Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
168s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe
Resource
win10v2004-20220812-en
General
-
Target
25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe
-
Size
42KB
-
MD5
125869122bcb4efe9937b2f59f4cb71e
-
SHA1
38b6f3b952b4bc54f50f9a301684aea4dbb45b0a
-
SHA256
25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8
-
SHA512
430b9baf6a23af1810752cf03e84baaa20030171a6b4fa01c2cdbe0e0f307acceb24a45b132774f2ad7ae94fd2338fc71a9619cb12079c6c228abdc2f52e2ab3
-
SSDEEP
768:5Igkgs9PuODprg/ovq86Xl4BEBLBJErpqTuZNemvN5BMCe:5ls9uOS//PnBLcrpqaZky5i
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\o4256627.exe\"" 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\j6256622.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\j6256622.exe" m4623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\o4256627.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\o4256627.exe\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\j6256622.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\j6256622.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\o4256627.exe\"" qm4623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\j6256622.exe" qm4623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\o4256627.exe\"" m4623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\j6256622.exe" 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\j6256622.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\o4256627.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\o4256627.exe\"" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\o4256627.exe\"" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\j6256622.exe" lsass.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" qm4623.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" m4623.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" m4623.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qm4623.exe -
Adds policy Run key to start application 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\f1464Adm = "\"C:\\Users\\Admin\\AppData\\Local\\dv692700x\\yesbron.com\"" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\f1464Adm = "\"C:\\Users\\Admin\\AppData\\Local\\dv692700x\\yesbron.com\"" services.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\f1464Adm = "\"C:\\Users\\Admin\\AppData\\Local\\dv692700x\\yesbron.com\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\f1464Adm = "\"C:\\Users\\Admin\\AppData\\Local\\dv692700x\\yesbron.com\"" qm4623.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N4038c = "\"C:\\Windows\\_default25662.pif\"" 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N4038c = "\"C:\\Windows\\_default25662.pif\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N4038c = "\"C:\\Windows\\_default25662.pif\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N4038c = "\"C:\\Windows\\_default25662.pif\"" services.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\f1464Adm = "\"C:\\Users\\Admin\\AppData\\Local\\dv692700x\\yesbron.com\"" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\f1464Adm = "\"C:\\Users\\Admin\\AppData\\Local\\dv692700x\\yesbron.com\"" 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N4038c = "\"C:\\Windows\\_default25662.pif\"" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N4038c = "\"C:\\Windows\\_default25662.pif\"" qm4623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N4038c = "\"C:\\Windows\\_default25662.pif\"" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\f1464Adm = "\"C:\\Users\\Admin\\AppData\\Local\\dv692700x\\yesbron.com\"" m4623.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\f1464Adm = "\"C:\\Users\\Admin\\AppData\\Local\\dv692700x\\yesbron.com\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N4038c = "\"C:\\Windows\\_default25662.pif\"" m4623.exe -
