Analysis
-
max time kernel
169s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2023 02:27
Static task
static1
Behavioral task
behavioral1
Sample
5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exe
Resource
win10v2004-20230220-en
General
-
Target
5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exe
-
Size
1.6MB
-
MD5
aec89ff0b1a792b6e454239c91e209b8
-
SHA1
6cf3f5866bbddfcc5ba1fd98241502e354c9735a
-
SHA256
5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0
-
SHA512
fb3096573d768549cdf6716150f6d8198edeb02224ff7ab9241da522a86248b50f795dd50179b1b5180e03247848c4f590f66f324ce4cf3873c9481f5f8bc6e7
-
SSDEEP
24576:EysIEELq7XWiVAz+QMXMfHot6goAP1JBni2ctmrIIGwWLPbDvtWnA:TsIE+CtWz+9XMfItr5XBn6c4nnz8
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
most
185.161.248.73:4164
-
auth_value
7da4dfa153f2919e617aa016f7c36008
Signatures
-
Processes:
b19471283.exe1.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b19471283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b19471283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b19471283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b19471283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b19471283.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 14 IoCs
Processes:
Yf177598.exeBL812718.exegS840389.exelP939020.exea26223903.exe1.exeb19471283.exec38960759.exeoneetx.exed33191375.exe1.exef53434405.exeoneetx.exeoneetx.exepid process 1104 Yf177598.exe 340 BL812718.exe 860 gS840389.exe 1108 lP939020.exe 1660 a26223903.exe 752 1.exe 1872 b19471283.exe 1708 c38960759.exe 1204 oneetx.exe 1540 d33191375.exe 1780 1.exe 520 f53434405.exe 1688 oneetx.exe 940 oneetx.exe -
Loads dropped DLL 25 IoCs
Processes:
5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exeYf177598.exeBL812718.exegS840389.exelP939020.exea26223903.exeb19471283.exec38960759.exeoneetx.exed33191375.exe1.exef53434405.exepid process 1360 5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exe 1104 Yf177598.exe 1104 Yf177598.exe 340 BL812718.exe 340 BL812718.exe 860 gS840389.exe 860 gS840389.exe 1108 lP939020.exe 1108 lP939020.exe 1660 a26223903.exe 1660 a26223903.exe 1108 lP939020.exe 1108 lP939020.exe 1872 b19471283.exe 860 gS840389.exe 1708 c38960759.exe 1708 c38960759.exe 340 BL812718.exe 1204 oneetx.exe 340 BL812718.exe 1540 d33191375.exe 1540 d33191375.exe 1780 1.exe 1104 Yf177598.exe 520 f53434405.exe -
Processes:
1.exeb19471283.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features b19471283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b19471283.exe -
Adds Run key to start application 2 TTPs 10 IoCs
Processes:
5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exeYf177598.exegS840389.exeBL812718.exelP939020.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce Yf177598.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce gS840389.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Yf177598.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce BL812718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" BL812718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" gS840389.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce lP939020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" lP939020.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
