Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 03:48
Static task
static1
Behavioral task
behavioral1
Sample
5db07d0892ea583f9b07fa74e920efaaab5d488e3e8f7d97255463f2cc2e39fc.exe
Resource
win10v2004-20241007-en
General
-
Target
5db07d0892ea583f9b07fa74e920efaaab5d488e3e8f7d97255463f2cc2e39fc.exe
-
Size
927KB
-
MD5
7d28f2751f8b276ed2d0a781a2b3979d
-
SHA1
47190e1dd76f614b9bcf11f5df84411e348ca7c3
-
SHA256
5db07d0892ea583f9b07fa74e920efaaab5d488e3e8f7d97255463f2cc2e39fc
-
SHA512
a8393ddb8699b36a4e4e3c60e3b97d25896c5f15a7ea67db46563997b826403aba85e78c7491a9c92992bdc18f055f5174810901ff6345d5470b054122875cb7
-
SSDEEP
12288:Ty90KNu4UG2wLBkwNGjMXtdvfmpauePCGsHj6wJGsn6Pxm7I8Slwu3i7P:Tyk4tBvsjMXGliCNj6k6P0XBIsP
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3336-21-0x0000000002050000-0x000000000206A000-memory.dmp healer behavioral1/memory/3336-23-0x0000000002540000-0x0000000002558000-memory.dmp healer behavioral1/memory/3336-51-0x0000000002540000-0x0000000002553000-memory.dmp healer behavioral1/memory/3336-49-0x0000000002540000-0x0000000002553000-memory.dmp healer behavioral1/memory/3336-48-0x0000000002540000-0x0000000002553000-memory.dmp healer behavioral1/memory/3336-45-0x0000000002540000-0x0000000002553000-memory.dmp healer behavioral1/memory/3336-43-0x0000000002540000-0x0000000002553000-memory.dmp healer behavioral1/memory/3336-41-0x0000000002540000-0x0000000002553000-memory.dmp healer behavioral1/memory/3336-39-0x0000000002540000-0x0000000002553000-memory.dmp healer behavioral1/memory/3336-37-0x0000000002540000-0x0000000002553000-memory.dmp healer behavioral1/memory/3336-35-0x0000000002540000-0x0000000002553000-memory.dmp healer behavioral1/memory/3336-33-0x0000000002540000-0x0000000002553000-memory.dmp healer behavioral1/memory/3336-31-0x0000000002540000-0x0000000002553000-memory.dmp healer behavioral1/memory/3336-29-0x0000000002540000-0x0000000002553000-memory.dmp healer behavioral1/memory/3336-27-0x0000000002540000-0x0000000002553000-memory.dmp healer behavioral1/memory/3336-25-0x0000000002540000-0x0000000002553000-memory.dmp healer behavioral1/memory/3336-24-0x0000000002540000-0x0000000002553000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 118819829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 118819829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 118819829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 118819829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 250294628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 250294628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 250294628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 118819829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 118819829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 250294628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 250294628.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral1/memory/5032-105-0x00000000049E0000-0x0000000004A1C000-memory.dmp family_redline behavioral1/memory/5032-106-0x00000000071B0000-0x00000000071EA000-memory.dmp family_redline behavioral1/memory/5032-110-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/5032-112-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/5032-108-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/5032-107-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 314112067.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 1988 nA897490.exe 632 Yv408990.exe 3336 118819829.exe 4568 250294628.exe 2912 314112067.exe 4424 oneetx.exe 5032 447507635.exe 1960 oneetx.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 118819829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 118819829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 250294628.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5db07d0892ea583f9b07fa74e920efaaab5d488e3e8f7d97255463f2cc2e39fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nA897490.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Yv408990.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2824 4568 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250294628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 447507635.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Yv408990.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 118819829.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5db07d0892ea583f9b07fa74e920efaaab5d488e3e8f7d97255463f2cc2e39fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nA897490.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 314112067.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3336 118819829.exe 3336 118819829.exe 4568 250294628.exe 4568 250294628.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3336 118819829.exe Token: SeDebugPrivilege 4568 250294628.exe Token: SeDebugPrivilege 5032 447507635.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 314112067.