Disables RegEdit via registry modification 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" m4623.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" qm4623.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts csrss.exe -
Executes dropped EXE 7 IoCs
pid Process 4356 smss.exe 1372 winlogon.exe 3536 services.exe 1276 csrss.exe 1344 lsass.exe 1620 qm4623.exe 1692 m4623.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1464Adm = "\"C:\\Windows\\system32\\s4827\\zh59927084y.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\N4038c = "\"C:\\Windows\\j6256622.exe\"" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\N4038c = "\"C:\\Windows\\j6256622.exe\"" m4623.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1464Adm = "\"C:\\Windows\\system32\\s4827\\zh59927084y.exe\"" 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\N4038c = "\"C:\\Windows\\j6256622.exe\"" 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1464Adm = "\"C:\\Windows\\system32\\s4827\\zh59927084y.exe\"" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1464Adm = "\"C:\\Windows\\system32\\s4827\\zh59927084y.exe\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\N4038c = "\"C:\\Windows\\j6256622.exe\"" services.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1464Adm = "\"C:\\Windows\\system32\\s4827\\zh59927084y.exe\"" m4623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\N4038c = "\"C:\\Windows\\j6256622.exe\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\N4038c = "\"C:\\Windows\\j6256622.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1464Adm = "\"C:\\Windows\\system32\\s4827\\zh59927084y.exe\"" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\N4038c = "\"C:\\Windows\\j6256622.exe\"" qm4623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\N4038c = "\"C:\\Windows\\j6256622.exe\"" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1464Adm = "\"C:\\Windows\\system32\\s4827\\zh59927084y.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1464Adm = "\"C:\\Windows\\system32\\s4827\\zh59927084y.exe\"" qm4623.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: lsass.exe File opened (read-only) \??\G: lsass.exe File opened (read-only) \??\I: lsass.exe File opened (read-only) \??\P: lsass.exe File opened (read-only) \??\W: lsass.exe File opened (read-only) \??\F: lsass.exe File opened (read-only) \??\H: lsass.exe File opened (read-only) \??\K: lsass.exe File opened (read-only) \??\L: lsass.exe File opened (read-only) \??\Q: lsass.exe File opened (read-only) \??\R: lsass.exe File opened (read-only) \??\X: lsass.exe File opened (read-only) \??\O: lsass.exe File opened (read-only) \??\T: lsass.exe File opened (read-only) \??\U: lsass.exe File opened (read-only) \??\V: lsass.exe File opened (read-only) \??\Z: lsass.exe File opened (read-only) \??\J: lsass.exe File opened (read-only) \??\M: lsass.exe File opened (read-only) \??\N: lsass.exe File opened (read-only) \??\S: lsass.exe File opened (read-only) \??\Y: lsass.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msvbvm60.dll 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll smss.exe File opened for modification C:\Windows\SysWOW64\s4827\lsass.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll m4623.exe File created C:\Windows\SysWOW64\s4827\zh59927084y.exe qm4623.exe File created C:\Windows\SysWOW64\s4827\domlist.txt cmd.exe File created C:\Windows\SysWOW64\c_25662k.com 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe File opened for modification C:\Windows\SysWOW64\s4827 smss.exe File created C:\Windows\SysWOW64\s4827\services.exe winlogon.exe File created C:\Windows\SysWOW64\s4827\zh59927084y.exe lsass.exe File created C:\Windows\SysWOW64\s4827\zh59927084y.exe m4623.exe File created C:\Windows\SysWOW64\s4827\smss.exe 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe File opened for modification C:\Windows\SysWOW64\s4827\csrss.