1.exeb19471283.exepid process 752 1.exe 752 1.exe 1872 b19471283.exe 1872 b19471283.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
a26223903.exeb19471283.exe1.exed33191375.exedescription pid process Token: SeDebugPrivilege 1660 a26223903.exe Token: SeDebugPrivilege 1872 b19471283.exe Token: SeDebugPrivilege 752 1.exe Token: SeDebugPrivilege 1540 d33191375.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
c38960759.exepid process 1708 c38960759.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exeYf177598.exeBL812718.exegS840389.exelP939020.exea26223903.exec38960759.exedescription pid process target process PID 1360 wrote to memory of 1104 1360 5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exe Yf177598.exe PID 1360 wrote to memory of 1104 1360 5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exe Yf177598.exe PID 1360 wrote to memory of 1104 1360 5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exe Yf177598.exe PID 1360 wrote to memory of 1104 1360 5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exe Yf177598.exe PID 1360 wrote to memory of 1104 1360 5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exe Yf177598.exe PID 1360 wrote to memory of 1104 1360 5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exe Yf177598.exe PID 1360 wrote to memory of 1104 1360 5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exe Yf177598.exe PID 1104 wrote to memory of 340 1104 Yf177598.exe BL812718.exe PID 1104 wrote to memory of 340 1104 Yf177598.exe BL812718.exe PID 1104 wrote to memory of 340 1104 Yf177598.exe BL812718.exe PID 1104 wrote to memory of 340 1104 Yf177598.exe BL812718.exe PID 1104 wrote to memory of 340 1104 Yf177598.exe BL812718.exe PID 1104 wrote to memory of 340 1104 Yf177598.exe BL812718.exe PID 1104 wrote to memory of 340 1104 Yf177598.exe BL812718.exe PID 340 wrote to memory of 860 340 BL812718.exe gS840389.exe PID 340 wrote to memory of 860 340 BL812718.exe gS840389.exe PID 340 wrote to memory of 860 340 BL812718.exe gS840389.exe PID 340 wrote to memory of 860 340 BL812718.exe gS840389.exe PID 340 wrote to memory of 860 340 BL812718.exe gS840389.exe PID 340 wrote to memory of 860 340 BL812718.exe gS840389.exe PID 340 wrote to memory of 860 340 BL812718.exe gS840389.exe PID 860 wrote to memory of 1108 860 gS840389.exe lP939020.exe PID 860 wrote to memory of 1108 860 gS840389.exe lP939020.exe PID 860 wrote to memory of 1108 860 gS840389.exe lP939020.exe PID 860 wrote to memory of 1108 860 gS840389.exe lP939020.exe PID 860 wrote to memory of 1108 860 gS840389.exe lP939020.exe PID 860 wrote to memory of 1108 860 gS840389.exe lP939020.exe PID 860 wrote to memory of 1108 860 gS840389.exe lP939020.exe PID 1108 wrote to memory of 1660 1108 lP939020.exe a26223903.exe PID 1108 wrote to memory of 1660 1108 lP939020.exe a26223903.exe PID 1108 wrote to memory of 1660 1108 lP939020.exe a26223903.exe PID 1108 wrote to memory of 1660 1108 