Analysis
-
max time kernel
113s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22-03-2023 19:31
Static task
static1
Behavioral task
behavioral1
Sample
1e0a9a6a6dbc719a4326c333ee95bbe6.exe
Resource
win7-20230220-en
General
-
Target
1e0a9a6a6dbc719a4326c333ee95bbe6.exe
-
Size
1014KB
-
MD5
1e0a9a6a6dbc719a4326c333ee95bbe6
-
SHA1
8c440628251c732a94c8bf0fe700578eb0a00477
-
SHA256
f4aef4e4264c997d4475ab1f26bc08d64cf1a7f4a49d44a651b4a5f6474179d3
-
SHA512
5279ed48b9b56ed6f3e33038822e2aead507beae7c28f8a36b03974d17c7a932d893905f5ea83ae54e8a6e7f9b887574860b6782aea89e1b2aaaa246ecb1244f
-
SSDEEP
24576:AyzUhB8R5d6QMYqrwgKCkP7ewkaGyUbg30BIr:HYhM5UZYq6f5FGM38I
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
sint
193.233.20.31:4125
-
auth_value
9d9b763b4dcfbff1c06ef4743cc0399e
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v3771vp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz3771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz3771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v3771vp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v3771vp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v3771vp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v3771vp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz3771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz3771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz3771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz3771.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1628-149-0x00000000021A0000-0x00000000021E6000-memory.dmp family_redline behavioral1/memory/1628-150-0x00000000022F0000-0x0000000002334000-memory.dmp family_redline behavioral1/memory/1628-151-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-152-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-154-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-158-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-156-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-160-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-164-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-162-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-166-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-170-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-168-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-172-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-174-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-176-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-178-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-180-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-182-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-184-0x00000000022F0000-0x000000000232E000-memory.dmp family_redline behavioral1/memory/1628-1061-0x0000000004BC0000-0x0000000004C00000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 11 IoCs
pid Process 1772 zap1561.exe 1932 zap9767.exe 704 zap6174.exe 592 tz3771.exe 484 v3771vp.exe 1628 w47cT85.exe 1348 xyYgn07.exe 1264 y39CR05.exe 1284 legenda.exe 1872 ss47.exe 812 legenda.exe -
