Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 12:11
Static task
static1
General
-
Target
9adbf0f8307421b0e45242705a30eddfa32bc93cc9f3d5c89609cb74ff1ede40.exe
-
Size
6.8MB
-
MD5
d4dae5fdd22b2b279325febe416d0547
-
SHA1
09638881b870c95662ec59926e1d3696263f53fa
-
SHA256
9adbf0f8307421b0e45242705a30eddfa32bc93cc9f3d5c89609cb74ff1ede40
-
SHA512
c4fc7f7af166012cd3f13e4ac5ea675597295465b10c5c1f2f37dde27649847e6f82b57ef425047141085b56375f83355bba91114865b002bf1b59e3d4443c0a
-
SSDEEP
98304:04/sO73wzI5P5bpWBTCufmmdAwd8d7yg4ldyPZBiTfx6vD7aGW7l6dvHi/jbqJdX:D/sZzIZ5bX4A3yPlAPSqaKvHFn3ia
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://fancywaxxers.shop/api
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4c123k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4c123k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4c123k.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4c123k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4c123k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4c123k.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2W0157.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3E16J.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4c123k.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1j62O4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2W0157.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2W0157.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4c123k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1j62O4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4c123k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3E16J.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1j62O4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3E16J.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 1j62O4.exe -
Executes dropped EXE 10 IoCs
pid Process 4812 I3M75.exe 2216 F0i65.exe 312 1j62O4.exe 5000 skotes.exe 2956 2W0157.exe 2312 skotes.exe 2108 3E16J.exe 2660 4c123k.exe 1128 skotes.exe 4456 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1j62O4.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 2W0157.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3E16J.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 4c123k.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4c123k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4c123k.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9adbf0f8307421b0e45242705a30eddfa32bc93cc9f3d5c89609cb74ff1ede40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" I3M75.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" F0i65.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 312 1j62O4.exe 5000 skotes.exe 2956 2W0157.exe 2312 skotes.exe 2108 3E16J.exe 2660 4c123k.exe 1128 skotes.exe 4456 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1j62O4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 312 2108 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3E16J.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c123k.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9adbf0f8307421b0e45242705a30eddfa32bc93cc9f3d5c89609cb74ff1ede40.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language I3M75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F0i65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1j62O4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2W0157.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3E16J.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3E16J.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 312 1j62O4.exe 312 1j62O4.exe 5000 skotes.exe 5000 skotes.exe 2956 2W0157.exe 2956 2W0157.exe 2312 skotes.exe 2312 skotes.exe 2108 3E16J.exe 2108 3E16J.exe 2108 3E16J.exe 2108 3E16J.exe 2660 4c123k.exe 2660 4c123k.exe 2660 4c123k.exe 2660 4c123k.exe 1128 skotes.exe 1128 skotes.exe 4456 skotes.exe 4456 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2660 4c123k.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 312 1j62O4.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2476 wrote to memory of 4812 2476 9adbf0f8307421b0e45242705a30eddfa32bc93cc9f3d5c89609cb74ff1ede40.exe 83 PID 2476 wrote to memory of 4812 2476 9adbf0f8307421b0e45242705a30eddfa32bc93cc9f3d5c89609cb74ff1ede40.exe 83 PID 2476 wrote to memory of 4812 2476 9adbf0f8307421b0e45242705a30eddfa32bc93cc9f3d5c89609cb74ff1ede40.exe 83 PID 4812 wrote to memory of 2216 4812 I3M75.exe 84 PID 4812 wrote to memory of 2216 4812 I3M75.exe 84 PID 4812 wrote to memory of 2216 4812 I3M75.exe 84 PID 2216 wrote to memory of 312 2216 F0i65.exe 85 PID 2216 wrote to memory of 312 2216 F0i65.exe 85 PID 2216 wrote to memory of 312 2216 F0i65.exe 85 PID 312 wrote to memory of 5000 312 1j62O4.exe 86 PID 312 wrote to memory of 5000 312 1j62O4.exe 86 PID 312 wrote to memory of 5000 312 1j62O4.exe 86 PID 2216 wrote to memory of 2956 2216 F0i65.exe 87 PID 2216 wrote to memory of 2956 2216 F0i65.exe 87 PID 2216 wrote to memory of 2956 2216 F0i65.exe 87 PID 4812 wrote to memory of 2108 4812 I3M75.exe 96 PID 4812 wrote to memory of 2108 4812 I3M75.exe 96 PID 4812 wrote to memory of 2108 4812 I3M75.exe 96 PID 2476 wrote to memory of 2660 2476 9adbf0f8307421b0e45242705a30eddfa32bc93cc9f3d5c89609cb74ff1ede40.exe 110 PID 2476 wrote to memory of 2660 2476 9adbf0f8307421b0e45242705a30eddfa32bc93cc9f3d5c89609cb74ff1ede40.exe 110 PID 2476 wrote to memory of 2660 2476 9adbf0f8307421b0e45242705a30eddfa32bc93cc9f3d5c89609cb74ff1ede40.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\9adbf0f8307421b0e45242705a30eddfa32bc93cc9f3d5c89609cb74ff1ede40.exe"C:\Users\Admin\AppData\Local\Temp\9adbf0f8307421b0e45242705a30eddfa32bc93cc9f3d5c89609cb74ff1ede40.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\I3M75.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\I3M75.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\F0i65.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\F0i65.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1j62O4.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1j62O4.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2W0157.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2W0157.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3E16J.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3E16J.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 15684⤵
- Program crash
PID:312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4c123k.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4c123k.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2108 -ip 21081⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4456
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD575aca548aa67bb93e938e2a9a2ce6949
SHA1728278cf603958a6279197342697979c2aff24ba
SHA256f967457380fbb7896e9ce238c6a5653ccb2d0dc8c541bbacc579398ae771a348
SHA51234dfadbfc1c54d58372fbaa7a440c2954c4d1389d05151d11db34136d88fb1b9edef0f2e9b0ded53c3a29962eb899c2906a9caf37f204cd19b2db881385d738b
-
Filesize
5.3MB
MD508a7ebc8e39b45c9fdbdcd433d82a768
SHA1d5df061f77e0f938f75bad9ececf7c55d6ac8ae5
SHA2567ce4f7e3c1468bf6616eb757323114159ac6dd980c7ec1ad51fcdc094f9f71dc
SHA5128a09c57b29d79a059449fb603305175201da4a0edf843aa5dcc6c0b36e484a0c620740b4923f86cfb3943872356258324d5f668d79eca9330c6ad39440040ced
-
Filesize
4.9MB
MD56c7f602306d9b4d0e2d6ca0a735480b5
SHA1ca8b6a60325a4e16e9c4f77fc626b33f6776301a
SHA2563d3e70c002477b1c5328d4297ff5a8db0981163e3c093b850908d271d1c7636d
SHA51280fd1c7bc0b51a03aa985063b04d781eb052dfa3eebc00ae70c82dece07ddc7f69d2f401e6d8e501134ebb4dcefacaf90f98dba5432c7b9c3f511bcd029e4ff5
-
Filesize
3.6MB
MD5872222f9c48fe345f6ac83b02311ead7
SHA1ef9f382f2fd5eac7662b4ca0d7d24f2374d51351
SHA256ad3555b09642bba84c8ae76b35d42c146789b59dd833a0fe7ed1d63ede76c1a2
SHA512f4afbc027528f7d0ff5a27516edbf8d66d29907de8e9c52f65af9280aab5c1a7addb476fa5d27ed457b3cb7d87bc408d8cc7e4a90f274c2558a1921714ea0280
-
Filesize
3.1MB
MD5c0b4ce3092e53fb07c1c8e8f1f3422e1
SHA10f5cfa7a0200991d52f96e623f72f851a1cff7e7
SHA2561c164a1be10c83eff0157196b089b7167522386ee1e097f4d91f4838a86366d1
SHA512fa9e3b564675e6471cf96858eb7d0923f086b7c83a3b02b838fdcded5acbdd618c49ba2f116ae0cdaa4f7e95f91ef09169dd9e4b0fca617a5dec212443cfb782
-
Filesize
1.8MB
MD5f2721fdbf7cb6565ea2d09cd37805806
SHA1bea6f303df5cd6cdd814acf46f0d20d68002a4d3
SHA2568bf62438e6a62d78c5e8a40548523fb1fbb5c6bb0e272e587862a37ee63d01e4
SHA51205c0a4af44372855dab5c69976afd6da84ac365f1a1202b57b4338faed45e75bdf8a7f33ab84514d1b7543a9a321f7645144496b43feb81e7c198d10f735eba6