Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2023, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
320KB
-
MD5
a2ea709771ba905519c16b61a171ae14
-
SHA1
998ad4bb0a2ac2f33c22ed1cce984fa0dc541552
-
SHA256
7ae7605486a8b4809d05c25bc912ef667374d72a7fc39400fbdde42940db5b39
-
SHA512
39f095edcdcec7f2764c1c81208fdea1c4814356f75d5f471bd596ec03c5325f57d46a1a56f72bfd9f2e511db1c61b8dd73bd1e7c8b5f0178d91e1c19d6c5473
-
SSDEEP
3072:n0t+7WULnoF70RcnaEVvTQIcbgAm3nHnOEf6/d5ZZUnWO8MyRDhGFpy10wZ2jQ:njWULoV0e5TQ+3pfeZ4WdsQ
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Extracted
djvu
http://zexeq.com/lancer/get.php
-
extension
.darj
-
offline_id
8EM6M9LqEzIk18qaQ87WiPQ1u84RRdej5V1ovht1
-
payload_url
http://uaery.top/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-vbVkogQdu2 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0668JOsie
Extracted
smokeloader
pub1
Extracted
smokeloader
sprg
Extracted
amadey
3.65
77.73.134.27/8bmdh3Slb2/index.php
Extracted
vidar
https://steamcommunity.com/profiles/76561199472266392
Extracted
vidar
� �
https://steamcommunity.com/profiles/76561199472266392
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
resource yara_rule behavioral2/memory/1000-312-0x00000000009B0000-0x00000000009CC000-memory.dmp family_rhadamanthys behavioral2/memory/1000-327-0x00000000009B0000-0x00000000009CC000-memory.dmp family_rhadamanthys behavioral2/memory/4408-331-0x0000000000760000-0x000000000077C000-memory.dmp family_rhadamanthys behavioral2/memory/1000-344-0x00000000009B0000-0x00000000009CC000-memory.dmp family_rhadamanthys -
Detected Djvu ransomware 16 IoCs
resource yara_rule behavioral2/memory/768-148-0x0000000002670000-0x000000000278B000-memory.dmp family_djvu behavioral2/memory/2888-147-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2888-150-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2888-151-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2888-157-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2888-239-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4844-254-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4844-249-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4844-269-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4844-278-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4844-279-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4844-284-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4844-286-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4844-287-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4844-289-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4844-323-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3464 2208 rundll32.exe 39 -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation 14.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation Player3.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation jgzhang.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation nbveek.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation E275.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation E275.exe -
Executes dropped EXE 21 IoCs
pid Process 768 E275.exe 2888 E275.exe 4828 E62F.exe 1000 F350.exe 4408 F8EE.exe 5004 FB03.exe 772 14.exe 3344 16D.exe 1512 Player3.exe 4840 jgzhang.exe 1212 ss31.exe 2468 nbveek.exe 3368 jgzhang.exe 1052 E275.exe 4844 E275.exe 544 build2.exe 452 build2.exe 4208 build3.exe 3372 nbveek.exe 388 mstsca.exe 2832 nbveek.exe -
Loads dropped DLL 6 IoCs
pid Process 4768 rundll32.exe 452 build2.exe 452 build2.exe 4920 rundll32.exe 5004 rundll32.exe 912 rundll32.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1576 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\51514023-12b7-47aa-ba68-af55bcd0051a\\E275.exe\" --AutoStart" E275.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 47 api.2ip.ua 48 api.2ip.ua 77 api.2ip.ua -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1000 F350.exe 1000 F350.exe 1000 F350.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 768 set thread context of 2888 768 E275.exe 92 PID 1052 set thread context of 4844 1052 E275.exe 121 PID 544 set thread context of 452 544 build2.exe 131 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 6 IoCs
