Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 19:35
Behavioral task
behavioral1
Sample
NEAS.f3bcc5c31983c4df992769a03546c4f0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.f3bcc5c31983c4df992769a03546c4f0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.f3bcc5c31983c4df992769a03546c4f0.exe
-
Size
298KB
-
MD5
f3bcc5c31983c4df992769a03546c4f0
-
SHA1
d589f8169fc7f714588010b6a6d5b8594a65ae8a
-
SHA256
5e62e4af480065fd6742a085643389231a332a7dd673daa79597657f63e1f47d
-
SHA512
0d57d4fa2e7f5bdf9c2a96067237d8dee35aaebe8e4607045cc22ed6e729963fd76cedfc573f8f8b02893db977b029f19a3c10a7ad98bcb875cc63a416a06b12
-
SSDEEP
1536:txfWbnPOxfWbnPOxfWbnPOxfWbnPOxfWbnPOxfWbnPOxfWbnPOxfWbnPOxfWbnP1:vMiMiMiMiMiMiMiMiMjucVVvJFWae/
Malware Config
Signatures
-
Drops file in Drivers directory 6 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\gmreadme.txt exc.exe File created C:\WINDOWS\SysWOW64\drivers\gmreadme.txt NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\drivers\afunix.sys NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\drivers\afunix.sys exc.exe File created C:\WINDOWS\SysWOW64\drivers\gm.dls NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\drivers\gm.dls exc.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation NEAS.f3bcc5c31983c4df992769a03546c4f0.exe -
Executes dropped EXE 1 IoCs
pid Process 3048 exc.exe -
resource yara_rule behavioral2/memory/1368-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x0002000000022889-5.dat upx behavioral2/memory/1368-6-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x0002000000022889-10.dat upx behavioral2/files/0x0002000000022889-11.dat upx behavioral2/memory/3048-13-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/3048-15-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x0001000000009e5c-16.dat upx behavioral2/files/0x000300000001d8b8-20.dat upx behavioral2/files/0x000300000001673e-23.dat upx behavioral2/files/0x000100000000aee4-26.dat upx behavioral2/files/0x000100000001dae5-32.dat upx behavioral2/files/0x0001000000009e61-37.dat upx behavioral2/files/0x00050000000006c3-34.dat upx behavioral2/files/0x000100000001dae4-30.dat upx behavioral2/files/0x000300000001db46-44.dat upx behavioral2/files/0x0001000000009e64-42.dat upx behavioral2/memory/1368-46-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/3048-47-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1368-48-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/3048-50-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1368-51-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x000400000001e648-52.dat upx behavioral2/files/0x000700000001e598-56.dat upx behavioral2/files/0x000100000000c0b7-60.dat upx behavioral2/memory/3048-63-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x000600000001e074-64.dat upx behavioral2/files/0x000400000001e64b-71.dat upx behavioral2/files/0x000400000001e64c-77.dat upx behavioral2/files/0x000400000001e64d-80.dat upx behavioral2/files/0x000400000001e652-93.dat upx behavioral2/files/0x000400000001e651-91.dat upx behavioral2/files/0x000400000001e653-96.dat upx behavioral2/files/0x000400000001e654-106.dat upx behavioral2/files/0x000700000001e5c5-109.dat upx behavioral2/files/0x000600000001e5c7-112.dat upx behavioral2/files/0x000400000001e650-88.dat upx behavioral2/files/0x000500000001e5ce-124.dat upx behavioral2/files/0x000600000001e5d1-130.dat upx behavioral2/files/0x000500000001e5dd-134.dat upx behavioral2/files/0x000500000001e5d0-128.dat upx behavioral2/files/0x000500000001e5de-137.dat upx behavioral2/files/0x000500000001e853-150.dat upx behavioral2/files/0x000500000001e884-171.dat