Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 03:03
Static task
static1
General
-
Target
9a213cb47e023d5f7e6e56cc499578bb8fc88d8ef0d9fe984da2ab6da559a92f.exe
-
Size
6.8MB
-
MD5
16be90aff996a05f0922ac2ae6f0e36e
-
SHA1
61630cd6dc23418e11f3dfc39b8342bcebd17199
-
SHA256
9a213cb47e023d5f7e6e56cc499578bb8fc88d8ef0d9fe984da2ab6da559a92f
-
SHA512
198caf394c2357188183447657146d2cee49d57c11e78d6af40f62c41d852b5f3ba53fa48b9652b6630e37e33084fca7fe755c34573faef47a2e0ffe0dc4c9e6
-
SSDEEP
196608:HtnBEurmtTqZL4cZeAH1dLsTk54WiFGl3B:xBEuqFsccZe26TaiqR
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://mindhandru.buzz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://mindhandru.buzz/api
https://prisonyfork.buzz/api
https://rebuildeso.buzz/api
https://scentniej.buzz/api
https://inherineau.buzz/api
https://screwamusresz.buzz/api
https://appliacnesot.buzz/api
https://cashfuzysao.buzz/api
https://hummskitnj.buzz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4S749x.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4S749x.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4S749x.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4S749x.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4S749x.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4S749x.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1W49y6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2j2139.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3N18F.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4S749x.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2j2139.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4S749x.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1W49y6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1W49y6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3N18F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2j2139.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3N18F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4S749x.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 1W49y6.exe -
Executes dropped EXE 10 IoCs
pid Process 2340 n8Z11.exe 228 J7q52.exe 2692 1W49y6.exe 1228 skotes.exe 3292 2j2139.exe 3132 3N18F.exe 1472 skotes.exe 2904 4S749x.exe 3868 skotes.exe 4708 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 2j2139.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 3N18F.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 4S749x.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 1W49y6.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4S749x.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4S749x.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9a213cb47e023d5f7e6e56cc499578bb8fc88d8ef0d9fe984da2ab6da559a92f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" n8Z11.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" J7q52.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2692 1W49y6.exe 1228 skotes.exe 3292 2j2139.exe 3132 3N18F.exe 1472 skotes.exe 2904 4S749x.exe 3868 skotes.exe 4708 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1W49y6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4528 3132 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1W49y6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2j2139.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3N18F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4S749x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a213cb47e023d5f7e6e56cc499578bb8fc88d8ef0d9fe984da2ab6da559a92f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n8Z11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J7q52.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3N18F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3N18F.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2692 1W49y6.exe 2692 1W49y6.exe 1228 skotes.exe 1228 skotes.exe 3292 2j2139.exe 3292 2j2139.exe 3132 3N18F.exe 3132 3N18F.exe 1472 skotes.exe 1472 skotes.exe 3132 3N18F.exe 3132 3N18F.exe 2904 4S749x.exe 2904 4S749x.exe 2904 4S749x.exe 2904 4S749x.exe 3868 skotes.exe 3868 skotes.exe 4708 skotes.exe 4708 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2904 4S749x.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 1W49y6.