Loads dropped DLL 25 IoCs
pid Process 1408 1e0a9a6a6dbc719a4326c333ee95bbe6.exe 1772 zap1561.exe 1772 zap1561.exe 1932 zap9767.exe 1932 zap9767.exe 704 zap6174.exe 704 zap6174.exe 704 zap6174.exe 704 zap6174.exe 484 v3771vp.exe 1932 zap9767.exe 1932 zap9767.exe 1628 w47cT85.exe 1772 zap1561.exe 1348 xyYgn07.exe 1408 1e0a9a6a6dbc719a4326c333ee95bbe6.exe 1264 y39CR05.exe 1264 y39CR05.exe 1284 legenda.exe 1284 legenda.exe 1872 ss47.exe 1752 rundll32.exe 1752 rundll32.exe 1752 rundll32.exe 1752 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features tz3771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz3771.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features v3771vp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v3771vp.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap6174.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1e0a9a6a6dbc719a4326c333ee95bbe6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1e0a9a6a6dbc719a4326c333ee95bbe6.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap1561.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap1561.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap9767.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap9767.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap6174.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 572 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 592 tz3771.exe 592 tz3771.exe 484 v3771vp.exe 484 v3771vp.exe 1628 w47cT85.exe 1628 w47cT85.exe 1348 xyYgn07.exe 1348 xyYgn07.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 592 tz3771.exe Token: SeDebugPrivilege 484 v3771vp.exe Token: SeDebugPrivilege 1628 w47cT85.exe Token: SeDebugPrivilege 1348 xyYgn07.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1772 1408 1e0a9a6a6dbc719a4326c333ee95bbe6.exe 28 PID 1408 wrote to memory of 1772 1408 1e0a9a6a6dbc719a4326c333ee95bbe6.exe 28 PID 1408 wrote to memory of 1772 1408 1e0a9a6a6dbc719a4326c333ee95bbe6.exe 28 PID 1408 wrote to memory of 1772 1408 1e0a9a6a6dbc719a4326c333ee95bbe6.exe 28 PID 1408 wrote to memory of 1772 1408 1e0a9a6a6dbc719a4326c333ee95bbe6.exe 28 PID 1408 wrote to memory of 1772 1408 1e0a9a6a6dbc719a4326c333ee95bbe6.exe 28 PID 1408 wrote to memory of 1772 1408 1e0a9a6a6dbc719a4326c333ee95bbe6.exe 28 PID 1772 wrote to memory of 1932 1772 zap1561.exe 29 PID 1772 wrote to memory of 1932 1772 zap1561.exe 29 PID 1772 wrote to memory of 1932 1772 zap1561.exe 29 PID 1772 wrote to memory of 1932 1772 zap1561.exe 29 PID 1772 wrote to memory of 1932 1772 zap1561.exe 29 PID 1772 wrote to memory of 1932 1772 zap1561.exe 29 PID 1772 wrote to memory of 1932 1772 zap1561.exe 29 PID 1932 wrote to memory of 704 1932 zap9767.exe 30 PID 1932 wrote to memory of 704 1932 zap9767.exe 30 PID 1932 wrote to memory of 704 1932 zap9767.exe 30 PID 1932 wrote to memory of 704 1932 zap9767.exe 30 PID 1932 wrote to memory of 704 1932 zap9767.exe 30 PID 1932 wrote to memory of 704 1932 zap9767.exe 30 PID 1932 wrote to memory of 704 1932 zap9767.exe 30 PID 704 wrote to