Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2023, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.864d5e84005578bd24f7fd17ca8fcf26546968cd559fad33897d7a8f623ba503_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.864d5e84005578bd24f7fd17ca8fcf26546968cd559fad33897d7a8f623ba503_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.864d5e84005578bd24f7fd17ca8fcf26546968cd559fad33897d7a8f623ba503_JC.exe
-
Size
161KB
-
MD5
d96009b9b3cc6675c4b790d73d30464e
-
SHA1
a0a1fabf8a611d8b3b6f1f32fd5b036f0b396ee7
-
SHA256
864d5e84005578bd24f7fd17ca8fcf26546968cd559fad33897d7a8f623ba503
-
SHA512
19160cef6f8c61565dc53988f3b34c9ceaced6f5223ad4042602230d8cc5200d282682f5271ae8da7e31b3e19ec873efad5cb0d748b16afbae6acbf779619841
-
SSDEEP
3072:3BnyBY97XloGpYDtRaG6pKQGAMI+mSWx3qs9qOu6DqHySinFrO3/pq8hW7xs:d57pYDtRMpUAis9qOjDbFrg/pqdS
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
magia
77.91.124.55:19071
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Extracted
amadey
3.83
http://5.42.65.80/8bmeVwqx/index.php
-
install_dir
207aa4515d
-
install_file
oneetx.exe
-
strings_key
3e634dd0840c68ae2ced83c2be7bf0d4
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x000700000002320c-26.dat healer behavioral2/files/0x000700000002320c-27.dat healer behavioral2/memory/1584-33-0x0000000000340000-0x000000000034A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 18C7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 18C7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 18C7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 18C7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 18C7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 18C7.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral2/memory/3660-35-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral2/memory/4672-88-0x0000000000540000-0x000000000059A000-memory.dmp family_redline behavioral2/memory/3292-146-0x0000000000990000-0x00000000009CE000-memory.dmp family_redline behavioral2/files/0x000600000002322d-132.dat family_redline behavioral2/files/0x000600000002322d-131.dat family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation 2079.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation 23A6.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 15 IoCs
pid Process 3192 E6A7.exe 4220 74F.exe 4732 1088.exe 1584 18C7.exe 1560 2079.exe 784 Dk4BX5nc.exe 3924 dR1wO3PR.exe 4240 23A6.exe 4216 ZD8uB3gn.exe 2132 Ge7mi6tI.exe 4672 2702.exe 3960 1xe17oI6.exe 3292 2ev168TZ.exe 3228 oneetx.exe 5264 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2104 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 18C7.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Ge7mi6tI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" E6A7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Dk4BX5nc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dR1wO3PR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ZD8uB3gn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4784 set thread context of 2960 4784 NEAS.864d5e84005578bd24f7fd17ca8fcf26546968cd559fad33897d7a8f623ba503_JC.exe 86 PID 4732 set thread context of 3660 4732 1088.exe 108 PID 4220 set thread context of 116 4220 74F.exe 110 PID 3960 set thread context of 1320 3960 1xe17oI6.exe 125 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 392 4784 WerFault.exe 84 4960 4732 WerFault.exe 105 1940 4220 WerFault.exe 102 992 3960 WerFault.exe 124 2688 1320 WerFault.exe 125 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5424 schtasks.exe 2536 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2960 AppLaunch.exe 2960 AppLaunch.exe 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found 2564 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2564 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2960 AppLaunch.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 1584 18C7.exe Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found Token: SeDebugPrivilege 4672 2702.exe Token: SeShutdownPrivilege 2564 Process not Found Token: SeCreatePagefilePrivilege 2564 Process not Found -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4240 23A6.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4784 wrote to memory of 2960 4784 NEAS.864d5e84005578bd24f7fd17ca8fcf26546968cd559fad33897d7a8f623ba503_JC.exe 86 PID 4784 wrote to memory of 2960 4784 NEAS.864d5e84005578bd24f7fd17ca8fcf26546968cd559fad33897d7a8f623ba503_JC.exe 86 PID 4784 wrote to memory of 2960 4784 NEAS.864d5e84005578bd24f7fd17ca8fcf26546968cd559fad33897d7a8f623ba503_JC.exe 86 PID 4784 wrote to memory of 2960 4784 NEAS.864d5e84005578bd24f7fd17ca8fcf26546968cd559fad33897d7a8f623ba503_JC.exe 86 PID 4784 wrote to memory of 2960 4784 NEAS.864d5e84005578bd24f7fd17ca8fcf26546968cd559fad33897d7a8f623ba503_JC.exe 86 PID 4784 wrote to memory of 2960 4784 NEAS.864d5e84005578bd24f7fd17ca8fcf26546968cd559fad33897d7a8f623ba503_JC.exe 86 PID 2564 wrote to memory of 3192 2564 Process not Found 101 PID 2564 wrote to memory of 3192 2564 Process not Found 101 PID 2564 wrote to memory of 3192 2564 Process not Found 101 PID 2564 wrote to memory of 4220 2564 Process not Found 102 PID 2564 wrote to memory of 4220 2564 Process not Found 102 PID 2564 wrote to memory of 4220 2564 Process not Found 102 PID 2564 wrote to memory of 2416 2564 Process not Found 103 PID 2564 wrote to memory of 2416 2564 Process not Found 103 PID 2564 wrote to memory of 4732 2564 Process not Found 105 PID 2564 wrote to memory of 4732 2564 Process not Found 105 PID 2564 wrote to memory of 4732 2564 Process not Found 105 PID 2564 wrote to memory of 1584 2564 Process not Found 106 PID 2564 wrote to memory of 1584 2564 Process not Found 106 PID 4220 wrote to memory of 2320 4220 74F.exe 107 PID 4220 wrote to memory of 2320 4220 74F.exe 107 PID 4220 wrote to memory of 2320 4220 74F.exe 107 PID 4732 wrote to memory of 3660 4732 1088.exe 108 PID 4732 wrote to memory of 3660 4732 1088.exe 108 PID 4732 wrote to memory of 3660 4732 1088.exe 108 PID 4732 wrote to memory of 3660 4732 1088.exe 108 PID 4732 wrote to memory of 3660 4732 1088.exe 108 PID 4732 wrote to memory of 3660 4732 1088.exe 108 PID 4732 wrote to memory of 3660 4732 1088.exe 108 PID 4732 wrote to memory of 3660 4732 1088.exe 108 PID 2564 wrote to memory of 1560 2564 Process not Found 112 PID 2564 wrote to memory of 1560 2564 Process not Found 112 PID 2564 wrote to memory of 1560 2564 Process not Found 112 PID 3192 wrote to memory of 784 3192 E6A7.exe 111 PID 3192 wrote to memory of 784 3192 E6A7.exe 111 PID 3192 wrote to memory of 784 3192 E6A7.exe 111 PID 4220 wrote to memory of 116 4220 74F.exe 110 PID 4220 wrote to memory of 116 4220 74F.exe 110 PID 4220 wrote to memory of 116 4220 74F.exe 110 PID 4220 wrote to memory of 116 4220 74F.exe 110 PID 4220 wrote to memory of 116 4220 74F.exe 110 PID 4220 wrote to memory of 116 4220 74F.exe 110 PID 4220 wrote to memory of 116 4220 74F.exe 110 PID 4220 wrote to memory of 116 4220 74F.exe 110 PID 4220 wrote to memory of 116 4220 74F.exe 110 PID 4220 wrote to memory of 116 4220 74F.exe 110 PID 784 wrote to memory of 3924 784 Dk4BX5nc.exe 114 PID 784 wrote to memory of 3924 784 Dk4BX5nc.exe 114 PID 784 wrote to memory of 3924 784 Dk4BX5nc.exe 114 PID 2564 wrote to memory of 4240 2564 Process not Found 117 PID 2564 wrote to memory of 4240 2564 Process not Found 117 PID 2564 wrote to memory of 4240 2564 Process not Found 117 PID 3924 wrote to memory of 4216 3924 dR1wO3PR.exe 118 PID 3924 wrote to memory of 4216 3924 dR1wO3PR.exe 118 PID 3924 wrote to memory of 4216 3924 dR1wO3PR.exe 118 PID 2416 wrote to memory of 3600 2416 cmd.exe 119 PID 2416 wrote to memory of 3600 2416 cmd.exe 119 PID 4216 wrote to memory of 2132 4216 ZD8uB3gn.exe 120 PID 4216 wrote to memory of 2132 4216 ZD8uB3gn.exe 120 PID 4216 wrote to memory of 2132 4216 ZD8uB3gn.exe 120 PID 2564 wrote to memory of 4672 2564 Process not Found 122 PID 2564 wrote to memory of 4672 2564 Process not Found 122 PID 2564 wrote to memory of 4672 2564 Process not Found 122 PID 2132 wrote to memory of 3960 2132 Ge7mi6tI.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.864d5e84005578bd24f7fd17ca8fcf26546968cd559fad33897d7a8f623ba503_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.864d5e84005578bd24f7fd17ca8fcf26546968cd559fad33897d7a8f623ba503_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 2522⤵
- Program crash
PID:392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4784 -ip 47841⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\E6A7.exeC:\Users\Admin\AppData\Local\Temp\E6A7.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Dk4BX5nc.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Dk4BX5nc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dR1wO3PR.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dR1wO3PR.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZD8uB3gn.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZD8uB3gn.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ge7mi6tI.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ge7mi6tI.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1xe17oI6.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1xe17oI6.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3960 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 5408⤵
- Program crash
PID:2688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 5727⤵
- Program crash
PID:992
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2ev168TZ.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2ev168TZ.exe6⤵
- Executes dropped EXE
PID:3292
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\74F.exeC:\Users\Admin\AppData\Local\Temp\74F.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2320
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 4202⤵
- Program crash
PID:1940
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\D4B.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login2⤵PID:3600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffb839646f8,0x7ffb83964708,0x7ffb839647183⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,959206650955120025,16955454409630795636,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2284 /prefetch:23⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,959206650955120025,16955454409630795636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:33⤵PID:3572
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb839646f8,0x7ffb83964708,0x7ffb839647183⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,2805898027901228241,16984347952379249779,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:83⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2805898027901228241,16984347952379249779,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:13⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2805898027901228241,16984347952379249779,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:13⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,2805898027901228241,16984347952379249779,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:33⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,2805898027901228241,16984347952379249779,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:23⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2805898027901228241,16984347952379249779,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3844 /prefetch:13⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2805898027901228241,16984347952379249779,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:13⤵PID:5640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2805898027901228241,16984347952379249779,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:13⤵PID:5632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,2805898027901228241,16984347952379249779,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3928 /prefetch:83⤵PID:5876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,2805898027901228241,16984347952379249779,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3928 /prefetch:83⤵PID:5892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2805898027901228241,16984347952379249779,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:13⤵PID:5920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2805898027901228241,16984347952379249779,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:13⤵PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2805898027901228241,16984347952379249779,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:13⤵PID:2680
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088.exeC:\Users\Admin\AppData\Local\Temp\1088.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 2162⤵
- Program crash
PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\18C7.exeC:\Users\Admin\AppData\Local\Temp\18C7.exe1⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4732 -ip 47321⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\2079.exeC:\Users\Admin\AppData\Local\Temp\2079.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"2⤵PID:5024
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵PID:2824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5612
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"4⤵PID:5908
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E4⤵PID:5124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5352
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:5364
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:5400
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F3⤵
- Creates scheduled task(s)
PID:2536
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:2104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4220 -ip 42201⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\23A6.exeC:\Users\Admin\AppData\Local\Temp\23A6.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3228 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:5424
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit3⤵PID:5444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5604
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:5928
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:2152
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5252
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"4⤵PID:5180
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E4⤵PID:5340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2702.exeC:\Users\Admin\AppData\Local\Temp\2702.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3960 -ip 39601⤵PID:2444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1320 -ip 13201⤵PID:1500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6016
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵PID:5536
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:5264
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
Filesize
152B
MD57a602869e579f44dfa2a249baa8c20fe
SHA1e0ac4a8508f60cb0408597eb1388b3075e27383f
SHA2569ecfb98abb311a853f6b532b8eb6861455ca3f0cc3b4b6b844095ad8fb28dfa5
SHA5121f611034390aaeb815d92514cdeea68c52ceb101ad8ac9f0ae006226bebc15bfa283375b88945f38837c2423d2d397fbf832b85f7db230af6392c565d21f8d10
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize744B
MD571812debf6f5b7a5fab97b0f487afeb6
SHA1fbef37a05c7d34e91ee63920429e496de3d9709d
SHA2560f5f0a158f495b8ea678721e1b3b0f216bc894176c8d658fb0094edfe77458f3
SHA5122bbdd99c43b82fe1bfea7c95a8e8f147bf4095b3a07b981a13e992cae2934f7e35d75dbcba60cb2e6046a18d8c397709c7c9e84b57c915852427034feb2d9769
-
Filesize
398B
MD5ef38235b738c75be474e407925422843
SHA108e5132051e95367daf1af589e9426fd219dd95d
SHA256ba991d1ad86d0420bf56a926fb1f1548a0f55cff6464b5ac282a5d35e2b7c6d5
SHA51250426707ce90a4bb0a823df7726cdf821fd577490fb911f399560e3739de77e6d993dd2ca5ac31a4a996a7eda281638458fae1112cdced28f18d9fd4b11cb106
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5da569dd3bc619654efdfbbf7377fd0c4
SHA13aa970ab1ad70c4105257bc8b796964739a13524
SHA2567f26c5ae6ed0c06469b75a001427b7f0c328abe115624e150816ba793a52302b
SHA51211cddf4e9a93e6dcdfda5b047782c1fd1655c767f91814761b534484c0b2d32714d069dc03df2687c6c308d7d5dea72987f7abfac9274956b293091382f72b30
-
Filesize
5KB
MD5d54afddde5d0005ef0bfced594ab606b
SHA16a4aa3a5918d14e7c393e23bc41a51e2da8b941d
SHA256079dab801c5811bcfee3c8fd5231a958701aab3c9493c780e363ae637dfee40e
SHA512f5eae5b62fcdbdcc3ccc92b07e4f5fb837036f712be8b5cfdf4aae13822b9953f31687813b63dfd4e90bd1113db73b5158f3acf8ca3b3a1a5af2f6e47de3b528
-
Filesize
6KB
MD531f288ddaaae0c804a58bde05533caa5
SHA1fb181e0e9b5645b8abf581e71f371a0b38ef7a8e
SHA256eab03af72f0431fc0c62f237ad5198b83bb7475b18f573690fa6043fb90287be
SHA512c62812af065c9c81b5c48fbd898b14e54ebedd38cb994c6f7ca1402725eace338b9cefe7d3d846d17b57dd1ad6c929c04cf76395dee2c2100a921e466356b046
-
Filesize
5KB
MD5544422a7addf84a2a086d180d2a0742f
SHA171252320d4e133ff1c4addb3635498803c0f2384
SHA256310c5c86956343bee077ce15531cedb3187008d7f8e0a70a5167df87a09cca3b
SHA51200711dc8c6173dafc9486792186d99763a694f87abb4e72e60c7c076b2c3a620ebc99c6cc6db0ed968bb1306f38d491da0db67d170413541926df6ac90e66ada
-
Filesize
24KB
MD510f5b64000466c1e6da25fb5a0115924
SHA1cb253bacf2b087c4040eb3c6a192924234f68639
SHA256d818b1cebb2d1e2b269f2e41654702a0df261e63ba2a479f34b75563265ee46b
SHA5128a8d230594d6fade63ecd63ba60985a7ccd1353de8d0a119543985bf182fdbb45f38ccc96441c24f0792ea1c449de69563c38348c2bedb2845522a2f83a149db
-
Filesize
705B
MD5a9581cfd9965c8679c63cb94cd312066
SHA1eb6fd1b70b5ae8785f685e376b1348c13d7076cc
SHA256c8b6cb297b5722f7289361728316f6b9a101a6d4640f7b41710a0652d1f8861c
SHA51296432868b03d9af1973f29577bef9a6ad704930461d509314294d4f7584b5b24bb0b53bcad3f0e92f556eb5726476b59fa7b629505430f4609f4e006ebca56e4
-
Filesize
204B
MD593b1d4ff54c300d30d3acbb5f202b7b8
SHA1f75e39970767b24ff52d52960a6b913ffd82b407
SHA2562d5b45ccd7a46b23342157ce9bb3c9df15c17c81d19dcdaaa9683127c400aefd
SHA512051ddc161a71bab5c1c807c9be142fa72b5c67bf0b1ba2b063c3673d11963a2f6ae57d74d6d74e5757d00514fbdbd72ac4b1ab8cd7eeac1e6dd4d67e767c1009
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
2KB
MD522ef740d4c1ac76e4dd72411f56527f3
SHA1865cb13f4f1c60a94893a1790210bd8e954fe80d
SHA2560ebd6e0ace89d6f9f7acbbae1c2bf9690ac5280d9fe719a024009ae8dadedd97
SHA5124869331e2e89e7d73c0c1c84a4818ed268b5b3f9773af7950bf26dda9f5aff1699df75cea6285de3038f3b7801ff53aae56e593620c55cc009deb4379d193484
-
Filesize
10KB
MD58ddb25ece0f0b5212c7735bba19673e0
SHA10925360fe3156e12e81f71180d5a45cf37bc4a92
SHA2560c68aa13ddb776481bed2f672c6e2191bdf760fb21eb86dcd6a24aabbaefb089
SHA512663dfa133b5430d1c52e493bcd3825a7f8d9a41d8b63dc229be0666dd7877c9963ead5b6d6f72c9bb6c6c4c3d36b247c43d98adc83ab66162e1c8753c4b435e7
-
Filesize
10KB
MD58ddb25ece0f0b5212c7735bba19673e0
SHA10925360fe3156e12e81f71180d5a45cf37bc4a92
SHA2560c68aa13ddb776481bed2f672c6e2191bdf760fb21eb86dcd6a24aabbaefb089
SHA512663dfa133b5430d1c52e493bcd3825a7f8d9a41d8b63dc229be0666dd7877c9963ead5b6d6f72c9bb6c6c4c3d36b247c43d98adc83ab66162e1c8753c4b435e7
-
Filesize
3KB
MD5ce71d6806c544433fec462b10a17936e
SHA185ef0efe8820039d3c1977b792a9c1f27958c36d
SHA256907b5c704eb15e0129a2227928cc81ac352a7af66db32f912f1bbbc2d35fb996
SHA512365328573efbc3f2ddc05ccadb7f112a0cc216aefaa0abc061ffd9d14a7d8455908e943d98744026e0c0ea771f7ebc2e0a72ba09ed0c9853d359ed1c48abb273
-
Filesize
3KB
MD5ce71d6806c544433fec462b10a17936e
SHA185ef0efe8820039d3c1977b792a9c1f27958c36d
SHA256907b5c704eb15e0129a2227928cc81ac352a7af66db32f912f1bbbc2d35fb996
SHA512365328573efbc3f2ddc05ccadb7f112a0cc216aefaa0abc061ffd9d14a7d8455908e943d98744026e0c0ea771f7ebc2e0a72ba09ed0c9853d359ed1c48abb273
-
Filesize
2KB
MD522ef740d4c1ac76e4dd72411f56527f3
SHA1865cb13f4f1c60a94893a1790210bd8e954fe80d
SHA2560ebd6e0ace89d6f9f7acbbae1c2bf9690ac5280d9fe719a024009ae8dadedd97
SHA5124869331e2e89e7d73c0c1c84a4818ed268b5b3f9773af7950bf26dda9f5aff1699df75cea6285de3038f3b7801ff53aae56e593620c55cc009deb4379d193484
-
Filesize
2KB
MD522ef740d4c1ac76e4dd72411f56527f3
SHA1865cb13f4f1c60a94893a1790210bd8e954fe80d
SHA2560ebd6e0ace89d6f9f7acbbae1c2bf9690ac5280d9fe719a024009ae8dadedd97
SHA5124869331e2e89e7d73c0c1c84a4818ed268b5b3f9773af7950bf26dda9f5aff1699df75cea6285de3038f3b7801ff53aae56e593620c55cc009deb4379d193484
-
Filesize
462KB
MD594d87a756037c9f3887603ebe0380c02
SHA188af15169aff5e5f661f369342ee24a9649602a7
SHA2560bdfa8c8dd00c8b20bf49d5bf6ab55432cc168b40be920c2ae8963e2d15d11bf
SHA512e7a43c1e4afaefb75889f6ef0ddcbe9ff1373f44fed92077c8c9c464f4ac3a43eaf9b170fa554669707c27b1a67ad0bc5ca17f0d427ab08f9edcd17fc6f48ffa
-
Filesize
462KB
MD594d87a756037c9f3887603ebe0380c02
SHA188af15169aff5e5f661f369342ee24a9649602a7
SHA2560bdfa8c8dd00c8b20bf49d5bf6ab55432cc168b40be920c2ae8963e2d15d11bf
SHA512e7a43c1e4afaefb75889f6ef0ddcbe9ff1373f44fed92077c8c9c464f4ac3a43eaf9b170fa554669707c27b1a67ad0bc5ca17f0d427ab08f9edcd17fc6f48ffa
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
425KB
MD59cad4182d25b774ed3d69305a84f0d14
SHA14cffee5301b04894df53c50b54684e24619d7dd2
SHA256b15e8f35b848a0cb272a4d480235baec025dab7887409c0551ba810e3a15f7fd
SHA512565100515fb2a0af94bbb5abdfa3c486492c03650d622df57ea52a7fb63411664e6a9f4b5d5abfc19a5d859a9d109369da608733553f039905a2ddcf9f7063f2
-
Filesize
425KB
MD59cad4182d25b774ed3d69305a84f0d14
SHA14cffee5301b04894df53c50b54684e24619d7dd2
SHA256b15e8f35b848a0cb272a4d480235baec025dab7887409c0551ba810e3a15f7fd
SHA512565100515fb2a0af94bbb5abdfa3c486492c03650d622df57ea52a7fb63411664e6a9f4b5d5abfc19a5d859a9d109369da608733553f039905a2ddcf9f7063f2
-
Filesize
423KB
MD5c2b950a805988239ab8dd210180cc66f
SHA16c5422bb1500de5c1c4359c2d325f52fd6536164
SHA256256d85437db898a4b3469a36a48b22314b3bdd61ae7ef3fd8e26b678f6e8a263
SHA51274b89dd9200332fc2f9b9d1dc78b3d89073a396ff699c198a299685465741d1b62e695f04fdd5faf1006d129a9bea5f4b3c5094bc3598570a83b809968a1baa5
-
Filesize
423KB
MD5c2b950a805988239ab8dd210180cc66f
SHA16c5422bb1500de5c1c4359c2d325f52fd6536164
SHA256256d85437db898a4b3469a36a48b22314b3bdd61ae7ef3fd8e26b678f6e8a263
SHA51274b89dd9200332fc2f9b9d1dc78b3d89073a396ff699c198a299685465741d1b62e695f04fdd5faf1006d129a9bea5f4b3c5094bc3598570a83b809968a1baa5
-
Filesize
79B
MD5403991c4d18ac84521ba17f264fa79f2
SHA1850cc068de0963854b0fe8f485d951072474fd45
SHA256ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576
-
Filesize
1.2MB
MD5f95081677aee8beec744da748e69ec3a
SHA1bac531451512b3f4efabe8392ce8a7e907859529
SHA25688c0478c3147da3becee31533934e118d411f434a49286ed047fb8b9cee5c4d9
SHA5125715fafc974d9c4e2255aa767d5812a0bb15541da120b4e0fd686a19999038e30e03f0b0c6a4ce35182a0e919ed0bd7bab19c01287be073f042ca1c3760ecaf7
-
Filesize
1.2MB
MD5f95081677aee8beec744da748e69ec3a
SHA1bac531451512b3f4efabe8392ce8a7e907859529
SHA25688c0478c3147da3becee31533934e118d411f434a49286ed047fb8b9cee5c4d9
SHA5125715fafc974d9c4e2255aa767d5812a0bb15541da120b4e0fd686a19999038e30e03f0b0c6a4ce35182a0e919ed0bd7bab19c01287be073f042ca1c3760ecaf7
-
Filesize
1.1MB
MD5b4cf076297529ee664ab156da00483f3
SHA122b8f6811f861a9e84d8c3b75eedd3ab2000975b
SHA256ccce907e340b2d51a19d36dac2eea1c32db411ec0e492def97c1db75b6097631
SHA51208fc92482d1ac777630b9017bd3962aac4c88cd69ef0e01bd9040cde17bf0d76d349fe6e5d552b0fbf106120d688effb3f928f95e11833f07a0b8cd9ed4afa6a
-
Filesize
1.1MB
MD5b4cf076297529ee664ab156da00483f3
SHA122b8f6811f861a9e84d8c3b75eedd3ab2000975b
SHA256ccce907e340b2d51a19d36dac2eea1c32db411ec0e492def97c1db75b6097631
SHA51208fc92482d1ac777630b9017bd3962aac4c88cd69ef0e01bd9040cde17bf0d76d349fe6e5d552b0fbf106120d688effb3f928f95e11833f07a0b8cd9ed4afa6a
-
Filesize
936KB
MD54ce42d70b1b5a1934a4396e82f792875
SHA169e3ccec3aa7f64013dd503ab8d40bb8bdc39848
SHA2565a81c04472205315884c71b2711c662c16f898a5ee382304bacb40940b26f7ca
SHA51240cb93ba57a72d1d506f606e55d312024d0b4b1454a32f9ec924d5525e1b852d6f910167b64dde6b422e14401898a75abeb4c046911ef4e0fbbb43aab16c877a
-
Filesize
936KB
MD54ce42d70b1b5a1934a4396e82f792875
SHA169e3ccec3aa7f64013dd503ab8d40bb8bdc39848
SHA2565a81c04472205315884c71b2711c662c16f898a5ee382304bacb40940b26f7ca
SHA51240cb93ba57a72d1d506f606e55d312024d0b4b1454a32f9ec924d5525e1b852d6f910167b64dde6b422e14401898a75abeb4c046911ef4e0fbbb43aab16c877a
-
Filesize
640KB
MD5752d5c24de20aa272b412673d0a5f59e
SHA16391f24be3d6869f750924aa023777845fe23e3c
SHA2565e69cad1f479b4c4cae7a6cd1614e329a95668371826d24cfea76e47742cd626
SHA5124d9aaca54cd044a36e0fbce7649837936dc962715d6094df27067065dadc0167623dadc8acec414da49d8e7698ff5f6efaa9b57135a406c437c3dc04bf47d789
-
Filesize
640KB
MD5752d5c24de20aa272b412673d0a5f59e
SHA16391f24be3d6869f750924aa023777845fe23e3c
SHA2565e69cad1f479b4c4cae7a6cd1614e329a95668371826d24cfea76e47742cd626
SHA5124d9aaca54cd044a36e0fbce7649837936dc962715d6094df27067065dadc0167623dadc8acec414da49d8e7698ff5f6efaa9b57135a406c437c3dc04bf47d789
-
Filesize
444KB
MD59de3f985cd2e14333f35953548661ed9
SHA1aa9d9144480899bfacab7dcd9c2e18c16cd96d26
SHA2569b5ea0eb901113cbe9e405c961fb7f7e705c8d917c4cb619f03b7cb4d6b596d3
SHA512524fe403b9eb285cc8ea733575d1388e81f36e7faa06690373b4db116be9ed8896d8788591b8d5e5770b98a050f699205a5c2fdeb96e8839a61014b64b6fc0dd
-
Filesize
444KB
MD59de3f985cd2e14333f35953548661ed9
SHA1aa9d9144480899bfacab7dcd9c2e18c16cd96d26
SHA2569b5ea0eb901113cbe9e405c961fb7f7e705c8d917c4cb619f03b7cb4d6b596d3
SHA512524fe403b9eb285cc8ea733575d1388e81f36e7faa06690373b4db116be9ed8896d8788591b8d5e5770b98a050f699205a5c2fdeb96e8839a61014b64b6fc0dd
-
Filesize
423KB
MD5c2b950a805988239ab8dd210180cc66f
SHA16c5422bb1500de5c1c4359c2d325f52fd6536164
SHA256256d85437db898a4b3469a36a48b22314b3bdd61ae7ef3fd8e26b678f6e8a263
SHA51274b89dd9200332fc2f9b9d1dc78b3d89073a396ff699c198a299685465741d1b62e695f04fdd5faf1006d129a9bea5f4b3c5094bc3598570a83b809968a1baa5
-
Filesize
423KB
MD5c2b950a805988239ab8dd210180cc66f
SHA16c5422bb1500de5c1c4359c2d325f52fd6536164
SHA256256d85437db898a4b3469a36a48b22314b3bdd61ae7ef3fd8e26b678f6e8a263
SHA51274b89dd9200332fc2f9b9d1dc78b3d89073a396ff699c198a299685465741d1b62e695f04fdd5faf1006d129a9bea5f4b3c5094bc3598570a83b809968a1baa5
-
Filesize
423KB
MD5c2b950a805988239ab8dd210180cc66f
SHA16c5422bb1500de5c1c4359c2d325f52fd6536164
SHA256256d85437db898a4b3469a36a48b22314b3bdd61ae7ef3fd8e26b678f6e8a263
SHA51274b89dd9200332fc2f9b9d1dc78b3d89073a396ff699c198a299685465741d1b62e695f04fdd5faf1006d129a9bea5f4b3c5094bc3598570a83b809968a1baa5
-
Filesize
221KB
MD56c3f931ef8aa01804bd1d1cd0263b36a
SHA1c046e1a33e6442558c900bc72a6973d2ed480775
SHA2560bcd0da473cc56d859c5fe173255eaaec4ef130c8f87c6c0fb5ccde85dfba0b4
SHA5124d6075278e577b4b5522a43ec77f3b648bbbadd760b849bf5ab80803f0c44dd303b21e71acca922c306feb1a9dc405ee3891cefe5fa2ec06997bb3c63e3835fe
-
Filesize
221KB
MD56c3f931ef8aa01804bd1d1cd0263b36a
SHA1c046e1a33e6442558c900bc72a6973d2ed480775
SHA2560bcd0da473cc56d859c5fe173255eaaec4ef130c8f87c6c0fb5ccde85dfba0b4
SHA5124d6075278e577b4b5522a43ec77f3b648bbbadd760b849bf5ab80803f0c44dd303b21e71acca922c306feb1a9dc405ee3891cefe5fa2ec06997bb3c63e3835fe
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9