Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 19:52
Static task
static1
Behavioral task
behavioral1
Sample
e0b5b550a2889c93ebc2f92ca39ae360_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e0b5b550a2889c93ebc2f92ca39ae360_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
e0b5b550a2889c93ebc2f92ca39ae360_NeikiAnalytics.exe
-
Size
706KB
-
MD5
e0b5b550a2889c93ebc2f92ca39ae360
-
SHA1
a07b9886ae127354f3300c87b6b3a14baf3d681e
-
SHA256
6925976f4fd5ee91f2fa151e287de8d82ee5839b14b3c0704c4888152bd91f5d
-
SHA512
4270ccb5b175a698103e0c23756acb27462ed08243997d0964089bb11c6cfafe60200bf4da21eebf96a4c74f70f3a15c91cf9296c20b1e63babab37d97e9f6ec
-
SSDEEP
12288:/MwVShoxD8J+pIeoDfiTBLypIkEWxAXvJlse8nBtczhaNY2R7qVuUA3Ns5r:/MwVStJ+yBDIOA/Jee6Bis7OuUA9s
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
Stem.pifdescription pid process target process PID 2772 created 1200 2772 Stem.pif Explorer.EXE -
Executes dropped EXE 2 IoCs
Processes:
Stem.pifStem.pifpid process 2772 Stem.pif 1352 Stem.pif -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 2688 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Stem.pifdescription pid process target process PID 2772 set thread context of 1352 2772 Stem.pif Stem.pif -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 2680 tasklist.exe 2824 tasklist.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Stem.pifpid process 2772 Stem.pif 2772 Stem.pif 2772 Stem.pif 2772 Stem.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
tasklist.exetasklist.exedescription pid process Token: SeDebugPrivilege 2680 tasklist.exe Token: SeDebugPrivilege 2824 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Stem.pifpid process 2772 Stem.pif 2772 Stem.pif 2772 Stem.pif -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Stem.pifpid process 2772 Stem.pif 2772 Stem.pif 2772 Stem.pif -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
e0b5b550a2889c93ebc2f92ca39ae360_NeikiAnalytics.execmd.exeStem.pifdescription pid process target process PID 2060 wrote to memory of 2688 2060 e0b5b550a2889c93ebc2f92ca39ae360_NeikiAnalytics.exe cmd.exe PID 2060 wrote to memory of 2688 2060 e0b5b550a2889c93ebc2f92ca39ae360_NeikiAnalytics.exe cmd.exe PID 2060 wrote to memory of 2688 2060 e0b5b550a2889c93ebc2f92ca39ae360_NeikiAnalytics.exe cmd.exe PID 2060 wrote to memory of 2688 2060 e0b5b550a2889c93ebc2f92ca39ae360_NeikiAnalytics.exe cmd.exe PID 2688 wrote to memory of 2680 2688 cmd.exe tasklist.exe PID 2688 wrote to memory of 2680 2688 cmd.exe tasklist.exe PID 2688 wrote to memory of 2680 2688 cmd.exe tasklist.exe PID 2688 wrote to memory of 2680 2688 cmd.exe tasklist.exe PID 2688 wrote to memory of 2644 2688 cmd.exe findstr.exe PID 2688 wrote to memory of 2644 2688 cmd.exe findstr.exe PID 2688 wrote to memory of 2644 2688 cmd.exe findstr.exe PID 2688 wrote to memory of 2644 2688 cmd.exe findstr.exe PID 2688 wrote to memory of 2824 2688 cmd.exe tasklist.exe PID 2688 wrote to memory of 2824 2688 cmd.exe tasklist.exe PID 2688 wrote to memory of 2824 2688 