6437157bae8ba24.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3206710.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6859980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5533895.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 448 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2684 g6381562.exe 2684 g6381562.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2684 g6381562.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3596 wrote to memory of 4648 3596 455b8457f31ece26e6a8ab7826deb745065432f3272dc029c6437157bae8ba24.exe 81 PID 3596 wrote to memory of 4648 3596 455b8457f31ece26e6a8ab7826deb745065432f3272dc029c6437157bae8ba24.exe 81 PID 3596 wrote to memory of 4648 3596 455b8457f31ece26e6a8ab7826deb745065432f3272dc029c6437157bae8ba24.exe 81 PID 4648 wrote to memory of 3000 4648 x3206710.exe 82 PID 4648 wrote to memory of 3000 4648 x3206710.exe 82 PID 4648 wrote to memory of 3000 4648 x3206710.exe 82 PID 3000 wrote to memory of 3008 3000 x6859980.exe 83 PID 3000 wrote to memory of 3008 3000 x6859980.exe 83 PID 3000 wrote to memory of 3008 3000 x6859980.exe 83 PID 3008 wrote to memory of 2684 3008 x5533895.exe 84 PID 3008 wrote to memory of 2684 3008 x5533895.exe 84 PID 3008 wrote to memory of 4456 3008 x5533895.exe 92 PID 3008 wrote to memory of 4456 3008 x5533895.exe 92 PID 3008 wrote to memory of 4456 3008 x5533895.exe 92 PID 4456 wrote to memory of 1268 4456 h1370236.exe 93 PID 4456 wrote to memory of 1268 4456 h1370236.exe 93 PID 4456 wrote to memory of 1268 4456 h1370236.exe 93 PID 3000 wrote to memory of 3016 3000 x6859980.exe 94 PID 3000 wrote to memory of 3016 3000 x6859980.exe 94 PID 3000 wrote to memory of 3016 3000 x6859980.exe 94 PID 1268 wrote to memory of 448 1268 saves.exe 95 PID 1268 wrote to memory of 448 1268 saves.exe 95 PID 1268 wrote to memory of 448 1268 saves.exe 95 PID 1268 wrote to memory of 1324 1268 saves.exe 97 PID 1268 wrote to memory of 1324 1268 saves.exe 97 PID 1268 wrote to memory of 1324 1268 saves.exe 97 PID 1324 wrote to memory of 4496 1324 cmd.exe 99 PID 1324 wrote to memory of 4496 1324 cmd.exe 99 PID 1324 wrote to memory of 4496 1324 cmd.exe 99 PID 1324 wrote to memory of 796 1324 cmd.exe 100 PID 1324 wrote to memory of 796 1324 cmd.exe 100 PID 1324 wrote to memory of 796 1324 cmd.exe 100 PID 1324 wrote to memory of 2792 1324 cmd.exe 101 PID 1324 wrote to memory of 2792 1324 cmd.exe 101 PID 1324 wrote to memory of 2792 1324 cmd.exe 101 PID 1324 wrote to memory of 464 1324 cmd.exe 102 PID 1324 wrote to memory of 464 1324 cmd.exe 102 PID 1324 wrote to memory of 464 1324 cmd.exe 102 PID 1324 wrote to memory of 3812 1324 cmd.exe 103 PID 1324 wrote to memory of 3812 1324 cmd.exe 103 PID 1324 wrote to memory of 3812 1324 cmd.exe 103 PID 1324 wrote to memory of 2960 1324 cmd.exe 104 PID 1324 wrote to memory of 2960 1324 cmd.exe 104 PID 1324 wrote to memory of 2960 1324 cmd.exe 104 PID 1268 wrote to memory of 4504 1268 saves.exe 108 PID 1268 wrote to memory of 4504 1268 saves.exe 108 PID 1268 wrote to memory of 4504 1268 saves.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\455b8457f31ece26e6a8ab7826deb745065432f3272dc029c6437157bae8ba24.exe"C:\Users\Admin\AppData\Local\Temp\455b8457f31ece26e6a8ab7826deb745065432f3272dc029c6437157bae8ba24.