Analysis
-
max time kernel
151s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 04:02
Static task
static1
Behavioral task
behavioral1
Sample
d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe
Resource
win10v2004-20221111-en
General
-
Target
d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe
-
Size
469KB
-
MD5
063b50add44b866d8614ce34bb6c1200
-
SHA1
99705620cd8a111d14c61cbc4cd3beccc3293877
-
SHA256
d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
-
SHA512
5470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
SSDEEP
12288:MEnCBHbmPATrvC4e5gK2b7kZGuqEwxq+YH:tZL15f2bQZG0aq+YH
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft RSVP = "C:\\Users\\Admin\\Local Settings\\Application Data\\Microsoft\\Windows\\rsvp.exe" d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DCOM = "C:\\Users\\Admin\\Local Settings\\Application Data\\Microsoft\\dllhost.exe" d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\dllhst3g.exe d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe -
Executes dropped EXE 18 IoCs
pid Process 1244 rsvp.exe 1648 dllhst3g.exe 756 dllhost.exe 376 sessmgr.exe 1496 spoolsv.exe 888 mstinit.exe 1332 spoolsv.exe 896 ieudinit.exe 1416 rsvp.exe 1336 rsvp.exe 668 rsvp.exe 1544 dllhst3g.exe 1868 dllhost.exe 1804 sessmgr.exe 676 spoolsv.exe 1616 mstinit.exe 988 spoolsv.exe 952 ieudinit.exe -
Loads dropped DLL 30 IoCs
pid Process 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 1336 rsvp.exe 1336 rsvp.exe 1336 rsvp.exe 1336 rsvp.exe 1336 rsvp.exe 1336 rsvp.exe 1336 rsvp.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DllHost3g = "C:\\Windows\\System32\\drivers\\dllhst3g.exe" d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Sessmgr = "C:\\Windows\\sessmgr.exe" d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\sessmgr.exe d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe File opened for modification C:\Windows\RCXD6A4.tmp d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe -
Modifies data under HKEY_USERS 12 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe Key created \REGISTRY\USER\.DEFAULT d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe Key created \REGISTRY\USER\.DEFAULT\Software d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IEudInit = "C:\\Users\\Admin\\Local Settings\\Application Data\\Microsoft\\Windows\\ieudinit.exe" d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Spooler = "C:\\Users\\Admin\\AppData\\Roaming\\spoolsv.exe" d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 1244 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 28 PID 1216 wrote to memory of 1244 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 28 PID 1216 wrote to memory of 1244 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 28 PID 1216 wrote to memory of 1244 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 28 PID 1216 wrote to memory of 1648 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 29 PID 1216 wrote to memory of 1648 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 29 PID 1216 wrote to memory of 1648 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 29 PID 1216 wrote to memory of 1648 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 29 PID 1216 wrote to memory of 756 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 30 PID 1216 wrote to memory of 756 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 30 PID 1216 wrote to memory of 756 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 30 PID 1216 wrote to memory of 756 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 30 PID 1216 wrote to memory of 376 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 31 PID 1216 wrote to memory of 376 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 31 PID 1216 wrote to memory of 376 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 