Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 21:01
Static task
static1
Behavioral task
behavioral1
Sample
becb044445ecb1a042c80970616a6ae1cc37769295fa0a7c5367baa85d20fe54.exe
Resource
win10v2004-20230703-en
General
-
Target
becb044445ecb1a042c80970616a6ae1cc37769295fa0a7c5367baa85d20fe54.exe
-
Size
704KB
-
MD5
32096f364019b76e93a47aa9700a2380
-
SHA1
d599d7c4b1acd7c851e1e1937ba820a85c88221e
-
SHA256
becb044445ecb1a042c80970616a6ae1cc37769295fa0a7c5367baa85d20fe54
-
SHA512
e7902fb2166d5030ff20a15f999aaa89b588e96e298e9b9a19a2df096099a2c049fd46509e73cabfb52edc806e78248a2791cd005c849e1837b2646e1cf57ae3
-
SSDEEP
12288:eMrBy90Rrv2C8tJ1jz9ov/iMSojjcfqDgMPqGHeCBgDRIlLXQDml7E4/ylFpKz:3yQruDz9o3iMSoHQqkMKxFIlLEmlOFEz
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000800000002322e-26.dat healer behavioral1/files/0x000800000002322e-27.dat healer behavioral1/memory/2748-28-0x0000000000130000-0x000000000013A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g7821830.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g7821830.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g7821830.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g7821830.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g7821830.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g7821830.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 3196 x9388934.exe 3784 x8488181.exe 3300 x3732613.exe 2748 g7821830.exe 964 h6532597.exe 4168 saves.exe 5108 i9367203.exe 2256 saves.exe 460 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 2144 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g7821830.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9388934.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8488181.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x3732613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" becb044445ecb1a042c80970616a6ae1cc37769295fa0a7c5367baa85d20fe54.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4716 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2748 g7821830.exe 2748 g7821830.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2748 g7821830.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2212 wrote to memory of 3196 2212 becb044445ecb1a042c80970616a6ae1cc37769295fa0a7c5367baa85d20fe54.exe 80 PID 2212 wrote to memory of 3196 2212 becb044445ecb1a042c80970616a6ae1cc37769295fa0a7c5367baa85d20fe54.exe 80 PID 2212 wrote to memory of 3196 2212 becb044445ecb1a042c80970616a6ae1cc37769295fa0a7c5367baa85d20fe54.exe 80 PID 3196 wrote to memory of 3784 3196 x9388934.exe 81 PID 3196 wrote to memory of 3784 3196 x9388934.exe 81 PID 3196 wrote to memory of 3784 3196 x9388934.exe 81 PID 3784 wrote to memory of 3300 3784 x8488181.exe 82 PID 3784 wrote to memory of 3300 3784 x8488181.exe 82 PID 3784 wrote to memory of 3300 3784 x8488181.exe 82 PID 3300 wrote to memory of 2748 3300 x3732613.exe 83 PID 3300 wrote to memory of 2748 3300 x3732613.exe 83 PID 3300 wrote to memory of 964 3300 x3732613.exe 92 PID 3300 wrote to memory of 964 3300 x3732613.exe 92 PID 3300 wrote to memory of 964 3300 x3732613.exe 92 PID 964 wrote to memory of 4168 964 h6532597.exe 93 PID 964 wrote to memory of 4168 964 h6532597.exe 93 PID 964 wrote to memory of 4168 964 h6532597.exe 93 PID 3784 wrote to memory of 5108 3784 x8488181.exe 94 PID 3784 wrote to memory of 5108 3784 x8488181.exe 94 PID 3784 wrote to memory of 5108 3784 x8488181.exe 94 PID 4168 wrote to memory of 4716 4168 saves.exe 96 PID 4168 wrote to memory of 4716 4168 saves.exe 96 PID 4168 wrote to memory of 4716 4168 saves.exe 96 PID 4168 wrote to memory of 4500 4168 saves.exe 98 PID 4168 wrote to memory of 4500 4168 saves.exe 98 PID 4168 wrote to memory of 4500 4168 saves.exe 98 PID 4500 wrote to memory of 1592 4500 cmd.exe 100 PID 4500 wrote to memory of 1592 4500 cmd.exe 100 PID 4500 wrote to memory of 1592 4500 cmd.exe 100 