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4400 wrote to memory of 2340 4400 9a213cb47e023d5f7e6e56cc499578bb8fc88d8ef0d9fe984da2ab6da559a92f.exe 82 PID 4400 wrote to memory of 2340 4400 9a213cb47e023d5f7e6e56cc499578bb8fc88d8ef0d9fe984da2ab6da559a92f.exe 82 PID 4400 wrote to memory of 2340 4400 9a213cb47e023d5f7e6e56cc499578bb8fc88d8ef0d9fe984da2ab6da559a92f.exe 82 PID 2340 wrote to memory of 228 2340 n8Z11.exe 83 PID 2340 wrote to memory of 228 2340 n8Z11.exe 83 PID 2340 wrote to memory of 228 2340 n8Z11.exe 83 PID 228 wrote to memory of 2692 228 J7q52.exe 84 PID 228 wrote to memory of 2692 228 J7q52.exe 84 PID 228 wrote to memory of 2692 228 J7q52.exe 84 PID 2692 wrote to memory of 1228 2692 1W49y6.exe 85 PID 2692 wrote to memory of 1228 2692 1W49y6.exe 85 PID 2692 wrote to memory of 1228 2692 1W49y6.exe 85 PID 228 wrote to memory of 3292 228 J7q52.exe 86 PID 228 wrote to memory of 3292 228 J7q52.exe 86 PID 228 wrote to memory of 3292 228 J7q52.exe 86 PID 2340 wrote to memory of 3132 2340 n8Z11.exe 91 PID 2340 wrote to memory of 3132 2340 n8Z11.exe 91 PID 2340 wrote to memory of 3132 2340 n8Z11.exe 91 PID 4400 wrote to memory of 2904 4400 9a213cb47e023d5f7e6e56cc499578bb8fc88d8ef0d9fe984da2ab6da559a92f.exe 101 PID 4400 wrote to memory of 2904 4400 9a213cb47e023d5f7e6e56cc499578bb8fc88d8ef0d9fe984da2ab6da559a92f.exe 101 PID 4400 wrote to memory of 2904 4400 9a213cb47e023d5f7e6e56cc499578bb8fc88d8ef0d9fe984da2ab6da559a92f.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a213cb47e023d5f7e6e56cc499578bb8fc88d8ef0d9fe984da2ab6da559a92f.exe"C:\Users\Admin\AppData\Local\Temp\9a213cb47e023d5f7e6e56cc499578bb8fc88d8ef0d9fe984da2ab6da559a92f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8Z11.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8Z11.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\J7q52.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\J7q52.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1W49y6.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1W49y6.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1228
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2j2139.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2j2139.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3N18F.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3N18F.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 15604⤵
- Program crash
PID:4528
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4S749x.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4S749x.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 3132 -ip 31321⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4708
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5da05a10f3b6687c34f5ccb452b0f0fac
SHA1ae2455e79c889fcf41109063906e4a6cdcd1dbb1
SHA2562a440ef8baac0aa446bd36c9f939e10825a7e9ef3e027274389f8317d1db27e0
SHA512a69dc9aed79d8bedd63c754940deb1c316631154d0b6de142ed3ae04271b21b46bf20af718f257f380a8a4bbe8af969b2d51fa4baa1fcabe483b72bcab58577d
-
Filesize
5.2MB
MD5978541e0abb0cb5d74b7c5c03b775896
SHA17afca4f5f81f88a32a44e375fb028a0ba24e8162
SHA25601115139901648269fb097efab890eede6a713a267234ecf66ba1d1f458d1fd1
SHA512c300d2b1e8d27d4884d70dbda825dce8a23eb709ae186e28535cb5ff79c095094e68db1f12c9d16ae600dbaad8209292d6dad961df872ee56e98c08b18aeb5e4
-
Filesize
5.0MB
MD55950e0c3247b78fc41a4c1cdae5135d2
SHA1c1306d58b6e271c3a4c75529b223baf02d434cfe
SHA256ab922f44d7991cf4815b2d264a96f56673cb8f77b0d1be4ceca46ac1f187be04
SHA51218ee7dc2b49397f95b3b83fb5ba4f81a313275c64b069edb2d7a44ecab2d3d48913516d06417a6fc91ecae7380fb293a3317903f8a3305e66c6ed5d8f17cc5f3
-
Filesize
3.6MB
MD53193a4297b6fa31fa30a2c64bab81d99
SHA134d1324a069dc85037320ec9cc8be9e1dbca2b51
SHA2562c177844062cf193fcbee6af8bc5885937ee255fdf2daac0fbb19213f434104d
SHA512ee992f4a0b95040bb6f9c154ad417edb4f6d11e29e9b7e4e2a801d090e3c0589ccabac9c1dd5036242e555791849bbd82d031b26f4a414a9559dac37608fdeab
-
Filesize
3.1MB
MD5f48c44e1a81b133aed1a25a42f065cd0
SHA1414e3d98e6d51902c5024e7bf18caf08990b8e90
SHA2564d47244b1cd9a876b0afcbb5ef2e0d8706dba3419a7693831a3004f1e5e95c56
SHA51292b418d18415b2a6bd8ac84ffe67c9a96228122c93f6cf60fe56a69d0965b122597ff7a4d4eb434e7c28d3fdf479029854d347c1740742723b64f1bc0fe1f76a
-
Filesize
1.8MB
MD563e1ee575307e1edd1e0b7357a5bafed
SHA1ca3177f3bc4b1dbc75736cf81981c78d68f42f7a
SHA256f4206cdda68f0d5e65006e954d7481aac64cd94a43d2311cfdfbbfdd2cbf8f58
SHA5127714f79f612316159f15a39073da18c8fdcf27707f00e9bb5fb9e9e7d2fb30d35d06aa7d1badba5d6066cc799190e2963cfa26ca2f7a10a13769c43c08e17612