pid pid_target Process procid_target 4948 3344 WerFault.exe 99 2564 4768 WerFault.exe 123 4568 4408 WerFault.exe 95 1052 1000 WerFault.exe 94 2776 452 WerFault.exe 131 4164 5004 WerFault.exe 160 -
Checks SCSI registry key(s) 3 TTPs 14 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FB03.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FB03.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E62F.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID F350.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FB03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 F350.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E62F.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E62F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F350.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F350.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F350.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1528 schtasks.exe 2108 schtasks.exe 4200 schtasks.exe -
Modifies registry class 44 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\InprocHandler32 jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\InprocHandler32\ = "ole32.dll" jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\LocalServer32 jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\ = "sqltest" jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\0\win32 jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib\Version = "1.0" jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\CLSID jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\CLSID\ = "{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}" jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\ = "sqltest.Application" jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ = "Isqltest" jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib\ = "{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}" jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ProgID jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4} jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ = "sqltest.Application" jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\InprocHandler32 jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\0 jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825} jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\CLSID jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\HELPDIR\ jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ProxyStubClsid32 jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib\ = "{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}" jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\FLAGS jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\HELPDIR jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ProgID\ = "sqltest.Application" jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD} jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\FLAGS\ = "0" jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jgzhang.exe" jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib\Version = "1.0" jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ = "Isqltest" jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ProxyStubClsid32 jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\CLSID\ = "{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}" jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\InprocHandler32\ = "ole32.dll" jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\LocalServer32 jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jgzhang.exe" jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0 jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ProgID jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ProgID\ = "sqltest.Application" jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825} jgzhang.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib jgzhang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jgzhang.exe" jgzhang.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 73 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4040 setup.exe 4040 setup.exe 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3160 Process not Found -