upx behavioral2/files/0x000500000001e885-174.dat upx behavioral2/files/0x000300000001e8d8-204.dat upx behavioral2/files/0x000300000001e8db-212.dat upx behavioral2/files/0x000300000001e687-218.dat upx behavioral2/files/0x000400000001e655-215.dat upx behavioral2/files/0x000300000001e8da-208.dat upx behavioral2/files/0x000300000001e8d9-206.dat upx behavioral2/files/0x000300000001e8d7-202.dat upx behavioral2/files/0x000300000001e8d6-197.dat upx behavioral2/files/0x000300000001e8d5-194.dat upx behavioral2/files/0x000300000001e8d4-192.dat upx behavioral2/files/0x000300000001e8d3-189.dat upx behavioral2/files/0x000300000001e8d2-187.dat upx behavioral2/files/0x000300000001e8d1-184.dat upx behavioral2/files/0x000300000001e8d0-178.dat upx behavioral2/files/0x000700000001e883-168.dat upx behavioral2/files/0x000600000001e859-165.dat upx behavioral2/memory/1368-235-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x010300000001e858-162.dat upx behavioral2/files/0x000700000001e857-159.dat upx -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\MP4SDECD.DLL NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\sechost.dll exc.exe File created C:\WINDOWS\SysWOW64\twinapi.appcore.dll exc.exe File created C:\WINDOWS\SysWOW64\upnpcont.exe exc.exe File created C:\WINDOWS\SysWOW64\WinFax.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\bthudtask.exe exc.exe File created C:\WINDOWS\SysWOW64\convert.exe NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\iri.dll exc.exe File created C:\WINDOWS\SysWOW64\ntdll.dll exc.exe File created C:\WINDOWS\SysWOW64\wermgr.exe exc.exe File created C:\WINDOWS\SysWOW64\KBDINORI.DLL NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\mspatchc.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\NetworkCollectionAgent.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\WsmRes.dll exc.exe File created C:\WINDOWS\SysWOW64\provisioningcommandscsp.dll exc.exe File created C:\WINDOWS\SysWOW64\UserDataLanguageUtil.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\cryptbase.dll exc.exe File created C:\WINDOWS\SysWOW64\DfsShlEx.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\mstscax.dll exc.exe File opened for modification C:\WINDOWS\SysWOW64\msvcr100.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\pngfilt.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\powrprof.dll exc.exe File created C:\WINDOWS\SysWOW64\WinSync.dll exc.exe File created C:\WINDOWS\SysWOW64\WinTypes.dll exc.exe File created C:\WINDOWS\SysWOW64\cemapi.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\CertEnroll.dll exc.exe File created C:\WINDOWS\SysWOW64\EdgeManager.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\KBDROST.DLL exc.exe File created C:\WINDOWS\SysWOW64\timeout.exe exc.exe File created C:\WINDOWS\SysWOW64\winrm.vbs exc.exe File created C:\WINDOWS\SysWOW64\ctfmon.exe NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\devenum.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\dmutil.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\mavinject.exe NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File opened for modification C:\WINDOWS\SysWOW64\mfcm100u.dll exc.exe File created C:\WINDOWS\SysWOW64\Windows.ApplicationModel.Background.SystemEventsBroker.dll exc.exe File created C:\WINDOWS\SysWOW64\wuceffects.dll exc.exe File created C:\WINDOWS\SysWOW64\actxprxy.dll exc.exe File created C:\WINDOWS\SysWOW64\CryptoWinRT.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\fmifs.dll exc.exe File created C:\WINDOWS\SysWOW64\prntvpt.dll exc.exe File created C:\WINDOWS\SysWOW64\rpcrt4.dll exc.exe File created C:\WINDOWS\SysWOW64\systeminfo.exe exc.exe File created C:\WINDOWS\SysWOW64\xboxgipsynthetic.dll exc.exe File created C:\WINDOWS\SysWOW64\iernonce.dll exc.exe File created C:\WINDOWS\SysWOW64\imapi2.