memory of 592 704 zap6174.exe 31 PID 704 wrote to memory of 592 704 zap6174.exe 31 PID 704 wrote to memory of 592 704 zap6174.exe 31 PID 704 wrote to memory of 592 704 zap6174.exe 31 PID 704 wrote to memory of 592 704 zap6174.exe 31 PID 704 wrote to memory of 592 704 zap6174.exe 31 PID 704 wrote to memory of 592 704 zap6174.exe 31 PID 704 wrote to memory of 484 704 zap6174.exe 32 PID 704 wrote to memory of 484 704 zap6174.exe 32 PID 704 wrote to memory of 484 704 zap6174.exe 32 PID 704 wrote to memory of 484 704 zap6174.exe 32 PID 704 wrote to memory of 484 704 zap6174.exe 32 PID 704 wrote to memory of 484 704 zap6174.exe 32 PID 704 wrote to memory of 484 704 zap6174.exe 32 PID 1932 wrote to memory of 1628 1932 zap9767.exe 33 PID 1932 wrote to memory of 1628 1932 zap9767.exe 33 PID 1932 wrote to memory of 1628 1932 zap9767.exe 33 PID 1932 wrote to memory of 1628 1932 zap9767.exe 33 PID 1932 wrote to memory of 1628 1932 zap9767.exe 33 PID 1932 wrote to memory of 1628 1932 zap9767.exe 33 PID 1932 wrote to memory of 1628 1932 zap9767.exe 33 PID 1772 wrote to memory of 1348 1772 zap1561.exe 35 PID 1772 wrote to memory of 1348 1772 zap1561.exe 35 PID 1772 wrote to memory of 1348 1772 zap1561.exe 35 PID 1772 wrote to memory of 1348 1772 zap1561.exe 35 PID 1772 wrote to memory of 1348 1772 zap1561.exe 35 PID 1772 wrote to memory of 1348 1772 zap1561.exe 35 PID 1772 wrote to memory of 1348 1772 zap1561.exe 35 PID 1408 wrote to memory of 1264 1408 1e0a9a6a6dbc719a4326c333ee95bbe6.exe 36 PID 1408 wrote to memory of 1264 1408 1e0a9a6a6dbc719a4326c333ee95bbe6.exe 36 PID 1408 wrote to memory of 1264 1408 1e0a9a6a6dbc719a4326c333ee95bbe6.exe 36 PID 1408 wrote to memory of 1264 1408 1e0a9a6a6dbc719a4326c333ee95bbe6.exe 36 PID 1408 wrote to memory of 1264 1408 1e0a9a6a6dbc719a4326c333ee95bbe6.exe 36 PID 1408 wrote to memory of 1264 1408 1e0a9a6a6dbc719a4326c333ee95bbe6.exe 36 PID 1408 wrote to memory of 1264 1408 1e0a9a6a6dbc719a4326c333ee95bbe6.exe 36 PID 1264 wrote to memory of 1284 1264 y39CR05.exe 37 PID 1264 wrote to memory of 1284 1264 y39CR05.exe 37 PID 1264 wrote to memory of 1284 1264 y39CR05.exe 37 PID 1264 wrote to memory of 1284 1264 y39CR05.exe 37 PID 1264 wrote to memory of 1284 1264 y39CR05.exe 37 PID 1264 wrote to memory of 1284 1264 y39CR05.exe 37 PID 1264 wrote to memory of 1284 1264 y39CR05.exe 37 PID 1284 wrote to memory of 572 1284 legenda.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e0a9a6a6dbc719a4326c333ee95bbe6.exe"C:\Users\Admin\AppData\Local\Temp\1e0a9a6a6dbc719a4326c333ee95bbe6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1561.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1561.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9767.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9767.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6174.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6174.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3771.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3771.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:592