lP939020.exe a26223903.exe PID 1108 wrote to memory of 1660 1108 lP939020.exe a26223903.exe PID 1108 wrote to memory of 1660 1108 lP939020.exe a26223903.exe PID 1108 wrote to memory of 1660 1108 lP939020.exe a26223903.exe PID 1660 wrote to memory of 752 1660 a26223903.exe 1.exe PID 1660 wrote to memory of 752 1660 a26223903.exe 1.exe PID 1660 wrote to memory of 752 1660 a26223903.exe 1.exe PID 1660 wrote to memory of 752 1660 a26223903.exe 1.exe PID 1660 wrote to memory of 752 1660 a26223903.exe 1.exe PID 1660 wrote to memory of 752 1660 a26223903.exe 1.exe PID 1660 wrote to memory of 752 1660 a26223903.exe 1.exe PID 1108 wrote to memory of 1872 1108 lP939020.exe b19471283.exe PID 1108 wrote to memory of 1872 1108 lP939020.exe b19471283.exe PID 1108 wrote to memory of 1872 1108 lP939020.exe b19471283.exe PID 1108 wrote to memory of 1872 1108 lP939020.exe b19471283.exe PID 1108 wrote to memory of 1872 1108 lP939020.exe b19471283.exe PID 1108 wrote to memory of 1872 1108 lP939020.exe b19471283.exe PID 1108 wrote to memory of 1872 1108 lP939020.exe b19471283.exe PID 860 wrote to memory of 1708 860 gS840389.exe c38960759.exe PID 860 wrote to memory of 1708 860 gS840389.exe c38960759.exe PID 860 wrote to memory of 1708 860 gS840389.exe c38960759.exe PID 860 wrote to memory of 1708 860 gS840389.exe c38960759.exe PID 860 wrote to memory of 1708 860 gS840389.exe c38960759.exe PID 860 wrote to memory of 1708 860 gS840389.exe c38960759.exe PID 860 wrote to memory of 1708 860 gS840389.exe c38960759.exe PID 1708 wrote to memory of 1204 1708 c38960759.exe oneetx.exe PID 1708 wrote to memory of 1204 1708 c38960759.exe oneetx.exe PID 1708 wrote to memory of 1204 1708 c38960759.exe oneetx.exe PID 1708 wrote to memory of 1204 1708 c38960759.exe oneetx.exe PID 1708 wrote to memory of 1204 1708 c38960759.exe oneetx.exe PID 1708 wrote to memory of 1204 1708 c38960759.exe oneetx.exe PID 1708 wrote to memory of 1204 1708 c38960759.exe oneetx.exe PID 340 wrote to memory of 1540 340 BL812718.exe d33191375.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exe"C:\Users\Admin\AppData\Local\Temp\5c49d9f3f398e7bf0aa48b300bb1f1e8c60f39583ffdbbef574648afedf5a2d0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yf177598.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yf177598.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BL812718.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BL812718.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gS840389.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gS840389.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\lP939020.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\lP939020.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a26223903.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a26223903.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b19471283.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b19471283.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c38960759.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c38960759.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1204 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:864