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\s4827\winlogon.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\c_25662k.com csrss.exe File opened for modification C:\Windows\SysWOW64\s4827 m4623.exe File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exe 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe File created C:\Windows\SysWOW64\s4827\lsass.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll lsass.exe File opened for modification C:\Windows\SysWOW64\s4827\domlist.txt lsass.exe File opened for modification C:\Windows\SysWOW64\s4827\smss.exe 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe File opened for modification C:\Windows\SysWOW64\c_25662k.com 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe File created C:\Windows\SysWOW64\s4827\zh59927084y.exemsatr.bin smss.exe File opened for modification C:\Windows\SysWOW64\s4827\smss.exe lsass.exe File created C:\Windows\SysWOW64\s4827\smss.exe qm4623.exe File opened for modification C:\Windows\SysWOW64\s4827\smss.exe smss.exe File created C:\Windows\SysWOW64\s4827\winlogon.exe smss.exe File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exe csrss.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll qm4623.exe File opened for modification C:\Windows\SysWOW64\c_25662k.com smss.exe File opened for modification C:\Windows\SysWOW64\s4827 services.exe File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exe services.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll services.exe File opened for modification C:\Windows\SysWOW64\c_25662k.com lsass.exe File opened for modification C:\Windows\SysWOW64\c_25662k.com m4623.exe File created C:\Windows\SysWOW64\c_25662k.com winlogon.exe File created C:\Windows\SysWOW64\s4827\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\s4827\smss.exe services.exe File opened for modification C:\Windows\SysWOW64\s4827 csrss.exe File created C:\Windows\SysWOW64\s4827\smss.exe m4623.exe File opened for modification C:\Windows\SysWOW64\s4827 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exe smss.exe File opened for modification C:\Windows\SysWOW64\s4827 winlogon.exe File opened for modification C:\Windows\SysWOW64\s4827 lsass.exe File created C:\Windows\SysWOW64\s4827\c.bron.tok.txt lsass.exe File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exe winlogon.exe File created C:\Windows\SysWOW64\s4827\smss.exe lsass.exe File created C:\Windows\SysWOW64\s4827\smss.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\s4827\smss.exe qm4623.exe File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exe qm4623.exe File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exe m4623.exe File created C:\Windows\SysWOW64\c_25662k.com m4623.exe File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exemsatr.bin smss.exe File opened for modification C:\Windows\SysWOW64\s4827\services.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\s4827 qm4623.exe File opened for modification C:\Windows\SysWOW64\c_25662k.com services.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll csrss.exe File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exe lsass.exe File created C:\Windows\SysWOW64\s4827\zh59927084y.exe winlogon.exe File created C:\Windows\SysWOW64\s4827\zh59927084y.exe 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe File opened for modification C:\Windows\SysWOW64\c_25662k.com winlogon.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\c_25662k.com qm4623.exe File created C:\Windows\SysWOW64\c_25662k.com qm4623.exe -
Drops file in Windows directory 41 IoCs