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4304 wrote to memory of 1988 4304 5db07d0892ea583f9b07fa74e920efaaab5d488e3e8f7d97255463f2cc2e39fc.exe 83 PID 4304 wrote to memory of 1988 4304 5db07d0892ea583f9b07fa74e920efaaab5d488e3e8f7d97255463f2cc2e39fc.exe 83 PID 4304 wrote to memory of 1988 4304 5db07d0892ea583f9b07fa74e920efaaab5d488e3e8f7d97255463f2cc2e39fc.exe 83 PID 1988 wrote to memory of 632 1988 nA897490.exe 84 PID 1988 wrote to memory of 632 1988 nA897490.exe 84 PID 1988 wrote to memory of 632 1988 nA897490.exe 84 PID 632 wrote to memory of 3336 632 Yv408990.exe 86 PID 632 wrote to memory of 3336 632 Yv408990.exe 86 PID 632 wrote to memory of 3336 632 Yv408990.exe 86 PID 632 wrote to memory of 4568 632 Yv408990.exe 97 PID 632 wrote to memory of 4568 632 Yv408990.exe 97 PID 632 wrote to memory of 4568 632 Yv408990.exe 97 PID 1988 wrote to memory of 2912 1988 nA897490.exe 102 PID 1988 wrote to memory of 2912 1988 nA897490.exe 102 PID 1988 wrote to memory of 2912 1988 nA897490.exe 102 PID 2912 wrote to memory of 4424 2912 314112067.exe 103 PID 2912 wrote to memory of 4424 2912 314112067.exe 103 PID 2912 wrote to memory of 4424 2912 314112067.exe 103 PID 4304 wrote to memory of 5032 4304 5db07d0892ea583f9b07fa74e920efaaab5d488e3e8f7d97255463f2cc2e39fc.exe 104 PID 4304 wrote to memory of 5032 4304 5db07d0892ea583f9b07fa74e920efaaab5d488e3e8f7d97255463f2cc2e39fc.exe 104 PID 4304 wrote to memory of 5032 4304 5db07d0892ea583f9b07fa74e920efaaab5d488e3e8f7d97255463f2cc2e39fc.exe 104 PID 4424 wrote to memory of 4868 4424 oneetx.exe 105 PID 4424 wrote to memory of 4868 4424 oneetx.exe 105 PID 4424 wrote to memory of 4868 4424 oneetx.exe 105 PID 4424 wrote to memory of 4840 4424 oneetx.exe 107 PID 4424 wrote to memory of 4840 4424 oneetx.exe 107 PID 4424 wrote to memory of 4840 4424 oneetx.exe 107 PID 4840 wrote to memory of 3888 4840 cmd.exe 109 PID 4840 wrote to memory of 3888 4840 cmd.exe 109 PID 4840 wrote to memory of 3888 4840 cmd.exe 109 PID 4840 wrote to memory of 2748 4840 cmd.exe 110 PID 4840 wrote to memory of 2748 4840 cmd.exe 110 PID 4840 wrote to memory of 2748 4840 cmd.exe 110 PID 4840 wrote to memory of 1748 4840 cmd.exe 111 PID 4840 wrote to memory of 1748 4840 cmd.exe 111 PID 4840 wrote to memory of 1748 4840 cmd.exe 111 PID 4840 wrote to memory of 1960 4840 cmd.exe 112 PID 4840 wrote to memory of 1960 4840 cmd.exe 112 PID 4840 wrote to memory of 1960 4840 cmd.exe 112 PID 4840 wrote to memory of 1964 4840 cmd.exe 113 PID 4840 wrote to memory of 1964 4840 cmd.exe 113 PID 4840 wrote to memory of 1964 4840 cmd.exe 113 PID 4840 wrote to memory of 2248 4840 cmd.exe 114 PID 4840 wrote to memory of 2248 4840 cmd.exe 114 PID 4840 wrote to memory of 2248 4840 cmd.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\5db07d0892ea583f9b07fa74e920efaaab5d488e3e8f7d97255463f2cc2e39fc.exe"C:\Users\Admin\AppData\Local\Temp\5db07d0892ea583f9b07fa74e920efaaab5d488e3e8f7d97255463f2cc2e39fc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nA897490.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nA897490.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Yv408990.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Yv408990.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\118819829.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\118819829.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\250294628.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\250294628.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 10645⤵
- Program crash
PID:2824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\314112067.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\314112067.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4868
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
- System Location Discovery: System Language Discovery
PID:3888
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"6⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E6⤵
- System Location Discovery: System Language Discovery
PID:1748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"6⤵
- System Location Discovery: System Language Discovery
PID:1964
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E6⤵
- System Location Discovery: System Language Discovery
PID:2248
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\447507635.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\447507635.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4568 -ip 45681⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1960
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD586d252b055235bc1cce386056a60c966
SHA183f039cbc5d1429c9b480014b894ee6ff034519c
SHA256acace7c1d74d845f22ccfcb01beb3f7e2f193adcd8e841f666e2f1dc435705a9
SHA512570b1d872c2b2e0721f4f2d2bd971988639bb5ab1a5fab43f0ac54d0df60b1045218db5c98d741bb2f6ea9af7e829842d4b17b3a12141e6b2edc6829fc956cf6
-
Filesize
582KB
MD55f61fd0f27deaed9c022b159a9ba7a64
SHA1981ac3b5932788fe2028a1208740e755979bd3d2
SHA256162805634f3c29e5b3d4a98a907bb06c2281409cd436dd0cda12e8c16411fb8a
SHA512660d5db47f5d17282e04dfe9cc217365c3e2e71bad03bf6606913644e64546ffc72fec5f46affc1c39fd954e0d49df86d79456357289aed06fc12eaf4ddc6f55
-
Filesize
204KB
MD51304f384653e08ae497008ff13498608
SHA1d9a76ed63d74d4217c5027757cb9a7a0d0093080
SHA2562a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa
SHA5124138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1
-
Filesize
410KB
MD51ea23ccf7e4c12b57002e41b3b8f1c71
SHA1fdae40a8e7604ad49b392d3aa12ddf5a9b4d430a
SHA2568bae106c52dbc7d592a159d301a428d24b2639a347bfc0756c31fd7710e87282
SHA512f9ab5272ecfd8472661ff5daed42dd1e76fea44be021fb935e4a55adb9818f3e6a5f65862f0d13c94802e5a412bdbd10ed7ffebee819a4e377bed007a646ffb5
-
Filesize
175KB
MD53d10b67208452d7a91d7bd7066067676
SHA1e6c3ab7b6da65c8cc7dd95351f118caf3a50248d
SHA2565c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302
SHA512b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df
-
Filesize
263KB
MD54573d9760f9c55bf186cb482c7f0770f
SHA1e27b9143fafc43aea586ca3006ebb07579a68265
SHA25677d3f2c70da840fdcc6f525ca32fd3702d13d456c467821424151e6246494243
SHA5126631df2e202c20e7a8b5364133ad8ae91b7a17eae67e6f66d4b775839a13f987567aaa9476618a55decdec677b37b2eae656d6619bd395420b14a8d83e0d5267