Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 03:44
Static task
static1
Behavioral task
behavioral1
Sample
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe
Resource
win10v2004-20240508-en
General
-
Target
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe
-
Size
10.0MB
-
MD5
c586088cd9ab88ae3f5c9219d5745828
-
SHA1
eece71d732fed6484a8ddb22a5aa0eded21279ed
-
SHA256
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232
-
SHA512
d7f986f6d578db7eed000c94e584719bbcefbe648b4267aa82bbd37228f4e475c70be6d33909e703d55bd5a3eeb5a83f4f9c0132a4cc8f8f1ae6494ddcb4aece
-
SSDEEP
196608:0FNkDWNGJiniFR78vqsd8n7B38vfUYA5H+LX34Z2vqA2:/DPU4YvVd4ycBHI4Z8j2
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
Runner.exef06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Runner.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Runner.exef06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Runner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Runner.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe -
Executes dropped EXE 1 IoCs
Processes:
Runner.exepid process 3708 Runner.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exeRunner.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Wine f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Wine Runner.exe -
Loads dropped DLL 3 IoCs
Processes:
Runner.exepid process 3708 Runner.exe 3708 Runner.exe 3708 Runner.exe -
Drops file in Windows directory 1 IoCs
Processes:
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exedescription ioc process File opened for modification C:\Windows\win.ini f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 48 IoCs
Processes:
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exeRunner.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DACDED71-1201-4F76-9C30-BDA795A55678}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe" f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine\ = "QMDispatch.QMVBSRoutine" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0} Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine\CLSID Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\ = "QMDispatch.QMRoutine" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CLSID Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CLSID\ = "{C07DB6A3-34FC-4084-BE2E-76BB9203B049}" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\ProgID Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MyMacro.MyGUIMacroControlServer\CLSID f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DACDED71-1201-4F76-9C30-BDA795A55678}\ProgID\ = "MyMacro.MyGUIMacroControlServer" f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\ProgID\ = "QMDispatch.QMVBSRoutine" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InProcServer32 Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B} Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DACDED71-1201-4F76-9C30-BDA795A55678}\InprocHandler32 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\MacroCommerce\\qdisp.dll" Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\InProcServer32\ThreadingModel = "Apartment" Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DACDED71-1201-4F76-9C30-BDA795A55678}\ = "MyMacro.MyGUIMacroControlServer" f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DACDED71-1201-4F76-9C30-BDA795A55678}\LocalServer32 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\ = "QMDispatch.QMVBSRoutine" Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine\CLSID\ = "{241D7F03-9232-4024-8373-149860BE27C0}" Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ = "QMDispatch.QMRoutine" Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\ = "QMDispatch.QMLibrary" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\InprocServer32 Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MyMacro.MyGUIMacroControlServer\CLSID\ = "{DACDED71-1201-4F76-9C30-BDA795A55678}" f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DACDED71-1201-4F76-9C30-BDA795A55678}\ProgID f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049} Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary\CLSID Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\ProgID Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\MacroCommerce\\qdisp.dll" Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InProcServer32\ThreadingModel = "Apartment" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ProgID Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ProgID\ = "QMDispatch.QMRoutine" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InProcServer32 Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\ProgID\ = "QMDispatch.QMLibrary" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\InProcServer32 Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InprocServer32 Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InProcServer32\ThreadingModel = "Apartment" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MyMacro.MyGUIMacroControlServer f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MyMacro.MyGUIMacroControlServer\ = "MyMacro.MyGUIMacroControlServer" f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DACDED71-1201-4F76-9C30-BDA795A55678} f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DACDED71-1201-4F76-9C30-BDA795A55678}\InprocHandler32\ = "ole32.dll" f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\MacroCommerce\\qdisp.dll" Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary\ = "QMDispatch.QMLibrary" Runner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary\CLSID\ = "{EBEB87A6-E151-4054-AB45-A6E094C5334B}" Runner.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InprocServer32 Runner.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exepid process 1556 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exepid process 1556 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