PID 4500 wrote to memory of 2712 4500 cmd.exe 101 PID 4500 wrote to memory of 2712 4500 cmd.exe 101 PID 4500 wrote to memory of 2712 4500 cmd.exe 101 PID 4500 wrote to memory of 1688 4500 cmd.exe 102 PID 4500 wrote to memory of 1688 4500 cmd.exe 102 PID 4500 wrote to memory of 1688 4500 cmd.exe 102 PID 4500 wrote to memory of 4916 4500 cmd.exe 103 PID 4500 wrote to memory of 4916 4500 cmd.exe 103 PID 4500 wrote to memory of 4916 4500 cmd.exe 103 PID 4500 wrote to memory of 1804 4500 cmd.exe 104 PID 4500 wrote to memory of 1804 4500 cmd.exe 104 PID 4500 wrote to memory of 1804 4500 cmd.exe 104 PID 4500 wrote to memory of 1180 4500 cmd.exe 105 PID 4500 wrote to memory of 1180 4500 cmd.exe 105 PID 4500 wrote to memory of 1180 4500 cmd.exe 105 PID 4168 wrote to memory of 2144 4168 saves.exe 108 PID 4168 wrote to memory of 2144 4168 saves.exe 108 PID 4168 wrote to memory of 2144 4168 saves.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\becb044445ecb1a042c80970616a6ae1cc37769295fa0a7c5367baa85d20fe54.exe"C:\Users\Admin\AppData\Local\Temp\becb044445ecb1a042c80970616a6ae1cc37769295fa0a7c5367baa85d20fe54.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9388934.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9388934.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8488181.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8488181.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3732613.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3732613.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7821830.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7821830.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6532597.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6532597.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4716
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1592
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:2712
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:1688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4916
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:1804
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:1180
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:2144
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9367203.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9367203.exe4⤵
- Executes dropped EXE
PID:5108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2256
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:460
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5ed238bd1d2a234262d7203c56acf696f
SHA1ff6781fbce327fc1f9a28d02c895c62d827ec616
SHA256f4251716ffad4048a2d724291d4c4f556af9e1bfd08d09c073907493764bc00c
SHA512d10c55e072f09f4dd55b9a2a699f2009dff54d436f0190b2d6ed11fce0eebcde8e26a797dec1b6788dba23a9dabbcb563a0d7e19a96f67a0d4dde7f791b4da70
-
Filesize
599KB
MD5ed238bd1d2a234262d7203c56acf696f
SHA1ff6781fbce327fc1f9a28d02c895c62d827ec616
SHA256f4251716ffad4048a2d724291d4c4f556af9e1bfd08d09c073907493764bc00c
SHA512d10c55e072f09f4dd55b9a2a699f2009dff54d436f0190b2d6ed11fce0eebcde8e26a797dec1b6788dba23a9dabbcb563a0d7e19a96f67a0d4dde7f791b4da70
-
Filesize
433KB
MD5c69cc8ad8bd700c67254e96acb07ea5a
SHA12abcc1f9b21ea2589cd687659a22b6ffc691dd35
SHA2563b0807d4d4901cebecf260c5e6b5810284a7479fa1167a51b4618d8ced170ba0
SHA512606bea67c4d6776872bd8339eb391a11583c35bebc5deb9f67c9b4fa9c1b40c25fb3c41ad51017ec258edc60eabda8f29fed78dd7161e5422227d077006afedd
-
Filesize
433KB
MD5c69cc8ad8bd700c67254e96acb07ea5a
SHA12abcc1f9b21ea2589cd687659a22b6ffc691dd35
SHA2563b0807d4d4901cebecf260c5e6b5810284a7479fa1167a51b4618d8ced170ba0
SHA512606bea67c4d6776872bd8339eb391a11583c35bebc5deb9f67c9b4fa9c1b40c25fb3c41ad51017ec258edc60eabda8f29fed78dd7161e5422227d077006afedd
-
Filesize
174KB
MD54db1ac2438441312413342bb5a15c660
SHA14505ab739d5e68eb0a567f49d246bfbae8057dee
SHA2569cc5973790f79a7694557d1c3bfbd8d7c5c8349574969073c352d3a4392b9dd6