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit7⤵PID:1752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1596
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:2000
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:1880
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"8⤵PID:1936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1276
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E8⤵PID:1636
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d33191375.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d33191375.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1780
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f53434405.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f53434405.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:520
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {74676725-0575-4973-9A14-BB64EF4B8EAA} S-1-5-21-3430344531-3702557399-3004411149-1000:WFSTZEPN\Admin:Interactive:[1]1⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe2⤵
- Executes dropped EXE
PID:940
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f054d458b8b903530dcac8f0255613d0
SHA11e5184d11095fcf8ecc0f3b2546dd7b7e1a78370
SHA25606239a3d7555dc94b4df265dcf8984491b68e2514318b069456ab8bd3476fa52
SHA512d49de6d3363835de552d10d6f66b3cb969221760bb9c76a04a8166641d65fe6a26f2be960060ccc32752e09ca5ec76d5e3c4b24c9ec235987677cc0a96a9defd
-
Filesize
1.3MB
MD5f054d458b8b903530dcac8f0255613d0
SHA11e5184d11095fcf8ecc0f3b2546dd7b7e1a78370
SHA25606239a3d7555dc94b4df265dcf8984491b68e2514318b069456ab8bd3476fa52
SHA512d49de6d3363835de552d10d6f66b3cb969221760bb9c76a04a8166641d65fe6a26f2be960060ccc32752e09ca5ec76d5e3c4b24c9ec235987677cc0a96a9defd
-
Filesize
1.2MB
MD5118cab242518c434b197ee2d15293b41
SHA128f00e6c793e39651c03682924ce2e03e720f60d
SHA256bb1dc2fbb72f2f291b2f814c27efc19c4258e17ce2b40f88d37305ed1d9b34ad
SHA5120c783d420a09e28b56429aa75d9bb2cb86bebd51d92f11b3eb71f74803ad216c2694d537e447c48ca96c458ca3bfd8f04d06c36a4473cf8f406c5683d23c45b0
-
Filesize
1.2MB
MD5118cab242518c434b197ee2d15293b41
SHA128f00e6c793e39651c03682924ce2e03e720f60d
SHA256bb1dc2fbb72f2f291b2f814c27efc19c4258e17ce2b40f88d37305ed1d9b34ad
SHA5120c783d420a09e28b56429aa75d9bb2cb86bebd51d92f11b3eb71f74803ad216c2694d537e447c48ca96c458ca3bfd8f04d06c36a4473cf8f406c5683d23c45b0
-
Filesize
169KB
MD55a2134f16ea4732bd1a8c6766ecafcbc
SHA160a94da5bdffbc1ea2faa4c812e73d9c394b241e
SHA256de639406e280e31879da2f13cc62d5711263eb81d7a3ae52ed10bb1ff186b16e
SHA512d4775cabf7fb5996a53ce1b76c05dc95687f2d45e1e43160968ce8a09e658e8794906ad91e4dd41741924dbf5853e9a61c461dafbe2688824ba7a79cbb2ea47e
-
Filesize
169KB
MD55a2134f16ea4732bd1a8c6766ecafcbc
SHA160a94da5bdffbc1ea2faa4c812e73d9c394b241e
SHA256de639406e280e31879da2f13cc62d5711263eb81d7a3ae52ed10bb1ff186b16e
SHA512d4775cabf7fb5996a53ce1b76c05dc95687f2d45e1e43160968ce8a09e658e8794906ad91e4dd41741924dbf5853e9a61c461dafbe2688824ba7a79cbb2ea47e
-
Filesize
574KB
MD52c014684401d650a6f41591f40e7dfec
SHA1130449ea6514239fafa78e52b9bbd93a267598b0
SHA2566e600e4170a99e1825fb8f082fc554d7a050f7e7afcd993b861a818607212ff0