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3771vp.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3771vp.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:484
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w47cT85.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w47cT85.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xyYgn07.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xyYgn07.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y39CR05.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y39CR05.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F4⤵
- Creates scheduled task(s)
PID:572
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit4⤵PID:1028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1508
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:N"5⤵PID:616
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:R" /E5⤵PID:600
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1684
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:N"5⤵PID:1512
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:R" /E5⤵PID:108
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000130001\ss47.exe"C:\Users\Admin\AppData\Local\Temp\1000130001\ss47.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1872
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1752
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {66229F8E-407A-44B8-9E6E-1EC02AFF4F3C} S-1-5-21-3430344531-3702557399-3004411149-1000:WFSTZEPN\Admin:Interactive:[1]1⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe2⤵
- Executes dropped EXE
PID:812
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
863KB
MD530e80be6e2b7742c20a2ee21ba2ec855
SHA1863423c37d5c7dec6a8de8fd852c8578b99918d5
SHA2565c6620b72c4698f0cece06137dfc9bdc04d893261f7b358c1675c79d6de25fef
SHA51225ef3ea1c7546e2805a8f298f25ceaccf8e41bc423886caa2a465bf4a5e9c7ee992196ae8f73ef9ab0861acea4284a726902454da9f63adfade80bb258bee677
-
Filesize
863KB
MD530e80be6e2b7742c20a2ee21ba2ec855
SHA1863423c37d5c7dec6a8de8fd852c8578b99918d5
SHA2565c6620b72c4698f0cece06137dfc9bdc04d893261f7b358c1675c79d6de25fef
SHA51225ef3ea1c7546e2805a8f298f25ceaccf8e41bc423886caa2a465bf4a5e9c7ee992196ae8f73ef9ab0861acea4284a726902454da9f63adfade80bb258bee677
-
Filesize
863KB
MD530e80be6e2b7742c20a2ee21ba2ec855
SHA1863423c37d5c7dec6a8de8fd852c8578b99918d5
SHA2565c6620b72c4698f0cece06137dfc9bdc04d893261f7b358c1675c79d6de25fef
SHA51225ef3ea1c7546e2805a8f298f25ceaccf8e41bc423886caa2a465bf4a5e9c7ee992196ae8f73ef9ab0861acea4284a726902454da9f63adfade80bb258bee677
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
829KB
MD57854727b70aa0ee12e5f48801055c508
SHA1e3b255c23772b767bcac431f2cd2841636eb1382
SHA256348731999eb9e4554b8611dbe1df96d5187e9e2db58976cf32c50e17fac61419
SHA512b89f5ca9b3d55a94b5ba157e38d489c31f54bfeb808bc775862d39c839d8f6a2a2d5b75e6a050fc18b2f1aceb3691de1e788aac7804cbafcddf43bea63c3ce15
-
Filesize
829KB
MD57854727b70aa0ee12e5f48801055c508
SHA1e3b255c23772b767bcac431f2cd2841636eb1382
SHA256348731999eb9e4554b8611dbe1df96d5187e9e2db58976cf32c50e17fac61419
