Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
50fd032a1bf115e267d0404131fa4993ca3399a864796e86f2cace5f800ae7bf.exe
Resource
win10v2004-20230703-en
General
-
Target
50fd032a1bf115e267d0404131fa4993ca3399a864796e86f2cace5f800ae7bf.exe
-
Size
704KB
-
MD5
1c36bbb5cea4e4d2acf2384833a6b5fd
-
SHA1
b0dfb57cc7590bb7cd53e7539716e5d2fbef7d01
-
SHA256
50fd032a1bf115e267d0404131fa4993ca3399a864796e86f2cace5f800ae7bf
-
SHA512
e939974b6cbaec7609deb592a6205fef71775ddd28ab78c9b37266e83fb92e348c7ce78b1f967122d370325e884bce3a6a410bda17fa29a8f2eac01f6a6ced14
-
SSDEEP
12288:RMrLy90/FuaRbrvNSSFkkBEoHAab5m/rSJX0yoe87mBLjIYRl5Tdw3WbwFN1kGit:OyiZdTnBVHAW5arCjoe87mBQKxw3rFnW
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00080000000231df-26.dat healer behavioral1/files/0x00080000000231df-27.dat healer behavioral1/memory/2556-28-0x0000000000E00000-0x0000000000E0A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g3168613.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g3168613.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g3168613.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g3168613.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g3168613.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g3168613.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 4948 x5603935.exe 2544 x1659427.exe 4780 x5208117.exe 2556 g3168613.exe 4532 h4034476.exe 5028 saves.exe 1072 i5622328.exe 2132 saves.exe 64 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 1244 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g3168613.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5208117.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 50fd032a1bf115e267d0404131fa4993ca3399a864796e86f2cace5f800ae7bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5603935.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1659427.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1008 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2556 g3168613.exe 2556 g3168613.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2556 g3168613.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3296 wrote to memory of 4948 3296 50fd032a1bf115e267d0404131fa4993ca3399a864796e86f2cace5f800ae7bf.exe 81 PID 3296 wrote to memory of 4948 3296 50fd032a1bf115e267d0404131fa4993ca3399a864796e86f2cace5f800ae7bf.exe 81 PID 3296 wrote to memory of 4948 3296 50fd032a1bf115e267d0404131fa4993ca3399a864796e86f2cace5f800ae7bf.exe 81 PID 4948 wrote to memory of 2544 4948 x5603935.exe 82 PID 4948 wrote to memory of 2544 4948 x5603935.exe 82 PID 4948 wrote to memory of 2544 4948 x5603935.exe 82 PID 2544 wrote to memory of 4780 2544 x1659427.exe 83 PID 2544 wrote to memory of 4780 2544 x1659427.exe 83 PID 2544 wrote to memory of 4780 2544 x1659427.exe 83 PID 4780 wrote to memory of 2556 4780 x5208117.exe 84 PID 4780 wrote to memory of 2556 4780 x5208117.exe 84 PID 4780 wrote to memory of 4532 4780 x5208117.exe 90 PID 4780 wrote to memory of 4532 4780 x5208117.exe 90 PID 4780 wrote to memory of 4532 4780 x5208117.exe 90 PID 4532 wrote to memory of 5028 4532 h4034476.exe 91 PID 4532 wrote to memory of 5028 4532 h4034476.exe 91 PID 4532 wrote to memory of 5028 4532 h4034476.exe 91 PID 2544 wrote to memory of 1072 2544 x1659427.exe 92 PID 2544 wrote to memory of 1072 2544 x1659427.exe 92 PID 2544 wrote to memory of 1072 2544 x1659427.exe 92 PID 5028 wrote to memory of 1008 5028 saves.exe 93 PID 5028 wrote to memory of 1008 5028 saves.exe 93 PID 5028 wrote to memory of 1008 5028 saves.exe 93 PID 5028 wrote to memory of 2120 5028 saves.exe 95 PID 5028 wrote to memory of 2120 5028 saves.exe 95 PID 5028 wrote to memory of 2120 5028 saves.exe 95 PID 2120 wrote to memory of 4536 2120 cmd.exe 97 PID 2120 wrote to memory of 4536 2120 cmd.exe 97 PID 2120 wrote to memory of 4536 2120 cmd.exe 97 PID 2120 wrote