Suspicious behavior: MapViewOfSection 21 IoCs
pid Process 4040 setup.exe 4828 E62F.exe 5004 FB03.exe 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 1000 F350.exe Token: SeCreatePagefilePrivilege 1000 F350.exe Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4840 jgzhang.exe 4840 jgzhang.exe 3368 jgzhang.exe 3368 jgzhang.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3160 wrote to memory of 768 3160 Process not Found 91 PID 3160 wrote to memory of 768 3160 Process not Found 91 PID 3160 wrote to memory of 768 3160 Process not Found 91 PID 768 wrote to memory of 2888 768 E275.exe 92 PID 768 wrote to memory of 2888 768 E275.exe 92 PID 768 wrote to memory of 2888 768 E275.exe 92 PID 768 wrote to memory of 2888 768 E275.exe 92 PID 768 wrote to memory of 2888 768 E275.exe 92 PID 768 wrote to memory of 2888 768 E275.exe 92 PID 768 wrote to memory of 2888 768 E275.exe 92 PID 768 wrote to memory of 2888 768 E275.exe 92 PID 768 wrote to memory of 2888 768 E275.exe 92 PID 768 wrote to memory of 2888 768 E275.exe 92 PID 3160 wrote to memory of 4828 3160 Process not Found 93 PID 3160 wrote to memory of 4828 3160 Process not Found 93 PID 3160 wrote to memory of 4828 3160 Process not Found 93 PID 3160 wrote to memory of 1000 3160 Process not Found 94 PID 3160 wrote to memory of 1000 3160 Process not Found 94 PID 3160 wrote to memory of 1000 3160 Process not Found 94 PID 3160 wrote to memory of 4408 3160 Process not Found 95 PID 3160 wrote to memory of 4408 3160 Process not Found 95 PID 3160 wrote to memory of 4408 3160 Process not Found 95 PID 3160 wrote to memory of 5004 3160 Process not Found 96 PID 3160 wrote to memory of 5004 3160 Process not Found 96 PID 3160 wrote to memory of 5004 3160 Process not Found 96 PID 3160 wrote to memory of 772 3160 Process not Found 98 PID 3160 wrote to memory of 772 3160 Process not Found 98 PID 3160 wrote to memory of 772 3160 Process not Found 98 PID 3160 wrote to memory of 3344 3160 Process not Found 99 PID 3160 wrote to memory of 3344 3160 Process not Found 99 PID 3160 wrote to memory of 3344 3160 Process not Found 99 PID 772 wrote to memory of 1512 772 14.exe 103 PID 772 wrote to memory of 1512 772 14.exe 103 PID 772 wrote to memory of 1512 772 14.exe 103 PID 772 wrote to memory of 4840 772 14.exe 104 PID 772 wrote to memory of 4840 772 14.exe 104 PID 772 wrote to memory of 4840 772 14.exe 104 PID 772 wrote to memory of 1212 772 14.exe 105 PID 772 wrote to memory of 1212 772 14.exe 105 PID 1512 wrote to memory of 2468 1512 Player3.exe 106 PID 1512 wrote to memory of 2468 1512 Player3.exe 106 PID 1512 wrote to memory of 2468 1512 Player3.exe 106 PID 4840 wrote to memory of 3368 4840 jgzhang.exe 107 PID 4840 wrote to memory of 3368 4840 jgzhang.exe 107 PID 4840 wrote to memory of 3368 4840 jgzhang.exe 107 PID 2468 wrote to memory of 4200 2468 nbveek.exe 108 PID 2468 wrote to memory of 4200 2468 nbveek.exe 108 PID 2468 wrote to memory of 4200 2468 nbveek.exe 108 PID 2468 wrote to memory of 1108 2468 nbveek.exe 110 PID 2468 wrote to memory of 1108 2468 nbveek.exe 110 PID 2468 wrote to memory of 1108 2468 nbveek.exe 110 PID 1108 wrote to memory of 2152 1108 cmd.exe 112 PID 1108 wrote to memory of 2152 1108 cmd.exe 112 PID 1108 wrote to memory of 2152 1108 cmd.exe 112 PID 1108 wrote to memory of 4008 1108 cmd.exe 113 PID 1108 wrote to memory of 4008 1108 cmd.exe 113 PID 1108 wrote to memory of 4008 1108 cmd.exe 113 PID 1108 wrote to memory of 4772 1108 cmd.exe 114 PID 1108 wrote to memory of 4772 1108 cmd.exe 114 PID 1108 wrote to memory of 4772 1108 cmd.exe 114 PID 2888 wrote to memory of 1576 2888 E275.exe 115 PID 2888 wrote to memory of 1576 2888 E275.exe 115 PID 2888 wrote to memory of 1576 2888 E275.exe 115 PID 1108 wrote to memory of 4128 1108 cmd.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4040