cmd.exe tasklist.exe PID 2688 wrote to memory of 2824 2688 cmd.exe tasklist.exe PID 2688 wrote to memory of 2996 2688 cmd.exe findstr.exe PID 2688 wrote to memory of 2996 2688 cmd.exe findstr.exe PID 2688 wrote to memory of 2996 2688 cmd.exe findstr.exe PID 2688 wrote to memory of 2996 2688 cmd.exe findstr.exe PID 2688 wrote to memory of 2600 2688 cmd.exe cmd.exe PID 2688 wrote to memory of 2600 2688 cmd.exe cmd.exe PID 2688 wrote to memory of 2600 2688 cmd.exe cmd.exe PID 2688 wrote to memory of 2600 2688 cmd.exe cmd.exe PID 2688 wrote to memory of 3036 2688 cmd.exe findstr.exe PID 2688 wrote to memory of 3036 2688 cmd.exe findstr.exe PID 2688 wrote to memory of 3036 2688 cmd.exe findstr.exe PID 2688 wrote to memory of 3036 2688 cmd.exe findstr.exe PID 2688 wrote to memory of 1792 2688 cmd.exe cmd.exe PID 2688 wrote to memory of 1792 2688 cmd.exe cmd.exe PID 2688 wrote to memory of 1792 2688 cmd.exe cmd.exe PID 2688 wrote to memory of 1792 2688 cmd.exe cmd.exe PID 2688 wrote to memory of 2772 2688 cmd.exe Stem.pif PID 2688 wrote to memory of 2772 2688 cmd.exe Stem.pif PID 2688 wrote to memory of 2772 2688 cmd.exe Stem.pif PID 2688 wrote to memory of 2772 2688 cmd.exe Stem.pif PID 2688 wrote to memory of 2528 2688 cmd.exe PING.EXE PID 2688 wrote to memory of 2528 2688 cmd.exe PING.EXE PID 2688 wrote to memory of 2528 2688 cmd.exe PING.EXE PID 2688 wrote to memory of 2528 2688 cmd.exe PING.EXE PID 2772 wrote to memory of 1352 2772 Stem.pif Stem.pif PID 2772 wrote to memory of 1352 2772 Stem.pif Stem.pif PID 2772 wrote to memory of 1352 2772 Stem.pif Stem.pif PID 2772 wrote to memory of 1352 2772 Stem.pif Stem.pif PID 2772 wrote to memory of 1352 2772 Stem.pif Stem.pif PID 2772 wrote to memory of 1352 2772 Stem.pif Stem.pif
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\e0b5b550a2889c93ebc2f92ca39ae360_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e0b5b550a2889c93ebc2f92ca39ae360_NeikiAnalytics.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Leaf Leaf.cmd & Leaf.cmd & exit3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2680 -
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵PID:2644
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2824 -
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"4⤵PID:2996
-
C:\Windows\SysWOW64\cmd.execmd /c md 3330234⤵PID:2600
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BODIESPHARMACOLOGYQUANTUMKITS" Emperor4⤵PID:3036
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Gifts + Gardening 333023\c4⤵PID:1792
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\333023\Stem.pif333023\Stem.pif 333023\c4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.14⤵
- Runs ping.exe
PID:2528 -
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\333023\Stem.pif"C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\333023\Stem.pif"2⤵
- Executes dropped EXE
PID:1352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD58b34c8d2a782d4198ee5e46499f1a54a
SHA1f67171f3b02c2b445883b7f2c894e17673ba5cb2
