Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 11:04
Static task
static1
Behavioral task
behavioral1
Sample
8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe
Resource
win7-20240903-en
General
-
Target
8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe
-
Size
1.8MB
-
MD5
3b5428fec258a2c2b250d9cc543fbe87
-
SHA1
fe28d0fb467baad2be5622e7aafc0c54586850be
-
SHA256
8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a
-
SHA512
34d5abbba093d484200c733357bedc4de88480c891f93d1b3c24bbf14eb852aaada76537d6ed3564e9928982392ab7e4f678c5a901991ba81010004a189b2762
-
SSDEEP
24576:Nw5iEO2JFqQY3+7RslTF2dk/BwATx3p3TRuMDgMpAVdvz1iqyoxrrbmobFlWpcfv:NmfJCkq5SklTlpVuCGsHox3moqmaix
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 20666b5d19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 20666b5d19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 20666b5d19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 20666b5d19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 20666b5d19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 20666b5d19.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ afecb0098a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 20666b5d19.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 20666b5d19.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion afecb0098a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion afecb0098a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 20666b5d19.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs Qtdedcpuf.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs Ixpla.exe -
Executes dropped EXE 8 IoCs
pid Process 2728 axplong.exe 2352 l4.exe 1428 l4.exe 1924 Qtdedcpuf.exe 2520 Ixpla.exe 3292 networkmanager.exe 4084 afecb0098a.exe 4160 20666b5d19.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 20666b5d19.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine afecb0098a.exe -
Loads dropped DLL 23 IoCs
pid Process 1964 8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe 1964 8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe 2728 axplong.exe 2352 l4.exe 1428 l4.exe 2728 axplong.exe 2728 axplong.exe 2728 axplong.exe 2728 axplong.exe 2728 axplong.exe 2728 axplong.exe 2728 axplong.exe 2728 axplong.exe 1708 WerFault.exe 1708 WerFault.exe 1708 WerFault.exe 1708 WerFault.exe 1708 WerFault.exe 4500 WerFault.exe 4500 WerFault.exe 4500 WerFault.exe 4500 WerFault.exe 4500 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 20666b5d19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 20666b5d19.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\afecb0098a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006198001\\afecb0098a.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\20666b5d19.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006199001\\20666b5d19.exe" axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1964 8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe 2728 axplong.exe 4084 afecb0098a.exe 4160 20666b5d19.exe -