-
C:\Users\Admin\AppData\Local\Temp\E275.exeC:\Users\Admin\AppData\Local\Temp\E275.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\E275.exeC:\Users\Admin\AppData\Local\Temp\E275.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\51514023-12b7-47aa-ba68-af55bcd0051a" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\E275.exe"C:\Users\Admin\AppData\Local\Temp\E275.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\E275.exe"C:\Users\Admin\AppData\Local\Temp\E275.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\dfed3d65-678f-43e4-af69-38d92cd2bc28\build2.exe"C:\Users\Admin\AppData\Local\dfed3d65-678f-43e4-af69-38d92cd2bc28\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:544 -
C:\Users\Admin\AppData\Local\dfed3d65-678f-43e4-af69-38d92cd2bc28\build2.exe"C:\Users\Admin\AppData\Local\dfed3d65-678f-43e4-af69-38d92cd2bc28\build2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 452 -s 18847⤵
- Program crash
PID:2776
-
-
-
-
C:\Users\Admin\AppData\Local\dfed3d65-678f-43e4-af69-38d92cd2bc28\build3.exe"C:\Users\Admin\AppData\Local\dfed3d65-678f-43e4-af69-38d92cd2bc28\build3.exe"5⤵
- Executes dropped EXE
PID:4208 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"6⤵
- Creates scheduled task(s)
PID:1528
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E62F.exeC:\Users\Admin\AppData\Local\Temp\E62F.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4828
-
C:\Users\Admin\AppData\Local\Temp\F350.exeC:\Users\Admin\AppData\Local\Temp\F350.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1000 -s 6682⤵
- Program crash
PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\F8EE.exeC:\Users\Admin\AppData\Local\Temp\F8EE.exe1⤵
- Executes dropped EXE
PID:4408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 5882⤵
- Program crash
PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\FB03.exeC:\Users\Admin\AppData\Local\Temp\FB03.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5004
-
C:\Users\Admin\AppData\Local\Temp\14.exeC:\Users\Admin\AppData\Local\Temp\14.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\Player3.exe"C:\Users\Admin\AppData\Local\Temp\Player3.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe" /F4⤵
- Creates scheduled task(s)
PID:4200
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nbveek.exe" /P "Admin:N"&&CACLS "nbveek.exe" /P "Admin:R" /E&&echo Y|CACLS "..\16de06bfb4" /P "Admin:N"&&CACLS "..\16de06bfb4" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2152
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:N"5⤵PID:4008
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:R" /E5⤵PID:4772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4128
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\16de06bfb4" /P "Admin:N"5⤵PID:4276
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\16de06bfb4" /P "Admin:R" /E5⤵PID:4288
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main4⤵
- Loads dropped DLL
PID:4920 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main5⤵
- Loads dropped DLL
PID:5004 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5004 -s 6526⤵
- Program crash
PID:4164
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\clip64.dll, Main4⤵
- Loads dropped DLL
PID:912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\jgzhang.exe"C:\Users\Admin\AppData\Local\Temp\jgzhang.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\jgzhang.exe"C:\Users\Admin\AppData\Local\Temp\jgzhang.exe" -h3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3368