SHA5129eb87554ef8b931a4a7aad204168c59d7ee1a65ba311c72e76d60e472512573a417b1c4b7f059fe55213bece033b254d2b1f0f8b0813c0083a441914bcb1af99
-
Filesize
174KB
MD54db1ac2438441312413342bb5a15c660
SHA14505ab739d5e68eb0a567f49d246bfbae8057dee
SHA2569cc5973790f79a7694557d1c3bfbd8d7c5c8349574969073c352d3a4392b9dd6
SHA5129eb87554ef8b931a4a7aad204168c59d7ee1a65ba311c72e76d60e472512573a417b1c4b7f059fe55213bece033b254d2b1f0f8b0813c0083a441914bcb1af99
-
Filesize
277KB
MD5176e27d1c893e9aad0d65ac9847a2dfd
SHA109eef171bc3ea72a695853de54a7e6000108aac8
SHA256fe9ecd7d35d166db0ccec1f5fe2010603888f70266dbef3d9a19b59dc8da91f3
SHA512474b21bd94d7d02c45282d315e25f1862202d1a3ac0d68f6b007f34fd1cba864e13908e75fe0a3cc3548cc90a3f8cf71e8abccd27b7c7db078cba3b133b5d0eb
-
Filesize
277KB
MD5176e27d1c893e9aad0d65ac9847a2dfd
SHA109eef171bc3ea72a695853de54a7e6000108aac8
SHA256fe9ecd7d35d166db0ccec1f5fe2010603888f70266dbef3d9a19b59dc8da91f3
SHA512474b21bd94d7d02c45282d315e25f1862202d1a3ac0d68f6b007f34fd1cba864e13908e75fe0a3cc3548cc90a3f8cf71e8abccd27b7c7db078cba3b133b5d0eb
-
Filesize
17KB
MD5fe1c5428dc2f35804c2330bf5b7c8234
SHA19a5a5c1b121ecb29a21207b1cf01d2b524db473b
SHA2569727048e6a1ba6073681fdcaa458b78f558110d15787d54e3baf53a55c94a943
SHA512fef4cd65596cbc6aa803849054deec622da7b58d08f5cecaa93eaf0fbf4b830b286840075b5b1a990170e4e6dbb68aa412068314e210b6c5897912aaca4b3ab9
-
Filesize
17KB
MD5fe1c5428dc2f35804c2330bf5b7c8234
SHA19a5a5c1b121ecb29a21207b1cf01d2b524db473b
SHA2569727048e6a1ba6073681fdcaa458b78f558110d15787d54e3baf53a55c94a943
SHA512fef4cd65596cbc6aa803849054deec622da7b58d08f5cecaa93eaf0fbf4b830b286840075b5b1a990170e4e6dbb68aa412068314e210b6c5897912aaca4b3ab9
-
Filesize
326KB
MD5c3d496b4a9f01b8e6e39c8961e3767a9
SHA1ffbea357702315c3ca1d5f3ba155e9173d8c801f
SHA25632d2a09d0f153b9321488460c8cd0a611ef83123ededbefeedd2a8769c42ee52
SHA5126b79ebc398fec11dbd0eca37634334f00b022680df6c5ada4cb2284a5e514c4e696e0c6e18f815635780cf02d82ffc9551fe89318e9dc447f3a09cbabfebe7d9
-
Filesize
326KB
MD5c3d496b4a9f01b8e6e39c8961e3767a9
SHA1ffbea357702315c3ca1d5f3ba155e9173d8c801f
SHA25632d2a09d0f153b9321488460c8cd0a611ef83123ededbefeedd2a8769c42ee52
SHA5126b79ebc398fec11dbd0eca37634334f00b022680df6c5ada4cb2284a5e514c4e696e0c6e18f815635780cf02d82ffc9551fe89318e9dc447f3a09cbabfebe7d9
-
Filesize
326KB
MD5c3d496b4a9f01b8e6e39c8961e3767a9
SHA1ffbea357702315c3ca1d5f3ba155e9173d8c801f
SHA25632d2a09d0f153b9321488460c8cd0a611ef83123ededbefeedd2a8769c42ee52
SHA5126b79ebc398fec11dbd0eca37634334f00b022680df6c5ada4cb2284a5e514c4e696e0c6e18f815635780cf02d82ffc9551fe89318e9dc447f3a09cbabfebe7d9
-
Filesize
326KB
MD5c3d496b4a9f01b8e6e39c8961e3767a9
SHA1ffbea357702315c3ca1d5f3ba155e9173d8c801f
SHA25632d2a09d0f153b9321488460c8cd0a611ef83123ededbefeedd2a8769c42ee52
SHA5126b79ebc398fec11dbd0eca37634334f00b022680df6c5ada4cb2284a5e514c4e696e0c6e18f815635780cf02d82ffc9551fe89318e9dc447f3a09cbabfebe7d9
-
Filesize
326KB
MD5c3d496b4a9f01b8e6e39c8961e3767a9
SHA1ffbea357702315c3ca1d5f3ba155e9173d8c801f
SHA25632d2a09d0f153b9321488460c8cd0a611ef83123ededbefeedd2a8769c42ee52
SHA5126b79ebc398fec11dbd0eca37634334f00b022680df6c5ada4cb2284a5e514c4e696e0c6e18f815635780cf02d82ffc9551fe89318e9dc447f3a09cbabfebe7d9
-
Filesize
326KB
MD5c3d496b4a9f01b8e6e39c8961e3767a9
SHA1ffbea357702315c3ca1d5f3ba155e9173d8c801f
SHA25632d2a09d0f153b9321488460c8cd0a611ef83123ededbefeedd2a8769c42ee52
SHA5126b79ebc398fec11dbd0eca37634334f00b022680df6c5ada4cb2284a5e514c4e696e0c6e18f815635780cf02d82ffc9551fe89318e9dc447f3a09cbabfebe7d9
-
Filesize
326KB
MD5c3d496b4a9f01b8e6e39c8961e3767a9
SHA1ffbea357702315c3ca1d5f3ba155e9173d8c801f
SHA25632d2a09d0f153b9321488460c8cd0a611ef83123ededbefeedd2a8769c42ee52
SHA5126b79ebc398fec11dbd0eca37634334f00b022680df6c5ada4cb2284a5e514c4e696e0c6e18f815635780cf02d82ffc9551fe89318e9dc447f3a09cbabfebe7d9
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7