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\iscsicpl.exe NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\KeyCredMgr.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\rastls.dll exc.exe File created C:\WINDOWS\SysWOW64\Windows.Web.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\odfox32.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\ProximityCommonPal.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\appidapi.dll exc.exe File created C:\WINDOWS\SysWOW64\cabapi.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\dcomcnfg.exe exc.exe File created C:\WINDOWS\SysWOW64\dpnet.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\DXCore.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\lcptr.tbl exc.exe File created C:\WINDOWS\SysWOW64\ROUTE.EXE exc.exe File created C:\WINDOWS\SysWOW64\xmllite.dll exc.exe File created C:\WINDOWS\SysWOW64\sdiagprv.dll exc.exe File created C:\WINDOWS\SysWOW64\usbperf.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\comdlg32.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\SysWOW64\dnscmmc.dll exc.exe -
Drops file in Windows directory 44 IoCs
description ioc Process File opened for modification C:\WINDOWS\Professional.xml NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\splwow64.exe NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\twain_32.dll exc.exe File created C:\WINDOWS\explorer.exe NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\hh.exe exc.exe File opened for modification C:\WINDOWS\lsasetup.log exc.exe File opened for modification C:\WINDOWS\PFRO.log NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File opened for modification C:\WINDOWS\PFRO.log exc.exe File created C:\WINDOWS\write.exe NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\bfsvc.exe exc.exe File created C:\WINDOWS\explorer.exe exc.exe File created C:\WINDOWS\hh.exe NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\mib.bin NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\splwow64.exe exc.exe File created C:\WINDOWS\WMSysPr9.prx NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File opened for modification C:\WINDOWS\DtcInstall.log exc.exe File created C:\WINDOWS\notepad.exe exc.exe File created C:\WINDOWS\sysmon.exe NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File opened for modification C:\WINDOWS\system.ini exc.exe File opened for modification C:\WINDOWS\win.ini NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\winhlp32.exe exc.exe File opened for modification C:\WINDOWS\setupact.log exc.exe File created C:\WINDOWS\sysmon.exe exc.exe File created C:\WINDOWS\twain_32.dll NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File opened for modification C:\WINDOWS\WindowsUpdate.log NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File opened for modification C:\WINDOWS\win.ini exc.exe File created C:\WINDOWS\notepad.exe NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File opened for modification C:\WINDOWS\SysmonDrv.sys NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\bfsvc.exe NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\HelpPane.exe NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File opened for modification C:\WINDOWS\Professional.xml exc.exe File opened for modification C:\WINDOWS\setuperr.log exc.exe File opened for modification C:\WINDOWS\setupact.log NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File opened for modification