-
-
-
C:\Users\Admin\AppData\Local\Temp\ss31.exe"C:\Users\Admin\AppData\Local\Temp\ss31.exe"2⤵
- Executes dropped EXE
PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\16D.exeC:\Users\Admin\AppData\Local\Temp\16D.exe1⤵
- Executes dropped EXE
PID:3344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3344 -s 3402⤵
- Program crash
PID:4948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3344 -ip 33441⤵PID:3716
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
PID:3464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
PID:4768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 6043⤵
- Program crash
PID:2564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4768 -ip 47681⤵PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4408 -ip 44081⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exeC:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe1⤵
- Executes dropped EXE
PID:3372
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
PID:388 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
PID:2108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1000 -ip 10001⤵PID:3256
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 452 -ip 4521⤵PID:456
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4928
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3344
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4972
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4608
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1668
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4896
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4864
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1928
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 496 -p 5004 -ip 50041⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exeC:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe1⤵
- Executes dropped EXE
PID:2832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD584770e5e2da7dbc35f74f1301910fea1
SHA1bd6156f63c93c2bc668dbd796d27474700cbff84
SHA25697a616430f4f8b8a76004f3ffab182f6a01870267c53387960f71f56c3dae1c5
SHA5126241fec66ad5219fa31ad47fdd93dea2ef079cfd600d3ec1ca48fe64d028d76a82984113a5052b74de8d678d183e2bafb965f3c6111f3cdf139239b07dfee941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD546695bc8561a32e1833a6d99a77181a0
SHA1b3c30e212f13fe612567d1a0d590ea400225bde2
SHA2568acf929c15a9d787e72809586a1c01d53cd344207ed8f5b5d2f325f4a25f708e
SHA51259a20f6594e628fb465ca887c4987656757d6b479c9fc72995c1bbe4c7ab89a8e60969aa68d7472b8a06bbfa99c01fdd0e87608fef95133463034bc21744e304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD587ad064f6b3b77983744553591ecf71e
SHA1f899658cb529675c7506ca1814d017d7b42963cd
SHA2567bb8eddf9b602084bc44711e2c376a0ae0d88d18f76cc97b7a6dad0f48ff2b53
SHA512fa381c7db92d97255dc54277e1fd41dbfef55e45ba9f2628291a39fd94f0dd8a7ca0da2266607469ad133bce86dc4f5c26e4af57ed71a9438134a228fca3a625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5df3618b202a6267259fcb0355f5e29bf
SHA1b410e2b5e95b3b1708a3a234ef640339f4fcc234
SHA256a2c6fc43bda56966214558901f56bc2acb3bc40d99a69595aeda7714d9ba3a7b
SHA51218a08480651561c6cbfc3fdbf54dae04243709ac64e3d05ccfcb2d15829c4b1be6770e720b3be40c21216bead70558c15c99d5520beeafae879b8bc48bbedcc9
-
Filesize
761KB
MD58edfc5cd990b582199df32c9552ba093
SHA1aa8e4fbb5246ad8e32735e3b34d4982d6f4b7d0f
SHA2567f2da95a6071289c2a16f751cd4ef110978e99be1ba6725541f4d753ae717e6e
SHA5126b0dd2fb19fa01b13bbf08cfcbd7055dc6b828cb4d0eb033885097cce3b049af9c87b09f6c42ca403d9fd1a98d98eb03afc80a3655f8bc123c69bea5e4e6153b
-
Filesize
1.1MB
MD5ba218b60cb97c3532b8b9c796d954622
SHA1ae18137fb0809f61797b7448bb139840d1f49e99
SHA2568bee3d713fc207a8ca82e8eaf85396b55fcd29fe9214a83ce9399fa48ac4bd4b
SHA51206b0ac48d4dad3253a817a7f6bc34437a748e3d885328986f652347c8cbc72f2fc5aebdc3e3781357887da74b77f2eb6b57a816d16d96e6b713e3c3aab1ba158
-
Filesize
1.1MB
MD5ba218b60cb97c3532b8b9c796d954622
