Analysis
-
max time kernel
15s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 14:30
Behavioral task
behavioral1
Sample
Waltuhium.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Waltuhium.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20240508-en
Errors
General
-
Target
Waltuhium.exe
-
Size
10.6MB
-
MD5
8200d020a6b7854f5ca4c0548b86b093
-
SHA1
24c120c5f6e7c42c9541258e4add0e959a3c4f8c
-
SHA256
18c766006964ed44aa9c82605660ee0c3eefcb577c5a5512b4e040a4e4aadf60
-
SHA512
3a6ced1bd514248d70026df5398d1ed71f4789c46432bed54658ff1a568da1a2512b92a8538088aadcaba262d654b27de15307c7ecd9d45b5861b2ae39f045d1
-
SSDEEP
196608:VcfVU3b01Kpn3V+uq+VvpSdQmRJ8dA6lRuVaycBIGpEGo6hTOv+QKfucQ8/6QjO:FL01+l+uq+VvUdQuslRl9foWOv+9fu6/
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2532 Waltuhium.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 65 discord.com 66 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2936 chrome.exe 2936 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2936 chrome.exe Token: SeShutdownPrivilege 2936 chrome.exe Token: SeShutdownPrivilege 2936 chrome.exe Token: SeShutdownPrivilege 2936 chrome.exe Token: SeShutdownPrivilege 2936 chrome.exe Token: SeShutdownPrivilege 2936 chrome.exe Token: SeShutdownPrivilege 2936 chrome.exe Token: SeShutdownPrivilege 2936 chrome.exe Token: SeShutdownPrivilege 2936 chrome.exe Token: SeShutdownPrivilege 2936 chrome.exe Token: SeShutdownPrivilege 2936 chrome.exe Token: SeShutdownPrivilege 2936 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe 2936 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2532 1196 Waltuhium.exe 28 PID 1196 wrote to memory of 2532 1196 Waltuhium.exe 28 PID 1196 wrote to memory of 2532 1196 Waltuhium.exe 28 PID 2936 wrote to memory of 3012 2936 chrome.exe 30 PID 2936 wrote to memory of 3012 2936 chrome.exe 30 PID 2936 wrote to memory of 3012 2936 chrome.exe 30 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 2620 2936 chrome.exe 32 PID 2936 wrote to memory of 1656 2936 chrome.exe 33 PID 2936 wrote to memory of 1656 2936 chrome.exe 33 PID 2936 wrote to memory of 1656 2936 chrome.exe 33 PID 2936 wrote to memory of 1860 2936 chrome.exe 34 PID 2936 wrote to memory of 1860 2936 chrome.exe 34 PID 2936 wrote to memory of 1860 2936 chrome.exe 34 PID 2936 wrote to memory of 1860 2936 chrome.exe 34 PID 2936 wrote to memory of 1860 2936 chrome.exe 34 PID 2936 wrote to memory of 1860 2936 chrome.exe 34 PID 2936 wrote to memory of 1860 2936 chrome.exe 34 PID 2936 wrote to memory of 1860 2936 chrome.exe 34 PID 2936 wrote to memory of 1860 2936 chrome.exe 34 PID 2936 wrote to memory of 1860 2936 chrome.exe 34 PID 2936 wrote to memory of 1860 2936 chrome.exe 34 PID 2936 wrote to memory of 1860 2936 chrome.exe 34 PID 2936 wrote to memory of 1860 2936 chrome.exe 34 PID 2936 wrote to memory of 1860 2936 chrome.exe 34 PID 2936 wrote to memory of 1860 2936 chrome.exe 34 PID 2936 wrote to memory of 1860 2936 chrome.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Waltuhium.exe"C:\Users\Admin\AppData\Local\Temp\Waltuhium.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\Waltuhium.exe"C:\Users\Admin\AppData\Local\Temp\Waltuhium.exe"2⤵
- Loads dropped DLL
PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6e29758,0x7fef6e29768,0x7fef6e297782⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1284,i,2138436347572196089,18227738744675253926,131072 /prefetch:22⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1488 --field-trial-handle=1284,i,2138436347572196089,18227738744675253926,131072 /prefetch:82⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1284,i,2138436347572196089,18227738744675253926,131072 /prefetch:82⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2276 --field-trial-handle=1284,i,2138436347572196089,18227738744675253926,131072 /prefetch:12⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2288 --field-trial-handle=1284,i,2138436347572196089,18227738744675253926,131072 /prefetch:12⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1452 --field-trial-handle=1284,i,2138436347572196089,18227738744675253926,131072 /prefetch:22⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2212 --field-trial-handle=1284,i,2138436347572196089,18227738744675253926,131072 /prefetch:12⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3244 --field-trial-handle=1284,i,2138436347572196089,18227738744675253926,131072 /prefetch:82⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3580 --field-trial-handle=1284,i,2138436347572196089,18227738744675253926,131072 /prefetch:82⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3552 --field-trial-handle=1284,i,2138436347572196089,18227738744675253926,131072 /prefetch:12⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2436 --field-trial-handle=1284,i,2138436347572196089,18227738744675253926,131072 /prefetch:12⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2416 --field-trial-handle=1284,i,2138436347572196089,18227738744675253926,131072 /prefetch:12⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4140 --field-trial-handle=1284,i,2138436347572196089,18227738744675253926,131072 /prefetch:82⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2044
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:696
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
441KB
MD54604e676a0a7d18770853919e24ec465
SHA1415ef3b2ca0851e00ebaf0d6c9f6213c561ac98f
SHA256a075b01d9b015c616511a9e87da77da3d9881621db32f584e4606ddabf1c1100
SHA5123d89c21f20772a8bebdb70b29c42fca2f6bffcda49dff9d5644f3f3910b7c710a5c20154a7af5134c9c7a8624a1251b5e56ced9351d87463f31bed8188eb0774
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2a094beb2664c8d2d40f0a112e54d7d
SHA15183ff1240a24f02f8d3c2c16e30a7fc4d619cbf
SHA2567eef44744dca2383e4aca2b75857613c922b9e05b86edc7330438019c35c5ed5
SHA512ec41fd68e65ab09119394dd7ff2c81aab656ffdfd1204adf90ec3a275bf9b3d27582c81d3a523839c16b3438ad54ab03c88f9842a04947fd279c4edbeaf860a8
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5c07a960efbf9e14d39041a79e87652f7
SHA101ba03e53d1cd7cab1cdb4af1eae9487414bf4e2
SHA256718d40f58aecde6e0bb62f66301ec6aaf79b06a18b82deeec4df08ef8d5d7729
SHA512ffa031ae0113ab93e5881f036dd58f6b0750376b5df54513009430c909b9bb22101d98cd91842c0b6962b6c8c306e2ac09f8bc5b7b868113c1506b244471d4fd
-
Filesize
5KB
MD573c677918a7f3cfd5a5c7df8fb6922e3
SHA136f83c4ec984f7b0e5f2e563d24db3d9f876095e
SHA256f37707f7d1e55aa1524175dd6cd9c900686bd7c4e1596cc5f8a6c3823608fdac
SHA512a1f55d9896e072186c564189ecf0de9f7824f6ef2a90fbb6a15d8f355dbbd5422684714786b3214661d22c8b2d60aeebf99aabb12ffd6bca4cb58e331979dab4
-
Filesize
6KB
MD502ed3cd354612e279cb58c81307859ad
SHA194c5720f2265625dc8a55d126952319297041e65
SHA256730d71e39bd0bdf1517a3477869b586cd8038b982918a78c774fcaf447446428
SHA512085c7d48dae0ec6abd25d7462394cf4ba87f241633faa495b283a61f79ecc760404f92c52becc88b234d40eeb84adc67b3be9a46eeefa003a8a1c6d1791f3e70
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\CURRENT~RFf766c2b.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
281KB
MD59446a44d01f61f260ccaa0dd4c303177
SHA1cc3d741a2e6d8a9536112b82d7b7fac09fb0672e
SHA256ad86e9a202f56d9db2e8ffffffd29d0a82bd67b0061fe6d94f9be42c40fcc491
SHA5127bba3b3139e6274a28cfca445e3c4de3a797e78fdf854e717ebc1714a4831392c0adae567d1639f3adf5bc4f976292a26f9eb1ea952c752f2ebdadf339cb9343
-
Filesize
281KB
MD592264badc2c7b028d24d27a9e13f7ddb
SHA1026dca6cedcab177f4f1f12a7d97a194e45dada7
SHA256c20cc602027f0b304c6eb7f2dba3af513c925383ab26b30d883ddb778a15a15d
SHA5127b27cf49f1792bef33182e4f4f89c44750c127e42c80e668ed297ccf654900e97326df4450bfc4e1144f9085c85da0a10d2d502cab69f4c0656939601aaad271
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989