Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
a69839da451a8bf04259687309ceb825b1260186d353fb2555612ed006582e5b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a69839da451a8bf04259687309ceb825b1260186d353fb2555612ed006582e5b.exe
Resource
win10v2004-20240802-en
General
-
Target
a69839da451a8bf04259687309ceb825b1260186d353fb2555612ed006582e5b.exe
-
Size
118KB
-
MD5
a83b2a5ff3529936192398c88edd27a3
-
SHA1
ea008405ea9fe482676789bc584a5bc03dac5b92
-
SHA256
a69839da451a8bf04259687309ceb825b1260186d353fb2555612ed006582e5b
-
SHA512
5196d43f3dd31d02247969f486fab9d5e3081174eec7cf1e927f6e82d6f36c912d1b91257aad8285748e383fcead68495038b99886ff54c007d16b86c488a40e
-
SSDEEP
3072:QJ4zfapVGYIC2MIEGuLuNP4FJed7eHnXm6qIXLE:8EypVnIC2oGuqNP1d7eHnXm6qIX
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation a69839da451a8bf04259687309ceb825b1260186d353fb2555612ed006582e5b.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation LKMService.exe -
Drops startup file 64 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_6d88de3d9b884152854059af299bcd8c.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_3c358d923d544c059b4a2732554d330b.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_cddc1771e28248aeb5aa19fe4404c0d5.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_55404908eb48408db17411880f940954.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_1af611df7517448c88ac9105c328e02c.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_355aab4f60634a75bdcb8738b6857809.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_f03beb26832e44bf8d210b41d63d3e8b.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_5e3e97c361074bc99cc368459cde8382.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_35a553d20e874df8846ceda94f583b36.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ec53fe3609004cad8a6d674ceea103a2.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_9e70abcd3ce94a5098f0eed86dbc67b5.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_84469c5055cd4215a497b4a4d68ad2e9.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_2bb1c1ac096543968b0535c3f9ad90ba.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_bd957f5aa42943eb8dad6049b91f7f50.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_2356bf027ea046708ec19635cdccf74c.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_4ebcd28a7b514fed8c92eb0713cd2b6c.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_aa2b05d9b77a46b0815337a0224bedb6.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_271d22429e6741fa96eb91b9864018ad.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_23bb22e45e5d41c3b05bd5adb28f0041.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_23acc173562240eb8e9075c6028858fc.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_f98885b52d7645ce9c6f922986888a6f.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_009415f0954146f3865e03a7cfb7990d.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_49df45e21da54b19a0b037c32401832e.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d46ae994c4014e23a597c0f88b5a202f.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_a764ec02ead04094a0d6560f6d144bd8.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_f768581cd55243b4b94d08056ded1e4a.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_8b70dcd505834baf8e6090d4794cec95.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_0a311d63a6da4fd28f14f9e30e2ef956.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_1ceba2f9f0334eaaa60713787b36ce26.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_15a25abcdccd4c839559e7b641f87004.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_2411b9cf1ac5409fa4cf21b2603a2c6c.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_16b342ce21504f5296546f3bf38a3d6f.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_1075707e1f6f4158a924b3003182a2e7.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c6b29dd98ab94cc2a7f49cc2759ed977.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_a3c35fae9fc0400f869dbeb527ceb65b.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_6e00e43fecf646b784f8f1b9e14fc357.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d3b1ba8e0b634b34ab5e25013cef41af.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_6b1f1790491b46f68e9a6c3791b6a219.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_238199ea4a5d47ee8e7f9f816d092890.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d013df44810840eaa66b6d24eb418258.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d22da6b94a474b1eba05b5d3d4724a30.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_09fb2012e6b844dd90f8b51105ce1285.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_144564a4bcf2438f9f581063cd73eaf7.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_a6895de1c6de4bd4b86042c61a7e5450.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_025ee558434b4961b77fa0701cedd117.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_4e120a023ce94e69a36eb34c2386d818.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_febc5eda53484b76bd7f4d09322d6079.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_5bf98212fe94426aa722756bcece67f3.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_7f59b89f52f74ac0aed59e7f9db9c6c2.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_cb7d029790f84faabff9e576d8631829.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_2216067dcc4e49e58d9d4fd09f8cdda5.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_8cbac2874fdd4a5abcb26c131e452631.