description ioc Process File opened for modification C:\Windows\j6256622.exe services.exe File opened for modification C:\Windows\_default25662.pif services.exe File opened for modification C:\Windows\o4256627.exe qm4623.exe File created C:\Windows\_default25662.pif m4623.exe File created C:\Windows\_default25662.pif winlogon.exe File opened for modification C:\Windows\o4256627.exe winlogon.exe File opened for modification C:\Windows\_default25662.pif winlogon.exe File opened for modification C:\Windows\Ad10218 winlogon.exe File opened for modification C:\Windows\j6256622.exe csrss.exe File opened for modification C:\Windows\j6256622.exe lsass.exe File opened for modification C:\Windows\o4256627.exe m4623.exe File created C:\Windows\o4256627.exe m4623.exe File opened for modification C:\Windows\_default25662.pif 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe File opened for modification C:\Windows\j6256622.exe winlogon.exe File opened for modification C:\Windows\o4256627.exe services.exe File created C:\Windows\_default25662.pif 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe File created C:\Windows\_default25662.pif lsass.exe File opened for modification C:\Windows\j6256622.exe m4623.exe File opened for modification C:\Windows\j6256622.exe qm4623.exe File opened for modification C:\Windows\_default25662.pif m4623.exe File created C:\Windows\j6256622.exe winlogon.exe File opened for modification C:\Windows\o4256627.exe 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe File created C:\Windows\o4256627.exe 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe File opened for modification C:\Windows\j6256622.exe smss.exe File created C:\Windows\j6256622.exe lsass.exe File opened for modification C:\Windows\_default25662.pif lsass.exe File created C:\Windows\j6256622.exe m4623.exe File created C:\Windows\j6256622.exe 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe File opened for modification C:\Windows\o4256627.exe smss.exe File opened for modification C:\Windows\_default25662.pif csrss.exe File created C:\Windows\o4256627.exe winlogon.exe File opened for modification C:\Windows\Ad10218\qm4623.exe winlogon.exe File opened for modification C:\Windows\o4256627.exe csrss.exe File opened for modification C:\Windows\o4256627.exe lsass.exe File opened for modification C:\Windows\_default25662.pif qm4623.exe File created C:\Windows\_default25662.pif qm4623.exe File opened for modification C:\Windows\j6256622.exe 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe File opened for modification C:\Windows\_default25662.pif smss.exe File created C:\Windows\Ad10218\qm4623.exe winlogon.exe File created C:\Windows\j6256622.exe qm4623.exe File created C:\Windows\o4256627.exe qm4623.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 3696 net.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe 1372 winlogon.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4928 wrote to memory of 4356 4928 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe 82 PID 4928 wrote to memory of 4356 4928 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe 82 PID 4928 wrote to memory of 4356 4928 25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe 82 PID 4356 wrote to memory of 1372 4356 smss.exe 84 PID 4356 wrote to memory of 1372 4356 smss.exe 84 PID 4356 wrote to memory of 1372 4356 smss.exe 84 PID 1372 wrote to memory of 3536 1372 winlogon.exe 88 PID 1372 wrote to memory of 3536 1372 winlogon.exe 88 PID 1372 wrote to memory of 3536 1372 winlogon.exe 88 PID 1372 wrote to memory of 1276 1372 winlogon.exe 90 PID 1372 wrote to memory of 1276 1372 winlogon.exe 90 PID 1372 wrote to memory of 1276 1372 winlogon.exe 90 PID 1372 wrote to memory of 1344 1372 winlogon.exe 92 PID 1372 wrote to