SHA512665f06b45575f3a05781aa0acabe4064bd7a16a6d8bd9667467890c3f2a562d4b7d624eacf10e65612ddfbc76483fa4949bf4318afecb073cd058abcfc1836d8
-
Filesize
574KB
MD52c014684401d650a6f41591f40e7dfec
SHA1130449ea6514239fafa78e52b9bbd93a267598b0
SHA2566e600e4170a99e1825fb8f082fc554d7a050f7e7afcd993b861a818607212ff0
SHA512665f06b45575f3a05781aa0acabe4064bd7a16a6d8bd9667467890c3f2a562d4b7d624eacf10e65612ddfbc76483fa4949bf4318afecb073cd058abcfc1836d8
-
Filesize
574KB
MD52c014684401d650a6f41591f40e7dfec
SHA1130449ea6514239fafa78e52b9bbd93a267598b0
SHA2566e600e4170a99e1825fb8f082fc554d7a050f7e7afcd993b861a818607212ff0
SHA512665f06b45575f3a05781aa0acabe4064bd7a16a6d8bd9667467890c3f2a562d4b7d624eacf10e65612ddfbc76483fa4949bf4318afecb073cd058abcfc1836d8
-
Filesize
726KB
MD577bef85dabea4435ac28aa33263efe48
SHA1ff4252479aa441517d1d7ef52f50ddda2f668fe8
SHA256929cf8db8877a6a4f3b01195407d940083683afce051deb3c7dc3d9a02d364f5
SHA512731ebd053e44b9065089b3a80f1f19cf1087ccb53549880f5ccf7b87688c2eb469ddb6e38edb96f755b4450ae583f35d0ba4c6bb289b5a1d79ebdedc7dbbf042
-
Filesize
726KB
MD577bef85dabea4435ac28aa33263efe48
SHA1ff4252479aa441517d1d7ef52f50ddda2f668fe8
SHA256929cf8db8877a6a4f3b01195407d940083683afce051deb3c7dc3d9a02d364f5
SHA512731ebd053e44b9065089b3a80f1f19cf1087ccb53549880f5ccf7b87688c2eb469ddb6e38edb96f755b4450ae583f35d0ba4c6bb289b5a1d79ebdedc7dbbf042
-
Filesize
205KB
MD5b5b13701634e89bc5f2cbe1c3e007ba7
SHA1844f5a1166ddaf00ed368f61525d3bbe22dd6233
SHA256adaf9527bf2208fafb0ff35fda1788c3d8500ea61b15c9696ae074b44c41005a
SHA5124968eae18b95bc2885b58010b3b9393c5e2d1c508292f0198aa97dd5ca6c60bc446b79ba5c2e0fd563f2dca45194e5a6849ea1f99663dbd919bad5d7de91a806
-
Filesize
205KB
MD5b5b13701634e89bc5f2cbe1c3e007ba7
SHA1844f5a1166ddaf00ed368f61525d3bbe22dd6233
SHA256adaf9527bf2208fafb0ff35fda1788c3d8500ea61b15c9696ae074b44c41005a
SHA5124968eae18b95bc2885b58010b3b9393c5e2d1c508292f0198aa97dd5ca6c60bc446b79ba5c2e0fd563f2dca45194e5a6849ea1f99663dbd919bad5d7de91a806
-
Filesize
554KB
MD56e7aee0757ec97afe0243683b8054bcb
SHA1bcf959d216133ab8ccc796ba02e081f19a7ae14b
SHA2565507837ef09d98d20e6b6846898ac2e97c29c417058eb6c1abc39dd4a983d8c8
SHA51286b114502a7a5e95f04cdfbb034a05681f05ea8d12f28af7aa1e4a59818ad7da51566639a88e7fd3296ee65071788e4d1ca00b865b136b6b0f169313ff2b4bce
-
Filesize
554KB
MD56e7aee0757ec97afe0243683b8054bcb
SHA1bcf959d216133ab8ccc796ba02e081f19a7ae14b
SHA2565507837ef09d98d20e6b6846898ac2e97c29c417058eb6c1abc39dd4a983d8c8
SHA51286b114502a7a5e95f04cdfbb034a05681f05ea8d12f28af7aa1e4a59818ad7da51566639a88e7fd3296ee65071788e4d1ca00b865b136b6b0f169313ff2b4bce
-
Filesize
303KB
MD5497f358e50fa260c0ff63808c23c0bc9
SHA14e77e63c24209ce501865e2a38b714b50352ddc8
SHA2560e5211e652909b3da7f1ff49190fce636f3b2384dd664a4d486589544f223469
SHA512c9902bcf60f00fbb887df62ab2146e3ed89a8558fac04b3c57e232b81ca2af21925b3215d95a99ba9d01df6ab891add390ca0e6da01c707e1556fda13053b90e
-
Filesize
303KB
MD5497f358e50fa260c0ff63808c23c0bc9
SHA14e77e63c24209ce501865e2a38b714b50352ddc8
SHA2560e5211e652909b3da7f1ff49190fce636f3b2384dd664a4d486589544f223469
