Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 10:02
Static task
static1
General
-
Target
b34ee550249ebc8acc77172fb03995126698a0969dd5f4e6c60c004a1fdeb2c6.exe
-
Size
6.8MB
-
MD5
89cbbdcfa0036639098ba4b01b48f1f2
-
SHA1
3c5b263d0b8ba02e5bec5cb2156e6fca4f14f043
-
SHA256
b34ee550249ebc8acc77172fb03995126698a0969dd5f4e6c60c004a1fdeb2c6
-
SHA512
9351a6a533e97a4fba39b8429e300142518123ad6896e0c2671375ac95b8622bfd941a25588c419a2a2db95cc9a3cbbc348d4b18c2e330be70b9adc9557f7ed1
-
SSDEEP
98304:ovhgUL2eoMaRvcq4myHsFBCWBrTZ9cjbL0D2lz9jJvnx4w9XzdxRhTJlzUbKc+4U:Z13V4mosqgTcT0Slz9NvHxDJlzUbJ9U
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://mindhandru.buzz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://mindhandru.buzz/api
https://prisonyfork.buzz/api
https://rebuildeso.buzz/api
https://scentniej.buzz/api
https://inherineau.buzz/api
https://screwamusresz.buzz/api
https://appliacnesot.buzz/api
https://cashfuzysao.buzz/api
https://hummskitnj.buzz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4N444P.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4N444P.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4N444P.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4N444P.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4N444P.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4N444P.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4N444P.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1v93S5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2c9622.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3w39i.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1v93S5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3w39i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2c9622.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3w39i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1v93S5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c9622.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4N444P.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4N444P.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 1v93S5.exe -
Executes dropped EXE 10 IoCs
pid Process 1572 V6W61.exe 4868 R0v73.exe 3516 1v93S5.exe 2396 skotes.exe 4156 2c9622.exe 4900 3w39i.exe 1280 skotes.exe 976 4N444P.exe 720 skotes.exe 4388 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 1v93S5.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2c9622.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 3w39i.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 4N444P.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4N444P.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4N444P.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" R0v73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b34ee550249ebc8acc77172fb03995126698a0969dd5f4e6c60c004a1fdeb2c6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" V6W61.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 3516 1v93S5.exe 2396 skotes.exe 4156 2c9622.exe 4900 3w39i.exe 1280 skotes.exe 976 4N444P.exe 720 skotes.exe 4388 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1v93S5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4616 4900 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1v93S5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c9622.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3w39i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4N444P.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b34ee550249ebc8acc77172fb03995126698a0969dd5f4e6c60c004a1fdeb2c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language V6W61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R0v73.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3w39i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3w39i.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3516 1v93S5.exe 3516 1v93S5.exe 2396 skotes.exe 2396 skotes.exe 4156 2c9622.exe 4156 2c9622.exe 4900 3w39i.exe 4900 3w39i.exe 1280 skotes.exe 1280 skotes.exe 4900 3w39i.exe 4900 3w39i.exe 976 4N444P.exe 976 4N444P.exe 976 4N444P.exe 976 4N444P.exe 720 skotes.exe 720 skotes.exe 4388 skotes.exe 4388 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 976 4N444P.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3516 1v93S5.