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3206710.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3206710.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6859980.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6859980.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5533895.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5533895.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6381562.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6381562.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1370236.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1370236.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:448
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4496
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:796
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:464
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:2960
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4504
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7667261.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7667261.exe4⤵
- Executes dropped EXE
PID:3016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4880
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2680
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD50cf292ae27892b1cbc1eb8d16ca3fb96
SHA11f5b46787b8d1a44f4b0c370329f2ae3349912a0
SHA256011dcfedbbaa8e0631aa31eb0586a7da618830c14ac20aea6b77bf46cb095870
SHA512678aeb4a4186ac8eb29a63dfed933cac61ca463410ea2708f30c07eef2b86c86ebbe73dba76a923411b9e8123f8f7c10d3cd1e8c77948d3776e92dfe94e8dee9
-
Filesize
599KB
MD50cf292ae27892b1cbc1eb8d16ca3fb96
SHA11f5b46787b8d1a44f4b0c370329f2ae3349912a0
SHA256011dcfedbbaa8e0631aa31eb0586a7da618830c14ac20aea6b77bf46cb095870
SHA512678aeb4a4186ac8eb29a63dfed933cac61ca463410ea2708f30c07eef2b86c86ebbe73dba76a923411b9e8123f8f7c10d3cd1e8c77948d3776e92dfe94e8dee9
-
Filesize
433KB
MD5464125186ff306d7e6aabff0fb178276
SHA17711a76478fb65db5c19ec1320f4cdf4c4be40a3
SHA256f786d6037520a7d47b55485663457ced0d6a44d4a31033487e38ebd81edd018f
SHA512206cb3522382515938941a29f179d6a0e822ba29643bb26327feb63f5f34d66d9933cef6c3e30ab21bcead52a4711cac474eed216e10c124ad87bbc69ede9954
-
Filesize
433KB
MD5464125186ff306d7e6aabff0fb178276
SHA17711a76478fb65db5c19ec1320f4cdf4c4be40a3
SHA256f786d6037520a7d47b55485663457ced0d6a44d4a31033487e38ebd81edd018f
SHA512206cb3522382515938941a29f179d6a0e822ba29643bb26327feb63f5f34d66d9933cef6c3e30ab21bcead52a4711cac474eed216e10c124ad87bbc69ede9954
-
Filesize
174KB
MD531674e54b3de638a51c4bc8fb34cb1f4
SHA1fd0bab3fb13ab7a05c0cb0169c41321d7cd2a2b3
SHA256d0b2e27ac2a1b0e4de0ed109311bfb6f92a5aa2a1670cedb4a27b9195facaa85
SHA512a11de695a942407f726c958b3b82281261651407a62735d1d293a1fc9e3883edd47dc8ba45df57356f501aa60174822901b8ace4dbeb7f884e92752e942a831b
-
Filesize
174KB
MD531674e54b3de638a51c4bc8fb34cb1f4
SHA1fd0bab3fb13ab7a05c0cb0169c41321d7cd2a2b3
SHA256d0b2e27ac2a1b0e4de0ed109311bfb6f92a5aa2a1670cedb4a27b9195facaa85
SHA512a11de695a942407f726c958b3b82281261651407a62735d1d293a1fc9e3883edd47dc8ba45df57356f501aa60174822901b8ace4dbeb7f884e92752e942a831b
-
Filesize
277KB
MD5922ef9eee8505cbf6965b91df2ff42a6
SHA15f4897118ae1f51de3dcdd20750f7d2abd0d9881
SHA2560799658e232d554a8566bc921bf40fc8c850fb877c20bb755360ce1cfb5102f8
