Analysis
-
max time kernel
4294249s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
02-04-2022 20:51
Static task
static1
Behavioral task
behavioral1
Sample
satana.exe
Resource
win7-20220311-en
General
-
Target
satana.exe
-
Size
49KB
-
MD5
46bfd4f1d581d7c0121d2b19a005d3df
-
SHA1
5b063298bbd1670b4d39e1baef67f854b8dcba9d
-
SHA256
683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
-
SHA512
b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!satana!.txt
Signatures
-
Satana
Ransomware family which also encrypts the system's Master Boot Record (MBR).
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
jbbf.exejbbf.exepid process 1808 jbbf.exe 1476 jbbf.exe -
Deletes itself 1 IoCs
Processes:
jbbf.exepid process 1476 jbbf.exe -
Loads dropped DLL 6 IoCs
Processes:
satana.exejbbf.exejbbf.exepid process 1880 satana.exe 1880 satana.exe 1880 satana.exe 1880 satana.exe 1808 jbbf.exe 1476 jbbf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
satana.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run satana.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\Run\qtlmdigk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\!satana!.txt" satana.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
jbbf.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 jbbf.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
satana.exejbbf.exedescription pid process target process PID 1924 set thread context of 1880 1924 satana.exe satana.exe PID 1808 set thread context of 1476 1808 jbbf.exe jbbf.exe -
Drops file in Program Files directory 64 IoCs
Processes:
jbbf.exedescription ioc process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\ea.xml jbbf.exe File created C:\Program Files\Windows Sidebar\de-DE\!satana!.txt jbbf.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\pdf.gif jbbf.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\28.png jbbf.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circleround_selectionsubpicture.png jbbf.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\drag.png jbbf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\Attachments.jpg jbbf.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Oasis\!satana!.txt jbbf.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-shadow.png jbbf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler-charts.xml jbbf.exe File created C:\Program Files\Java\jre7\bin\dtplugin\!satana!.txt jbbf.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\novelty.png jbbf.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\!satana!.txt jbbf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SoftBlue\tab_on.gif jbbf.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_corner_top_left.png jbbf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\plugin.xml jbbf.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\trad_m.png jbbf.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\server_issue.gif jbbf.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\HandPrints.jpg jbbf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\ViewHeaderPreview.jpg jbbf.exe File created C:\Program Files\Common Files\Microsoft Shared\!satana!.txt jbbf.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationUp_SelectionSubpicture.png jbbf.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\!satana!.txt jbbf.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\!satana!.txt jbbf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Clarity.xml jbbf.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaireMCE.png jbbf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_OliveGreen.gif jbbf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsplk.xml jbbf.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_corner_top_right.png jbbf.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\cloud_Thumbnail.bmp jbbf.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\!satana!.txt jbbf.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\gadget.xml jbbf.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\!satana!.txt jbbf.exe File created C:\Program Files\Windows NT\TableTextService\ja-JP\!satana!.txt jbbf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_bullets.gif jbbf.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\DMR_48.jpg jbbf.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_corner_bottom_left.png jbbf.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\32.png jbbf.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_SelectionSubpicture.png jbbf.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\passport.png jbbf.exe File created C:\Program Files\Windows NT\Accessories\en-US\!satana!.txt jbbf.exe File created C:\Program Files (x86)\Internet Explorer\ja-JP\!satana!.txt jbbf.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt jbbf.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\!satana!.txt jbbf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7TSFrame.png jbbf.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\!satana!.txt jbbf.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\!satana!.txt jbbf.exe File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\!satana!.txt jbbf.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\!satana!.txt jbbf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Slipstream.xml jbbf.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\combo-hover-right.png jbbf.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waxing-gibbous.png jbbf.exe File created C:\Program Files (x86)\Windows Defender\ja-JP\!satana!.txt jbbf.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\!satana!.txt jbbf.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\!satana!.txt jbbf.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\!satana!.txt jbbf.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-first-quarter.png jbbf.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\!satana!.txt jbbf.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\!satana!.txt jbbf.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color32.bmp jbbf.exe File created C:\Program Files\Windows NT\Accessories\es-ES\!satana!.txt jbbf.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\!satana!.txt jbbf.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\gadget.xml jbbf.exe File created C:\Program Files (x86)\Microsoft Office\Office14\!satana!.txt jbbf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