SHA512b89f5ca9b3d55a94b5ba157e38d489c31f54bfeb808bc775862d39c839d8f6a2a2d5b75e6a050fc18b2f1aceb3691de1e788aac7804cbafcddf43bea63c3ce15
-
Filesize
175KB
MD587d8308e8cda648f980eaded98c6dd64
SHA18e1213fea55c704c3d133c4b8675b99a66c08fc1
SHA256dfb2378d9e691c98c02a4ebd3196a313185549e72cd0d770972ea47888889246
SHA51204add36bd3e21f02b1fa836caddfbc0a0adfa480f18a369a5974bf98e093f17f36ab68251d5acdda4d8a94458451953b1fcf6ab7706b5e7125fc852c5dc71200
-
Filesize
175KB
MD587d8308e8cda648f980eaded98c6dd64
SHA18e1213fea55c704c3d133c4b8675b99a66c08fc1
SHA256dfb2378d9e691c98c02a4ebd3196a313185549e72cd0d770972ea47888889246
SHA51204add36bd3e21f02b1fa836caddfbc0a0adfa480f18a369a5974bf98e093f17f36ab68251d5acdda4d8a94458451953b1fcf6ab7706b5e7125fc852c5dc71200
-
Filesize
687KB
MD54be9defe39f603aa1af7d0b0ad75962e
SHA1740fc24871ed32e0bead9c532ed6ac2d1b7c4701
SHA256901a6fc085141a4d6e4ebc6d51467d2cbe73ce1cba9f10eddfb5fac7f8f75c89
SHA5121b3556e36be0ce788fba4773d44768e69ad4e57b717de4d4d2fa74774e3900309a5c3a8c386c56bec3972f64cff0aef0f728e086bf4da9609b1322d67af4f0b7
-
Filesize
687KB
MD54be9defe39f603aa1af7d0b0ad75962e
SHA1740fc24871ed32e0bead9c532ed6ac2d1b7c4701
SHA256901a6fc085141a4d6e4ebc6d51467d2cbe73ce1cba9f10eddfb5fac7f8f75c89
SHA5121b3556e36be0ce788fba4773d44768e69ad4e57b717de4d4d2fa74774e3900309a5c3a8c386c56bec3972f64cff0aef0f728e086bf4da9609b1322d67af4f0b7
-
Filesize
473KB
MD5c26ff0f9d1b7b81d6125da172edc4323
SHA13bfb26887c0aa6bc29bcb468155c030b115a2a9a
SHA256559710eb013b5b6bfda85d7d9b6e17869fb1520c489fabc38c974cbe5a162a69
SHA512c4cefcfdfb5f3ac4587495d82e6edbc9e2445a4ea70267f75a45748d5ad13fb711fa36bddde710c0b9feb9f979a5cf10b26770006e046d77613ea6158e905b6a
-
Filesize
473KB
MD5c26ff0f9d1b7b81d6125da172edc4323
SHA13bfb26887c0aa6bc29bcb468155c030b115a2a9a
SHA256559710eb013b5b6bfda85d7d9b6e17869fb1520c489fabc38c974cbe5a162a69
SHA512c4cefcfdfb5f3ac4587495d82e6edbc9e2445a4ea70267f75a45748d5ad13fb711fa36bddde710c0b9feb9f979a5cf10b26770006e046d77613ea6158e905b6a
-
Filesize
473KB
MD5c26ff0f9d1b7b81d6125da172edc4323
SHA13bfb26887c0aa6bc29bcb468155c030b115a2a9a
SHA256559710eb013b5b6bfda85d7d9b6e17869fb1520c489fabc38c974cbe5a162a69
SHA512c4cefcfdfb5f3ac4587495d82e6edbc9e2445a4ea70267f75a45748d5ad13fb711fa36bddde710c0b9feb9f979a5cf10b26770006e046d77613ea6158e905b6a
-
Filesize
340KB
MD565fab239f085f68fb55cc2ca4318e5dc
SHA1fbea0f7827bcf53d0b2c76beb3d17abfefbb1dec
SHA2565679cd3acadd2f0ad8ee0ccdc4aad7313438514ee2559b1310f258316917965a
SHA51256562d2d7f182247260a55030e67dc2f7a5ecc3e52c1dbe24c60ece5e75c2a76ec94fb3a8ce8de8d575640c88c72fc1c6122007a4e6a3249a6c6c9bf4f4f7cb7
-
Filesize
340KB
MD565fab239f085f68fb55cc2ca4318e5dc
SHA1fbea0f7827bcf53d0b2c76beb3d17abfefbb1dec
SHA2565679cd3acadd2f0ad8ee0ccdc4aad7313438514ee2559b1310f258316917965a
SHA51256562d2d7f182247260a55030e67dc2f7a5ecc3e52c1dbe24c60ece5e75c2a76ec94fb3a8ce8de8d575640c88c72fc1c6122007a4e6a3249a6c6c9bf4f4f7cb7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
415KB
MD5edaa104de6c62cf9a6edc880e01bc99e
SHA18909ecf34cca4515371469e9b4d0e85e4f222048