to memory of 964 2120 cmd.exe 98 PID 2120 wrote to memory of 964 2120 cmd.exe 98 PID 2120 wrote to memory of 964 2120 cmd.exe 98 PID 2120 wrote to memory of 3376 2120 cmd.exe 99 PID 2120 wrote to memory of 3376 2120 cmd.exe 99 PID 2120 wrote to memory of 3376 2120 cmd.exe 99 PID 2120 wrote to memory of 4744 2120 cmd.exe 100 PID 2120 wrote to memory of 4744 2120 cmd.exe 100 PID 2120 wrote to memory of 4744 2120 cmd.exe 100 PID 2120 wrote to memory of 4932 2120 cmd.exe 101 PID 2120 wrote to memory of 4932 2120 cmd.exe 101 PID 2120 wrote to memory of 4932 2120 cmd.exe 101 PID 2120 wrote to memory of 1520 2120 cmd.exe 102 PID 2120 wrote to memory of 1520 2120 cmd.exe 102 PID 2120 wrote to memory of 1520 2120 cmd.exe 102 PID 5028 wrote to memory of 1244 5028 saves.exe 109 PID 5028 wrote to memory of 1244 5028 saves.exe 109 PID 5028 wrote to memory of 1244 5028 saves.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\50fd032a1bf115e267d0404131fa4993ca3399a864796e86f2cace5f800ae7bf.exe"C:\Users\Admin\AppData\Local\Temp\50fd032a1bf115e267d0404131fa4993ca3399a864796e86f2cace5f800ae7bf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5603935.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5603935.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1659427.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1659427.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5208117.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5208117.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3168613.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3168613.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4034476.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4034476.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1008
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4536
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:964
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:3376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4932
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:1520
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:1244
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i5622328.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i5622328.exe4⤵
- Executes dropped EXE
PID:1072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2132
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:64
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5e8af5bccaf3dac58eb5f07784a8d38b9
SHA1f7ffad6c573e7b443440107449fb169541f0d0ac
SHA256c464dcbe84e2d26b84b95f12793d9b93609c738ab9cfc7c46da73ed36831b0f7
SHA512f94cd55425bf353b9b9e764a1ca499bce5d939c63c93fd645308394adfa7b4388e5d248d6fb6f46382df1bcd0b536da73aa52f3dbf615dde0b429da7c7acde21
-
Filesize
599KB
MD5e8af5bccaf3dac58eb5f07784a8d38b9
SHA1f7ffad6c573e7b443440107449fb169541f0d0ac
SHA256c464dcbe84e2d26b84b95f12793d9b93609c738ab9cfc7c46da73ed36831b0f7
SHA512f94cd55425bf353b9b9e764a1ca499bce5d939c63c93fd645308394adfa7b4388e5d248d6fb6f46382df1bcd0b536da73aa52f3dbf615dde0b429da7c7acde21
-
Filesize
433KB
MD52abb99f935f02110b0d635c0b37571b8
SHA1ddd7a849b94d9f6f6177f9a778b27a8be506719e
SHA256fa2479f1854f89f9eca2004f2c891d1bbf8129b4a55130c144cc0cc3e2a5e513
SHA51293ce1db7b6482a5e8a1bd4c50b7ea07ff14b49638bad5a90746078587c5d26c07509148b08485d793989ad0b3dd1b6ade64c4a462f5fc5ad07045105025cf9d7
-
Filesize
433KB
MD52abb99f935f02110b0d635c0b37571b8
SHA1ddd7a849b94d9f6f6177f9a778b27a8be506719e
SHA256fa2479f1854f89f9eca2004f2c891d1bbf8129b4a55130c144cc0cc3e2a5e513
SHA51293ce1db7b6482a5e8a1bd4c50b7ea07ff14b49638bad5a90746078587c5d26c07509148b08485d793989ad0b3dd1b6ade64c4a462f5fc5ad07045105025cf9d7
-
Filesize
174KB
MD5cb8eb73448c4dea9525ebf9b50e18f4f
SHA13ef2d4de5cecce7c66191542a4582eae4a148373
SHA2563a2a9d6a6fdc49907a49e8f02d0b097f73e4e3ad169613ba402000acf5ec0ed6