memory of 1344 1372 winlogon.exe 92 PID 1372 wrote to memory of 1344 1372 winlogon.exe 92 PID 1372 wrote to memory of 1620 1372 winlogon.exe 94 PID 1372 wrote to memory of 1620 1372 winlogon.exe 94 PID 1372 wrote to memory of 1620 1372 winlogon.exe 94 PID 1372 wrote to memory of 1692 1372 winlogon.exe 96 PID 1372 wrote to memory of 1692 1372 winlogon.exe 96 PID 1372 wrote to memory of 1692 1372 winlogon.exe 96 PID 1372 wrote to memory of 1476 1372 winlogon.exe 98 PID 1372 wrote to memory of 1476 1372 winlogon.exe 98 PID 1372 wrote to memory of 1476 1372 winlogon.exe 98 PID 1372 wrote to memory of 3436 1372 winlogon.exe 100 PID 1372 wrote to memory of 3436 1372 winlogon.exe 100 PID 1372 wrote to memory of 3436 1372 winlogon.exe 100 PID 1372 wrote to memory of 4044 1372 winlogon.exe 102 PID 1372 wrote to memory of 4044 1372 winlogon.exe 102 PID 1372 wrote to memory of 4044 1372 winlogon.exe 102 PID 1344 wrote to memory of 888 1344 lsass.exe 104 PID 1344 wrote to memory of 888 1344 lsass.exe 104 PID 1344 wrote to memory of 888 1344 lsass.exe 104 PID 888 wrote to memory of 3696 888 cmd.exe 106 PID 888 wrote to memory of 3696 888 cmd.exe 106 PID 888 wrote to memory of 3696 888 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe"C:\Users\Admin\AppData\Local\Temp\25914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\s4827\smss.exe"C:\Windows\system32\s4827\smss.exe" ~Brontok~Log~2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\s4827\winlogon.exe"C:\Windows\system32\s4827\winlogon.exe" ~Brontok~Is~The~Best~3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\s4827\services.exe"C:\Windows\system32\s4827\services.exe" ~Brontok~Serv~4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:3536
-
-
C:\Windows\SysWOW64\s4827\csrss.exe"C:\Windows\system32\s4827\csrss.exe" ~Brontok~SpreadMail~4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:1276
-
-
C:\Windows\SysWOW64\s4827\lsass.exe"C:\Windows\system32\s4827\lsass.exe" ~Brontok~Network~4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net view /domain > "C:\Windows\system32\s4827\domlist.txt"5⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\net.exenet view /domain6⤵
- Discovers systems in the same network
PID:3696
-
-
-
-
C:\Windows\Ad10218\qm4623.exe"C:\Windows\Ad10218\qm4623.exe" ~Brontok~Back~Log~4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:1620
-
-
C:\Windows\SysWOW64\s4827\m4623.exe"C:\Windows\system32\s4827\m4623.exe" ~Brontok~Back~Log~4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:1692
-
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe" /delete /y4⤵PID:1476
-
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe" 17:08 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Local\jalak-93927015-bali.com"4⤵PID:3436
-
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe" 11:03 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Local\jalak-93927015-bali.com"4⤵PID:4044
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5125869122bcb4efe9937b2f59f4cb71e
SHA138b6f3b952b4bc54f50f9a301684aea4dbb45b0a
SHA25625914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8
SHA512430b9baf6a23af1810752cf03e84baaa20030171a6b4fa01c2cdbe0e0f307acceb24a45b132774f2ad7ae94fd2338fc71a9619cb12079c6c228abdc2f52e2ab3
-
Filesize
42KB
MD5125869122bcb4efe9937b2f59f4cb71e
SHA138b6f3b952b4bc54f50f9a301684aea4dbb45b0a
SHA25625914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8
SHA512430b9baf6a23af1810752cf03e84baaa20030171a6b4fa01c2cdbe0e0f307acceb24a45b132774f2ad7ae94fd2338fc71a9619cb12079c6c228abdc2f52e2ab3
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD59c2be962a1ff516f8105b62ca3520dd2
SHA183a7d67e7d09644eae92846d91c5a06618f0c63f
SHA256fc251a8eab579f282dfb63fa023ce9b95612d7d11029634687493df67da1a0db
