Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 19:34
Static task
static1
General
-
Target
2494d3d43b66cf0b1ad061b6d88dc4e623f697ed31501de24e5371cd77bd8cbd.exe
-
Size
6.8MB
-
MD5
afccebf285b581489c98a5372fef29b5
-
SHA1
b1c3fe1e0a5c2ea94743c1bb617e76d991d0447f
-
SHA256
2494d3d43b66cf0b1ad061b6d88dc4e623f697ed31501de24e5371cd77bd8cbd
-
SHA512
6074a72fc0df7aef8aa758f9a8b011da4e19674557452c89017770e0c639ed6973c0359b697bdc9cb79982671b97ff25beba9b06d9093bc6b0af28511be44f8c
-
SSDEEP
196608:EMMOyjw/dsiSD/O//LiELf4x6Wwz5rO8si0QaHzMv:4Oy2Bu/O//2ELfwSO8ILT
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://mindhandru.buzz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://mindhandru.buzz/api
https://prisonyfork.buzz/api
https://rebuildeso.buzz/api
https://scentniej.buzz/api
https://inherineau.buzz/api
https://screwamusresz.buzz/api
https://appliacnesot.buzz/api
https://cashfuzysao.buzz/api
https://hummskitnj.buzz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4v303I.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4v303I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4v303I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4v303I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4v303I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4v303I.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1c58t0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2E6891.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3i41u.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4v303I.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4v303I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2E6891.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1c58t0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3i41u.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1c58t0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2E6891.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3i41u.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4v303I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 1c58t0.exe -
Executes dropped EXE 10 IoCs
pid Process 2240 Q0B61.exe 3460 X7I22.exe 5044 1c58t0.exe 2384 skotes.exe 4708 2E6891.exe 3016 3i41u.exe 5028 skotes.exe 1916 4v303I.exe 2228 skotes.exe 1268 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 2E6891.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 3i41u.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 4v303I.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 1c58t0.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4v303I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4v303I.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2494d3d43b66cf0b1ad061b6d88dc4e623f697ed31501de24e5371cd77bd8cbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Q0B61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" X7I22.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 5044 1c58t0.exe 2384 skotes.exe 4708 2E6891.exe 3016 3i41u.exe 5028 skotes.exe 1916 4v303I.exe 2228 skotes.exe 1268 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1c58t0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 980 3016 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2E6891.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3i41u.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4v303I.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2494d3d43b66cf0b1ad061b6d88dc4e623f697ed31501de24e5371cd77bd8cbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Q0B61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language X7I22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c58t0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3i41u.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3i41u.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 5044 1c58t0.exe 5044 1c58t0.exe 2384 skotes.exe 2384 skotes.exe 4708 2E6891.exe 4708 2E6891.exe 3016 3i41u.exe 3016 3i41u.exe 5028 skotes.exe 5028 skotes.exe 3016 3i41u.exe 3016 3i41u.exe 1916 4v303I.exe 1916 4v303I.exe 1916 4v303I.exe 1916 4v303I.exe 2228 skotes.exe 2228 skotes.exe 1268 skotes.exe 1268 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1916 4v303I.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5044 1c58t0.