resource yara_rule behavioral1/files/0x000500000001a49a-2462.dat upx behavioral1/memory/2728-2468-0x00000000069E0000-0x000000000715B000-memory.dmp upx behavioral1/memory/3292-2475-0x0000000001110000-0x000000000188B000-memory.dmp upx behavioral1/memory/3292-2477-0x0000000001110000-0x000000000188B000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1708 1924 WerFault.exe 36 4500 2520 WerFault.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qtdedcpuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ixpla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afecb0098a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20666b5d19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1964 8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe 2728 axplong.exe 4084 afecb0098a.exe 4160 20666b5d19.exe 4160 20666b5d19.exe 4160 20666b5d19.exe 1924 Qtdedcpuf.exe 2520 Ixpla.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1924 Qtdedcpuf.exe Token: SeDebugPrivilege 2520 Ixpla.exe Token: SeDebugPrivilege 4160 20666b5d19.exe Token: SeDebugPrivilege 1924 Qtdedcpuf.exe Token: SeDebugPrivilege 2520 Ixpla.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2728 1964 8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe 30 PID 1964 wrote to memory of 2728 1964 8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe 30 PID 1964 wrote to memory of 2728 1964 8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe 30 PID 1964 wrote to memory of 2728 1964 8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe 30 PID 2728 wrote to memory of 2352 2728 axplong.exe 33 PID 2728 wrote to memory of 2352 2728 axplong.exe 33 PID 2728 wrote to memory of 2352 2728 axplong.exe 33 PID 2728 wrote to memory of 2352 2728 axplong.exe 33 PID 2352 wrote to memory of 1428 2352 l4.exe 35 PID 2352 wrote to memory of 1428 2352 l4.exe 35 PID 2352 wrote to memory of 1428 2352 l4.exe 35 PID 2728 wrote to memory of 1924 2728 axplong.exe 36 PID 2728 wrote to memory of 1924 2728 axplong.exe 36 PID 2728 wrote to memory of 1924 2728 axplong.exe 36 PID 2728 wrote to memory of 1924 2728 axplong.exe 36 PID 2728 wrote to memory of 2520 2728 axplong.exe 37 PID 2728 wrote to memory of 2520 2728 axplong.exe 37 PID 2728 wrote to memory of 2520 2728 axplong.exe 37 PID 2728 wrote to memory of 2520 2728 axplong.exe 37 PID 2728 wrote to memory of 3292 2728 axplong.exe 38 PID 2728 wrote to memory of 3292 2728 axplong.exe 38 PID 2728 wrote to memory of 3292 2728 axplong.exe 38 PID 2728 wrote to memory of 3292 2728 axplong.exe 38 PID 2728 wrote to memory of 4084 2728 axplong.exe 39 PID 2728 wrote to memory of 4084 2728 axplong.exe 39 PID 2728 wrote to memory of 4084 2728 axplong.exe 39 PID 2728 wrote to memory of 4084 2728 axplong.exe 39 PID 2728 wrote to memory of 4160 2728 axplong.exe 40 PID 2728 wrote to memory of 4160 2728 axplong.exe 40 PID 2728 wrote to memory of 4160 2728 axplong.exe 40 PID 2728 wrote to memory of 4160 2728 axplong.exe 40 PID 1924 wrote to memory of 1708 1924 Qtdedcpuf.exe 41 PID 1924 wrote to memory of 1708 1924 Qtdedcpuf.exe 41 PID 1924 wrote to memory of 1708 1924 Qtdedcpuf.exe 41 PID 1924 wrote to memory of 1708 1924 Qtdedcpuf.exe 41 PID 2520 wrote to memory of 4500 2520 Ixpla.exe 42 PID 2520 wrote to memory of 4500 2520 Ixpla.exe 42 PID 2520 wrote to memory of 4500 2520 Ixpla.exe 42 PID 2520 wrote to memory of 4500 2520 Ixpla.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe"C:\Users\Admin\AppData\Local\Temp\8c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe"C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\onefile_2352_133784750976220000\l4.exeC:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1428
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"3⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 6324⤵
- Loads dropped DLL
- Program crash
PID:1708
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"3⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 6324⤵
- Loads dropped DLL
- Program crash
PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe"C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe"3⤵
- Executes dropped EXE
PID:3292
-
-
C:\Users\Admin\AppData\Local\Temp\1006198001\afecb0098a.exe"C:\Users\Admin\AppData\Local\Temp\1006198001\afecb0098a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\1006199001\20666b5d19.exe"C:\Users\Admin\AppData\Local\Temp\1006199001\20666b5d19.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD5d68f79c459ee4ae03b76fa5ba151a41f
SHA1bfa641085d59d58993ba98ac9ee376f898ee5f7b
SHA256aa50c900e210abb6be7d2420d9d5ae34c66818e0491aabd141421d175211fed6
SHA512bd4ef3e3708df81d53b2e9050447032e8dcdcc776cf0353077310f208a30dab8f31d6ec6769d47fb6c05c642bdd7a58fb4f93d9d28e2de0efc01312fbc5e391e
-
Filesize
1.4MB
MD5338cbbffa6028ee1a0beb3e7e6c4abd9
SHA1bd008e415d2d85a124d33d455a2e2b0a0312be39
SHA2561af9406ad522df70d8b59054cbdbef1a267fe199ab0ec1369523cdce9884bea6
SHA512a8bb96d8ab47a3f57d5f1fc48c61392e9b28b379517cd12a468044d42a7ecdf9c099244d94784ff2411b358ea2272f8069a2fee2ea952b693ee460de0f689215
-
Filesize
1.4MB
MD56e7ffd057086e44e4fcc01846cd2b152
SHA105712e7e7b8429b2dd201ea504dc32fefe5795da
SHA256fbc587e990949e428e8ce7a2c74dbf85cd63ffa07370756ad854595fea0033d7
SHA5128cab1824b32c54273658d28738109c8a1ef3170c1fbe02deeee40d40990acb6d45431bfb65a3facebee9a919bd972734012b1e8de035b9c1329f1bd0e709ecd2
-
Filesize
2.1MB
MD5f8d528a37993ed91d2496bab9fc734d3
SHA14b66b225298f776e21f566b758f3897d20b23cad
SHA256bc8458a8d78cf91129c84b153aafe8319410aacb8e14aec506897c8e0793ba02
SHA51275dc1bbb1388f68d121bab26fc7f6bf9dc1226417ad7ed4a7b9718999aa0f9c891fed0db3c9ea6d6ccb34288cc848dc44b20ea83a30afd4ea2e99cff51f30f5a
-
Filesize
1.7MB
MD5807a67da4cfbc1cf70de9fecfea9fb09
SHA1e2c37f774fe4daf510961d6ed7239d8b03d83036
SHA256c85b9fda965fb5d13142b0ef3369e46abbc5f4bfb948fd2179d6d160123c0689
SHA51265c46a8585e0b87c53d242a18dab0ed9d83c1378347ac0209bf5522b93c34051ae1aa7e0b63829980f1cb156d54bab3060c39152d27ff694a79876aabcd78561
-
Filesize
2.7MB
MD5d6160b483577667b6a0056f5f3325103
SHA1811c2a568c756389939ad598e379d48a5be37789
SHA256cf9ded7b486e8bcddc5ac55f90b4b7e2eb2af62f86c4790476a7033087ba9a3b
SHA51243d9b20a2461c13afbf35b021786adca1bed0b7e3024987853242dfbbf5d73b3e24f85847dd873b27cac7a4be7aa168f47f7fad0d59087f2f0f710583d85236b
-
Filesize
1.8MB
MD53b5428fec258a2c2b250d9cc543fbe87
SHA1fe28d0fb467baad2be5622e7aafc0c54586850be
SHA2568c2b50cbbb58c0277697e4c82994fc810a882722cd83ef7b701b975959e5123a
SHA51234d5abbba093d484200c733357bedc4de88480c891f93d1b3c24bbf14eb852aaada76537d6ed3564e9928982392ab7e4f678c5a901991ba81010004a189b2762
-
Filesize
5.9MB
MD563c4e3f9c7383d039ab4af449372c17f
SHA1f52ff760a098a006c41269ff73abb633b811f18e
SHA256151524f6c1d1aeac530cfd69de15c3336043dc8eb3f5aeaa31513e24bfd7acdd
SHA512dcfb4804c5569ad13e752270d13320f8769601b7092544741e35bc62a22af363b7a5ea7c5a65132c9575540a3e689a6946110502bd0f046385b8739e81761fbf
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb
-
Filesize
82B
MD5107a610c004bfc1ebb8b87365b2c4600
SHA104695e838daaaf45d91f0b51868c8995b80d3392
SHA2563a5be027d623c694cc4874fbb6cd2f434bbaf65033607f6d2acfc1d05c3f6fdc
SHA5124b26a04ec889e149bf4fb974178990804d371d72b239c1d55c5acc32636cfd7ad02f8d21ed9e289358873242493303de25f2a0bca7d1b5da9b0426854ff4a2d2
-
Filesize
1.4MB
MD5759e3444d12ca2d26c855eaac57250f4
SHA1a3cc60dd91e520403278c2a378d5afc0123e5e95
SHA25626c2621121c0083ab6437d535477697cbf5b509dc61419a7cb8c9e571b50785f
SHA51251e52708a92dc9d5459e476b4765c3634b523c90f17e9577f1191992e4edda0dd752da6bd9966f60417c9c65181511ef14812fc1db98abb0f4c2b38e2d18897e