SHA5127e6a9b103eb71a5efb8c15c5b6a3e6cb7c6d20ed7f4547114c0a834bd0b83cd3aff25026a80c1335715d38365e37bbb60e158690ec1e7b4b06b0248828c57d8c
-
Filesize
42KB
MD59c2be962a1ff516f8105b62ca3520dd2
SHA183a7d67e7d09644eae92846d91c5a06618f0c63f
SHA256fc251a8eab579f282dfb63fa023ce9b95612d7d11029634687493df67da1a0db
SHA5127e6a9b103eb71a5efb8c15c5b6a3e6cb7c6d20ed7f4547114c0a834bd0b83cd3aff25026a80c1335715d38365e37bbb60e158690ec1e7b4b06b0248828c57d8c
-
Filesize
42KB
MD59c2be962a1ff516f8105b62ca3520dd2
SHA183a7d67e7d09644eae92846d91c5a06618f0c63f
SHA256fc251a8eab579f282dfb63fa023ce9b95612d7d11029634687493df67da1a0db
SHA5127e6a9b103eb71a5efb8c15c5b6a3e6cb7c6d20ed7f4547114c0a834bd0b83cd3aff25026a80c1335715d38365e37bbb60e158690ec1e7b4b06b0248828c57d8c
-
Filesize
42KB
MD5125869122bcb4efe9937b2f59f4cb71e
SHA138b6f3b952b4bc54f50f9a301684aea4dbb45b0a
SHA25625914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8
SHA512430b9baf6a23af1810752cf03e84baaa20030171a6b4fa01c2cdbe0e0f307acceb24a45b132774f2ad7ae94fd2338fc71a9619cb12079c6c228abdc2f52e2ab3
-
Filesize
42KB
MD5125869122bcb4efe9937b2f59f4cb71e
SHA138b6f3b952b4bc54f50f9a301684aea4dbb45b0a
SHA25625914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8
SHA512430b9baf6a23af1810752cf03e84baaa20030171a6b4fa01c2cdbe0e0f307acceb24a45b132774f2ad7ae94fd2338fc71a9619cb12079c6c228abdc2f52e2ab3
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD5b9047a10edc2384255c3e6a26143c8c1
SHA19f274c7fb691f1096fb3d28393ef311f09808d76
SHA25668b8c0d554960530e504991f29d17f77430107d31cae00b37c02b542041c81a6
SHA5128dfeb84f50e87baa472d4302a71d45e5f314b3d18b519a4d6eb18c989de7e92ba432b8a8add07deadb2d0c6c324d591b62d415a2a24fcf42d9b2128bd444e44c
-
Filesize
42KB
MD5b9047a10edc2384255c3e6a26143c8c1
SHA19f274c7fb691f1096fb3d28393ef311f09808d76
SHA25668b8c0d554960530e504991f29d17f77430107d31cae00b37c02b542041c81a6
SHA5128dfeb84f50e87baa472d4302a71d45e5f314b3d18b519a4d6eb18c989de7e92ba432b8a8add07deadb2d0c6c324d591b62d415a2a24fcf42d9b2128bd444e44c
-
Filesize
42KB
MD59c2be962a1ff516f8105b62ca3520dd2
SHA183a7d67e7d09644eae92846d91c5a06618f0c63f
SHA256fc251a8eab579f282dfb63fa023ce9b95612d7d11029634687493df67da1a0db
SHA5127e6a9b103eb71a5efb8c15c5b6a3e6cb7c6d20ed7f4547114c0a834bd0b83cd3aff25026a80c1335715d38365e37bbb60e158690ec1e7b4b06b0248828c57d8c
-
Filesize
42KB
MD5c5704c5e7ca9fc15457295c3adcedea5
SHA12767a12c7d6b8ab8169b01baa231a975ab85a59f
SHA256f9099f91f8e3e17e70981dc1c9f44827bbe10a387160658106bdf3b6f7b6606f
SHA5125054ca3cd78b910e0b8ef7c0490fe65a9c399a71c9b3b806515fab9c9d152efeaf026f203a2a0e502612bb252e82858894b51628bc667ac1bcd2898b9bbcc284
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD5b9047a10edc2384255c3e6a26143c8c1
SHA19f274c7fb691f1096fb3d28393ef311f09808d76
SHA25668b8c0d554960530e504991f29d17f77430107d31cae00b37c02b542041c81a6
SHA5128dfeb84f50e87baa472d4302a71d45e5f314b3d18b519a4d6eb18c989de7e92ba432b8a8add07deadb2d0c6c324d591b62d415a2a24fcf42d9b2128bd444e44c
-
Filesize
42KB
MD5b9047a10edc2384255c3e6a26143c8c1
SHA19f274c7fb691f1096fb3d28393ef311f09808d76
SHA25668b8c0d554960530e504991f29d17f77430107d31cae00b37c02b542041c81a6
SHA5128dfeb84f50e87baa472d4302a71d45e5f314b3d18b519a4d6eb18c989de7e92ba432b8a8add07deadb2d0c6c324d591b62d415a2a24fcf42d9b2128bd444e44c
-
Filesize
42KB
MD5c5704c5e7ca9fc15457295c3adcedea5
SHA12767a12c7d6b8ab8169b01baa231a975ab85a59f
SHA256f9099f91f8e3e17e70981dc1c9f44827bbe10a387160658106bdf3b6f7b6606f
SHA5125054ca3cd78b910e0b8ef7c0490fe65a9c399a71c9b3b806515fab9c9d152efeaf026f203a2a0e502612bb252e82858894b51628bc667ac1bcd2898b9bbcc284
-
Filesize
42KB
MD5c5704c5e7ca9fc15457295c3adcedea5
SHA12767a12c7d6b8ab8169b01baa231a975ab85a59f
SHA256f9099f91f8e3e17e70981dc1c9f44827bbe10a387160658106bdf3b6f7b6606f
SHA5125054ca3cd78b910e0b8ef7c0490fe65a9c399a71c9b3b806515fab9c9d152efeaf026f203a2a0e502612bb252e82858894b51628bc667ac1bcd2898b9bbcc284