SHA51211c190cc517cecd760c5a6f8a53405fdde4c0f724fc60e735786e19ba383883828bcb59ecdad0a254c6c245e1bc5e8f401ee3ad67f9577282dd4459185593f5d
-
Filesize
174KB
MD5cb8eb73448c4dea9525ebf9b50e18f4f
SHA13ef2d4de5cecce7c66191542a4582eae4a148373
SHA2563a2a9d6a6fdc49907a49e8f02d0b097f73e4e3ad169613ba402000acf5ec0ed6
SHA51211c190cc517cecd760c5a6f8a53405fdde4c0f724fc60e735786e19ba383883828bcb59ecdad0a254c6c245e1bc5e8f401ee3ad67f9577282dd4459185593f5d
-
Filesize
277KB
MD5adee32b31262a16d72c0e71a4d68d9b0
SHA181b2196a8c8e9d6ba8283e9cdc71206da6df138b
SHA256d9416e3f8cb8983ad0f2d3a3774c6d362a077d0cba7d877ad6c7f3e797888a4d
SHA512de240be1a4f83736531e26de01eb26b287e67baace4f1f8b209bc1566f06de19478356be758513ef95c8f80012331bf45663f5b5565b9d74b2efb85283744528
-
Filesize
277KB
MD5adee32b31262a16d72c0e71a4d68d9b0
SHA181b2196a8c8e9d6ba8283e9cdc71206da6df138b
SHA256d9416e3f8cb8983ad0f2d3a3774c6d362a077d0cba7d877ad6c7f3e797888a4d
SHA512de240be1a4f83736531e26de01eb26b287e67baace4f1f8b209bc1566f06de19478356be758513ef95c8f80012331bf45663f5b5565b9d74b2efb85283744528
-
Filesize
16KB
MD558407bd346eafad2c041221fb4123aa1
SHA1978750623fc67da7db1d6c80af33c4eb3a097145
SHA2565ea15d8075e1bf7f9b977a9329aa57eb2ae2c053bd5cf4f51cf733bb069ab2b0
SHA51209fcf599593b7e198f8e503cea1ab95bd116e88e89cd6356e49b5f5f40e1377c320f1652d35c9cdd280931baee0d058a84d284e1bfc7b97a52ec8a225d4692c1
-
Filesize
16KB
MD558407bd346eafad2c041221fb4123aa1
SHA1978750623fc67da7db1d6c80af33c4eb3a097145
SHA2565ea15d8075e1bf7f9b977a9329aa57eb2ae2c053bd5cf4f51cf733bb069ab2b0
SHA51209fcf599593b7e198f8e503cea1ab95bd116e88e89cd6356e49b5f5f40e1377c320f1652d35c9cdd280931baee0d058a84d284e1bfc7b97a52ec8a225d4692c1
-
Filesize
324KB
MD594363dcc52c79eb3b7db40fbd15dce26
SHA1a7e4bac1639353968db7bfbed27970b99278e9f9
SHA2569250c876cacc4cdf6298bfe2e9e83df515580234e1eaa482ac64f07654010a56
SHA512494b0b7e1023ed1a9ea2acbe833bec18cd97f056c211f9b395b314d3788683ae56346e866bb21fcd09b2324c1c828912ac650ca6b73016a957d0f2782c9ff4e3
-
Filesize
324KB
MD594363dcc52c79eb3b7db40fbd15dce26
SHA1a7e4bac1639353968db7bfbed27970b99278e9f9
SHA2569250c876cacc4cdf6298bfe2e9e83df515580234e1eaa482ac64f07654010a56
SHA512494b0b7e1023ed1a9ea2acbe833bec18cd97f056c211f9b395b314d3788683ae56346e866bb21fcd09b2324c1c828912ac650ca6b73016a957d0f2782c9ff4e3
-
Filesize
324KB
MD594363dcc52c79eb3b7db40fbd15dce26
SHA1a7e4bac1639353968db7bfbed27970b99278e9f9
SHA2569250c876cacc4cdf6298bfe2e9e83df515580234e1eaa482ac64f07654010a56
SHA512494b0b7e1023ed1a9ea2acbe833bec18cd97f056c211f9b395b314d3788683ae56346e866bb21fcd09b2324c1c828912ac650ca6b73016a957d0f2782c9ff4e3
-
Filesize
324KB
MD594363dcc52c79eb3b7db40fbd15dce26
SHA1a7e4bac1639353968db7bfbed27970b99278e9f9
SHA2569250c876cacc4cdf6298bfe2e9e83df515580234e1eaa482ac64f07654010a56
SHA512494b0b7e1023ed1a9ea2acbe833bec18cd97f056c211f9b395b314d3788683ae56346e866bb21fcd09b2324c1c828912ac650ca6b73016a957d0f2782c9ff4e3
-
Filesize
324KB
MD594363dcc52c79eb3b7db40fbd15dce26
SHA1a7e4bac1639353968db7bfbed27970b99278e9f9
SHA2569250c876cacc4cdf6298bfe2e9e83df515580234e1eaa482ac64f07654010a56
SHA512494b0b7e1023ed1a9ea2acbe833bec18cd97f056c211f9b395b314d3788683ae56346e866bb21fcd09b2324c1c828912ac650ca6b73016a957d0f2782c9ff4e3
-
Filesize
324KB
MD594363dcc52c79eb3b7db40fbd15dce26
SHA1a7e4bac1639353968db7bfbed27970b99278e9f9
SHA2569250c876cacc4cdf6298bfe2e9e83df515580234e1eaa482ac64f07654010a56
SHA512494b0b7e1023ed1a9ea2acbe833bec18cd97f056c211f9b395b314d3788683ae56346e866bb21fcd09b2324c1c828912ac650ca6b73016a957d0f2782c9ff4e3
-
Filesize
324KB
MD594363dcc52c79eb3b7db40fbd15dce26
SHA1a7e4bac1639353968db7bfbed27970b99278e9f9
SHA2569250c876cacc4cdf6298bfe2e9e83df515580234e1eaa482ac64f07654010a56
SHA512494b0b7e1023ed1a9ea2acbe833bec18cd97f056c211f9b395b314d3788683ae56346e866bb21fcd09b2324c1c828912ac650ca6b73016a957d0f2782c9ff4e3
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7