SHA2563834676f62cb70418ee0cb8f8763b4c1751639cb3a7f8eeebe7a85e595f2b249
SHA512318da72cccaac9f5770dc2007f6c377542f3cfaea928048f4a44ce560b8d49a31f5d0b870fb4c2a8d0178d1509642fa07ced5afb061c1077d97b0b1d9f30c308
-
Filesize
40KB
MD51d64f66de3218e4f8ff3c5de074f9547
SHA1186c61e6ea46db774077d7f85074f34ce3588a84
SHA2567759523603f776adf9eef4177f93dc987bc551659043656acc9e42284bcb451d
SHA512b6dda26ab5c9d76e256c3f835dca4cf86e7a780c850a61f915386af5745d6fe8a97cd2194bd63fe02abb5b9389493a4a132eeaa5e2ad87e08186225b5daab218
-
Filesize
16KB
MD5a28f2ba823781eef4308dd654bc875a0
SHA13e3703f47c0293ee64ec444566db65acf4768ad0
SHA256d04205b851184eece5886faabfdf4d6a934bb5e0e080dc89ee5b8a9cfb3e97bc
SHA51291553a15e8b9c8e034f69b56f4b34cab5481f3ba1145962b8906e179e3a28ec6b938af23b422345f0374cf755c1e4c2dfadca2ea94112bff682b2296b54e016f
-
Filesize
59KB
MD5b0fee4e79487592a8a2d86249201eeeb
SHA14ead656edeb284a194cbc10de8b137c769a7a387
SHA256251bb864f8036eda2fa50a8504cdd741d7189a193d58edb065b7e17e5e19226c
SHA512c06f32c708e323b409dc44d412dfb7f4e4c2c661ce241258936e078b0f60f190ea582bcd87e3f961ee6ca65dbef50f832af231230ac6d001008a2c1fddd61dc3
-
Filesize
40KB
MD591f32291f248878aa7cba1f197bcffb1
SHA1ce7fdf08d568e13c7b3eb936eefb429c41a2ceb5
SHA256ace8b72a2b6a18d0f3892af246491666d5465de369db191d7cb7e23c4631be48
SHA512b6b7168210ea93a268bbe4a34be6677cc5c6510ca552542b79eea42889265bd017173dd9926a2fa6f2382ae2daaec93499728f2c826d435bb8bdef43bf48a131
-
Filesize
61KB
MD55e17bc4171157600cf0f6c9fa84ccf49
SHA1be66b56eebb2a21840ac79177eb70e4d8a794c0d
SHA2564faf94eeb29e6387e6dbeee73b789cd66cdc257f31fda27cc3fe88beab09f69b
SHA512f41f7df61bcdd279c01d302d91d36701cc3eb60cb26defdbf5d809ecf29771aeab655a9b4c1567e696281fda78e8c2c59261e2ccd5b463e9bb9df08b6c21f068
-
Filesize
41KB
MD541e6bf39189e5314acceefc08cd6a6c9
SHA10743f9d20f42418073dd19be505e402abbb1df5e
SHA256bbc9357bde4872bbdd812fcd08770f2a2f16d39a286762898e745521365c2b15
SHA51202a8bb307ba1a5c4035f82fac9959bbade75ee6ee7ca722d718bd3f9cecfb84d6d02b6edc74c0691c0a2105749cb5cbbd73da33fafac55dee29cdd1fa6dd0e64
-
Filesize
177B
MD5622f0a5f9cc2d1e789b2a6d6ac2eb349
SHA16e1b05e9a62a4ba1573e921a6b6500184c0abc43
SHA25637e375e57c7d0f11364c690a0f52222c3e1b022514c7293459255882b5f33e10
SHA5129d09a8d3f617c6e6c80194a87f030426abd3b7ca29e48ba87f264a90f6215e540cacbf3b9fe89399d8b2191175a952f3745a9799de6e6a30c2ff73cac537de90
-
Filesize
7KB
MD5b55df96cbdd6bafb58ff61ea4e8b1e74
SHA1e015878dbf301dfaeecd99c2e7b794364ac32d58
SHA2569c919742ada83079501e0035e86aefe831e7824d218e89611e55e5ac56f7c095
SHA51272af8dc5d56960f5df5ba2319faa9d257a927635de338c7a6d0014e4ceaacd93f9e38766470e0e5d4069ac53436291130b2f8cd95e17009adfab7ccffc52193c
-
Filesize
38KB
MD5a15439f9cd2379dc75e85feafe20e62b
SHA1bf2c396b6de21b0525762c0e7acb50259ce5050a
SHA256f07011e4018ee6d085dd4e95298146ca2712ae4137cb60340881be09c0bb712b
SHA5126d57b13c990a36de9924c6550124c36f6bf6e1ebf3a94d3633846993418b06be22edc0af13a6aae91eda8a051642a3c656c4ffaf261beb2002d5d7529cf50d91
-
Filesize
7KB
MD5811a0b0309b4d18de7db36010a534fd5
SHA1aa5a746b898406028b25c169ec50602bf0edb71c