C:\WINDOWS\WindowsUpdate.log exc.exe File created C:\WINDOWS\winhlp32.exe NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File opened for modification C:\WINDOWS\DtcInstall.log NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\HelpPane.exe exc.exe File opened for modification C:\WINDOWS\lsasetup.log NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File opened for modification C:\WINDOWS\setuperr.log NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File opened for modification C:\WINDOWS\SysmonDrv.sys exc.exe File created C:\WINDOWS\mib.bin exc.exe File opened for modification C:\WINDOWS\system.ini NEAS.f3bcc5c31983c4df992769a03546c4f0.exe File created C:\WINDOWS\WMSysPr9.prx exc.exe File created C:\WINDOWS\write.exe exc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 3304 msedge.exe 3304 msedge.exe 1228 identity_helper.exe 1228 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1368 wrote to memory of 3048 1368 NEAS.f3bcc5c31983c4df992769a03546c4f0.exe 84 PID 1368 wrote to memory of 3048 1368 NEAS.f3bcc5c31983c4df992769a03546c4f0.exe 84 PID 1368 wrote to memory of 3048 1368 NEAS.f3bcc5c31983c4df992769a03546c4f0.exe 84 PID 1368 wrote to memory of 4836 1368 NEAS.f3bcc5c31983c4df992769a03546c4f0.exe 94 PID 1368 wrote to memory of 4836 1368 NEAS.f3bcc5c31983c4df992769a03546c4f0.exe 94 PID 3048 wrote to memory of 3304 3048 exc.exe 93 PID 3048 wrote to memory of 3304 3048 exc.exe 93 PID 4836 wrote to memory of 4552 4836 msedge.exe 95 PID 4836 wrote to memory of 4552 4836 msedge.exe 95 PID 3304 wrote to memory of 4748 3304 msedge.exe 96 PID 3304 wrote to memory of 4748 3304 msedge.exe 96 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2416 3304 msedge.exe 98 PID 3304 wrote to memory of 2468 3304 msedge.exe 97 PID 3304 wrote to memory of 2468 3304 msedge.exe 97 PID 3304 wrote to memory of 864 3304 msedge.exe 99 PID 3304 wrote to memory of 864 3304 msedge.exe 99 PID 3304 wrote to memory of 864 3304 msedge.exe 99 PID 3304 wrote to memory of 864 3304 msedge.exe 99 PID 3304 wrote to memory of 864 3304 msedge.exe 99 PID 3304 wrote to memory of 864 3304 msedge.exe 99 PID 3304 wrote to memory of 864 3304 msedge.exe 99 PID 3304 wrote to memory of 864 3304 msedge.exe 99 PID 3304 wrote to memory of 864 3304 msedge.exe 99 PID 3304 wrote to memory of 864 3304 msedge.exe 99 PID 3304 wrote to memory of 864 3304 msedge.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f3bcc5c31983c4df992769a03546c4f0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f3bcc5c31983c4df992769a03546c4f0.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\exc.exe"C:\exc.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.freeav.com/3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd8,0x104,0x7ffb561746f8,0x7ffb56174708,0x7ffb561747184⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,312685010936358381,4497911957330627817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,312685010936358381,4497911957330627817,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:24⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,312685010936358381,4497911957330627817,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:84⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,312685010936358381,4497911957330627817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:14⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,312685010936358381,4497911957330627817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:14⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,312685010936358381,4497911957330627817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:14⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,312685010936358381,4497911957330627817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:14⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,312685010936358381,4497911957330627817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3764 /prefetch:14⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2212,312685010936358381,4497911957330627817,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4752 /prefetch:84⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,312685010936358381,4497911957330627817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 /prefetch:84⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,312685010936358381,4497911957330627817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,312685010936358381,4497911957330627817,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:14⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,312685010936358381,4497911957330627817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:14⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,312685010936358381,4497911957330627817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:14⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,312685010936358381,4497911957330627817,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:14⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,312685010936358381,4497911957330627817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:14⤵PID:2256
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.freeav.com/2⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb561746f8,0x7ffb56174708,0x7ffb561747183⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,14100649924123874392,3317148941563273607,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:23⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,14100649924123874392,3317148941563273607,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:33⤵PID:3012
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:432
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x504 0x5141⤵PID:3216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5e26ef8633ce1f5c4c228e04e5c50ea57
SHA1a98842ae47279800d01fba8d38a0abafeeddce7c
SHA25677fa7565934b06086e2cfe5cfaa0fd1f0f6e7dd8b98a6e0ba9005f02a6297897
SHA5125b12a1c69668c22cdc4104f45df4f718c73657726c6745382964cf8e8ba2f32aaa9f0d16e3ef5f18877196ff2bb9afa37a60d9ed4cea750ccd4d8feca03f8652
-
Filesize
6KB
MD52d327ecc2a1ed6d0ebdb1f89e402ec78
SHA1bdf5bfce102bd127b8643de8a7ca8515392440c5
SHA256d422aeb00c3c960eec6dcb434a09bee59ac7d26e327799547dcf650cc5fb5938
SHA512be3ad438beff6c4c3e89eed6ba032ca2caf618b107b433abc605bac3896b1201464802f5b3eeb20e9553b0db7d4d499e53b6b309c2e3b1765f9d51ca8e178a8b
-
Filesize
24KB
MD510f5b64000466c1e6da25fb5a0115924
SHA1cb253bacf2b087c4040eb3c6a192924234f68639
SHA256d818b1cebb2d1e2b269f2e41654702a0df261e63ba2a479f34b75563265ee46b
SHA5128a8d230594d6fade63ecd63ba60985a7ccd1353de8d0a119543985bf182fdbb45f38ccc96441c24f0792ea1c449de69563c38348c2bedb2845522a2f83a149db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
2KB
MD5f0916869db52efd56ca02e654300ce38
SHA1f6eb941ff00c1061db7a8785073cd9aada4b526a
SHA2568f1157a769516e2b9e8b7e1417894de74c247f93ded6c1e3c7e5b932c56faa70
SHA512ef17c125ab106d532632fb2c2dae0dc1c5ec555be44dddc1c2e5018b1e016bc1bf6cd32776719913294c792ba94b7505974f383a552652ecbdf289547e0c3bd0
-
Filesize
10KB
MD58237724531c27cdbc01dee9a262be8db
SHA179caed4b0baa46d96f99aec97340b3e7f1c82fd0
SHA25604c65649496763d85590a2c0ab11ea32f29b1ef4c197858b7744b2e92e3c250e
SHA512b44c39c3e1abdecb667de575db92e2e6fa73ef4fbb98ec7dd884eae4a916c53a8a39dde2753e890df18a68c989e9689be654562152abb51f5b6f5a3faf477007
