Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/12/2024, 02:31
Static task
static1
General
-
Target
b00878bb0fe4797090a6d4647253d50a6b97bedfcac2a0eae556af524c6b088d.exe
-
Size
6.8MB
-
MD5
dc64a8923ab5c9c9836e8636cfb0410b
-
SHA1
abf6409e40f502d3aa47e8583a63afe597047535
-
SHA256
b00878bb0fe4797090a6d4647253d50a6b97bedfcac2a0eae556af524c6b088d
-
SHA512
ac075e203c7e2eea5ccc5b1ad99c40d8cac46b26b18f6bb0795875c951b85d42f5536f9da306ffc29ac1f3a68f635ff47c2b9f6febaa44b2bc5234ebe0a22e77
-
SSDEEP
196608:0d8/avwTjYhJfrylK1DExo5RVizFUa5wYnetHc4eX2ko:RYhlryuDvLiqda92
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://mindhandru.buzz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://mindhandru.buzz/api
https://prisonyfork.buzz/api
https://rebuildeso.buzz/api
https://scentniej.buzz/api
https://inherineau.buzz/api
https://screwamusresz.buzz/api
https://appliacnesot.buzz/api
https://cashfuzysao.buzz/api
https://hummskitnj.buzz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4o283f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4o283f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4o283f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4o283f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4o283f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4o283f.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1J12N9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2v3175.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3S90G.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4o283f.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1J12N9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2v3175.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2v3175.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3S90G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3S90G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1J12N9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4o283f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4o283f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 1J12N9.exe -
Executes dropped EXE 10 IoCs
pid Process 4492 N3r09.exe 2768 v5E84.exe 4196 1J12N9.exe 2156 skotes.exe 4928 2v3175.exe 4420 skotes.exe 2484 3S90G.exe 716 4o283f.exe 3724 skotes.exe 1260 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3S90G.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 4o283f.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 1J12N9.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2v3175.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4o283f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4o283f.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b00878bb0fe4797090a6d4647253d50a6b97bedfcac2a0eae556af524c6b088d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" N3r09.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5E84.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4196 1J12N9.exe 2156 skotes.exe 4928 2v3175.exe 4420 skotes.exe 2484 3S90G.exe 716 4o283f.exe 3724 skotes.exe 1260 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1J12N9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3268 2484 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1J12N9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2v3175.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3S90G.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4o283f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b00878bb0fe4797090a6d4647253d50a6b97bedfcac2a0eae556af524c6b088d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N3r09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v5E84.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3S90G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3S90G.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4196 1J12N9.exe 4196 1J12N9.exe 2156 skotes.exe 2156 skotes.exe 4928 2v3175.exe 4928 2v3175.exe 4420 skotes.exe 4420 skotes.exe 2484 3S90G.exe 2484 3S90G.exe 2484 3S90G.exe 2484 3S90G.exe 716 4o283f.exe 716 4o283f.exe 716 4o283f.exe 716 4o283f.exe 3724 skotes.exe 3724 skotes.exe 1260 skotes.exe 1260 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 716 4o283f.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4196 1J12N9.