SHA25680c0a354bc7af4b38747ee98109f3ca56fe3ac71ca8e3aba9c3fa89d35878c77
SHA5128f1390365b83fc0df3ec7959792dd155edcc5b6d48541e30b44b6cfd38584674f212211a64edb007cd61084b078c5fa15421a20efd21ff5b4172548bbf11645e
-
Filesize
415KB
MD5edaa104de6c62cf9a6edc880e01bc99e
SHA18909ecf34cca4515371469e9b4d0e85e4f222048
SHA25680c0a354bc7af4b38747ee98109f3ca56fe3ac71ca8e3aba9c3fa89d35878c77
SHA5128f1390365b83fc0df3ec7959792dd155edcc5b6d48541e30b44b6cfd38584674f212211a64edb007cd61084b078c5fa15421a20efd21ff5b4172548bbf11645e
-
Filesize
415KB
MD5edaa104de6c62cf9a6edc880e01bc99e
SHA18909ecf34cca4515371469e9b4d0e85e4f222048
SHA25680c0a354bc7af4b38747ee98109f3ca56fe3ac71ca8e3aba9c3fa89d35878c77
SHA5128f1390365b83fc0df3ec7959792dd155edcc5b6d48541e30b44b6cfd38584674f212211a64edb007cd61084b078c5fa15421a20efd21ff5b4172548bbf11645e
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
223B
MD594cbeec5d4343918fd0e48760e40539c
SHA1a049266c5c1131f692f306c8710d7e72586ae79d
SHA25648eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA5124e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0
-
Filesize
863KB
MD530e80be6e2b7742c20a2ee21ba2ec855
SHA1863423c37d5c7dec6a8de8fd852c8578b99918d5
SHA2565c6620b72c4698f0cece06137dfc9bdc04d893261f7b358c1675c79d6de25fef
SHA51225ef3ea1c7546e2805a8f298f25ceaccf8e41bc423886caa2a465bf4a5e9c7ee992196ae8f73ef9ab0861acea4284a726902454da9f63adfade80bb258bee677
-
Filesize
863KB
MD530e80be6e2b7742c20a2ee21ba2ec855
SHA1863423c37d5c7dec6a8de8fd852c8578b99918d5
SHA2565c6620b72c4698f0cece06137dfc9bdc04d893261f7b358c1675c79d6de25fef
SHA51225ef3ea1c7546e2805a8f298f25ceaccf8e41bc423886caa2a465bf4a5e9c7ee992196ae8f73ef9ab0861acea4284a726902454da9f63adfade80bb258bee677
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
829KB
MD57854727b70aa0ee12e5f48801055c508
SHA1e3b255c23772b767bcac431f2cd2841636eb1382
SHA256348731999eb9e4554b8611dbe1df96d5187e9e2db58976cf32c50e17fac61419
SHA512b89f5ca9b3d55a94b5ba157e38d489c31f54bfeb808bc775862d39c839d8f6a2a2d5b75e6a050fc18b2f1aceb3691de1e788aac7804cbafcddf43bea63c3ce15
-
Filesize
829KB
MD57854727b70aa0ee12e5f48801055c508
SHA1e3b255c23772b767bcac431f2cd2841636eb1382
SHA256348731999eb9e4554b8611dbe1df96d5187e9e2db58976cf32c50e17fac61419
SHA512b89f5ca9b3d55a94b5ba157e38d489c31f54bfeb808bc775862d39c839d8f6a2a2d5b75e6a050fc18b2f1aceb3691de1e788aac7804cbafcddf43bea63c3ce15
-
Filesize
175KB
MD587d8308e8cda648f980eaded98c6dd64
SHA18e1213fea55c704c3d133c4b8675b99a66c08fc1
SHA256dfb2378d9e691c98c02a4ebd3196a313185549e72cd0d770972ea47888889246
SHA51204add36bd3e21f02b1fa836caddfbc0a0adfa480f18a369a5974bf98e093f17f36ab68251d5acdda4d8a94458451953b1fcf6ab7706b5e7125fc852c5dc71200
-
Filesize
175KB
MD587d8308e8cda648f980eaded98c6dd64
SHA18e1213fea55c704c3d133c4b8675b99a66c08fc1
SHA256dfb2378d9e691c98c02a4ebd3196a313185549e72cd0d770972ea47888889246
SHA51204add36bd3e21f02b1fa836caddfbc0a0adfa480f18a369a5974bf98e093f17f36ab68251d5acdda4d8a94458451953b1fcf6ab7706b5e7125fc852c5dc71200
-
Filesize
687KB
MD54be9defe39f603aa1af7d0b0ad75962e
SHA1740fc24871ed32e0bead9c532ed6ac2d1b7c4701