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD5125869122bcb4efe9937b2f59f4cb71e
SHA138b6f3b952b4bc54f50f9a301684aea4dbb45b0a
SHA25625914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8
SHA512430b9baf6a23af1810752cf03e84baaa20030171a6b4fa01c2cdbe0e0f307acceb24a45b132774f2ad7ae94fd2338fc71a9619cb12079c6c228abdc2f52e2ab3
-
Filesize
42KB
MD5125869122bcb4efe9937b2f59f4cb71e
SHA138b6f3b952b4bc54f50f9a301684aea4dbb45b0a
SHA25625914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8
SHA512430b9baf6a23af1810752cf03e84baaa20030171a6b4fa01c2cdbe0e0f307acceb24a45b132774f2ad7ae94fd2338fc71a9619cb12079c6c228abdc2f52e2ab3
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD59c2be962a1ff516f8105b62ca3520dd2
SHA183a7d67e7d09644eae92846d91c5a06618f0c63f
SHA256fc251a8eab579f282dfb63fa023ce9b95612d7d11029634687493df67da1a0db
SHA5127e6a9b103eb71a5efb8c15c5b6a3e6cb7c6d20ed7f4547114c0a834bd0b83cd3aff25026a80c1335715d38365e37bbb60e158690ec1e7b4b06b0248828c57d8c
-
Filesize
42KB
MD59c2be962a1ff516f8105b62ca3520dd2
SHA183a7d67e7d09644eae92846d91c5a06618f0c63f
SHA256fc251a8eab579f282dfb63fa023ce9b95612d7d11029634687493df67da1a0db
SHA5127e6a9b103eb71a5efb8c15c5b6a3e6cb7c6d20ed7f4547114c0a834bd0b83cd3aff25026a80c1335715d38365e37bbb60e158690ec1e7b4b06b0248828c57d8c
-
Filesize
42KB
MD5c5704c5e7ca9fc15457295c3adcedea5
SHA12767a12c7d6b8ab8169b01baa231a975ab85a59f
SHA256f9099f91f8e3e17e70981dc1c9f44827bbe10a387160658106bdf3b6f7b6606f
SHA5125054ca3cd78b910e0b8ef7c0490fe65a9c399a71c9b3b806515fab9c9d152efeaf026f203a2a0e502612bb252e82858894b51628bc667ac1bcd2898b9bbcc284
-
Filesize
42KB
MD5c5704c5e7ca9fc15457295c3adcedea5
SHA12767a12c7d6b8ab8169b01baa231a975ab85a59f
SHA256f9099f91f8e3e17e70981dc1c9f44827bbe10a387160658106bdf3b6f7b6606f
SHA5125054ca3cd78b910e0b8ef7c0490fe65a9c399a71c9b3b806515fab9c9d152efeaf026f203a2a0e502612bb252e82858894b51628bc667ac1bcd2898b9bbcc284
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD5125869122bcb4efe9937b2f59f4cb71e
SHA138b6f3b952b4bc54f50f9a301684aea4dbb45b0a
SHA25625914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8
SHA512430b9baf6a23af1810752cf03e84baaa20030171a6b4fa01c2cdbe0e0f307acceb24a45b132774f2ad7ae94fd2338fc71a9619cb12079c6c228abdc2f52e2ab3
-
Filesize
42KB
MD5125869122bcb4efe9937b2f59f4cb71e
SHA138b6f3b952b4bc54f50f9a301684aea4dbb45b0a
SHA25625914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8
SHA512430b9baf6a23af1810752cf03e84baaa20030171a6b4fa01c2cdbe0e0f307acceb24a45b132774f2ad7ae94fd2338fc71a9619cb12079c6c228abdc2f52e2ab3
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD59c2be962a1ff516f8105b62ca3520dd2
SHA183a7d67e7d09644eae92846d91c5a06618f0c63f
SHA256fc251a8eab579f282dfb63fa023ce9b95612d7d11029634687493df67da1a0db
SHA5127e6a9b103eb71a5efb8c15c5b6a3e6cb7c6d20ed7f4547114c0a834bd0b83cd3aff25026a80c1335715d38365e37bbb60e158690ec1e7b4b06b0248828c57d8c
-
Filesize
42KB
MD59c2be962a1ff516f8105b62ca3520dd2
SHA183a7d67e7d09644eae92846d91c5a06618f0c63f
SHA256fc251a8eab579f282dfb63fa023ce9b95612d7d11029634687493df67da1a0db
SHA5127e6a9b103eb71a5efb8c15c5b6a3e6cb7c6d20ed7f4547114c0a834bd0b83cd3aff25026a80c1335715d38365e37bbb60e158690ec1e7b4b06b0248828c57d8c
-
Filesize
42KB
MD59c2be962a1ff516f8105b62ca3520dd2
SHA183a7d67e7d09644eae92846d91c5a06618f0c63f
SHA256fc251a8eab579f282dfb63fa023ce9b95612d7d11029634687493df67da1a0db
SHA5127e6a9b103eb71a5efb8c15c5b6a3e6cb7c6d20ed7f4547114c0a834bd0b83cd3aff25026a80c1335715d38365e37bbb60e158690ec1e7b4b06b0248828c57d8c
-
Filesize
42KB
MD5125869122bcb4efe9937b2f59f4cb71e
SHA138b6f3b952b4bc54f50f9a301684aea4dbb45b0a
SHA25625914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8
SHA512430b9baf6a23af1810752cf03e84baaa20030171a6b4fa01c2cdbe0e0f307acceb24a45b132774f2ad7ae94fd2338fc71a9619cb12079c6c228abdc2f52e2ab3