-
Filesize
29KB
MD561f59f823bd4bf1972267a5c41d10494
SHA1bf6d3909cc469e53abd1b0d1a2538188fe301139
SHA256b49b1a1d9453139a79e6e44486bc678bfdf3e28db545a48b025f4dd23c81fafb
SHA5127979b50432253af960240631471533a6b903005046e0b21ce04bd3b7ade1bbefd1d4f7edc55d64b8f174a273f3750682774d754d6041c6b13f71b9069effdac5
-
Filesize
28KB
MD5ad62f0957979a18fc71dc919378d8046
SHA177c724fce3dece4b5bed4be3296e50cfd4a38742
SHA25675d3b7e8160b6bd6f4d8c61c9e432a5821428a9e1ad2f88f5dd3a8517a425c76
SHA5123ad217eb596b7a0d90f3f751974833877c3cf99827463d7a4ff8f711eb6d533e2e7a98ec5e133f5b57007f37486158a0965cee57193daa779bc321c9261bee1f
-
Filesize
57KB
MD5fa8664152981301dcff6d0559545f2bc
SHA1628d2deae7cde31e91b961bd7e5cfb171845f79b
SHA256bc4ed078149fe4c0f6a3e03de08874aa967617554c11b55081f21c117e9e3adc
SHA512d38d47988c03824df038247b635360ead23a30e6c948fa102729377ddbec135377a37840f24ea58580c3e07559dd0fbd63024c5a0008c5a23c15661dca325db1
-
Filesize
162KB
MD5234adb4f2b7fe0c0d5745d45d61c4baa
SHA161c26345d1b880a80722f5b1955f8ada9dfc8f48
SHA2568b971180cc215fdc7a9f45e75f8215ff3e5ff59af9543d175ed38172947b73b1
SHA51264469a19ffd5087d5b85eb7fb71bafe9dfd42256babb8e6375069719882bb127a478aea91e1b9ea748488bf7bb637e9707877f7c086181c7c683f27520759749
-
Filesize
188KB
MD5b2f11223ff81afe3cd735f10bdbe2b39
SHA1269e0b987d0a6b001157bf947a8f8a0fc6dc3cbf
SHA2568164de18e9a6047a9cabed74345a2287d21d46ddb5f6bb48c825d0b81b198da2
SHA512a3a6434af008194c063c40917ba54d81aadd21b8615cf30b1b835138d51630ed468980548e0233da105e5960d558419fb11c3671031f5486b67d7c16543a08e6
-
Filesize
238KB
MD570d9a9a12d2f1ab4c5546d0ceeeb7316
SHA156381ed47c9d228395dc73cdcbae78c654b1f4e2
SHA25632ab0111c174197472aedbf065016e227c0c169ebbffbc2fcbc39666f5031a36
SHA5126d171f9e74721128c1baaff8c78308d047d1b43e4b6b0879ad4af537f37748a1714fe418f4f68c0964a26626c72c0e8df6506aacf336d52314a6ad66a1dc66da
-
Filesize
28KB
MD5b3a048db585b01eee041d9571823b895
SHA1f05bd693db0b0bddacb85338e38e83648abf0e84
SHA256b4006ad903e1a110f369c0f31bd5ab0465b4ea568e203953d7bb388566d758fc
SHA51245655c6a7c929eea9ecd444665f5a72868a0c473d665c7b13900d147a8486c7845e55dcb140b41548602037edf18e645963beef05faba2fd8b96aa089d9757d9
-
Filesize
62KB
MD5a91519a4b5e2e509ebcb154607e99f00
SHA1e450460a405fb5f2aee1d3aa894ad2265232e450
SHA25640facd7b945b73a53be41e17da3a936726b39b008cbd65936aac0d8bb0be1a50
SHA512e3652fb0be915934d9ea2b4a4a9d03ec32d31e8378f57933f9a26931ad7ee79714ad26c30010ef53cc183aa3aec3497b9d455ab118cfb45c8814cc23520c364b
-
Filesize
90KB
MD54c7a0a4d84fe15287d399a6c0736fddb
SHA16edb4a806d7c056c6374fba558a418cf7c4b374d
SHA2564453ece1878bb58db5f07c5541ab7a911fec85e581ccba56180ceccfa76895d3
SHA51272846959803196167e202967e054079a699ae5b9d1ffbbd2232dea81e362752a87c76f660ec2ce7040fc29029e7ee8011fff90788ee05fb3e725b7f4b6be3265
-
Filesize
109KB
MD5d9421df55ea998655fd76c7691db651d
SHA14e721a9bb2a4c11bae9ea52d6b9da14c788d157d
SHA25668884796721f9fdf9cf14ddd59b693be73ba80acac9a54cd7bbba926db10434e
SHA512db158a02301a531b5a8be3138018cfbede2ecea912893dcc5552dec13cb9865ceea13c674765a23daa920000113e1f74c0b6a36096f0ecdfa46581686b9ba362
-
Filesize
117KB
MD52b3368e7f446e1e624168e434eba9523
SHA1261caa1ffe875a03b9dbda19fed4a41fb6426bee
SHA256953e4d2afc62aaad99e879dc39b40615fac78ab94fb1fbbc0cc39ad816fd450e
SHA512eebefbaa080b762168916d7be8f3daf09d0f7ff9526316906a70ddd8c363e177a097a3c868abc0a695cc3eb3299774f55130adc982a53d91e87fc53b3e46ecbe
-
Filesize
118KB
MD5c09c502f140b5b11bd926f83a6f13c4c
SHA12581d470491d5d6d7e8ada22666a006c7f13e22f
SHA25672e2921fe8c12f31091bed7a7230f0a0186be28476487064d696fbcd556f7750