31 PID 1216 wrote to memory of 376 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 31 PID 1216 wrote to memory of 1496 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 32 PID 1216 wrote to memory of 1496 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 32 PID 1216 wrote to memory of 1496 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 32 PID 1216 wrote to memory of 1496 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 32 PID 1216 wrote to memory of 888 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 33 PID 1216 wrote to memory of 888 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 33 PID 1216 wrote to memory of 888 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 33 PID 1216 wrote to memory of 888 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 33 PID 1216 wrote to memory of 1332 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 34 PID 1216 wrote to memory of 1332 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 34 PID 1216 wrote to memory of 1332 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 34 PID 1216 wrote to memory of 1332 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 34 PID 1216 wrote to memory of 896 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 35 PID 1216 wrote to memory of 896 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 35 PID 1216 wrote to memory of 896 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 35 PID 1216 wrote to memory of 896 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 35 PID 1216 wrote to memory of 1416 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 36 PID 1216 wrote to memory of 1416 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 36 PID 1216 wrote to memory of 1416 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 36 PID 1216 wrote to memory of 1416 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 36 PID 1216 wrote to memory of 1336 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 37 PID 1216 wrote to memory of 1336 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 37 PID 1216 wrote to memory of 1336 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 37 PID 1216 wrote to memory of 1336 1216 d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe 37 PID 1336 wrote to memory of 668 1336 rsvp.exe 38 PID 1336 wrote to memory of 668 1336 rsvp.exe 38 PID 1336 wrote to memory of 668 1336 rsvp.exe 38 PID 1336 wrote to memory of 668 1336 rsvp.exe 38 PID 1336 wrote to memory of 1544 1336 rsvp.exe 39 PID 1336 wrote to memory of 1544 1336 rsvp.exe 39 PID 1336 wrote to memory of 1544 1336 rsvp.exe 39 PID 1336 wrote to memory of 1544 1336 rsvp.exe 39 PID 1336 wrote to memory of 1868 1336 rsvp.exe 40 PID 1336 wrote to memory of 1868 1336 rsvp.exe 40 PID 1336 wrote to memory of 1868 1336 rsvp.exe 40 PID 1336 wrote to memory of 1868 1336 rsvp.exe 40 PID 1336 wrote to memory of 1804 1336 rsvp.exe 41 PID 1336 wrote to memory of 1804 1336 rsvp.exe 41 PID 1336 wrote to memory of 1804 1336 rsvp.exe 41 PID 1336 wrote to memory of 1804 1336 rsvp.exe 41 PID 1336 wrote to memory of 676 1336 rsvp.exe 42 PID 1336 wrote to memory of 676 1336 rsvp.exe 42 PID 1336 wrote to memory of 676 1336 rsvp.exe 42 PID 1336 wrote to memory of 676 1336 rsvp.exe 42 PID 1336 wrote to memory of 1616 1336 rsvp.exe 43 PID 1336 wrote to memory of 1616 1336 rsvp.exe 43 PID 1336 wrote to memory of 1616 1336 rsvp.exe 43 PID 1336 wrote to memory of 1616 1336 rsvp.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe"C:\Users\Admin\AppData\Local\Temp\d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0.exe"1⤵
- Adds policy Run key to start application
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\rsvp.exe"C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\rsvp.exe" /c 272⤵
- Executes dropped EXE
PID:1244
-