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2040 wrote to memory of 4492 2040 b00878bb0fe4797090a6d4647253d50a6b97bedfcac2a0eae556af524c6b088d.exe 82 PID 2040 wrote to memory of 4492 2040 b00878bb0fe4797090a6d4647253d50a6b97bedfcac2a0eae556af524c6b088d.exe 82 PID 2040 wrote to memory of 4492 2040 b00878bb0fe4797090a6d4647253d50a6b97bedfcac2a0eae556af524c6b088d.exe 82 PID 4492 wrote to memory of 2768 4492 N3r09.exe 83 PID 4492 wrote to memory of 2768 4492 N3r09.exe 83 PID 4492 wrote to memory of 2768 4492 N3r09.exe 83 PID 2768 wrote to memory of 4196 2768 v5E84.exe 84 PID 2768 wrote to memory of 4196 2768 v5E84.exe 84 PID 2768 wrote to memory of 4196 2768 v5E84.exe 84 PID 4196 wrote to memory of 2156 4196 1J12N9.exe 85 PID 4196 wrote to memory of 2156 4196 1J12N9.exe 85 PID 4196 wrote to memory of 2156 4196 1J12N9.exe 85 PID 2768 wrote to memory of 4928 2768 v5E84.exe 86 PID 2768 wrote to memory of 4928 2768 v5E84.exe 86 PID 2768 wrote to memory of 4928 2768 v5E84.exe 86 PID 4492 wrote to memory of 2484 4492 N3r09.exe 88 PID 4492 wrote to memory of 2484 4492 N3r09.exe 88 PID 4492 wrote to memory of 2484 4492 N3r09.exe 88 PID 2040 wrote to memory of 716 2040 b00878bb0fe4797090a6d4647253d50a6b97bedfcac2a0eae556af524c6b088d.exe 101 PID 2040 wrote to memory of 716 2040 b00878bb0fe4797090a6d4647253d50a6b97bedfcac2a0eae556af524c6b088d.exe 101 PID 2040 wrote to memory of 716 2040 b00878bb0fe4797090a6d4647253d50a6b97bedfcac2a0eae556af524c6b088d.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\b00878bb0fe4797090a6d4647253d50a6b97bedfcac2a0eae556af524c6b088d.exe"C:\Users\Admin\AppData\Local\Temp\b00878bb0fe4797090a6d4647253d50a6b97bedfcac2a0eae556af524c6b088d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\N3r09.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\N3r09.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5E84.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5E84.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J12N9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J12N9.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2v3175.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2v3175.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3S90G.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3S90G.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 15644⤵
- Program crash
PID:3268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o283f.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o283f.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:716
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2484 -ip 24841⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1260
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5b463ac63be93490443b264c0a5a9273c
SHA14714313eab41f5e3ed0e40cf81eeaaf2a5038a4a
SHA2568cce8c57c28f725bf29936c7ffc0046c4d4613208a1357df45df7ee7cce9f120
SHA5125e226ee2a74bb0b8eb1b847a3b60a2a79aa76489f846c6e9195cb96384faf61c8402db3be859a021a54a453e37155a86723b4f8972c548e7df9b6d712819ae13
-
Filesize
5.2MB
MD5c71a228ed99b15ef24fec17c8d1115e5
SHA11bea76c58d4827300af8feee3ba4a1af37082578
SHA256cc54cc156eeaa540edbb0e8f3d57cf1acb5bfab0105f3b18214d6253e3edbbdf
SHA512bc7a2f14487c7da87012958e44c31956550d9fe64b751b14ab83ad1b96e0d77adad305fd6b192790595300db4e35be37533be325b2e8d2cb74b43661e82678f5
-
Filesize
4.9MB
MD56b80064dc2ce990d86dfe626b049e4fd
SHA1086b7a4ef8878371aa32673af2365d562f3179d0
SHA256c9b7962d520c5a0a1067f8b61c08ed27b23387ee910b2b0f328fee3a3cdab9d3
SHA51238c71885521d916f69d2cf21055d3cf9e212c67c78427aca2fe5559c14fb8e7f065345502f2354567f5fa58c329adeb66d01f911faefa28e34bed94478bd713f
-
Filesize
3.6MB
MD5bfb406695a3e9d40d1851aa1ed203154
SHA12d9b49276304d5b23a107bd9857c412aeb3bd4e5
SHA256203bfd3e3d0097f042af5ffb82baa21b29752f059404c11ce0cd65f0d5b3190b
SHA5125c473df8e9c9a75a35d948f6194e43143bc2c1de8643e1f076c4a46886ec3ef05abe0d5733ad2948718b29b4bcc7a3ce82a54f735f188f7a92ae35617cf89e4e
-
Filesize
3.1MB
MD5ee75f556e0ef4c3f8af20e442d0e00dd
SHA1f3a47cf0a27efc002e447772a320727bee9a3713
SHA25680bb9c013d5486e364bf67136761b32a337d86eef0d95f6825b8c3202e2a677b
SHA512870a210d845b75caaea5c9269bcc79704905c2f425326ac76d9a15038d47e5acffd507c870d36177bc27c8ec27fea59ec5e8d9f89c4412f66424d25b27b5a338
-
Filesize
1.8MB
MD5ceb4ec53ed4847265a4dc29c5975e005
SHA124fb92c455433899d9ff57fb3400f29b8e7d2223
SHA2569874d4ea41ec6dbeffcf0933dd8b9a166e582c775b436cff4ddf92b219df091b
SHA512125b99a6c73b4ab36a9fc45bbbece950e361efbf987f50c45aff15844d815c2a2f4f8b7de2a33655868ea54f739cc7e233a8cdedd172abe7fd6aca6ac20ba395