Analysis
-
max time kernel
144s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 11:36
Static task
static1
General
-
Target
d5d258f8d34f1350887547f09e34965f86315e3c445f1d1e0238a51e47be3a6d.exe
-
Size
6.8MB
-
MD5
8c92a0ca8c78ec66615177a1f2370085
-
SHA1
2b576ceea55fde405f86743fccd08588f3160d3d
-
SHA256
d5d258f8d34f1350887547f09e34965f86315e3c445f1d1e0238a51e47be3a6d
-
SHA512
c2cf1560474285deb529017ff1e688c5e7cb01497f9b06b61c4d3b092ea72f3722bda3ba4be50788446fbe9a7d4a5bb9734943917b25acd49a654d6813f82e71
-
SSDEEP
98304:0iFUwG+qBJOChC8L2oDv9GIex2V66vGtfqz0+UJMBXOEBcoX61Q5TENcB0ctK/6q:9zDqB0ChC8iIv9oyTnoDscoXKu3cJX
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://fancywaxxers.shop/api
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4I395z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4I395z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4I395z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4I395z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4I395z.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4I395z.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2k4919.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3Y83y.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4I395z.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1Q32N7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3Y83y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1Q32N7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4I395z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2k4919.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3Y83y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4I395z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1Q32N7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2k4919.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 1Q32N7.exe -
Executes dropped EXE 10 IoCs
pid Process 3280 U0y33.exe 4552 t7R27.exe 1912 1Q32N7.exe 4668 skotes.exe 3164 2k4919.exe 1160 3Y83y.exe 2612 skotes.exe 4360 4I395z.exe 2060 skotes.exe 4496 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 4I395z.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 1Q32N7.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2k4919.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3Y83y.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4I395z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4I395z.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" U0y33.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" t7R27.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d5d258f8d34f1350887547f09e34965f86315e3c445f1d1e0238a51e47be3a6d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1912 1Q32N7.exe 4668 skotes.exe 3164 2k4919.exe 1160 3Y83y.exe 2612 skotes.exe 4360 4I395z.exe 2060 skotes.exe 4496 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1Q32N7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5096 1160 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5d258f8d34f1350887547f09e34965f86315e3c445f1d1e0238a51e47be3a6d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U0y33.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language t7R27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Q32N7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2k4919.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3Y83y.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4I395z.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3Y83y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3Y83y.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1912 1Q32N7.exe 1912 1Q32N7.exe 4668 skotes.exe 4668 skotes.exe 3164 2k4919.exe 3164 2k4919.exe 1160 3Y83y.exe 1160 3Y83y.exe 2612 skotes.exe 2612 skotes.exe 1160 3Y83y.exe 1160 3Y83y.exe 4360 4I395z.exe 4360 4I395z.exe 4360 4I395z.exe 4360 4I395z.exe 2060 skotes.exe 2060 skotes.exe 4496 skotes.exe 4496 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4360 4I395z.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1912 1Q32N7.