SHA256b706222fb8af1229108432d46b02a208f3feb18ecc143528599f036a756bd780
SHA512a9ba2739614a88a48277ce138b4027d93a0aabe613d84aea314ecf55a0224f70dd1b35532c2855ab5ce194dcaac9b96e310f95ed12e3be0d7cd83d9fb61ee7b8
-
Filesize
38KB
MD5611538ecefe9a453c5917595e2b89e08
SHA1cd69db14edea9016ac8791f9242aff234ade1364
SHA2561d2ea2bfe39057b66a77b141de7dd4fded8b1ef5da824d11dc7be6f5ed549957
SHA5126f2be9e318ee59835ef86d23f1edd990bc26c0f66b9b6b0a1ab2d6ee87517a4008846858129e626f716544b7b78b7656ae1ed574cb354cbe7a0ec29e1e9ef4d0
-
Filesize
169KB
MD5601491c2535709cac1d1650216b4de85
SHA158e6cf8a69f1ebf179fce7e56b0ac001a4580f89
SHA2560327ea05281aca7ee28ae4b17251db495f4b5161822dbf918d0c87cdea851e28
SHA512341ed95a337cf7fbd5a4dbbd03775810abd9d73c53ab788f9175a8fb4ece4530da49d89d730d4743dfb0446b795ce798dd2190e2021b2d68717e64f9eaef1f11
-
Filesize
47KB
MD5312d46318b318adcd35865746e8a7c55
SHA1dc6b454c9db68d2e116c76585db7c2d078e3c133
SHA256478da98c7014892a7708f0d4740953d660a47b3d3400e3fdb9d02c11f9a03784
SHA512ad5312471f99358c761f9b09062a172110d81b02a0a730211d0c65f92ac68357a75967f2a9fe9c27449ffdc3e3802de2f6aa599c8a9379a7537a8c9855d39b68
-
Filesize
33KB
MD50c0a4f9addddeff14057061a79367bc9
SHA19518f7f01d4da3bc9208315b0a5797931c81584e
SHA2566846468929d35a6e0b74973baa292a01091a566c9e70bef4140208e8b3d0debf
SHA51253273d02ab759962372db026dcff86b29da14ee61a14f4be121d346bd0d7b5b13357aa1f15d23452e24183a9c7248af68bad7c40c2247cbd665ece4b77c7503b
-
Filesize
15KB
MD50bd06c3400244a9f948e6a8ac52b5d57
SHA1842b57930264517cf805800df8a0d6af2c66b5f6
SHA256c2381fd8410de55ec3496865430ff0be4e8cb8fc0632b31fbe2ff1c037314481
SHA512cc71d19f35d499de7c86e373b925f0a1d1852459b057373fa663701ea4f4f76e6e33ac8b2f6299de9ecd5bafae28fa469169d94fadf5eca712923f4e6e4f2bb8
-
Filesize
39KB
MD5153a1d3047aa4e6cbfd18b4d8f646dcf
SHA1c51edeeb43b1f8125178ed75b1d4684069ccd925
SHA25619178821ef227afe385ff47503a74683b2dbc1ff88554eb9275bb6aa8764c4a3
SHA512a05f852d0e73459c96438ecf24436992a3e66994bf3af69a0841126d19fad28e048f458eca0e3170d7a005067f219d58d90f42b441a690bef6769256c708c5c2
-
Filesize
8KB
MD59355be2f8e62c3841b5f5231b885fee7
SHA1c241d672570e855784c4b52241ea1f183f237bff
SHA256337c14b9e4bd3b4eb043d1ef635df305abef2d3e314c2864518b4a133ab6b6f8
SHA512688a7d6b4409f58a805f171cb831a8b3fa1a1b1a996ab75956f6ee8e6be357eb9c004cc5719e65fe23af6846b9a8b8c2b5473b463823eadda90e7b3e0668ae4e
-
Filesize
62KB
MD547c2bc009643c3446d89f6d3a584a90c
SHA14a56191ee5a093df1f48fe20516acb2e788dc9aa
SHA256591633247ca3c5ac8ed37d06eba393a029c95b9c169564c236f38918817bd9dc
SHA5123376a53f2ad3d95d1139256aafa307b579a8b45151bc19a9ab340f333ae1af0064ff002b3d857a41f992d771a39decd05b1f59219c8a6806bfa5cc9be5bb1fc7
-
Filesize
39KB
MD593f9d5bfe49837ea224219fb95047904
SHA1702a635c5363a66020ee9e99118f0141f193cc83
SHA25637abb4c4b4f1669544f6c32cef2b26d64b46c3dc136288b8c6fc48377467e13c
SHA5126eeb5988575d963667fbd2f86a6718cdb91652af8acdf35a79424d0285665aae687e5b0a2d02944573521011d9cdc225606144fefa2f8f35b560adaa3059b7b6
-
Filesize
59KB
MD51ad411af6c3e623452d3068e9d1a6043