SHA512c9902bcf60f00fbb887df62ab2146e3ed89a8558fac04b3c57e232b81ca2af21925b3215d95a99ba9d01df6ab891add390ca0e6da01c707e1556fda13053b90e
-
Filesize
391KB
MD58be929e38dabbf105b36dde1e73a363d
SHA10092a9774f2ef2e3bcb164783965efb40d1eeb7f
SHA2564f95d97bdcf704b7e046e6a5c772fb5d39dde64a3f5798299e1cbd8a8471b868
SHA5121a31bed1b7e0b9fa5ad7e90467341424c08cd25bf53f9a918edd632d58007078dda1acde817bc5f0124e34ac139c8730ec9c6678cf9d35eeb600ab57b711e8da
-
Filesize
391KB
MD58be929e38dabbf105b36dde1e73a363d
SHA10092a9774f2ef2e3bcb164783965efb40d1eeb7f
SHA2564f95d97bdcf704b7e046e6a5c772fb5d39dde64a3f5798299e1cbd8a8471b868
SHA5121a31bed1b7e0b9fa5ad7e90467341424c08cd25bf53f9a918edd632d58007078dda1acde817bc5f0124e34ac139c8730ec9c6678cf9d35eeb600ab57b711e8da
-
Filesize
391KB
MD58be929e38dabbf105b36dde1e73a363d
SHA10092a9774f2ef2e3bcb164783965efb40d1eeb7f
SHA2564f95d97bdcf704b7e046e6a5c772fb5d39dde64a3f5798299e1cbd8a8471b868
SHA5121a31bed1b7e0b9fa5ad7e90467341424c08cd25bf53f9a918edd632d58007078dda1acde817bc5f0124e34ac139c8730ec9c6678cf9d35eeb600ab57b711e8da
-
Filesize
205KB
MD5b5b13701634e89bc5f2cbe1c3e007ba7
SHA1844f5a1166ddaf00ed368f61525d3bbe22dd6233
SHA256adaf9527bf2208fafb0ff35fda1788c3d8500ea61b15c9696ae074b44c41005a
SHA5124968eae18b95bc2885b58010b3b9393c5e2d1c508292f0198aa97dd5ca6c60bc446b79ba5c2e0fd563f2dca45194e5a6849ea1f99663dbd919bad5d7de91a806
-
Filesize
205KB
MD5b5b13701634e89bc5f2cbe1c3e007ba7
SHA1844f5a1166ddaf00ed368f61525d3bbe22dd6233
SHA256adaf9527bf2208fafb0ff35fda1788c3d8500ea61b15c9696ae074b44c41005a
SHA5124968eae18b95bc2885b58010b3b9393c5e2d1c508292f0198aa97dd5ca6c60bc446b79ba5c2e0fd563f2dca45194e5a6849ea1f99663dbd919bad5d7de91a806
-
Filesize
205KB
MD5b5b13701634e89bc5f2cbe1c3e007ba7
SHA1844f5a1166ddaf00ed368f61525d3bbe22dd6233
SHA256adaf9527bf2208fafb0ff35fda1788c3d8500ea61b15c9696ae074b44c41005a
SHA5124968eae18b95bc2885b58010b3b9393c5e2d1c508292f0198aa97dd5ca6c60bc446b79ba5c2e0fd563f2dca45194e5a6849ea1f99663dbd919bad5d7de91a806
-
Filesize
205KB
MD5b5b13701634e89bc5f2cbe1c3e007ba7
SHA1844f5a1166ddaf00ed368f61525d3bbe22dd6233
SHA256adaf9527bf2208fafb0ff35fda1788c3d8500ea61b15c9696ae074b44c41005a
SHA5124968eae18b95bc2885b58010b3b9393c5e2d1c508292f0198aa97dd5ca6c60bc446b79ba5c2e0fd563f2dca45194e5a6849ea1f99663dbd919bad5d7de91a806
-
Filesize
205KB
MD5b5b13701634e89bc5f2cbe1c3e007ba7
SHA1844f5a1166ddaf00ed368f61525d3bbe22dd6233
SHA256adaf9527bf2208fafb0ff35fda1788c3d8500ea61b15c9696ae074b44c41005a
SHA5124968eae18b95bc2885b58010b3b9393c5e2d1c508292f0198aa97dd5ca6c60bc446b79ba5c2e0fd563f2dca45194e5a6849ea1f99663dbd919bad5d7de91a806
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.3MB
MD5f054d458b8b903530dcac8f0255613d0
SHA11e5184d11095fcf8ecc0f3b2546dd7b7e1a78370
SHA25606239a3d7555dc94b4df265dcf8984491b68e2514318b069456ab8bd3476fa52
SHA512d49de6d3363835de552d10d6f66b3cb969221760bb9c76a04a8166641d65fe6a26f2be960060ccc32752e09ca5ec76d5e3c4b24c9ec235987677cc0a96a9defd
-
Filesize
1.3MB
MD5f054d458b8b903530dcac8f0255613d0
SHA11e5184d11095fcf8ecc0f3b2546dd7b7e1a78370
SHA25606239a3d7555dc94b4df265dcf8984491b68e2514318b069456ab8bd3476fa52