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3820 wrote to memory of 3280 3820 d5d258f8d34f1350887547f09e34965f86315e3c445f1d1e0238a51e47be3a6d.exe 82 PID 3820 wrote to memory of 3280 3820 d5d258f8d34f1350887547f09e34965f86315e3c445f1d1e0238a51e47be3a6d.exe 82 PID 3820 wrote to memory of 3280 3820 d5d258f8d34f1350887547f09e34965f86315e3c445f1d1e0238a51e47be3a6d.exe 82 PID 3280 wrote to memory of 4552 3280 U0y33.exe 83 PID 3280 wrote to memory of 4552 3280 U0y33.exe 83 PID 3280 wrote to memory of 4552 3280 U0y33.exe 83 PID 4552 wrote to memory of 1912 4552 t7R27.exe 84 PID 4552 wrote to memory of 1912 4552 t7R27.exe 84 PID 4552 wrote to memory of 1912 4552 t7R27.exe 84 PID 1912 wrote to memory of 4668 1912 1Q32N7.exe 85 PID 1912 wrote to memory of 4668 1912 1Q32N7.exe 85 PID 1912 wrote to memory of 4668 1912 1Q32N7.exe 85 PID 4552 wrote to memory of 3164 4552 t7R27.exe 86 PID 4552 wrote to memory of 3164 4552 t7R27.exe 86 PID 4552 wrote to memory of 3164 4552 t7R27.exe 86 PID 3280 wrote to memory of 1160 3280 U0y33.exe 90 PID 3280 wrote to memory of 1160 3280 U0y33.exe 90 PID 3280 wrote to memory of 1160 3280 U0y33.exe 90 PID 3820 wrote to memory of 4360 3820 d5d258f8d34f1350887547f09e34965f86315e3c445f1d1e0238a51e47be3a6d.exe 101 PID 3820 wrote to memory of 4360 3820 d5d258f8d34f1350887547f09e34965f86315e3c445f1d1e0238a51e47be3a6d.exe 101 PID 3820 wrote to memory of 4360 3820 d5d258f8d34f1350887547f09e34965f86315e3c445f1d1e0238a51e47be3a6d.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5d258f8d34f1350887547f09e34965f86315e3c445f1d1e0238a51e47be3a6d.exe"C:\Users\Admin\AppData\Local\Temp\d5d258f8d34f1350887547f09e34965f86315e3c445f1d1e0238a51e47be3a6d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\U0y33.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\U0y33.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t7R27.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t7R27.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Q32N7.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Q32N7.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2k4919.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2k4919.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Y83y.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Y83y.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 15684⤵
- Program crash
PID:5096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4I395z.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4I395z.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 1160 -ip 11601⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4496
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD59516fb6cb4b85dbd0675edcddead14cc
SHA1d088ecf46a9dc47e5e967677030003ba757680b1
SHA25628774238961ef4a149d4aa20bae55ea636c51717a6a2ea72975270aa3dab9056
SHA512e75d2f8b60be55a9c69d5f9a1ce8513edc9bb825e5e99d1cd53307e90cef7db04529b4220cef1d93398023b87b63e6af2310e8f76442d7f5eda1be1e4a290863
-
Filesize
5.3MB
MD5bb6ab7fac6560b9223d65e4468530459
SHA18efaa5c68314a0899a1906e83985fe8bdb95ac92
SHA25667b778073ad1b532d98945c841a44e2b80978fe2cf27e782ad8174746b6ac882
SHA512d90abde3dc817d05ee8b0abe3109e4d6b2fbc55041488d2eb9e16bcc07107f313122a14133fdfe72df1f0bf467f01c0a61894642a63871cb6f4777bb366eda14
-
Filesize
5.0MB
MD5a347b21decb0421332c440e9d2511930
SHA1304da48e42cc69c6526c6c6c69fd7654f2b05e1b
SHA2563bbe4740ca668ab4c53de42413bf53ded17ab11c289919b4df497fdef5a9f342
SHA5127d9105d3eab38e9fe86ed2c2033a01054251774f42e9b413d223c24e1844f7e4a14a78d707086295aee0414c9221407ac972fa442a20c21e79b92492e736cf5d
-
Filesize
3.6MB
MD5ae33fd4d4bacc943ca3e6232557e03c7
SHA1a13ee1a49d907371583ea41943e74afe9d79ff28
SHA256eb1496b312cee3e3b1d5edefccf3c50024e74f1f56775f9b8691286fd1276b9e
SHA5125864a69662faf6c4361500c411e802c9f4e0e089c7ff8b200fd3762785524c481c42c8579e46302c21e49666935e54585ddc0d662805f4e6bacd2bc06ee54013
-
Filesize
3.1MB
MD55bcf3e5f5192a077f237f7c9580e6fe0
SHA1cec8a3f915bde5b7ff646b48433976f288e5caf2
SHA256f267abb5b184dcfc91a6e9aac7e2fe4c490142292b442814494635d38b179a1c
SHA5126f55d4b20573fb4e3dbb634a935c4350b63ab77e2b29d48e672069695dd15aa620217a1d1967dc91cf920f22f7a295d4dc60e61769c09e9ee2b6f371bcc6dbb6
-
Filesize
1.8MB
MD5d0680331e38e90d9a9419f2ed4911674
SHA1b1b7f0bfdc827e41b7e9141d6eb450adc308a19f
SHA2561f0774aab3bff554d7c8b4fb83388be1a9ad2831e33ac29d7592eb6b63c836f8
SHA512048ec40b9093b7a332e05ac265aacb77aef995f418947571f80fb13d75bbc442a13e061875973800e7ceb5b6d9d22f0da81a1f38f12ad3f18593d460f2904aaf