SHA1ae18137fb0809f61797b7448bb139840d1f49e99
SHA2568bee3d713fc207a8ca82e8eaf85396b55fcd29fe9214a83ce9399fa48ac4bd4b
SHA51206b0ac48d4dad3253a817a7f6bc34437a748e3d885328986f652347c8cbc72f2fc5aebdc3e3781357887da74b77f2eb6b57a816d16d96e6b713e3c3aab1ba158
-
Filesize
262KB
MD5e2572333d883806e24435b137052bdca
SHA1ee38c8e82998188a9d6186510282a106b889bd3c
SHA256aff0d7c63d9f54d6c899c45d36ca69449dcb66d084595dc3b730b2f0c2bb6cf0
SHA5122d35732cf895db8286090e95a8a7323920dfe27a6c0601d506f0f7df8eaa81157bbea02dde4dceb00208b3d55edc4697f2b3c1a4f2feb645fd896ce12bad2ed8
-
Filesize
262KB
MD5e2572333d883806e24435b137052bdca
SHA1ee38c8e82998188a9d6186510282a106b889bd3c
SHA256aff0d7c63d9f54d6c899c45d36ca69449dcb66d084595dc3b730b2f0c2bb6cf0
SHA5122d35732cf895db8286090e95a8a7323920dfe27a6c0601d506f0f7df8eaa81157bbea02dde4dceb00208b3d55edc4697f2b3c1a4f2feb645fd896ce12bad2ed8
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
82KB
MD56194d485239472d4880911734c04e388
SHA156df019f8435c95673f67e1f923601d70bed5b37
SHA256873098eabdd8e201cbc6f023c0440897fbac15da17356b52658ddf438d01eefc
SHA512091900e24f111cba752d1e46653a6895d3aa852f3c74b10ff3ee304ce080a2f911e979804b7820f04baef3fe37d37213fbf98d8f6388e3c09ebeea5011a82020
-
Filesize
761KB
MD58edfc5cd990b582199df32c9552ba093
SHA1aa8e4fbb5246ad8e32735e3b34d4982d6f4b7d0f
SHA2567f2da95a6071289c2a16f751cd4ef110978e99be1ba6725541f4d753ae717e6e
SHA5126b0dd2fb19fa01b13bbf08cfcbd7055dc6b828cb4d0eb033885097cce3b049af9c87b09f6c42ca403d9fd1a98d98eb03afc80a3655f8bc123c69bea5e4e6153b
-
Filesize
761KB
MD58edfc5cd990b582199df32c9552ba093
SHA1aa8e4fbb5246ad8e32735e3b34d4982d6f4b7d0f
SHA2567f2da95a6071289c2a16f751cd4ef110978e99be1ba6725541f4d753ae717e6e
SHA5126b0dd2fb19fa01b13bbf08cfcbd7055dc6b828cb4d0eb033885097cce3b049af9c87b09f6c42ca403d9fd1a98d98eb03afc80a3655f8bc123c69bea5e4e6153b
-
Filesize
761KB
MD58edfc5cd990b582199df32c9552ba093
SHA1aa8e4fbb5246ad8e32735e3b34d4982d6f4b7d0f
SHA2567f2da95a6071289c2a16f751cd4ef110978e99be1ba6725541f4d753ae717e6e
SHA5126b0dd2fb19fa01b13bbf08cfcbd7055dc6b828cb4d0eb033885097cce3b049af9c87b09f6c42ca403d9fd1a98d98eb03afc80a3655f8bc123c69bea5e4e6153b
-
Filesize
761KB
MD58edfc5cd990b582199df32c9552ba093
SHA1aa8e4fbb5246ad8e32735e3b34d4982d6f4b7d0f
SHA2567f2da95a6071289c2a16f751cd4ef110978e99be1ba6725541f4d753ae717e6e
SHA5126b0dd2fb19fa01b13bbf08cfcbd7055dc6b828cb4d0eb033885097cce3b049af9c87b09f6c42ca403d9fd1a98d98eb03afc80a3655f8bc123c69bea5e4e6153b
-
Filesize
761KB
MD58edfc5cd990b582199df32c9552ba093
SHA1aa8e4fbb5246ad8e32735e3b34d4982d6f4b7d0f
SHA2567f2da95a6071289c2a16f751cd4ef110978e99be1ba6725541f4d753ae717e6e
SHA5126b0dd2fb19fa01b13bbf08cfcbd7055dc6b828cb4d0eb033885097cce3b049af9c87b09f6c42ca403d9fd1a98d98eb03afc80a3655f8bc123c69bea5e4e6153b
-
Filesize
356KB
MD5d5e7b073a42ebb95571c8a83064c9215
SHA189533d0f2641cba9271200cdda0ba12f6db47f7c
SHA256df25c3481e720e03599d17ea479390fa89445c77b9c85fa2935df3202de8e15e
SHA512f2a19f2f5abee2bf7c786044a65e1d7e4be0bd051e792a711bafedfba52cacba3ef41a8bd2036507c0a99fce1ba929f4d8fd133133585b4b4bdf54e62a7f7f2c
-
Filesize
356KB
MD5d5e7b073a42ebb95571c8a83064c9215
SHA189533d0f2641cba9271200cdda0ba12f6db47f7c
SHA256df25c3481e720e03599d17ea479390fa89445c77b9c85fa2935df3202de8e15e
SHA512f2a19f2f5abee2bf7c786044a65e1d7e4be0bd051e792a711bafedfba52cacba3ef41a8bd2036507c0a99fce1ba929f4d8fd133133585b4b4bdf54e62a7f7f2c
-
Filesize
4.4MB
MD5166d22ed93c723326a6d5fead162fdd3
SHA117cfd9649a4f68ef90c72689820876dbe4ca22d1
SHA256e9879548658614428c01bc7c4878bc87d0e2ad57b3621a7aa614e89c32c388e7
SHA512c871182afed08bcbd73ea86d058973afd2602481497f752d7da46aad4d9a09ea39911010832e3bf4b68f5cf7ac73300169efeeeefe82a68a897f543f7dfc96f4
-
Filesize
4.4MB
MD5166d22ed93c723326a6d5fead162fdd3
SHA117cfd9649a4f68ef90c72689820876dbe4ca22d1
SHA256e9879548658614428c01bc7c4878bc87d0e2ad57b3621a7aa614e89c32c388e7
SHA512c871182afed08bcbd73ea86d058973afd2602481497f752d7da46aad4d9a09ea39911010832e3bf4b68f5cf7ac73300169efeeeefe82a68a897f543f7dfc96f4