VSSADMIN.EXEpid process 1188 VSSADMIN.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
jbbf.exevssvc.exedescription pid process Token: SeIncBasePriorityPrivilege 1476 jbbf.exe Token: SeBackupPrivilege 896 vssvc.exe Token: SeRestorePrivilege 896 vssvc.exe Token: SeAuditPrivilege 896 vssvc.exe Token: SeShutdownPrivilege 1476 jbbf.exe -
Suspicious use of WriteProcessMemory 58 IoCs
Processes:
satana.exesatana.exejbbf.exejbbf.exedescription pid process target process PID 1924 wrote to memory of 1880 1924 satana.exe satana.exe PID 1924 wrote to memory of 1880 1924 satana.exe satana.exe PID 1924 wrote to memory of 1880 1924 satana.exe satana.exe PID 1924 wrote to memory of 1880 1924 satana.exe satana.exe PID 1924 wrote to memory of 1880 1924 satana.exe satana.exe PID 1924 wrote to memory of 1880 1924 satana.exe satana.exe PID 1924 wrote to memory of 1880 1924 satana.exe satana.exe PID 1924 wrote to memory of 1880 1924 satana.exe satana.exe PID 1924 wrote to memory of 1880 1924 satana.exe satana.exe PID 1924 wrote to memory of 1880 1924 satana.exe satana.exe PID 1880 wrote to memory of 1808 1880 satana.exe jbbf.exe PID 1880 wrote to memory of 1808 1880 satana.exe jbbf.exe PID 1880 wrote to memory of 1808 1880 satana.exe jbbf.exe PID 1880 wrote to memory of 1808 1880 satana.exe jbbf.exe PID 1808 wrote to memory of 1476 1808 jbbf.exe jbbf.exe PID 1808 wrote to memory of 1476 1808 jbbf.exe jbbf.exe PID 1808 wrote to memory of 1476 1808 jbbf.exe jbbf.exe PID 1808 wrote to memory of 1476 1808 jbbf.exe jbbf.exe PID 1808 wrote to memory of 1476 1808 jbbf.exe jbbf.exe PID 1808 wrote to memory of 1476 1808 jbbf.exe jbbf.exe PID 1808 wrote to memory of 1476 1808 jbbf.exe jbbf.exe PID 1808 wrote to memory of 1476 1808 jbbf.exe jbbf.exe PID 1808 wrote to memory of 1476 1808 jbbf.exe jbbf.exe PID 1808 wrote to memory of 1476 1808 jbbf.exe jbbf.exe PID 1476 wrote to memory of 1188 1476 jbbf.exe VSSADMIN.EXE PID 1476 wrote to memory of 1188 1476 jbbf.exe VSSADMIN.EXE PID 1476 wrote to memory of 1188 1476 jbbf.exe VSSADMIN.EXE PID 1476 wrote to memory of 1188 1476 jbbf.exe VSSADMIN.EXE PID 1476 wrote to memory of 12020 1476 jbbf.exe NOTEPAD.EXE PID 1476 wrote to memory of 12020 1476 jbbf.exe NOTEPAD.EXE PID 1476 wrote to memory of 12020 1476 jbbf.exe NOTEPAD.EXE PID 1476 wrote to memory of 12020 1476 jbbf.exe NOTEPAD.EXE PID 1476 wrote to memory of 12048 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12048 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12048 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12048 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12048 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12048 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12048 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12048 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12048 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12080 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12080 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12080 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12080 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12080 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12080 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12080 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12080 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12080 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12132 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12132 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12132 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12132 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12132 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12132 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12132 1476 jbbf.exe rundll32.exe PID 1476 wrote to memory of 12132 1476 jbbf.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\satana.exe"C:\Users\Admin\AppData\Local\Temp\satana.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\satana.exe"C:\Users\Admin\AppData\Local\Temp\satana.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\jbbf.exe"C:\Users\Admin\AppData\Local\Temp\jbbf.exe" {846ee340-7039-11de-9d20-806e6f6e6963} "C:\Users\Admin\AppData\Local\Temp\satana.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\jbbf.exe"C:\Users\Admin\AppData\Local\Temp\jbbf.exe" {846ee340-7039-11de-9d20-806e6f6e6963} "C:\Users\Admin\AppData\Local\Temp\satana.exe"4⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\VSSADMIN.EXE"C:\Windows\system32\VSSADMIN.EXE" Delete Shadows /All /Quiet5⤵
- Interacts with shadow copies
PID:1188
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\!satana!.txt5⤵PID:12020
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe5⤵PID:12048
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe5⤵PID:12132
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe5⤵PID:12080
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:896
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\!satana!.txt1⤵PID:11912
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:12100
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:580
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59f30500ec5d0f749cf1c468a5b754741
SHA109a531504ef7132ae81564929f4c5303db2a2119
SHA2564989cbe9df3e80de55510e2d8c52f3763df13cc0203e852c44b67a38010b4196
SHA512e06faa0ba380f583fd0e37ce12e5ab412215d62f99725bb83dde99c37f7b787a89cbd6feff51956701b3011ef68e24ad86be1ec82e75b87bd521e70169855130
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
1KB
MD59f30500ec5d0f749cf1c468a5b754741
SHA109a531504ef7132ae81564929f4c5303db2a2119
SHA2564989cbe9df3e80de55510e2d8c52f3763df13cc0203e852c44b67a38010b4196
SHA512e06faa0ba380f583fd0e37ce12e5ab412215d62f99725bb83dde99c37f7b787a89cbd6feff51956701b3011ef68e24ad86be1ec82e75b87bd521e70169855130
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5