Analysis
-
max time kernel
27s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2023, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
cd5c8ed82f61855b377e3c59bad6edd1844bc5b46c21715969063a3e5befe2f5.exe
Resource
win10v2004-20230220-en
General
-
Target
cd5c8ed82f61855b377e3c59bad6edd1844bc5b46c21715969063a3e5befe2f5.exe
-
Size
291KB
-
MD5
7e41a726ac7ee1ac53883122630cc6fa
-
SHA1
0c0d72b7ec10fb1ce48bb50f5fb3678984be7e58
-
SHA256
cd5c8ed82f61855b377e3c59bad6edd1844bc5b46c21715969063a3e5befe2f5
-
SHA512
c648d2cbb197730de0e3e3dbd29bbd3a6a910e3a6deb8a4c756410a5515c725e8bc8fc7e8a1c631ca80c141aa7445b98f3a4b31fcb2d69fdfe67fff862123624
-
SSDEEP
3072:WWJrcehjYNj/swrIhO/Z5IItOyvtzw6WBSh7DWvdmoNfKX5Aj9OQ5f:FJrcBN4AZyI3vj97aFmoNPj7
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://toobussy.com/tmp/
http://wuc11.com/tmp/
http://ladogatur.ru/tmp/
http://kingpirate.ru/tmp/
Extracted
djvu
http://zexeq.com/raud/get.php
http://zexeq.com/lancer/get.php
-
extension
.vapo
-
offline_id
BUcuB8PRg0LNi380axIJs5BS8nCUdeo9U88L2Lt1
-
payload_url
http://colisumy.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-tnzomMj6HU Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0717JOsie
Extracted
amadey
3.67
45.9.74.80/0bjdn2Z/index.php
Extracted
vidar
4
e44c96dfdf315ccf17cdd4b93cfe6e48
https://steamcommunity.com/profiles/76561199508624021
https://t.me/looking_glassbot
-
profile_id_v2
e44c96dfdf315ccf17cdd4b93cfe6e48
-
user_agent
Mozilla/5.0 (X11; CrOS x86_64 14541.0.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36
Extracted
smokeloader
pub1
Signatures
-
Detected Djvu ransomware 37 IoCs
resource yara_rule behavioral1/memory/4688-153-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4688-156-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4008-158-0x0000000002490000-0x00000000025AB000-memory.dmp family_djvu behavioral1/memory/4688-160-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4688-174-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4688-180-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5032-189-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5032-190-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5032-191-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5032-197-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5032-198-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4284-235-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4284-238-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4284-264-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5032-260-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5032-265-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5032-257-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4284-270-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5032-288-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3508-311-0x0000000002460000-0x000000000257B000-memory.dmp family_djvu behavioral1/memory/4832-314-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4832-317-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3940-333-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4832-339-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3940-332-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2684-329-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2684-324-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4728-322-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4728-315-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4832-308-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4728-307-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4728-299-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4832-341-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4728-340-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4832-361-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5032-345-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4832-347-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4008 C1CE.exe 4688 C1CE.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1688 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\2cdb2807-3b2b-4ba8-addf-3baa705155ae\\C1CE.exe\" --AutoStart" C1CE.exe -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 87 api.2ip.ua 88 api.2ip.ua 89 api.2ip.ua 55 api.2ip.ua 56 api.2ip.ua 66 api.2ip.ua 76 api.2ip.ua 86 api.2ip.ua -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4008 set thread context of 4688 4008 C1CE.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cd5c8ed82f61855b377e3c59bad6edd1844bc5b46c21715969063a3e5befe2f5.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cd5c8ed82f61855b377e3c59bad6edd1844bc5b46c21715969063a3e5befe2f5.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cd5c8ed82f61855b377e3c59bad6edd1844bc5b46c21715969063a3e5befe2f5.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2016 schtasks.exe 1140 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 876 cd5c8ed82f61855b377e3c59bad6edd1844bc5b46c21715969063a3e5befe2f5.exe 876 cd5c8ed82f61855b377e3c59bad6edd1844bc5b46c21715969063a3e5befe2f5.exe 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 876 cd5c8ed82f61855b377e3c59bad6edd1844bc5b46c21715969063a3e5befe2f5.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3176 wrote to memory of 4008 3176 Process not Found 91 PID 3176 wrote to memory of 4008 3176 Process not Found 91 PID 3176 wrote to memory of 4008 3176 Process not Found 91 PID 4008 wrote to memory of 4688 4008 C1CE.exe 92 PID 4008 wrote to memory of 4688 4008 C1CE.exe 92 PID 4008 wrote to memory of 4688 4008 C1CE.exe 92 PID 4008 wrote to memory of 4688 4008 C1CE.exe 92 PID 4008 wrote to memory of 4688 4008 C1CE.exe 92 PID 4008 wrote to memory of 4688 4008 C1CE.exe 92 PID 4008 wrote to memory of 4688 4008 C1CE.exe 92 PID 4008 wrote to memory of 4688 4008 C1CE.exe 92 PID 4008 wrote to memory of 4688 4008 C1CE.exe 92 PID 4008 wrote to memory of 4688 4008 C1CE.exe 92 PID 4688 wrote to memory of 1688 4688 C1CE.exe 93 PID 4688 wrote to memory of 1688 4688 C1CE.exe 93 PID 4688 wrote to memory of 1688 4688 C1CE.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd5c8ed82f61855b377e3c59bad6edd1844bc5b46c21715969063a3e5befe2f5.exe"C:\Users\Admin\AppData\Local\Temp\cd5c8ed82f61855b377e3c59bad6edd1844bc5b46c21715969063a3e5befe2f5.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:876
-
C:\Users\Admin\AppData\Local\Temp\C1CE.exeC:\Users\Admin\AppData\Local\Temp\C1CE.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\C1CE.exeC:\Users\Admin\AppData\Local\Temp\C1CE.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\2cdb2807-3b2b-4ba8-addf-3baa705155ae" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\C1CE.exe"C:\Users\Admin\AppData\Local\Temp\C1CE.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\C1CE.exe"C:\Users\Admin\AppData\Local\Temp\C1CE.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:5032
-
C:\Users\Admin\AppData\Local\93accd83-cf60-4283-9d42-531690e754a9\build2.exe"C:\Users\Admin\AppData\Local\93accd83-cf60-4283-9d42-531690e754a9\build2.exe"5⤵PID:1480
-
C:\Users\Admin\AppData\Local\93accd83-cf60-4283-9d42-531690e754a9\build2.exe"C:\Users\Admin\AppData\Local\93accd83-cf60-4283-9d42-531690e754a9\build2.exe"6⤵PID:3848
-
-
-
C:\Users\Admin\AppData\Local\93accd83-cf60-4283-9d42-531690e754a9\build3.exe"C:\Users\Admin\AppData\Local\93accd83-cf60-4283-9d42-531690e754a9\build3.exe"5⤵PID:2748
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"6⤵
- Creates scheduled task(s)
PID:2016
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CBE1.exeC:\Users\Admin\AppData\Local\Temp\CBE1.exe1⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\aafg31.exe"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"2⤵PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\NewPlayer.exe"C:\Users\Admin\AppData\Local\Temp\NewPlayer.exe"2⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe"3⤵PID:4136
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe" /F4⤵
- Creates scheduled task(s)
PID:1140
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\6d73a97b0c" /P "Admin:N"&&CACLS "..\6d73a97b0c" /P "Admin:R" /E&&Exit4⤵PID:3096
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"5⤵PID:1592
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\6d73a97b0c" /P "Admin:R" /E5⤵PID:2336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\6d73a97b0c" /P "Admin:N"5⤵PID:5036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2276
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E5⤵PID:3608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1896
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\XandETC.exe"C:\Users\Admin\AppData\Local\Temp\XandETC.exe"2⤵PID:4476
-
-
C:\Users\Admin\AppData\Local\Temp\D4BC.exeC:\Users\Admin\AppData\Local\Temp\D4BC.exe1⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\D4BC.exeC:\Users\Admin\AppData\Local\Temp\D4BC.exe2⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\D4BC.exe"C:\Users\Admin\AppData\Local\Temp\D4BC.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\D4BC.exe"C:\Users\Admin\AppData\Local\Temp\D4BC.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:4832
-
C:\Users\Admin\AppData\Local\3de4a330-5420-407e-8034-2a34d1c069a1\build2.exe"C:\Users\Admin\AppData\Local\3de4a330-5420-407e-8034-2a34d1c069a1\build2.exe"5⤵PID:3584
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D922.exeC:\Users\Admin\AppData\Local\Temp\D922.exe1⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\DC30.exeC:\Users\Admin\AppData\Local\Temp\DC30.exe1⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\DC30.exeC:\Users\Admin\AppData\Local\Temp\DC30.exe2⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\DC30.exe"C:\Users\Admin\AppData\Local\Temp\DC30.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:1048
-
-
-
C:\Users\Admin\AppData\Local\Temp\E114.exeC:\Users\Admin\AppData\Local\Temp\E114.exe1⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\E114.exeC:\Users\Admin\AppData\Local\Temp\E114.exe2⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\E114.exe"C:\Users\Admin\AppData\Local\Temp\E114.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:2752
-
-
-
C:\Users\Admin\AppData\Local\Temp\DF0F.exeC:\Users\Admin\AppData\Local\Temp\DF0F.exe1⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\DF0F.exe"C:\Users\Admin\AppData\Local\Temp\DF0F.exe" --Admin IsNotAutoStart IsNotTask2⤵PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\DF0F.exeC:\Users\Admin\AppData\Local\Temp\DF0F.exe1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\302F.exeC:\Users\Admin\AppData\Local\Temp\302F.exe1⤵PID:2164
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force1⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\DAE7.exeC:\Users\Admin\AppData\Local\Temp\DAE7.exe1⤵PID:3672
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵PID:2748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD5e73564fc86b002bfb05e8417ced2d426
SHA1e2ae003f169b96d4d2aff06863c5a40dd52e6914
SHA2560fc12ea7658816e3410574704afb17412d3ea4faa923bd31d3accec281e18954
SHA512f0bcc24d0051d781a46de7553e7dd5aad3235eeea1ecf1cf727228386385e0860634ccbc01a5738ad4f45930ddeff9fc6c8f01e60a2c49588ccf90c2bd12f4b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5de4be4c4e0e9cd4f8d9cbe736c23c184
SHA1f46e03a991a06ba383ccd1d0a8a9a06426322dfa
SHA25686d888eec3475b61914dfe4de9c29e55f7d382660a739cab5a200bd189048ec2
SHA5128e6bba4416f6b7be02e94ae3ac8da5e20907136d12a8ee5257888cde98dc6093353460172d80b0d2271981ac0ff37ab678da95ef081c115fe0b47d9c90360096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD526ddbe6a19c10cd59ba8e526eea7ba4b
SHA1c656009d00e0df083371c94e45c1215d5badc200
SHA256a43996cd78f46780f607a812c6bdb8f389feb17a3e9739ca7629b725f255ceb1
SHA5121e4cd6289ed0b8415362d045ce4d76bef0c5d37384106414dcc17bf0e2708fab13c2fdbf397d14769985a2f0841d155fada106352813ef71ceb9a434396fac1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD50bef1758118e89bf6825bab0fcd6b245
SHA1b32800abdc33d45985b1230a7be388d82df50e85
SHA2567891fdbabc15f2fd15d6328b31c08bd1666b26701af5431bc736242aca0130d5
SHA512a93ae52378c0afaf975fe5c35eed0896fd4967c975bdda34b7295e5d6bf971b7bf691e05060b8df90269e37f693a92c2e6c1ef9e47d1b0fafe99ec737f3d0b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD533eecb43d65a43fd1c1d9d34fb4dc946
SHA140d2746ba6e1ce48c66b064299892e8332f5220b
SHA256f4f2119ac24955631fc15915c68bf340bf18fd9977c788c2f9224504ca780cab
SHA512be0b78e9f314dc13f18336c93fc9298d8270740a8a0a8d5581d30e196c2358befcae56f5065345bdd8991f0d1bfc952041d5f1adc69db33394a2766abff52987
-
Filesize
791KB
MD5829a40ecbc3a28b8392c07b1d3d32a37
SHA15d965f02ce9fa09af8fff35b965b988808b28c6b
SHA2565be13215f6ed976daffbbf7527b06f8ee8b21dae5dc3629dae9488d53c35e80b
SHA5124f2c28c07a5dece23d3db7c1252bffa6dda7c88373d1ce13accdf79b621e252fab3f753a864d22eeecebeeb0cbd9d1ed5ef64965ba98856dcf2d98253d671e21
-
Filesize
327KB
MD5b888efe68f257aa2335ed9cbd63c1343
SHA1c1a97d41d16a7a274802e873ce6b990312b07e03
SHA256c8b5119160d3301fc69657f1c23c8561e6290b953ec645298f436431d41bbd70
SHA5127d5bfc95c8f3d5bcc12a4ae1929b4ff946ab3747b29b3ab57b684decfa78db4836ec187d8a9ecda5d2e6c4baa02989ac1648fb9aaa0e592fb3a70f880529e3a8
-
Filesize
327KB
MD5b888efe68f257aa2335ed9cbd63c1343
SHA1c1a97d41d16a7a274802e873ce6b990312b07e03
SHA256c8b5119160d3301fc69657f1c23c8561e6290b953ec645298f436431d41bbd70
SHA5127d5bfc95c8f3d5bcc12a4ae1929b4ff946ab3747b29b3ab57b684decfa78db4836ec187d8a9ecda5d2e6c4baa02989ac1648fb9aaa0e592fb3a70f880529e3a8
-
Filesize
327KB
MD5b888efe68f257aa2335ed9cbd63c1343
SHA1c1a97d41d16a7a274802e873ce6b990312b07e03
SHA256c8b5119160d3301fc69657f1c23c8561e6290b953ec645298f436431d41bbd70
SHA5127d5bfc95c8f3d5bcc12a4ae1929b4ff946ab3747b29b3ab57b684decfa78db4836ec187d8a9ecda5d2e6c4baa02989ac1648fb9aaa0e592fb3a70f880529e3a8
-
Filesize
327KB
MD5b888efe68f257aa2335ed9cbd63c1343
SHA1c1a97d41d16a7a274802e873ce6b990312b07e03
SHA256c8b5119160d3301fc69657f1c23c8561e6290b953ec645298f436431d41bbd70
SHA5127d5bfc95c8f3d5bcc12a4ae1929b4ff946ab3747b29b3ab57b684decfa78db4836ec187d8a9ecda5d2e6c4baa02989ac1648fb9aaa0e592fb3a70f880529e3a8
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
83KB
MD5773e6ff1587a5eb0f35a25756a71efca
SHA1291dd0aba00cb512018d08e5ce2779a98e7c2e35
SHA2563fc1c0495fd7a909e9bc64bc4c99542f494508c80766263a923588343a92e4ca
SHA512add1cb74676f1317cff90baea71f278f27d75fb6b54edaad737702e45054de95a6c2dacdf616d6ce2b5d8c8b54824f9397b5827b15dc9d9cf15b8b80b6856b40
-
Filesize
4.9MB
MD52af03d52f9cf9e53dffc1183b403e1b7
SHA1124d97058db289da50a48f90911be2d67649f629
SHA256a41f46ef947c9ff3b1e5625e6cf5799e776a55e48f54f7fffe19e08e826de99a
SHA5127d773c689dc4dd3be9807c00207cf2713767c77c2b25b9eeb47fa7c0f87e05fa3736d25d79b428771d0fde6c0f25fccc476589817aa7fa93e622230e75ad65d8
-
Filesize
4.9MB
MD52af03d52f9cf9e53dffc1183b403e1b7
SHA1124d97058db289da50a48f90911be2d67649f629
SHA256a41f46ef947c9ff3b1e5625e6cf5799e776a55e48f54f7fffe19e08e826de99a
SHA5127d773c689dc4dd3be9807c00207cf2713767c77c2b25b9eeb47fa7c0f87e05fa3736d25d79b428771d0fde6c0f25fccc476589817aa7fa93e622230e75ad65d8
-
Filesize
249KB
MD508240e71429b32855b418a4acf0e38ec
SHA1b180ace2ea6815775d29785c985b576dc21b76b5
SHA256a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8
SHA51269fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf
-
Filesize
249KB
MD508240e71429b32855b418a4acf0e38ec
SHA1b180ace2ea6815775d29785c985b576dc21b76b5
SHA256a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8
SHA51269fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf
-
Filesize
791KB
MD5829a40ecbc3a28b8392c07b1d3d32a37
SHA15d965f02ce9fa09af8fff35b965b988808b28c6b
SHA2565be13215f6ed976daffbbf7527b06f8ee8b21dae5dc3629dae9488d53c35e80b
SHA5124f2c28c07a5dece23d3db7c1252bffa6dda7c88373d1ce13accdf79b621e252fab3f753a864d22eeecebeeb0cbd9d1ed5ef64965ba98856dcf2d98253d671e21
-
Filesize
791KB
MD5829a40ecbc3a28b8392c07b1d3d32a37
SHA15d965f02ce9fa09af8fff35b965b988808b28c6b
SHA2565be13215f6ed976daffbbf7527b06f8ee8b21dae5dc3629dae9488d53c35e80b
SHA5124f2c28c07a5dece23d3db7c1252bffa6dda7c88373d1ce13accdf79b621e252fab3f753a864d22eeecebeeb0cbd9d1ed5ef64965ba98856dcf2d98253d671e21
-
Filesize
791KB
MD5829a40ecbc3a28b8392c07b1d3d32a37
SHA15d965f02ce9fa09af8fff35b965b988808b28c6b
SHA2565be13215f6ed976daffbbf7527b06f8ee8b21dae5dc3629dae9488d53c35e80b
SHA5124f2c28c07a5dece23d3db7c1252bffa6dda7c88373d1ce13accdf79b621e252fab3f753a864d22eeecebeeb0cbd9d1ed5ef64965ba98856dcf2d98253d671e21
-
Filesize
791KB
MD5829a40ecbc3a28b8392c07b1d3d32a37
SHA15d965f02ce9fa09af8fff35b965b988808b28c6b
SHA2565be13215f6ed976daffbbf7527b06f8ee8b21dae5dc3629dae9488d53c35e80b
SHA5124f2c28c07a5dece23d3db7c1252bffa6dda7c88373d1ce13accdf79b621e252fab3f753a864d22eeecebeeb0cbd9d1ed5ef64965ba98856dcf2d98253d671e21
-
Filesize
791KB
MD5829a40ecbc3a28b8392c07b1d3d32a37
SHA15d965f02ce9fa09af8fff35b965b988808b28c6b
SHA2565be13215f6ed976daffbbf7527b06f8ee8b21dae5dc3629dae9488d53c35e80b
SHA5124f2c28c07a5dece23d3db7c1252bffa6dda7c88373d1ce13accdf79b621e252fab3f753a864d22eeecebeeb0cbd9d1ed5ef64965ba98856dcf2d98253d671e21
-
Filesize
4.9MB
MD52af03d52f9cf9e53dffc1183b403e1b7
SHA1124d97058db289da50a48f90911be2d67649f629
SHA256a41f46ef947c9ff3b1e5625e6cf5799e776a55e48f54f7fffe19e08e826de99a
SHA5127d773c689dc4dd3be9807c00207cf2713767c77c2b25b9eeb47fa7c0f87e05fa3736d25d79b428771d0fde6c0f25fccc476589817aa7fa93e622230e75ad65d8
-
Filesize
4.9MB
MD52af03d52f9cf9e53dffc1183b403e1b7
SHA1124d97058db289da50a48f90911be2d67649f629
SHA256a41f46ef947c9ff3b1e5625e6cf5799e776a55e48f54f7fffe19e08e826de99a
SHA5127d773c689dc4dd3be9807c00207cf2713767c77c2b25b9eeb47fa7c0f87e05fa3736d25d79b428771d0fde6c0f25fccc476589817aa7fa93e622230e75ad65d8
-
Filesize
791KB
MD5829a40ecbc3a28b8392c07b1d3d32a37
SHA15d965f02ce9fa09af8fff35b965b988808b28c6b
SHA2565be13215f6ed976daffbbf7527b06f8ee8b21dae5dc3629dae9488d53c35e80b
SHA5124f2c28c07a5dece23d3db7c1252bffa6dda7c88373d1ce13accdf79b621e252fab3f753a864d22eeecebeeb0cbd9d1ed5ef64965ba98856dcf2d98253d671e21
-
Filesize
791KB
MD5829a40ecbc3a28b8392c07b1d3d32a37
SHA15d965f02ce9fa09af8fff35b965b988808b28c6b
SHA2565be13215f6ed976daffbbf7527b06f8ee8b21dae5dc3629dae9488d53c35e80b
SHA5124f2c28c07a5dece23d3db7c1252bffa6dda7c88373d1ce13accdf79b621e252fab3f753a864d22eeecebeeb0cbd9d1ed5ef64965ba98856dcf2d98253d671e21
-
Filesize
791KB
MD5829a40ecbc3a28b8392c07b1d3d32a37
SHA15d965f02ce9fa09af8fff35b965b988808b28c6b
SHA2565be13215f6ed976daffbbf7527b06f8ee8b21dae5dc3629dae9488d53c35e80b
SHA5124f2c28c07a5dece23d3db7c1252bffa6dda7c88373d1ce13accdf79b621e252fab3f753a864d22eeecebeeb0cbd9d1ed5ef64965ba98856dcf2d98253d671e21
-
Filesize
791KB
MD5829a40ecbc3a28b8392c07b1d3d32a37
SHA15d965f02ce9fa09af8fff35b965b988808b28c6b
SHA2565be13215f6ed976daffbbf7527b06f8ee8b21dae5dc3629dae9488d53c35e80b
SHA5124f2c28c07a5dece23d3db7c1252bffa6dda7c88373d1ce13accdf79b621e252fab3f753a864d22eeecebeeb0cbd9d1ed5ef64965ba98856dcf2d98253d671e21
-
Filesize
791KB
MD5829a40ecbc3a28b8392c07b1d3d32a37
SHA15d965f02ce9fa09af8fff35b965b988808b28c6b
SHA2565be13215f6ed976daffbbf7527b06f8ee8b21dae5dc3629dae9488d53c35e80b
SHA5124f2c28c07a5dece23d3db7c1252bffa6dda7c88373d1ce13accdf79b621e252fab3f753a864d22eeecebeeb0cbd9d1ed5ef64965ba98856dcf2d98253d671e21
-
Filesize
791KB
MD5829a40ecbc3a28b8392c07b1d3d32a37
SHA15d965f02ce9fa09af8fff35b965b988808b28c6b
SHA2565be13215f6ed976daffbbf7527b06f8ee8b21dae5dc3629dae9488d53c35e80b
SHA5124f2c28c07a5dece23d3db7c1252bffa6dda7c88373d1ce13accdf79b621e252fab3f753a864d22eeecebeeb0cbd9d1ed5ef64965ba98856dcf2d98253d671e21
-
Filesize
292KB
MD5a7e3e69590c360a838ca3dd872c3f59c
SHA1c10a2d5387a4a8cc9ee16dd8734b8af00979ea21
SHA256ea994ef4203c0ff7e5882c2438047913eb8a0d870b8429fbf948813cd9d62455
SHA5128151e710d39d8088ee8f26255be495d822662142ec07b487f46d9d090e4c33349f42f1a7e39913c5742b532b1c3afea5796e65c03ff5b4b396939599e70ef054
-
Filesize
292KB
MD5a7e3e69590c360a838ca3dd872c3f59c
SHA1c10a2d5387a4a8cc9ee16dd8734b8af00979ea21
SHA256ea994ef4203c0ff7e5882c2438047913eb8a0d870b8429fbf948813cd9d62455
SHA5128151e710d39d8088ee8f26255be495d822662142ec07b487f46d9d090e4c33349f42f1a7e39913c5742b532b1c3afea5796e65c03ff5b4b396939599e70ef054
-
Filesize
781KB
MD53503789c1156a563d3d60f261bd72a63
SHA1204107c85020849f29df5830b22735079441c474
SHA256fbaf84035775676eb94483b529c885f3b57e26c7d1fbd36b3afb0ae9badeb378
SHA512685d3691497b0df89f1ae2359c9928f3f2a105982a120d6ca8a94606fefbaeb87c5558bac3fef743fab03907307f0543452d75f260aa3ed7b87b490210152dfc
-
Filesize
781KB
MD53503789c1156a563d3d60f261bd72a63
SHA1204107c85020849f29df5830b22735079441c474
SHA256fbaf84035775676eb94483b529c885f3b57e26c7d1fbd36b3afb0ae9badeb378
SHA512685d3691497b0df89f1ae2359c9928f3f2a105982a120d6ca8a94606fefbaeb87c5558bac3fef743fab03907307f0543452d75f260aa3ed7b87b490210152dfc
-
Filesize
781KB
MD53503789c1156a563d3d60f261bd72a63
SHA1204107c85020849f29df5830b22735079441c474
SHA256fbaf84035775676eb94483b529c885f3b57e26c7d1fbd36b3afb0ae9badeb378
SHA512685d3691497b0df89f1ae2359c9928f3f2a105982a120d6ca8a94606fefbaeb87c5558bac3fef743fab03907307f0543452d75f260aa3ed7b87b490210152dfc
-
Filesize
781KB
MD53503789c1156a563d3d60f261bd72a63
SHA1204107c85020849f29df5830b22735079441c474
SHA256fbaf84035775676eb94483b529c885f3b57e26c7d1fbd36b3afb0ae9badeb378
SHA512685d3691497b0df89f1ae2359c9928f3f2a105982a120d6ca8a94606fefbaeb87c5558bac3fef743fab03907307f0543452d75f260aa3ed7b87b490210152dfc
-
Filesize
781KB
MD53503789c1156a563d3d60f261bd72a63
SHA1204107c85020849f29df5830b22735079441c474
SHA256fbaf84035775676eb94483b529c885f3b57e26c7d1fbd36b3afb0ae9badeb378
SHA512685d3691497b0df89f1ae2359c9928f3f2a105982a120d6ca8a94606fefbaeb87c5558bac3fef743fab03907307f0543452d75f260aa3ed7b87b490210152dfc
-
Filesize
781KB
MD53503789c1156a563d3d60f261bd72a63
SHA1204107c85020849f29df5830b22735079441c474
SHA256fbaf84035775676eb94483b529c885f3b57e26c7d1fbd36b3afb0ae9badeb378
SHA512685d3691497b0df89f1ae2359c9928f3f2a105982a120d6ca8a94606fefbaeb87c5558bac3fef743fab03907307f0543452d75f260aa3ed7b87b490210152dfc
-
Filesize
781KB
MD53503789c1156a563d3d60f261bd72a63
SHA1204107c85020849f29df5830b22735079441c474
SHA256fbaf84035775676eb94483b529c885f3b57e26c7d1fbd36b3afb0ae9badeb378
SHA512685d3691497b0df89f1ae2359c9928f3f2a105982a120d6ca8a94606fefbaeb87c5558bac3fef743fab03907307f0543452d75f260aa3ed7b87b490210152dfc
-
Filesize
781KB
MD53503789c1156a563d3d60f261bd72a63
SHA1204107c85020849f29df5830b22735079441c474
SHA256fbaf84035775676eb94483b529c885f3b57e26c7d1fbd36b3afb0ae9badeb378
SHA512685d3691497b0df89f1ae2359c9928f3f2a105982a120d6ca8a94606fefbaeb87c5558bac3fef743fab03907307f0543452d75f260aa3ed7b87b490210152dfc
-
Filesize
781KB
MD53503789c1156a563d3d60f261bd72a63
SHA1204107c85020849f29df5830b22735079441c474
SHA256fbaf84035775676eb94483b529c885f3b57e26c7d1fbd36b3afb0ae9badeb378
SHA512685d3691497b0df89f1ae2359c9928f3f2a105982a120d6ca8a94606fefbaeb87c5558bac3fef743fab03907307f0543452d75f260aa3ed7b87b490210152dfc
-
Filesize
781KB
MD53503789c1156a563d3d60f261bd72a63
SHA1204107c85020849f29df5830b22735079441c474
SHA256fbaf84035775676eb94483b529c885f3b57e26c7d1fbd36b3afb0ae9badeb378
SHA512685d3691497b0df89f1ae2359c9928f3f2a105982a120d6ca8a94606fefbaeb87c5558bac3fef743fab03907307f0543452d75f260aa3ed7b87b490210152dfc
-
Filesize
781KB
MD53503789c1156a563d3d60f261bd72a63
SHA1204107c85020849f29df5830b22735079441c474
SHA256fbaf84035775676eb94483b529c885f3b57e26c7d1fbd36b3afb0ae9badeb378
SHA512685d3691497b0df89f1ae2359c9928f3f2a105982a120d6ca8a94606fefbaeb87c5558bac3fef743fab03907307f0543452d75f260aa3ed7b87b490210152dfc
-
Filesize
249KB
MD508240e71429b32855b418a4acf0e38ec
SHA1b180ace2ea6815775d29785c985b576dc21b76b5
SHA256a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8
SHA51269fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf
-
Filesize
249KB
MD508240e71429b32855b418a4acf0e38ec
SHA1b180ace2ea6815775d29785c985b576dc21b76b5
SHA256a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8
SHA51269fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf
-
Filesize
249KB
MD508240e71429b32855b418a4acf0e38ec
SHA1b180ace2ea6815775d29785c985b576dc21b76b5
SHA256a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8
SHA51269fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
Filesize
950KB
MD5b4f79b3194235084a3ec85711edfbd38
SHA14e5dc4085dafbe91f8fbe3265c49a9bf6e14e43d
SHA256d425f18f931a8224c162fee1804e5101bc538fe8e85c7a11d73d2ba4833addf4
SHA512b22737bb7d80fc87d40b3762eb51b921b7ae1ba6bb3ba20f0e6940f5e91eb23ddbb44c9e8f8a7f9ee332542738cbf700688629eba17e7d04190e5db95a019964
-
Filesize
950KB
MD5b4f79b3194235084a3ec85711edfbd38
SHA14e5dc4085dafbe91f8fbe3265c49a9bf6e14e43d
SHA256d425f18f931a8224c162fee1804e5101bc538fe8e85c7a11d73d2ba4833addf4
SHA512b22737bb7d80fc87d40b3762eb51b921b7ae1ba6bb3ba20f0e6940f5e91eb23ddbb44c9e8f8a7f9ee332542738cbf700688629eba17e7d04190e5db95a019964
-
Filesize
950KB
MD5b4f79b3194235084a3ec85711edfbd38
SHA14e5dc4085dafbe91f8fbe3265c49a9bf6e14e43d
SHA256d425f18f931a8224c162fee1804e5101bc538fe8e85c7a11d73d2ba4833addf4
SHA512b22737bb7d80fc87d40b3762eb51b921b7ae1ba6bb3ba20f0e6940f5e91eb23ddbb44c9e8f8a7f9ee332542738cbf700688629eba17e7d04190e5db95a019964
-
Filesize
560B
MD5e1de16e16ae306fde713091c73e2ab87
SHA1a1c8734e5b61454da7a4c560dc983278029c95b8
SHA2563827aa17b90ae76d1ddde02f1528444a0d59b4f931ed85a6c0d74197e0e70670
SHA5123d35b1e4ff81e9978bca08879e717e564af5ac0d39336865c3df0f1570cc47cc3c23bbd56291b703ad7bc44c280c8072da159877215350d13bb87f1728329c59
-
Filesize
1.0MB
MD516fd83a682162d6edc119dc12c9990dc
SHA14b5f38c78c8e5f1333989da0912e945335f82c95
SHA25636be2f6cccdf3edc709e7dabcbe529d4f6390d3c624ba10fb471bd05d36060c8
SHA5125af414c95db738d0a65fdd67f2ff3923c451ee68856237f55626586aac14efe62288f5b8d74a5fbf2eaba9e6a1689cea89b856212a597ab12a3a4b0097e3f3a5