-
Filesize
4.4MB
MD5166d22ed93c723326a6d5fead162fdd3
SHA117cfd9649a4f68ef90c72689820876dbe4ca22d1
SHA256e9879548658614428c01bc7c4878bc87d0e2ad57b3621a7aa614e89c32c388e7
SHA512c871182afed08bcbd73ea86d058973afd2602481497f752d7da46aad4d9a09ea39911010832e3bf4b68f5cf7ac73300169efeeeefe82a68a897f543f7dfc96f4
-
Filesize
4.4MB
MD5166d22ed93c723326a6d5fead162fdd3
SHA117cfd9649a4f68ef90c72689820876dbe4ca22d1
SHA256e9879548658614428c01bc7c4878bc87d0e2ad57b3621a7aa614e89c32c388e7
SHA512c871182afed08bcbd73ea86d058973afd2602481497f752d7da46aad4d9a09ea39911010832e3bf4b68f5cf7ac73300169efeeeefe82a68a897f543f7dfc96f4
-
Filesize
262KB
MD5e2572333d883806e24435b137052bdca
SHA1ee38c8e82998188a9d6186510282a106b889bd3c
SHA256aff0d7c63d9f54d6c899c45d36ca69449dcb66d084595dc3b730b2f0c2bb6cf0
SHA5122d35732cf895db8286090e95a8a7323920dfe27a6c0601d506f0f7df8eaa81157bbea02dde4dceb00208b3d55edc4697f2b3c1a4f2feb645fd896ce12bad2ed8
-
Filesize
262KB
MD5e2572333d883806e24435b137052bdca
SHA1ee38c8e82998188a9d6186510282a106b889bd3c
SHA256aff0d7c63d9f54d6c899c45d36ca69449dcb66d084595dc3b730b2f0c2bb6cf0
SHA5122d35732cf895db8286090e95a8a7323920dfe27a6c0601d506f0f7df8eaa81157bbea02dde4dceb00208b3d55edc4697f2b3c1a4f2feb645fd896ce12bad2ed8
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
Filesize
557KB
MD5ee5d452cc4ee71e1f544582bf6fca143
SHA1a193952075b2b4a83759098754e814a931b8ba90
SHA256f5cb9476e4b5576bb94eae1d278093b6470b0238226d4c05ec8c76747d57cbfe
SHA5127a935ae3df65b949c5e7f1ed93bd2173165ef4e347ceb5879725fbb995aedeef853b5b1dc4c4155d423f34d004f8a0df59258cefdad5f49e617d0a74764c896b
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6
-
Filesize
328KB
MD5bbaa394e6b0ecb7808722986b90d290c
SHA1682e835d7ea19c9aa3d464436d673e5c89ab2bb6
SHA256baa3acf778b3bcf4b7be932384799e8c95a5dc56c0faea8cbf7a33195ab47e73
SHA5122f3ef8921f36beaedf364d72f01af70aaa16acd3804343a1c5ff4f72b91333b4489d15c33c08b05695b216cbd024fc8783676dd98a907be3af8cb8a56c075f4f
-
Filesize
328KB
MD5bbaa394e6b0ecb7808722986b90d290c
SHA1682e835d7ea19c9aa3d464436d673e5c89ab2bb6
SHA256baa3acf778b3bcf4b7be932384799e8c95a5dc56c0faea8cbf7a33195ab47e73
SHA5122f3ef8921f36beaedf364d72f01af70aaa16acd3804343a1c5ff4f72b91333b4489d15c33c08b05695b216cbd024fc8783676dd98a907be3af8cb8a56c075f4f
-
Filesize
328KB
MD5bbaa394e6b0ecb7808722986b90d290c
SHA1682e835d7ea19c9aa3d464436d673e5c89ab2bb6
SHA256baa3acf778b3bcf4b7be932384799e8c95a5dc56c0faea8cbf7a33195ab47e73
SHA5122f3ef8921f36beaedf364d72f01af70aaa16acd3804343a1c5ff4f72b91333b4489d15c33c08b05695b216cbd024fc8783676dd98a907be3af8cb8a56c075f4f
-
Filesize
328KB
MD5bbaa394e6b0ecb7808722986b90d290c
SHA1682e835d7ea19c9aa3d464436d673e5c89ab2bb6
SHA256baa3acf778b3bcf4b7be932384799e8c95a5dc56c0faea8cbf7a33195ab47e73
SHA5122f3ef8921f36beaedf364d72f01af70aaa16acd3804343a1c5ff4f72b91333b4489d15c33c08b05695b216cbd024fc8783676dd98a907be3af8cb8a56c075f4f
-
Filesize
579KB
MD5ecf708ffb402f5956e63e73313d8c46f
SHA19333f29c771a162cdf3b00a07ea6a94623e33762
SHA25657c011aeceb54ab58d9d2ea21a115ca66145c445e172492ace12cce697c0852e
SHA512f89cccaddff10ebe4200dbd9becc56327277522e32b6b0425ef57e334e806d26888c6f07ea76dd7c152fc83b173a2975006e61f84b0a5348687d1e256bd00c91
-
Filesize
579KB
MD5ecf708ffb402f5956e63e73313d8c46f
SHA19333f29c771a162cdf3b00a07ea6a94623e33762
SHA25657c011aeceb54ab58d9d2ea21a115ca66145c445e172492ace12cce697c0852e
SHA512f89cccaddff10ebe4200dbd9becc56327277522e32b6b0425ef57e334e806d26888c6f07ea76dd7c152fc83b173a2975006e61f84b0a5348687d1e256bd00c91
-
Filesize
579KB
MD5ecf708ffb402f5956e63e73313d8c46f
SHA19333f29c771a162cdf3b00a07ea6a94623e33762
SHA25657c011aeceb54ab58d9d2ea21a115ca66145c445e172492ace12cce697c0852e
SHA512f89cccaddff10ebe4200dbd9becc56327277522e32b6b0425ef57e334e806d26888c6f07ea76dd7c152fc83b173a2975006e61f84b0a5348687d1e256bd00c91
-
Filesize
299KB
MD56b343cd7dea3ae28d0819bc55a2f86fe
SHA1cedd49849a5dd678d0a55da607e9b28a9680073c