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4316 wrote to memory of 2240 4316 2494d3d43b66cf0b1ad061b6d88dc4e623f697ed31501de24e5371cd77bd8cbd.exe 83 PID 4316 wrote to memory of 2240 4316 2494d3d43b66cf0b1ad061b6d88dc4e623f697ed31501de24e5371cd77bd8cbd.exe 83 PID 4316 wrote to memory of 2240 4316 2494d3d43b66cf0b1ad061b6d88dc4e623f697ed31501de24e5371cd77bd8cbd.exe 83 PID 2240 wrote to memory of 3460 2240 Q0B61.exe 84 PID 2240 wrote to memory of 3460 2240 Q0B61.exe 84 PID 2240 wrote to memory of 3460 2240 Q0B61.exe 84 PID 3460 wrote to memory of 5044 3460 X7I22.exe 85 PID 3460 wrote to memory of 5044 3460 X7I22.exe 85 PID 3460 wrote to memory of 5044 3460 X7I22.exe 85 PID 5044 wrote to memory of 2384 5044 1c58t0.exe 86 PID 5044 wrote to memory of 2384 5044 1c58t0.exe 86 PID 5044 wrote to memory of 2384 5044 1c58t0.exe 86 PID 3460 wrote to memory of 4708 3460 X7I22.exe 87 PID 3460 wrote to memory of 4708 3460 X7I22.exe 87 PID 3460 wrote to memory of 4708 3460 X7I22.exe 87 PID 2240 wrote to memory of 3016 2240 Q0B61.exe 88 PID 2240 wrote to memory of 3016 2240 Q0B61.exe 88 PID 2240 wrote to memory of 3016 2240 Q0B61.exe 88 PID 4316 wrote to memory of 1916 4316 2494d3d43b66cf0b1ad061b6d88dc4e623f697ed31501de24e5371cd77bd8cbd.exe 110 PID 4316 wrote to memory of 1916 4316 2494d3d43b66cf0b1ad061b6d88dc4e623f697ed31501de24e5371cd77bd8cbd.exe 110 PID 4316 wrote to memory of 1916 4316 2494d3d43b66cf0b1ad061b6d88dc4e623f697ed31501de24e5371cd77bd8cbd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2494d3d43b66cf0b1ad061b6d88dc4e623f697ed31501de24e5371cd77bd8cbd.exe"C:\Users\Admin\AppData\Local\Temp\2494d3d43b66cf0b1ad061b6d88dc4e623f697ed31501de24e5371cd77bd8cbd.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Q0B61.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Q0B61.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\X7I22.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\X7I22.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1c58t0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1c58t0.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2E6891.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2E6891.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3i41u.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3i41u.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 14844⤵
- Program crash
PID:980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4v303I.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4v303I.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3016 -ip 30161⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1268
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD571244cdbf54bc5717c35095c0969884f
SHA1401a1b1032928dfc95c34d4a01304d3f1314aae7
SHA256e76402cc94a0f88412bb1e5e7a4dd9c5e32eebba014c18e8035f8364bfcdcc4c
SHA5126015795586dc7862613b481d18f2a40da6853f53a99c69f1d2d52e2157f796ab5c1fdea5ef078ac61909d3950178feadebc2f06bbb0abcfc4845c8cfe446c272
-
Filesize
5.2MB
MD5f512265b19f71ac1817646831d7ff802
SHA17fca8776d953bbe9b54e0242661420039ae3e3e9
SHA25661f4e984d66fdeba7638f5d84c12bb1ac37a6f73307502ab79ac31a91b86e290
SHA512b47f698f98eaf460ce4c08f4e750d0da072fe5c591fb9f82917a6eb720f8c053a1d1166cc63e9a43de6e067b5568190025f2e1d996e8413da45b2498212de9a6
-
Filesize
5.0MB
MD5de1d6ba5a3d41a8fa2d97694efcc0a5d
SHA1234a176f9f778db7a8639f7450289d426421e324
SHA256c7107e5b4a7a6a36e7d841c528056fc8748e4350ec6b3824be7b7b45e3778676
SHA512c4bfc293f58fdbaaf081ba91f2303d7ad7505faecd49200187f1ab94f9c79b6d95a570cb673fd97762919d622e2def3dd513aa71576e00b2b898362503d1d502
-
Filesize
3.5MB
MD5ac1236d4c2e9a248ab7e41b218977218
SHA1fa0089ab03a1f631d0299d9f9e74b8b843f9e443
SHA2563db54837dfda5b9b3c66aad720483a36d0cc68e130954ea6d122f58609a3dd54
SHA512ab97a59f1dcfae38a2efd786cb7e5585e7e9e44612b22683e05c65d3caed5d14cad822c2bbbda43d7966f88867efef162af37d0fe9c06fa96a54cadf17effab3
-
Filesize
3.1MB
MD5e568c8a9b1599c62c2e72fc310e029d4
SHA114013af4ec0ecdbafbf60c7e1181291c0da371f5
SHA256fff782587c0bdff8cde60bf73e5554ff013af295b3a8c3ade6aec9215ffcf887
SHA512dbf76117dca42a45f59292cff4c2b947a112643e877488c0bc8ba59c5ea4b4d1da9c9d9203c4be22c7ccdeea6fb42fa3deb0fb7a25172e42c5f92b2d2d65461c
-
Filesize
1.7MB
MD526b5af1cfc3efc73b6d9be8f11412a9b
SHA1669f03be44e22fa6842b05a1aaa9b08870e5c73a
SHA2560d637271932e343f729bf09cbcc63204c681bef4d60e72767bed5f281203ce76
SHA51217c4e9293becb84482caaa74d0698cde0897ad85c409bac0ca8ea15131332b81e6dd17bbff300c31498d4877c898a4704b1b4d00488c9575ed44e12cc8937efb