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_1644667dff26414c8a4f712ae8b1c7a0.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_44a4807f9cfa46a8874aa74c64d659f4.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_5a54220434934b02bce1384ef17ff791.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_3f6755bb959c4048b4c9b270a846f182.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_4d1d4ebaaf3248f889e6ce111c5bc0a2.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_1815870b3c5046d7970fe2de5a654503.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_9632e87abe9845d99b023445ddc7d156.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_b06130a0a271439984136c7f27aa8223.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_22006d945b8c4510b0cf11be46092441.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_2a4907143c1547f892de5a6b419bb73c.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_5bba2a4d0ab545baacb83ce3ada68c42.lnk LKMService.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_eaebd5b4bba344c6b047b2b4b0e9c604.lnk LKMService.exe -
Executes dropped EXE 3 IoCs
pid Process 4212 LKMService.exe 688 GoogleUpdater.exe 712 3f02d4e30ba04eb58356926eeed241bc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LKMService_bd75bd16b98746c7be8feb1e81e82581 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EdgeUpdater\\LKMService.exe" a69839da451a8bf04259687309ceb825b1260186d353fb2555612ed006582e5b.exe -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 api64.ipify.org 31 api64.ipify.org 33 ipinfo.io 34 ipinfo.io 19 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 712 set thread context of 4196 712 3f02d4e30ba04eb58356926eeed241bc.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a69839da451a8bf04259687309ceb825b1260186d353fb2555612ed006582e5b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LKMService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f02d4e30ba04eb58356926eeed241bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4212 LKMService.exe 4212 LKMService.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe 688 GoogleUpdater.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4212 LKMService.exe Token: SeDebugPrivilege 688 GoogleUpdater.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2356 wrote to memory of 4212 2356 a69839da451a8bf04259687309ceb825b1260186d353fb2555612ed006582e5b.exe 82 PID 2356 wrote to memory of 4212 2356 a69839da451a8bf04259687309ceb825b1260186d353fb2555612ed006582e5b.exe 82 PID 2356 wrote to memory of 4212 2356 a69839da451a8bf04259687309ceb825b1260186d353fb2555612ed006582e5b.exe 82 PID 4212 wrote to memory of 688 4212 LKMService.exe 83 PID 4212 wrote to memory of 688 4212 LKMService.exe 83 PID 4212 wrote to memory of 688 4212 LKMService.exe 83 PID 4212 wrote to memory of 712 4212 LKMService.exe 84 PID 4212 wrote to memory of 712 4212 LKMService.exe 84 PID 4212 wrote to memory of 712 4212 LKMService.exe 84 PID 712 wrote to memory of 4196 712 3f02d4e30ba04eb58356926eeed241bc.exe 86 PID 712 wrote to memory of 4196 712 3f02d4e30ba04eb58356926eeed241bc.exe 86 PID 712 wrote to memory of 4196 712 3f02d4e30ba04eb58356926eeed241bc.exe 86 PID 712 wrote to memory of 4196 712 3f02d4e30ba04eb58356926eeed241bc.exe 86 PID 712 wrote to memory of 4196 712 3f02d4e30ba04eb58356926eeed241bc.exe 86 PID 712 wrote to memory of 4196 712 3f02d4e30ba04eb58356926eeed241bc.exe 86 PID 712 wrote to memory of 4196 712 3f02d4e30ba04eb58356926eeed241bc.exe 86 PID 712 wrote to memory of 4196 712 3f02d4e30ba04eb58356926eeed241bc.exe 86 PID 712 wrote to memory of 4196 712 3f02d4e30ba04eb58356926eeed241bc.exe 86 PID 712 wrote to memory of 4196 712 3f02d4e30ba04eb58356926eeed241bc.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a69839da451a8bf04259687309ceb825b1260186d353fb2555612ed006582e5b.exe"C:\Users\Admin\AppData\Local\Temp\a69839da451a8bf04259687309ceb825b1260186d353fb2555612ed006582e5b.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\LKMService.exe"C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\LKMService.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe"C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe" --checker3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:688
-
-
C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\3f02d4e30ba04eb58356926eeed241bc.exe"C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\3f02d4e30ba04eb58356926eeed241bc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4196
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD534ec7a5a9154386680a400b65cada6cb
SHA1a97b1bf2c6af2499c31510bd8c2efce3c50482f6
SHA256f0bfcf5fc84fbbbe4b4a46cf51193a359cfddbd79aa88f81d6da4f5dab79ba70
SHA5123c675d631cd15283d3f258c90615c2be10bcdb7f0405f4c3ba50a2c3b3f59f7533951f33be75809e920b8d74ff56bbb83bf48e3ef9814621cf1dea6cfbe55eee
-
Filesize
118KB
MD5a83b2a5ff3529936192398c88edd27a3
SHA1ea008405ea9fe482676789bc584a5bc03dac5b92
SHA256a69839da451a8bf04259687309ceb825b1260186d353fb2555612ed006582e5b
SHA5125196d43f3dd31d02247969f486fab9d5e3081174eec7cf1e927f6e82d6f36c912d1b91257aad8285748e383fcead68495038b99886ff54c007d16b86c488a40e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ba33e41971ce45c9b341e12e48c26ef2.lnk
Filesize1KB
MD5e101126f02a85f24abcac905202cd6e8
SHA11ddf9fcffb494f7ffc271d1f67e4e0065b8cdd7c
SHA25617f00ba86010c4517cc2f41fc4d7e9868cf8c986926465a85c223abd1308b7a2
SHA5126cda2494aa37e322a337a7624b2fe225195f5243f2647a30a5b65f88057c529ffbed83030ba6b4288c788d416fcc555c7c3b99bcbcf5171cce4fd75251d3158f