SHA512d49de6d3363835de552d10d6f66b3cb969221760bb9c76a04a8166641d65fe6a26f2be960060ccc32752e09ca5ec76d5e3c4b24c9ec235987677cc0a96a9defd
-
Filesize
1.2MB
MD5118cab242518c434b197ee2d15293b41
SHA128f00e6c793e39651c03682924ce2e03e720f60d
SHA256bb1dc2fbb72f2f291b2f814c27efc19c4258e17ce2b40f88d37305ed1d9b34ad
SHA5120c783d420a09e28b56429aa75d9bb2cb86bebd51d92f11b3eb71f74803ad216c2694d537e447c48ca96c458ca3bfd8f04d06c36a4473cf8f406c5683d23c45b0
-
Filesize
1.2MB
MD5118cab242518c434b197ee2d15293b41
SHA128f00e6c793e39651c03682924ce2e03e720f60d
SHA256bb1dc2fbb72f2f291b2f814c27efc19c4258e17ce2b40f88d37305ed1d9b34ad
SHA5120c783d420a09e28b56429aa75d9bb2cb86bebd51d92f11b3eb71f74803ad216c2694d537e447c48ca96c458ca3bfd8f04d06c36a4473cf8f406c5683d23c45b0
-
Filesize
169KB
MD55a2134f16ea4732bd1a8c6766ecafcbc
SHA160a94da5bdffbc1ea2faa4c812e73d9c394b241e
SHA256de639406e280e31879da2f13cc62d5711263eb81d7a3ae52ed10bb1ff186b16e
SHA512d4775cabf7fb5996a53ce1b76c05dc95687f2d45e1e43160968ce8a09e658e8794906ad91e4dd41741924dbf5853e9a61c461dafbe2688824ba7a79cbb2ea47e
-
Filesize
169KB
MD55a2134f16ea4732bd1a8c6766ecafcbc
SHA160a94da5bdffbc1ea2faa4c812e73d9c394b241e
SHA256de639406e280e31879da2f13cc62d5711263eb81d7a3ae52ed10bb1ff186b16e
SHA512d4775cabf7fb5996a53ce1b76c05dc95687f2d45e1e43160968ce8a09e658e8794906ad91e4dd41741924dbf5853e9a61c461dafbe2688824ba7a79cbb2ea47e
-
Filesize
574KB
MD52c014684401d650a6f41591f40e7dfec
SHA1130449ea6514239fafa78e52b9bbd93a267598b0
SHA2566e600e4170a99e1825fb8f082fc554d7a050f7e7afcd993b861a818607212ff0
SHA512665f06b45575f3a05781aa0acabe4064bd7a16a6d8bd9667467890c3f2a562d4b7d624eacf10e65612ddfbc76483fa4949bf4318afecb073cd058abcfc1836d8
-
Filesize
574KB
MD52c014684401d650a6f41591f40e7dfec
SHA1130449ea6514239fafa78e52b9bbd93a267598b0
SHA2566e600e4170a99e1825fb8f082fc554d7a050f7e7afcd993b861a818607212ff0
SHA512665f06b45575f3a05781aa0acabe4064bd7a16a6d8bd9667467890c3f2a562d4b7d624eacf10e65612ddfbc76483fa4949bf4318afecb073cd058abcfc1836d8
-
Filesize
574KB
MD52c014684401d650a6f41591f40e7dfec
SHA1130449ea6514239fafa78e52b9bbd93a267598b0
SHA2566e600e4170a99e1825fb8f082fc554d7a050f7e7afcd993b861a818607212ff0
SHA512665f06b45575f3a05781aa0acabe4064bd7a16a6d8bd9667467890c3f2a562d4b7d624eacf10e65612ddfbc76483fa4949bf4318afecb073cd058abcfc1836d8
-
Filesize
726KB
MD577bef85dabea4435ac28aa33263efe48
SHA1ff4252479aa441517d1d7ef52f50ddda2f668fe8
SHA256929cf8db8877a6a4f3b01195407d940083683afce051deb3c7dc3d9a02d364f5
SHA512731ebd053e44b9065089b3a80f1f19cf1087ccb53549880f5ccf7b87688c2eb469ddb6e38edb96f755b4450ae583f35d0ba4c6bb289b5a1d79ebdedc7dbbf042
-
Filesize
726KB
MD577bef85dabea4435ac28aa33263efe48
SHA1ff4252479aa441517d1d7ef52f50ddda2f668fe8
SHA256929cf8db8877a6a4f3b01195407d940083683afce051deb3c7dc3d9a02d364f5
SHA512731ebd053e44b9065089b3a80f1f19cf1087ccb53549880f5ccf7b87688c2eb469ddb6e38edb96f755b4450ae583f35d0ba4c6bb289b5a1d79ebdedc7dbbf042
-
Filesize
205KB
MD5b5b13701634e89bc5f2cbe1c3e007ba7
SHA1844f5a1166ddaf00ed368f61525d3bbe22dd6233
SHA256adaf9527bf2208fafb0ff35fda1788c3d8500ea61b15c9696ae074b44c41005a
SHA5124968eae18b95bc2885b58010b3b9393c5e2d1c508292f0198aa97dd5ca6c60bc446b79ba5c2e0fd563f2dca45194e5a6849ea1f99663dbd919bad5d7de91a806