SHA256901a6fc085141a4d6e4ebc6d51467d2cbe73ce1cba9f10eddfb5fac7f8f75c89
SHA5121b3556e36be0ce788fba4773d44768e69ad4e57b717de4d4d2fa74774e3900309a5c3a8c386c56bec3972f64cff0aef0f728e086bf4da9609b1322d67af4f0b7
-
Filesize
687KB
MD54be9defe39f603aa1af7d0b0ad75962e
SHA1740fc24871ed32e0bead9c532ed6ac2d1b7c4701
SHA256901a6fc085141a4d6e4ebc6d51467d2cbe73ce1cba9f10eddfb5fac7f8f75c89
SHA5121b3556e36be0ce788fba4773d44768e69ad4e57b717de4d4d2fa74774e3900309a5c3a8c386c56bec3972f64cff0aef0f728e086bf4da9609b1322d67af4f0b7
-
Filesize
473KB
MD5c26ff0f9d1b7b81d6125da172edc4323
SHA13bfb26887c0aa6bc29bcb468155c030b115a2a9a
SHA256559710eb013b5b6bfda85d7d9b6e17869fb1520c489fabc38c974cbe5a162a69
SHA512c4cefcfdfb5f3ac4587495d82e6edbc9e2445a4ea70267f75a45748d5ad13fb711fa36bddde710c0b9feb9f979a5cf10b26770006e046d77613ea6158e905b6a
-
Filesize
473KB
MD5c26ff0f9d1b7b81d6125da172edc4323
SHA13bfb26887c0aa6bc29bcb468155c030b115a2a9a
SHA256559710eb013b5b6bfda85d7d9b6e17869fb1520c489fabc38c974cbe5a162a69
SHA512c4cefcfdfb5f3ac4587495d82e6edbc9e2445a4ea70267f75a45748d5ad13fb711fa36bddde710c0b9feb9f979a5cf10b26770006e046d77613ea6158e905b6a
-
Filesize
473KB
MD5c26ff0f9d1b7b81d6125da172edc4323
SHA13bfb26887c0aa6bc29bcb468155c030b115a2a9a
SHA256559710eb013b5b6bfda85d7d9b6e17869fb1520c489fabc38c974cbe5a162a69
SHA512c4cefcfdfb5f3ac4587495d82e6edbc9e2445a4ea70267f75a45748d5ad13fb711fa36bddde710c0b9feb9f979a5cf10b26770006e046d77613ea6158e905b6a
-
Filesize
340KB
MD565fab239f085f68fb55cc2ca4318e5dc
SHA1fbea0f7827bcf53d0b2c76beb3d17abfefbb1dec
SHA2565679cd3acadd2f0ad8ee0ccdc4aad7313438514ee2559b1310f258316917965a
SHA51256562d2d7f182247260a55030e67dc2f7a5ecc3e52c1dbe24c60ece5e75c2a76ec94fb3a8ce8de8d575640c88c72fc1c6122007a4e6a3249a6c6c9bf4f4f7cb7
-
Filesize
340KB
MD565fab239f085f68fb55cc2ca4318e5dc
SHA1fbea0f7827bcf53d0b2c76beb3d17abfefbb1dec
SHA2565679cd3acadd2f0ad8ee0ccdc4aad7313438514ee2559b1310f258316917965a
SHA51256562d2d7f182247260a55030e67dc2f7a5ecc3e52c1dbe24c60ece5e75c2a76ec94fb3a8ce8de8d575640c88c72fc1c6122007a4e6a3249a6c6c9bf4f4f7cb7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
415KB
MD5edaa104de6c62cf9a6edc880e01bc99e
SHA18909ecf34cca4515371469e9b4d0e85e4f222048
SHA25680c0a354bc7af4b38747ee98109f3ca56fe3ac71ca8e3aba9c3fa89d35878c77
SHA5128f1390365b83fc0df3ec7959792dd155edcc5b6d48541e30b44b6cfd38584674f212211a64edb007cd61084b078c5fa15421a20efd21ff5b4172548bbf11645e
-
Filesize
415KB
MD5edaa104de6c62cf9a6edc880e01bc99e
SHA18909ecf34cca4515371469e9b4d0e85e4f222048
SHA25680c0a354bc7af4b38747ee98109f3ca56fe3ac71ca8e3aba9c3fa89d35878c77
SHA5128f1390365b83fc0df3ec7959792dd155edcc5b6d48541e30b44b6cfd38584674f212211a64edb007cd61084b078c5fa15421a20efd21ff5b4172548bbf11645e
-
Filesize
415KB
MD5edaa104de6c62cf9a6edc880e01bc99e
SHA18909ecf34cca4515371469e9b4d0e85e4f222048
SHA25680c0a354bc7af4b38747ee98109f3ca56fe3ac71ca8e3aba9c3fa89d35878c77
SHA5128f1390365b83fc0df3ec7959792dd155edcc5b6d48541e30b44b6cfd38584674f212211a64edb007cd61084b078c5fa15421a20efd21ff5b4172548bbf11645e
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2