-
Filesize
42KB
MD5125869122bcb4efe9937b2f59f4cb71e
SHA138b6f3b952b4bc54f50f9a301684aea4dbb45b0a
SHA25625914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8
SHA512430b9baf6a23af1810752cf03e84baaa20030171a6b4fa01c2cdbe0e0f307acceb24a45b132774f2ad7ae94fd2338fc71a9619cb12079c6c228abdc2f52e2ab3
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD5b9047a10edc2384255c3e6a26143c8c1
SHA19f274c7fb691f1096fb3d28393ef311f09808d76
SHA25668b8c0d554960530e504991f29d17f77430107d31cae00b37c02b542041c81a6
SHA5128dfeb84f50e87baa472d4302a71d45e5f314b3d18b519a4d6eb18c989de7e92ba432b8a8add07deadb2d0c6c324d591b62d415a2a24fcf42d9b2128bd444e44c
-
Filesize
42KB
MD5b9047a10edc2384255c3e6a26143c8c1
SHA19f274c7fb691f1096fb3d28393ef311f09808d76
SHA25668b8c0d554960530e504991f29d17f77430107d31cae00b37c02b542041c81a6
SHA5128dfeb84f50e87baa472d4302a71d45e5f314b3d18b519a4d6eb18c989de7e92ba432b8a8add07deadb2d0c6c324d591b62d415a2a24fcf42d9b2128bd444e44c
-
Filesize
42KB
MD5125869122bcb4efe9937b2f59f4cb71e
SHA138b6f3b952b4bc54f50f9a301684aea4dbb45b0a
SHA25625914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8
SHA512430b9baf6a23af1810752cf03e84baaa20030171a6b4fa01c2cdbe0e0f307acceb24a45b132774f2ad7ae94fd2338fc71a9619cb12079c6c228abdc2f52e2ab3
-
Filesize
42KB
MD5125869122bcb4efe9937b2f59f4cb71e
SHA138b6f3b952b4bc54f50f9a301684aea4dbb45b0a
SHA25625914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8
SHA512430b9baf6a23af1810752cf03e84baaa20030171a6b4fa01c2cdbe0e0f307acceb24a45b132774f2ad7ae94fd2338fc71a9619cb12079c6c228abdc2f52e2ab3
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD59c2be962a1ff516f8105b62ca3520dd2
SHA183a7d67e7d09644eae92846d91c5a06618f0c63f
SHA256fc251a8eab579f282dfb63fa023ce9b95612d7d11029634687493df67da1a0db
SHA5127e6a9b103eb71a5efb8c15c5b6a3e6cb7c6d20ed7f4547114c0a834bd0b83cd3aff25026a80c1335715d38365e37bbb60e158690ec1e7b4b06b0248828c57d8c
-
Filesize
42KB
MD575c2a7ec76302bbb14878fecff355f73
SHA11db2dbe58876d7f48cc7fafe5d90f35ccfda2a13
SHA2568d4ef7e2c38845e02c9009155540c8f156add878603176bb47ec03e6de733520
SHA51267284c47d8de83c03adbca3f237059e0635300025e297095821f8196f46f73bcdfeafa7bd92120ea5ed91815dacfd789cf8bcec18576743cc3657f3645f6c382
-
Filesize
42KB
MD59c2be962a1ff516f8105b62ca3520dd2
SHA183a7d67e7d09644eae92846d91c5a06618f0c63f
SHA256fc251a8eab579f282dfb63fa023ce9b95612d7d11029634687493df67da1a0db
SHA5127e6a9b103eb71a5efb8c15c5b6a3e6cb7c6d20ed7f4547114c0a834bd0b83cd3aff25026a80c1335715d38365e37bbb60e158690ec1e7b4b06b0248828c57d8c
-
Filesize
42KB
MD5125869122bcb4efe9937b2f59f4cb71e
SHA138b6f3b952b4bc54f50f9a301684aea4dbb45b0a
SHA25625914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8
SHA512430b9baf6a23af1810752cf03e84baaa20030171a6b4fa01c2cdbe0e0f307acceb24a45b132774f2ad7ae94fd2338fc71a9619cb12079c6c228abdc2f52e2ab3
-
Filesize
42KB
MD5125869122bcb4efe9937b2f59f4cb71e
SHA138b6f3b952b4bc54f50f9a301684aea4dbb45b0a
SHA25625914150e9e6289a693fb97df6186e3702421d75d7342d2ae581b391e0c295e8
SHA512430b9baf6a23af1810752cf03e84baaa20030171a6b4fa01c2cdbe0e0f307acceb24a45b132774f2ad7ae94fd2338fc71a9619cb12079c6c228abdc2f52e2ab3
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD53d20385839018f5cf86101e78991aa41
SHA1b307318c9b21dd86cfe193a2b7dbe2183ed298ad
SHA25646e15f259289e8b6d12700df776319620e3ce49ae2a6a4df7ba1f4510c5701b0
SHA512f561185a40614eaa5c81d93b6739702826d7eda59241d915ad953c1bc720389208e1ca38249ccc65abebd69da4883664653c39db8effd6f3cdb4ee41cb206d20
-
Filesize
42KB
MD5b9047a10edc2384255c3e6a26143c8c1
SHA19f274c7fb691f1096fb3d28393ef311f09808d76
SHA25668b8c0d554960530e504991f29d17f77430107d31cae00b37c02b542041c81a6
SHA5128dfeb84f50e87baa472d4302a71d45e5f314b3d18b519a4d6eb18c989de7e92ba432b8a8add07deadb2d0c6c324d591b62d415a2a24fcf42d9b2128bd444e44c