-
Filesize
205KB
MD5b5b13701634e89bc5f2cbe1c3e007ba7
SHA1844f5a1166ddaf00ed368f61525d3bbe22dd6233
SHA256adaf9527bf2208fafb0ff35fda1788c3d8500ea61b15c9696ae074b44c41005a
SHA5124968eae18b95bc2885b58010b3b9393c5e2d1c508292f0198aa97dd5ca6c60bc446b79ba5c2e0fd563f2dca45194e5a6849ea1f99663dbd919bad5d7de91a806
-
Filesize
554KB
MD56e7aee0757ec97afe0243683b8054bcb
SHA1bcf959d216133ab8ccc796ba02e081f19a7ae14b
SHA2565507837ef09d98d20e6b6846898ac2e97c29c417058eb6c1abc39dd4a983d8c8
SHA51286b114502a7a5e95f04cdfbb034a05681f05ea8d12f28af7aa1e4a59818ad7da51566639a88e7fd3296ee65071788e4d1ca00b865b136b6b0f169313ff2b4bce
-
Filesize
554KB
MD56e7aee0757ec97afe0243683b8054bcb
SHA1bcf959d216133ab8ccc796ba02e081f19a7ae14b
SHA2565507837ef09d98d20e6b6846898ac2e97c29c417058eb6c1abc39dd4a983d8c8
SHA51286b114502a7a5e95f04cdfbb034a05681f05ea8d12f28af7aa1e4a59818ad7da51566639a88e7fd3296ee65071788e4d1ca00b865b136b6b0f169313ff2b4bce
-
Filesize
303KB
MD5497f358e50fa260c0ff63808c23c0bc9
SHA14e77e63c24209ce501865e2a38b714b50352ddc8
SHA2560e5211e652909b3da7f1ff49190fce636f3b2384dd664a4d486589544f223469
SHA512c9902bcf60f00fbb887df62ab2146e3ed89a8558fac04b3c57e232b81ca2af21925b3215d95a99ba9d01df6ab891add390ca0e6da01c707e1556fda13053b90e
-
Filesize
303KB
MD5497f358e50fa260c0ff63808c23c0bc9
SHA14e77e63c24209ce501865e2a38b714b50352ddc8
SHA2560e5211e652909b3da7f1ff49190fce636f3b2384dd664a4d486589544f223469
SHA512c9902bcf60f00fbb887df62ab2146e3ed89a8558fac04b3c57e232b81ca2af21925b3215d95a99ba9d01df6ab891add390ca0e6da01c707e1556fda13053b90e
-
Filesize
391KB
MD58be929e38dabbf105b36dde1e73a363d
SHA10092a9774f2ef2e3bcb164783965efb40d1eeb7f
SHA2564f95d97bdcf704b7e046e6a5c772fb5d39dde64a3f5798299e1cbd8a8471b868
SHA5121a31bed1b7e0b9fa5ad7e90467341424c08cd25bf53f9a918edd632d58007078dda1acde817bc5f0124e34ac139c8730ec9c6678cf9d35eeb600ab57b711e8da
-
Filesize
391KB
MD58be929e38dabbf105b36dde1e73a363d
SHA10092a9774f2ef2e3bcb164783965efb40d1eeb7f
SHA2564f95d97bdcf704b7e046e6a5c772fb5d39dde64a3f5798299e1cbd8a8471b868
SHA5121a31bed1b7e0b9fa5ad7e90467341424c08cd25bf53f9a918edd632d58007078dda1acde817bc5f0124e34ac139c8730ec9c6678cf9d35eeb600ab57b711e8da
-
Filesize
391KB
MD58be929e38dabbf105b36dde1e73a363d
SHA10092a9774f2ef2e3bcb164783965efb40d1eeb7f
SHA2564f95d97bdcf704b7e046e6a5c772fb5d39dde64a3f5798299e1cbd8a8471b868
SHA5121a31bed1b7e0b9fa5ad7e90467341424c08cd25bf53f9a918edd632d58007078dda1acde817bc5f0124e34ac139c8730ec9c6678cf9d35eeb600ab57b711e8da
-
Filesize
205KB
MD5b5b13701634e89bc5f2cbe1c3e007ba7
SHA1844f5a1166ddaf00ed368f61525d3bbe22dd6233
SHA256adaf9527bf2208fafb0ff35fda1788c3d8500ea61b15c9696ae074b44c41005a
SHA5124968eae18b95bc2885b58010b3b9393c5e2d1c508292f0198aa97dd5ca6c60bc446b79ba5c2e0fd563f2dca45194e5a6849ea1f99663dbd919bad5d7de91a806
-
Filesize
205KB
MD5b5b13701634e89bc5f2cbe1c3e007ba7
SHA1844f5a1166ddaf00ed368f61525d3bbe22dd6233
SHA256adaf9527bf2208fafb0ff35fda1788c3d8500ea61b15c9696ae074b44c41005a
SHA5124968eae18b95bc2885b58010b3b9393c5e2d1c508292f0198aa97dd5ca6c60bc446b79ba5c2e0fd563f2dca45194e5a6849ea1f99663dbd919bad5d7de91a806
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf