Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 08:42
Static task
static1
General
-
Target
c1a7f7461997525717fba8cf2894ee4ece155fc3c4329af6b82450fedd3d0b0d.exe
-
Size
6.5MB
-
MD5
bd286e18fe81c2e827bc2a565367afbc
-
SHA1
9373a1febb17bcd4fe4f63f1c9e53402fbb97134
-
SHA256
c1a7f7461997525717fba8cf2894ee4ece155fc3c4329af6b82450fedd3d0b0d
-
SHA512
0f93ec82fd022495d811accab114db312e7dc426812db6b15d08242118a9893bade90b45f25470e66bea8bcb34adb2757cd780d1eab0a0d8cfaeec003879af07
-
SSDEEP
196608:HfVX7d4rxKxb8x6AHdiVXLRixR37S+fWAY9G:trirxKI62diV0rFSE
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/1048-50-0x0000000000FE0000-0x0000000001292000-memory.dmp healer behavioral1/memory/1048-51-0x0000000000FE0000-0x0000000001292000-memory.dmp healer behavioral1/memory/1048-62-0x0000000000FE0000-0x0000000001292000-memory.dmp healer -
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 4a751C.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4a751C.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4a751C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4a751C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4a751C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4a751C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4a751C.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4a751C.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 4a751C.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 4a751C.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2r4450.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3V07Y.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4a751C.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1x99x8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1x99x8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2r4450.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3V07Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3V07Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4a751C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4a751C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1x99x8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2r4450.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 1x99x8.exe -
Executes dropped EXE 10 IoCs
pid Process 468 k3d97.exe 4264 D9n76.exe 3972 1x99x8.exe 2192 skotes.exe 3904 2r4450.exe 4616 3V07Y.exe 1048 4a751C.exe 4748 skotes.exe 760 skotes.exe 4764 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 1x99x8.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2r4450.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 3V07Y.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 4a751C.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4a751C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4a751C.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c1a7f7461997525717fba8cf2894ee4ece155fc3c4329af6b82450fedd3d0b0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" k3d97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" D9n76.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 3972 1x99x8.exe 2192 skotes.exe 3904 2r4450.exe 4616 3V07Y.exe 1048 4a751C.exe 4748 skotes.exe 760 skotes.exe 4764 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1x99x8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2r4450.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3V07Y.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a751C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1a7f7461997525717fba8cf2894ee4ece155fc3c4329af6b82450fedd3d0b0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k3d97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D9n76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1x99x8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3972 1x99x8.exe 3972 1x99x8.exe 2192 skotes.exe 2192 skotes.exe 3904 2r4450.exe 3904 2r4450.exe 4616 3V07Y.exe 4616 3V07Y.exe 1048 4a751C.exe 1048 4a751C.exe 4748 skotes.exe 4748 skotes.exe 1048 4a751C.exe 1048 4a751C.exe 760 skotes.exe 760 skotes.exe 4764 skotes.exe 4764 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1048 4a751C.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3972 1x99x8.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1104 wrote to memory of 468 1104 c1a7f7461997525717fba8cf2894ee4ece155fc3c4329af6b82450fedd3d0b0d.exe 82 PID 1104 wrote to memory of 468 1104 c1a7f7461997525717fba8cf2894ee4ece155fc3c4329af6b82450fedd3d0b0d.exe 82 PID 1104 wrote to memory of 468 1104 c1a7f7461997525717fba8cf2894ee4ece155fc3c4329af6b82450fedd3d0b0d.exe 82 PID 468 wrote to memory of 4264 468 k3d97.exe 83 PID 468 wrote to memory of 4264 468 k3d97.exe 83 PID 468 wrote to memory of 4264 468 k3d97.exe 83 PID 4264 wrote to memory of 3972 4264 D9n76.exe 84 PID 4264 wrote to memory of 3972 4264 D9n76.exe 84 PID 4264 wrote to memory of 3972 4264 D9n76.exe 84 PID 3972 wrote to memory of 2192 3972 1x99x8.exe 85 PID 3972 wrote to memory of 2192 3972 1x99x8.exe 85 PID 3972 wrote to memory of 2192 3972 1x99x8.exe 85 PID 4264 wrote to memory of 3904 4264 D9n76.exe 86 PID 4264 wrote to memory of 3904 4264 D9n76.exe 86 PID 4264 wrote to memory of 3904 4264 D9n76.exe 86 PID 468 wrote to memory of 4616 468 k3d97.exe 87 PID 468 wrote to memory of 4616 468 k3d97.exe 87 PID 468 wrote to memory of 4616 468 k3d97.exe 87 PID 1104 wrote to memory of 1048 1104 c1a7f7461997525717fba8cf2894ee4ece155fc3c4329af6b82450fedd3d0b0d.exe 88 PID 1104 wrote to memory of 1048 1104 c1a7f7461997525717fba8cf2894ee4ece155fc3c4329af6b82450fedd3d0b0d.exe 88 PID 1104 wrote to memory of 1048 1104 c1a7f7461997525717fba8cf2894ee4ece155fc3c4329af6b82450fedd3d0b0d.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1a7f7461997525717fba8cf2894ee4ece155fc3c4329af6b82450fedd3d0b0d.exe"C:\Users\Admin\AppData\Local\Temp\c1a7f7461997525717fba8cf2894ee4ece155fc3c4329af6b82450fedd3d0b0d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k3d97.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k3d97.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\D9n76.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\D9n76.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x99x8.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x99x8.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2r4450.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2r4450.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3V07Y.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3V07Y.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4a751C.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4a751C.exe2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:760
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4764
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5011089d066ed2be073c0031cd591bf9e
SHA1bd6b55b160acfe6614dc074aea200d1be77b55e3
SHA25617c0de3b4993163903982fe6dfa86205afc5e4b46e653d876d318f8af61e15c4
SHA512a70fd959b2686ee197fc8a6b5597c2f865007f84e141fe39baf9ec3d7baa61bfd61b7d851783812fecfd928769879f4a6394a808ce268c3140d5471ff733447d
-
Filesize
5.0MB
MD538ef4c4c1c9285fc56e16c2c7a6ceadc
SHA1f55530619259b0c3946f4b31d6ae17d14afaab8d
SHA2563f5bbbb0f6b1603c4b529bcfb9b2a7cdd32d6188dd4c9f538c8f3461beb8257b
SHA512b5967b9679880f4da00d4c9411f35a92cfffd3202cf8292c7ef6a1232cd8c076290a8492c0ba6b551e265a828394cd110146a562c19f9a8c3dc094ee2587a2ad
-
Filesize
4.9MB
MD565da3999e1355d9799be96ff147014ec
SHA1f2c05ffa9f501a1fee037fde6046e4820ec5bd89
SHA256ab64e3f44b5bce5b0181bf5bd682ce6438ef51e3a8802cdfac837c0619bc4bfa
SHA5123c726a801d2413e87d78b57133722a6346a9156d1f463f6f553e07d36a0c899288129867eed566e04bfeb63cabe7385a896d3b0ba38cb24e8b307570b7c49bfa
-
Filesize
3.3MB
MD58b8dba76dcd9b49ccb52017e0d3b4c8e
SHA107f366f0d496cddde3b21166c9062798f5ae6e4a
SHA256d95f48d3fda73ba667314aad57463d1bff4ea75b6c0507057f44c6d7207b6b9b
SHA512d97e076d7b2c68241cbd35a3223d1dc645b724350103edf6f0fa58df1ff7a2035db204e52db823625bc58ff47a347fe400d835122486912004c238c75294f635
-
Filesize
3.0MB
MD5698b494f0464727fb30511a84323eb85
SHA137af63d61a628779571ce220670d5454b7e40a37
SHA25653a0103e1797ebe3af680e0bf7a2e3f3daa619ef4b573517aac23f4157cb4518
SHA51259c0d73fba15dce22ad88e0bc661dd19fc54c28e6539d49a713cd99998513279834f9daadaff6beb4c6334c3a7ffa8e4a1ffcd0dacb2f9ec5d9a0da3cfea78bd
-
Filesize
2.9MB
MD5cae2f5abf1b0fd97b1a7c205f453f41d
SHA18edeee2307a3409c0d7b758d64af6bf29d9cc2d8
SHA256836fe70790d7e71e61d8021dacab53b6e3a6ef2ba722163d6d3e85cbbd7b7787
SHA5128708c41fabed6dba5519d35223d7db82acde142234cb54f6677364174676fbebb604526ef5ecd66b37f84a17d26727b13a76042b7c35bff95c5643de30693750