SHA512ffa4615f74c746cfc2f38279c650ae27b689d9ef7ac22e58256d6c384081bd598aee9befca465de4be04aae8fa75b332f222af49f7ad317e71cd6d42c7aa1ff8
-
Filesize
277KB
MD5922ef9eee8505cbf6965b91df2ff42a6
SHA15f4897118ae1f51de3dcdd20750f7d2abd0d9881
SHA2560799658e232d554a8566bc921bf40fc8c850fb877c20bb755360ce1cfb5102f8
SHA512ffa4615f74c746cfc2f38279c650ae27b689d9ef7ac22e58256d6c384081bd598aee9befca465de4be04aae8fa75b332f222af49f7ad317e71cd6d42c7aa1ff8
-
Filesize
16KB
MD57d66741ed46964d07f3950244801e31c
SHA1caa28e3a228ed87d10f106c5e640028f93feb551
SHA256607c8cea74c6abc2a722e6caefa22e2b2a37869c08d30bfcdf9d032f1e2ee2b0
SHA512c20a0364b28916cc939bcc0aac00a070792780e5b7d1e4dc0742d9101538af38c9f49b1a322fe187ba8099eddf8c7d9dfaa6a449f22b2c239148e8697d0c7fed
-
Filesize
16KB
MD57d66741ed46964d07f3950244801e31c
SHA1caa28e3a228ed87d10f106c5e640028f93feb551
SHA256607c8cea74c6abc2a722e6caefa22e2b2a37869c08d30bfcdf9d032f1e2ee2b0
SHA512c20a0364b28916cc939bcc0aac00a070792780e5b7d1e4dc0742d9101538af38c9f49b1a322fe187ba8099eddf8c7d9dfaa6a449f22b2c239148e8697d0c7fed
-
Filesize
324KB
MD57301aec073219b8b3caf5c4e45315040
SHA1ab8eeb43ee04b2ad83f2ed5a84f5ba62d7dccfd9
SHA256455e8b79c737bbd25443a3348417ad92caefdb8faa8fb6f1e649c8a5fa54da8c
SHA512222f40f6cbfdd5e0144579a5013c033e6e46b4bac51c6f7f8217af949ace4bcf6fb250ae3be2c4d4ed4c93939109291d86842ff7ce93a90eba042aecd24c7e2b
-
Filesize
324KB
MD57301aec073219b8b3caf5c4e45315040
SHA1ab8eeb43ee04b2ad83f2ed5a84f5ba62d7dccfd9
SHA256455e8b79c737bbd25443a3348417ad92caefdb8faa8fb6f1e649c8a5fa54da8c
SHA512222f40f6cbfdd5e0144579a5013c033e6e46b4bac51c6f7f8217af949ace4bcf6fb250ae3be2c4d4ed4c93939109291d86842ff7ce93a90eba042aecd24c7e2b
-
Filesize
324KB
MD57301aec073219b8b3caf5c4e45315040
SHA1ab8eeb43ee04b2ad83f2ed5a84f5ba62d7dccfd9
SHA256455e8b79c737bbd25443a3348417ad92caefdb8faa8fb6f1e649c8a5fa54da8c
SHA512222f40f6cbfdd5e0144579a5013c033e6e46b4bac51c6f7f8217af949ace4bcf6fb250ae3be2c4d4ed4c93939109291d86842ff7ce93a90eba042aecd24c7e2b
-
Filesize
324KB
MD57301aec073219b8b3caf5c4e45315040
SHA1ab8eeb43ee04b2ad83f2ed5a84f5ba62d7dccfd9
SHA256455e8b79c737bbd25443a3348417ad92caefdb8faa8fb6f1e649c8a5fa54da8c
SHA512222f40f6cbfdd5e0144579a5013c033e6e46b4bac51c6f7f8217af949ace4bcf6fb250ae3be2c4d4ed4c93939109291d86842ff7ce93a90eba042aecd24c7e2b
-
Filesize
324KB
MD57301aec073219b8b3caf5c4e45315040
SHA1ab8eeb43ee04b2ad83f2ed5a84f5ba62d7dccfd9
SHA256455e8b79c737bbd25443a3348417ad92caefdb8faa8fb6f1e649c8a5fa54da8c
SHA512222f40f6cbfdd5e0144579a5013c033e6e46b4bac51c6f7f8217af949ace4bcf6fb250ae3be2c4d4ed4c93939109291d86842ff7ce93a90eba042aecd24c7e2b
-
Filesize
324KB
MD57301aec073219b8b3caf5c4e45315040
SHA1ab8eeb43ee04b2ad83f2ed5a84f5ba62d7dccfd9
SHA256455e8b79c737bbd25443a3348417ad92caefdb8faa8fb6f1e649c8a5fa54da8c
SHA512222f40f6cbfdd5e0144579a5013c033e6e46b4bac51c6f7f8217af949ace4bcf6fb250ae3be2c4d4ed4c93939109291d86842ff7ce93a90eba042aecd24c7e2b
-
Filesize
324KB
MD57301aec073219b8b3caf5c4e45315040
SHA1ab8eeb43ee04b2ad83f2ed5a84f5ba62d7dccfd9
SHA256455e8b79c737bbd25443a3348417ad92caefdb8faa8fb6f1e649c8a5fa54da8c
SHA512222f40f6cbfdd5e0144579a5013c033e6e46b4bac51c6f7f8217af949ace4bcf6fb250ae3be2c4d4ed4c93939109291d86842ff7ce93a90eba042aecd24c7e2b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7