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4876 wrote to memory of 1572 4876 b34ee550249ebc8acc77172fb03995126698a0969dd5f4e6c60c004a1fdeb2c6.exe 82 PID 4876 wrote to memory of 1572 4876 b34ee550249ebc8acc77172fb03995126698a0969dd5f4e6c60c004a1fdeb2c6.exe 82 PID 4876 wrote to memory of 1572 4876 b34ee550249ebc8acc77172fb03995126698a0969dd5f4e6c60c004a1fdeb2c6.exe 82 PID 1572 wrote to memory of 4868 1572 V6W61.exe 83 PID 1572 wrote to memory of 4868 1572 V6W61.exe 83 PID 1572 wrote to memory of 4868 1572 V6W61.exe 83 PID 4868 wrote to memory of 3516 4868 R0v73.exe 84 PID 4868 wrote to memory of 3516 4868 R0v73.exe 84 PID 4868 wrote to memory of 3516 4868 R0v73.exe 84 PID 3516 wrote to memory of 2396 3516 1v93S5.exe 85 PID 3516 wrote to memory of 2396 3516 1v93S5.exe 85 PID 3516 wrote to memory of 2396 3516 1v93S5.exe 85 PID 4868 wrote to memory of 4156 4868 R0v73.exe 86 PID 4868 wrote to memory of 4156 4868 R0v73.exe 86 PID 4868 wrote to memory of 4156 4868 R0v73.exe 86 PID 1572 wrote to memory of 4900 1572 V6W61.exe 91 PID 1572 wrote to memory of 4900 1572 V6W61.exe 91 PID 1572 wrote to memory of 4900 1572 V6W61.exe 91 PID 4876 wrote to memory of 976 4876 b34ee550249ebc8acc77172fb03995126698a0969dd5f4e6c60c004a1fdeb2c6.exe 101 PID 4876 wrote to memory of 976 4876 b34ee550249ebc8acc77172fb03995126698a0969dd5f4e6c60c004a1fdeb2c6.exe 101 PID 4876 wrote to memory of 976 4876 b34ee550249ebc8acc77172fb03995126698a0969dd5f4e6c60c004a1fdeb2c6.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\b34ee550249ebc8acc77172fb03995126698a0969dd5f4e6c60c004a1fdeb2c6.exe"C:\Users\Admin\AppData\Local\Temp\b34ee550249ebc8acc77172fb03995126698a0969dd5f4e6c60c004a1fdeb2c6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\V6W61.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\V6W61.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\R0v73.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\R0v73.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1v93S5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1v93S5.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2c9622.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2c9622.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4156
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w39i.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w39i.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 15364⤵
- Program crash
PID:4616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4N444P.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4N444P.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4900 -ip 49001⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:720
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4388
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD522b047821f0ba5292d13adbe42ff3f1f
SHA163c3eae853edd71d14bd514ae7c491c09b35d9ed
SHA256059091e3732bd3c619b566b30d49af8202a8e4f5b68bae5fc52a2e100fe74bbb
SHA512da555d2d669f0b4a1b3a92c4becb934043d4d27eba024e98158eff96e49e1cf70c63586d108a2673c4629d261c609f3fbdfce73f562654c0446aef71424201d3
-
Filesize
5.2MB
MD5dde9d368d9ed0430872bcfb7e54ba050
SHA1c456c3e24a2e6acd75bcd347cf80f750bb8844a5
SHA25680a9002b88c75212a5003738e002845f423a8797387bbfa5332ecc6851d5fde5
SHA5120f46f1b2759bd543cda7b5bdeb6326f32e772ea200ebee7c8f3a8f8040f5344bd4d753df4224eb0d809d5b927513efceed8a5111fb3a30f385bb1df8fb5aad3a
-
Filesize
4.9MB
MD54fb17c975189aaddf8f73e55672e15db
SHA1f95440a84bc20f1a35c7a6aba46ad9b2edc1139b
SHA25655f15526b557380bd03f86b0f06361358ac7fa22ffc1d2bfdcf131c5b2e581f1
SHA51226ee58a20d259c5ffa50699e39e98db2d7e94e4c623d5dca5177388c469d8b0f32d14d0be98accd0c154e59d1f2b67289914c052e028e2adce3ab37410678af2
-
Filesize
3.6MB
MD504d6e4992534c2166fc2452b68c2ee57
SHA19fe6a0f03b744dc9e2970454e7a7663952ff54bb
SHA2561da06d0463d4ba36bd3ecdcbd66418b9ea5aac4bbf5c166128fb25c8aa5200e1
SHA5127ea1e2f2b13b2c406a833d7bfa1b1f827d8755472c432e9aea769975852870d5d1aa7ba2b027acfe2fb70c028f2e768c761ace46e4fafcb18f296a31efd27f09
-
Filesize
3.1MB
MD5f3908bd3c6b8f49fd6ffe975665e523b
SHA1d344b8f77bade439af945cad6c9915d47f4e3845
SHA2561e716d45fa7df965de2ec3a66af49a37b9fa2d54042acd1fe4df4d7998963206
SHA5125f7b97182dc81866179fd60fa5c44bd89c5ebc6074b5154cb87e2e97836f79f26288d4a081e75c1c60eecf13b6a57ce9c266f6ecc20b25fdd180716a1b4f609f
-
Filesize
1.8MB
MD5c317f66c3bb595d92533e3d0fe227366
SHA1ff7cf48fd32a6e4b73b14568c7610d585e5b40d3
SHA25677e2dd1562a40f41cea1d27cd0bf045c762372807813718327a6cae72c46731e
SHA5126415beacba6698451e4610799f99dacc4522f81e9dd60e65d076bc0910656cdc4e30115ff5242743f7d7bbbae851a0cc884a2da9e5cdea486011f748e7b9704a