SHA2564240b655ed2af5ae8873b49e2e2d204383b2fd675c21f02527a9a4d9b719cd49
SHA5127c28ba260fe53879b6e8f69d65c4263d454d75033889162d000c421695e634aeb13f4d4c2b999934f8eb2e58d62913764f1590689925e120600155d8390d0a48
-
Filesize
299KB
MD56b343cd7dea3ae28d0819bc55a2f86fe
SHA1cedd49849a5dd678d0a55da607e9b28a9680073c
SHA2564240b655ed2af5ae8873b49e2e2d204383b2fd675c21f02527a9a4d9b719cd49
SHA5127c28ba260fe53879b6e8f69d65c4263d454d75033889162d000c421695e634aeb13f4d4c2b999934f8eb2e58d62913764f1590689925e120600155d8390d0a48
-
Filesize
299KB
MD56b343cd7dea3ae28d0819bc55a2f86fe
SHA1cedd49849a5dd678d0a55da607e9b28a9680073c
SHA2564240b655ed2af5ae8873b49e2e2d204383b2fd675c21f02527a9a4d9b719cd49
SHA5127c28ba260fe53879b6e8f69d65c4263d454d75033889162d000c421695e634aeb13f4d4c2b999934f8eb2e58d62913764f1590689925e120600155d8390d0a48
-
Filesize
299KB
MD56b343cd7dea3ae28d0819bc55a2f86fe
SHA1cedd49849a5dd678d0a55da607e9b28a9680073c
SHA2564240b655ed2af5ae8873b49e2e2d204383b2fd675c21f02527a9a4d9b719cd49
SHA5127c28ba260fe53879b6e8f69d65c4263d454d75033889162d000c421695e634aeb13f4d4c2b999934f8eb2e58d62913764f1590689925e120600155d8390d0a48
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
89KB
MD5d3074d3a19629c3c6a533c86733e044e
SHA15b15823311f97036dbaf4a3418c6f50ffade0eb9
SHA256b1f486289739badf85c2266b7c2bbbc6c620b05a6084081d09d0911c51f7c401
SHA5127dd731fd26085d2a4f3963acd758a42a457e355117b50478bc053180cb189f5f3428806e29d29adfb96370067ff45e36950842de18b658524b72019027be62cf
-
Filesize
89KB
MD5d3074d3a19629c3c6a533c86733e044e
SHA15b15823311f97036dbaf4a3418c6f50ffade0eb9
SHA256b1f486289739badf85c2266b7c2bbbc6c620b05a6084081d09d0911c51f7c401
SHA5127dd731fd26085d2a4f3963acd758a42a457e355117b50478bc053180cb189f5f3428806e29d29adfb96370067ff45e36950842de18b658524b72019027be62cf
-
Filesize
89KB
MD5d3074d3a19629c3c6a533c86733e044e
SHA15b15823311f97036dbaf4a3418c6f50ffade0eb9
SHA256b1f486289739badf85c2266b7c2bbbc6c620b05a6084081d09d0911c51f7c401
SHA5127dd731fd26085d2a4f3963acd758a42a457e355117b50478bc053180cb189f5f3428806e29d29adfb96370067ff45e36950842de18b658524b72019027be62cf
-
Filesize
1.0MB
MD52c4e958144bd089aa93a564721ed28bb
SHA138ef85f66b7fdc293661e91ba69f31598c5b5919
SHA256b597b1c638ae81f03ec4baafa68dda316d57e6398fe095a58ecc89e8bcc61855
SHA512a0e3b82bbb458018e368cb921ed57d3720945e7e7f779c85103370a1ae65ff0120e1b5bad399b9315be5c3e970795734c8a82baf3783154408be635b860ee9e6
-
Filesize
1.0MB
MD52c4e958144bd089aa93a564721ed28bb
SHA138ef85f66b7fdc293661e91ba69f31598c5b5919
SHA256b597b1c638ae81f03ec4baafa68dda316d57e6398fe095a58ecc89e8bcc61855
SHA512a0e3b82bbb458018e368cb921ed57d3720945e7e7f779c85103370a1ae65ff0120e1b5bad399b9315be5c3e970795734c8a82baf3783154408be635b860ee9e6
-
Filesize
1.0MB
MD52c4e958144bd089aa93a564721ed28bb
SHA138ef85f66b7fdc293661e91ba69f31598c5b5919
SHA256b597b1c638ae81f03ec4baafa68dda316d57e6398fe095a58ecc89e8bcc61855
SHA512a0e3b82bbb458018e368cb921ed57d3720945e7e7f779c85103370a1ae65ff0120e1b5bad399b9315be5c3e970795734c8a82baf3783154408be635b860ee9e6
-
Filesize
1.0MB
MD52c4e958144bd089aa93a564721ed28bb
SHA138ef85f66b7fdc293661e91ba69f31598c5b5919
SHA256b597b1c638ae81f03ec4baafa68dda316d57e6398fe095a58ecc89e8bcc61855
SHA512a0e3b82bbb458018e368cb921ed57d3720945e7e7f779c85103370a1ae65ff0120e1b5bad399b9315be5c3e970795734c8a82baf3783154408be635b860ee9e6
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
262KB
MD5e2572333d883806e24435b137052bdca
SHA1ee38c8e82998188a9d6186510282a106b889bd3c
SHA256aff0d7c63d9f54d6c899c45d36ca69449dcb66d084595dc3b730b2f0c2bb6cf0
SHA5122d35732cf895db8286090e95a8a7323920dfe27a6c0601d506f0f7df8eaa81157bbea02dde4dceb00208b3d55edc4697f2b3c1a4f2feb645fd896ce12bad2ed8
-
Filesize
356KB
MD5d5e7b073a42ebb95571c8a83064c9215
SHA189533d0f2641cba9271200cdda0ba12f6db47f7c
SHA256df25c3481e720e03599d17ea479390fa89445c77b9c85fa2935df3202de8e15e
SHA512f2a19f2f5abee2bf7c786044a65e1d7e4be0bd051e792a711bafedfba52cacba3ef41a8bd2036507c0a99fce1ba929f4d8fd133133585b4b4bdf54e62a7f7f2c