Processes:
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exeRunner.exepid process 1556 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe 1556 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe 1556 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe 1556 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe 1556 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe 1556 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe 3708 Runner.exe 3708 Runner.exe 3708 Runner.exe 3708 Runner.exe 3708 Runner.exe 3708 Runner.exe 3708 Runner.exe 3708 Runner.exe 3708 Runner.exe 3708 Runner.exe 3708 Runner.exe 3708 Runner.exe 1556 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe 3708 Runner.exe 3708 Runner.exe 3708 Runner.exe 3708 Runner.exe 3708 Runner.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exedescription pid process target process PID 1556 wrote to memory of 3708 1556 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Runner.exe PID 1556 wrote to memory of 3708 1556 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Runner.exe PID 1556 wrote to memory of 3708 1556 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe Runner.exe PID 1556 wrote to memory of 3924 1556 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe PING.EXE PID 1556 wrote to memory of 3924 1556 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe PING.EXE PID 1556 wrote to memory of 3924 1556 f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe"C:\Users\Admin\AppData\Local\Temp\f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Roaming\MyMacro\Runner.exe--host_id 5 --verify_key yTXqFyRRY1nm --product "C:\Users\Admin\AppData\Local\Temp\f06dce63f780087e5872d85d6633ba388ea0ddc62c96597ba004e065db5ff232.exe" --version 2014.05.2716572⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3708
-
-
C:\Windows\SysWOW64\PING.EXE"C:\Windows\System32\PING.EXE" www.baidu.com -n 22⤵
- Runs ping.exe
PID:3924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD53e2c47fbfdfb579024b6b28b2d91681a
SHA1e22de21dd35523d8f6f0344902f4c3ced1fe5450
SHA25659f9d365c857d15e08d1f9bba11b084ec7e6f789654c480852e45b670c5fe27b
SHA512429ed0b3e95e699b4a218fa281cb09d2bfc971f2cc9bcc57a3f21c94d5f99b86a5b938243963d994e41915f7d7d14a260aa60cc8865ef09414d99d21cc292d57
-
Filesize
1.6MB
MD5dac15cd405974331d81d90aff70f6408
SHA16b2a12b794081ba6221c7616792be8db5e122854
SHA2565c94a26c92dba4aaaeccd20d7a3104be6afcbfa523c546ae4ae86031d8a541ee
SHA512d9b3cb4b64260049429e4c9ccb6a13c8715b89b915a053f4eb40a3d15133805bcfedbf5aa4836d6ac4cfbb6895bddfd114e3816c3be21b37647b25b9ce23232f
-
Filesize
258B
MD5b416fa6a4a3bb151bdeed27ba06a2f86
SHA1d785b2d792f5bb27bfa68b1a06a0679468934c77
SHA256ce52547241248745ed63b31d8e4330c77235ac448246cccbb23330340c4dee0c
SHA5122352cc74b5de3034424f0249747be6237d16798f34f27b3b8cc8d37a97b52974223045e324e6423c76ccd933cfb2dd3c2552a09227446b45eacf912ddd589bdf
-
Filesize
256KB
MD5a07736ac8aa5e994f6c8da4edc547d83
SHA155986ba7dfd9977cb1f4189eb5f8a3b59208c414
SHA25696eff30408d0e54256a31737962a4456d1bc50e1567e876c3558d375e05dc311
SHA5125b44265fa810f0b8e0f897103a6e7143bcb25462392acd1df256f35076b3560abd4288c8358cf6edd0fd74978cb973c2ec62f08281d910d6d6e5063aea1a009b
-
Filesize
337B
MD5a4d4d602b697d4be67fd3149b4e65a54
SHA1ae7d035c1d8fcd943db7bf97d82efa28a72e8878
SHA2563ca14cb78eef5691daffe25b11ae3a755d60cc1089ec0b35b74ea21ae72b9a63
SHA51251062a045de53a4dd59abda9178fd1f8f37f7cabfe625a0604c9eef126af112793736d9871b7d0e1f01f1c0a19f6d3872e850a2e6556635a4e9ad780e6690f0c
-
Filesize
518B
MD5e9bcfc58aefc9ea8008717275ac33ed1
SHA1e0e516b224a9c1083a529f94664fd8b9f302da07
SHA2562d4d96dd20cc8f050fd72ee9ec1cd70b0160d63afc277368599057675562bc7e
SHA512fa4464c5ae4ebc882ddec8154e2f1d569f878377fd864cb2696f376d9129fee9ab3bb1acc2c7bd60c28041aaf8e7304aa37bec0a8a3c8583ecd15b283c16cd34
-
Filesize
303KB
MD5014c01cd6522778e1e15be0e696dfe0c
SHA1c908376fcc4525ec5c4b35d289ef1361ea5cb2d9
SHA256259eaf1ddc9bf610d11a22413853b3d4386fc5a8412c6e602c74eb43f1a32d46
SHA5123b8d040b4a6e879ecf3bafba336b2fc8d793d4f6931902faf87e8f64faf6eca7f1f21485794cffe16c7d0ea907b9f6db93df0b4bae8cb3684733e95608523fd9
-
Filesize
7.3MB
MD5e51c4cf022ecb48837b33246eccfe153
SHA1489c21afcd01e068c4f99caf6eb1636018753691
SHA256dfc70b81341e185688e663d379df199c302fa4b9b27512ccc5cb356ef2ab95b5
SHA5129bf556eaa22656fa6746d310485b7d5c41fab53738e9d505ed40d32580993b08c95d2ddefc756e192ea359312b97dda0333129cf09ccfcad02c9dcf431d48781
-
Filesize
59KB
MD5b35416c2b3e818894df95608b76934f7
SHA1bbdd1c0f49e9ce54e9312f5edfead76d343c21cf
SHA2568147481d1c93da5ce5de7ff7a72a45756d45ea1f27d27bb8c9944642f42549a3
SHA51292382562761b36b4ed2ec0bba832c66c8f720e190630596ff830a047a498889e7a0f3628d1a3ffac066b06ccd8c2d3840e82b4304b636e1b1ee434910c6f0bdf