SHA14884b1e9a53d30b0084d69fbc88de76e9bb99aed
SHA25675093732dad731222be75f329d33ffb119dfe4a6f161ab51d932c42c168c90db
SHA5120f11d43abb43fa693829b82e2b7bd5af7d5b1fcf58a449bb57907f7d2a1b3d16b2d94a3a3d1dfd3772103bf8b0aedc3be64c0bdaaf8a71135de2a19c828e2f72
-
Filesize
7KB
MD5f158cfeee5dbb71c959e747b69792318
SHA1a9835c8203eb13a78d22fbaf5c5eb7e11b6a2e14
SHA256112eaf10d1590968929382398c602bf7ca094d16776e16608f8559fc8c0eca53
SHA51209192b45025666d7839efc3f3d435fe802339e8cd5dad15cb5d8e511d4ed5100f6880fd037c5bd686230db0bc19dead92fc58549d13ed51c5754798812f35c31
-
Filesize
66KB
MD5061106db00b18307b883c9190b9cc10a
SHA1a1efce0b6b56adba206d5fb1c1bdceb25840b169
SHA2565c55a89d21839e2a30041ee99d8175861b774911a619f143b261b85f6254afe0
SHA51285e37255e5a28f2f1128b8537e43d77d6026d17a853861a30c6beadf8b4aa987108e88a0804a736567c566e96505396be1e2072fdb155e8b5782448db3aabb93
-
Filesize
58KB
MD57111c1e2e358594165eb3a30dbc3382b
SHA11e51201557f708fa3edbc2fcdfafe4e288a545cd
SHA2561595e1d30b437723c9df0f4885785b68d80ac5f2f3350a844cd6c38735e821e5
SHA5125f5842e1b533a0fe482ac920453032ed011ad0cfe6c40d9c5aed6c2a9053136a71e701c4ec00ca535a789dc687d37212ab85035d11c08832e3c1f1bbcee0fd9e
-
Filesize
52KB
MD59dc96a0030f05f7480a4b63608a7b98a
SHA113778b5c0b44ffb32548b98fcfc3764a78e35595
SHA256bc90dce1937a12ce256fcc5149eda666a30639ed98ed94e110f06a269813bd76
SHA5123054a09778bb399b7669385a6d98faf5cdb6934c8cecc35c4e280ab691df0e361b0136baa9619cdbe2987c74f52b0dd5e710ca35a178212aeac0978454f6c849
-
Filesize
24KB
MD5b3276b23c4617d1e9febb5ad477b192f
SHA147f90454ab8bd0c1a8c3d575668d37a655a0cc7b
SHA25613a6c0ca290693fcfc137de634baf0ba43eef5b804235cd8fe93a50b9f742e50
SHA512cde99bb9e18f2015415d55e142c2af52ee20f0484d071568659c93ea4a90c9785f7cda55a5b0f471c5826ffc3e95542e89471c72930fcf11d01cc6008e69ee2c
-
Filesize
22KB
MD56420cb5430a7de86f10bfeb41201ac2a
SHA11d0d8bb371a9ed59e049f1c44f4a878ae8b78a9f
SHA25645b8ba74f9129eb55475ddc9d97038d88936f161ef81cbf10850c60aa3cfec04
SHA5127a93b8cf31191fdc57add730e431f8edc76dc0f4aa42ed6bc55c994d9aab7072283b1f45df9f989fa02b94b1f2e1d2fcb454ec95ca2cae5301f39f9ee2761445
-
Filesize
48KB
MD524573ca35779509fcc71f5bfed6db145
SHA1e02a9a870fa89864a7593385285b01a6122107f6
SHA2566dcad1af3b87392087bf41a9dcda1dcddb0a3af51641d17c90f83dd2c058b45c
SHA512a85926f43e2eaddc923f6a44de8d7c1ccc70961e0f9c8f8ca5d9cd9bb94c6f920b88189972b3cef7a1d23c304b6f6ccee3473a1f462e74008d53e3134b6a1a4f
-
Filesize
5KB
MD5c9c3cd6d995d2089357ef0ee34d56425
SHA1ca3ee8f40d8f94c7f623965d1819d8300f394908
SHA256fecab7b37d0358ef0dbd775260cc14d99da52982103eff54acd071aea08e1aa3
SHA512982dbf3cbee0bfee1110109df2fa8fe3a5a17762d5e4df5271c7563f76e539141814e2fe6de6ab5be47f6374f3cfc2edb3342b066952bd22f22628f6a6b67ce0
-
Filesize
39KB
MD57003d135567e7236f3ddd6126a985682
SHA15ee430a10eb8e14ead383dcfc5db1ac20959c2bb
SHA256f7f64b34c26dbd49e8096090d4e993dadaec1ba843d5fa962159045a5210f17d
SHA5127cf2f564031ec23c3cd71d104b9c99c225f5c14a554f1839f03d31cfc28d97f9e5d1a7323218ba2dcdfa7105d6afb0e119d2abf2b3996744531fe3c7ea7ffcbc
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f