-
C:\Windows\SysWOW64\drivers\dllhst3g.exeC:\Windows\System32\drivers\dllhst3g.exe /c 262⤵
- Executes dropped EXE
PID:1648
-
-
C:\Users\Admin\Local Settings\Application Data\Microsoft\dllhost.exe"C:\Users\Admin\Local Settings\Application Data\Microsoft\dllhost.exe" /c 772⤵
- Executes dropped EXE
PID:756
-
-
C:\Windows\sessmgr.exeC:\Windows\sessmgr.exe /c 982⤵
- Executes dropped EXE
PID:376
-
-
C:\Users\Admin\AppData\Roaming\MICROS~1\spoolsv.exeC:\Users\Admin\AppData\Roaming\MICROS~1\spoolsv.exe /c 552⤵
- Executes dropped EXE
PID:1496
-
-
C:\Users\Admin\AppData\Roaming\MICROS~1\mstinit.exeC:\Users\Admin\AppData\Roaming\MICROS~1\mstinit.exe /c 252⤵
- Executes dropped EXE
PID:888
-
-
C:\Users\Admin\AppData\Roaming\spoolsv.exeC:\Users\Admin\AppData\Roaming\spoolsv.exe /c 702⤵
- Executes dropped EXE
PID:1332
-
-
C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\ieudinit.exe"C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\ieudinit.exe" /c 582⤵
- Executes dropped EXE
PID:896
-
-
C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\rsvp.exe"C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\rsvp.exe" /c 12⤵
- Executes dropped EXE
PID:1416
-
-
C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\rsvp.exe"C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\rsvp.exe" /r2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\rsvp.exe"C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\rsvp.exe" /c 923⤵
- Executes dropped EXE
PID:668
-
-
C:\Windows\SysWOW64\drivers\dllhst3g.exeC:\Windows\System32\drivers\dllhst3g.exe /c 353⤵
- Executes dropped EXE
PID:1544
-
-
C:\Users\Admin\Local Settings\Application Data\Microsoft\dllhost.exe"C:\Users\Admin\Local Settings\Application Data\Microsoft\dllhost.exe" /c 463⤵
- Executes dropped EXE
PID:1868
-
-
C:\Windows\sessmgr.exeC:\Windows\sessmgr.exe /c 213⤵
- Executes dropped EXE
PID:1804
-
-
C:\Users\Admin\AppData\Roaming\MICROS~1\spoolsv.exeC:\Users\Admin\AppData\Roaming\MICROS~1\spoolsv.exe /c 623⤵
- Executes dropped EXE
PID:676
-
-
C:\Users\Admin\AppData\Roaming\MICROS~1\mstinit.exeC:\Users\Admin\AppData\Roaming\MICROS~1\mstinit.exe /c 663⤵
- Executes dropped EXE
PID:1616
-
-
C:\Users\Admin\AppData\Roaming\spoolsv.exeC:\Users\Admin\AppData\Roaming\spoolsv.exe /c 793⤵
- Executes dropped EXE
PID:988
-
-
C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\ieudinit.exe"C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\ieudinit.exe" /c 723⤵
- Executes dropped EXE
PID:952
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
9B
MD5fd63d82ed40e8a3704a7a9d1fd7cace9
SHA1533af3f97864dec95c52b29353b23c3837323c3f
SHA256290521e03d9652fdc60e3af37842d26fa8e7f1816c71f666217a18d0d8bb6634
SHA512f48f6a18bdfec016c2cf9d85bb933e19e1c2b8f84fcd43d9d68f20a14da2071b889b6542e393c6f815a2e8081f3ff0cd3ad4f3bbb6d361ce17873e4a58f585cf
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5001f59b3f7a1c3e83cd2916a0bb6f7b8
SHA13dd6eb92c73f5b370833a7c5d25f38f0d27e9b96
SHA256069fa912f8623f35877738701a45abc8a94a5ee08b54c4a1be00d2ce485ecf28
SHA5120e10e1c1c7e500a46299fbbd63c1ad20b2210c5eb3716625ecd21d0cfdbf6da9386a1228f11c2da17f1c305093e9138d375816479d6b974aa800f4bd3b957b85
-
Filesize
469KB
MD5001f59b3f7a1c3e83cd2916a0bb6f7b8
SHA13dd6eb92c73f5b370833a7c5d25f38f0d27e9b96
SHA256069fa912f8623f35877738701a45abc8a94a5ee08b54c4a1be00d2ce485ecf28
SHA5120e10e1c1c7e500a46299fbbd63c1ad20b2210c5eb3716625ecd21d0cfdbf6da9386a1228f11c2da17f1c305093e9138d375816479d6b974aa800f4bd3b957b85
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def
-
Filesize
469KB
MD5063b50add44b866d8614ce34bb6c1200
SHA199705620cd8a111d14c61cbc4cd3beccc3293877
SHA256d68bb54d066a314da5dbca2156f12ade8941f10cc1cd99d029d7c90d542543f0
SHA5125470a2da68bff69321542d994150bb03f117100387b45aade5aa500f12c7cfb5a1e0d81cfbd95b50854993776ef5847bf7283a6c591edd20e3fe0383f7675def