SHA5122d4784780d0a373522a1dbaeba05e081969b9687a2c4346df9fe63a9b4a0a3ff861cde1bb7437365da578d15e0b52eade97e250c82d546662ec4eee7225915e0
-
Filesize
116KB
MD521884ef57aa4e8fe8cb5c3b70a0c95fa
SHA10f66b4c42737b36ecc3ed1a8ab6570f8e09bc0a4
SHA2565d0e403cee707f33fc2bc25e900d671bbbc2f63e490c57af2ac69c559486e3e2
SHA5123dba51a23b550af384ffd9fc2f6aeb0357cb662a43603e8052ad54752e7a3f600a50d18de777b4ea5405ae866e87ad81d3f7d97764e4ce3a6c16db49c5cae72f
-
Filesize
98KB
MD54408408939fb0f65cad5e5a3cd7be14c
SHA14b17ada346e4bdf1f2694a6ac5128f3d21c841d2
SHA256cf8e2a8057d086a0e65d175f057845ed245fd09b720c7aa99837436c01dc366a
SHA512e504f053e53eda7c95db5091163f0538a71ecf4b920ad1e2b2857d9ce0f87de00a6bc66872193dd848b716a632fd817e13cccfdeb389d57b63fd5c2d4e42693e
-
Filesize
97KB
MD5e700f757bfa8258767f391c5e964d936
SHA17e279378e72202948882cd943bf7dd806b7ef19b
SHA2566e6966506c543c0fea7dd32db43bf64a659d62cdca50d9a45098940f9d79bb7b
SHA5127f9aa15b018d77110202066f8c4ca72064f6d609cf25a773eff373b6034931b00b239beac34996f2073337d708e53eb695dcc91bf1867c673e1e1124e2209237
-
Filesize
86KB
MD577b5dfa89f18c0274ad23f370f3e311e
SHA18f1438be80c5169bf704e1a9d3a501bd134601a2
SHA256755a2a42353b75afa0e469b2e5e0222e008b3573daf2b04e6847bf5c6cec9117
SHA512ce75f90883ca9c39560b5c2cb6d062564f9e18ad77c6b225e247fd8b10bd32acf342569c0cfb02af2709d10c75d9ad8059c978d0fe51e8a7807317390ff36fad
-
Filesize
4.2MB
MD5cb6e2148fc50adf1361d2b6ea5003013
SHA17c63db63d96c8085ae4b0a2de02111dadf5dc878
SHA25637c4108b24dbc062e045d1fbac7430b099cd8dd52ca735da789cb4736eed1535
SHA51228c5b714859a482c0d1917b647c1d011f9cde5a5a60ab365525bbc4be053c6e44aaf67e14abfa7306c239ad3e4cfc332ba33a682b2f52d15a140b665da89c7d1
-
Filesize
4.3MB
MD5582850c3793bf5748e970cbfd3adf8e4
SHA17a518b3765165794bd0c20c248e347b1b55f913c
SHA256d43936e2f7e1dc7932b464a77b91ace34cb98571aae9aea9c3e5b6157793d5b4
SHA5123cd47c00811a1fb76b7e81ff4f2b8140259e73a1d94c80e1e32847ea6ec55dbbd2531bcb8edd73b04284252c2daea1375bfcf42afabe191cdce082a6459626f6
-
Filesize
100KB
MD55391876c108f1295f8ff6edffaefe86d
SHA1c39bafb208b210f1dfce0cf6ee04334d0fd08feb
SHA2563c90e1a3d23f2016fbde09aff89b0f1b5d0fb6631f02b09e112ce84610f63857
SHA512f69cec2c9d33efc3f8737e682fee3641cdec7f8b260dd8ceefb7d84f7b3630694f8763062e635ba03a1e2dac1dba5f5e9b19f1cfbb73253f42166153e1b8c9ef
-
Filesize
100KB
MD5988728f01ec7e5bf1981484e6cf2bf83
SHA1c3e184414c01404ee01aa0fe2c85ecd68aa7a71c
SHA256d4d34484476630a072f4445f5454a8d9b2f780b72509221dc24271a93b2ba24e
SHA5124fa3860a7810062493e1666f9444ead74dd519fbdcbf88cc6ec6032a4bbbf401226b7300c0b1d87188734b81ffe66cff16830c63ca5d793e54f722798f39ef65
-
Filesize
128KB
MD5eeddffd9bc14f3f7653022ca612e944d
SHA1d8003db5ffe855ed50cfb7ba0aba5306921b9857
SHA256d8a2279a9a5645c860543a4bda2c8db7a4ea97a57b0e94cbeb8546a92f029b2c
SHA512b40a532076c998574463744cee161b74d13d01539efcabb280f732369766777e4ccd62a5c80a265e15fe260315dee75773f0c711e4b0c3ae19cfc5d131d33ac2
-
Filesize
118KB
MD5fbb93dfed076be56c03df4a358021e7b
SHA189ab6f01fb1983f0d69f64938e4f047630c21a38
SHA25630f9d5af6b2809128ab1bbf771032a176863433d257cfcf8769056ee5f5d8bad
SHA512f772de475bcc0279c01ce539cce9664c51266f18f11ae24ffead6a77cdd1fdfcedb8c528b97b8d5776238532ff72fdfe9c2f77b3af24381b69efe44f3d7a092a
-
Filesize
127KB
MD5fb762ba8a1e4ac33054f4e5d71579c80
SHA1b43e135f96c865c0a39c51d9133c60baeb7caf50
SHA25607b671d51f3a752543624deeafd5d41d376243a710efc24e8d9af147cac8c711
SHA512e11e5324cf6db5f603faf75ac1fdc8b1335acd94d81402a76a6c1b8049cb0d341960c2f4b020cf32f9faf372dd42f44540f4f34833e6ff9d18e5b382c58694e8
-
Filesize
128KB
MD5c1f342506931a1af786e10bfceddfa37
SHA1da6ae8dd3c5de6e795b05e87ec06b606fd2aa76b
SHA256208f1b971158b035e85b007953cea26ca001c00e99c306a7606d91d4b6f5bdf9
SHA51204d1a9e7afe8ecdc9ffbc7fd52b4d4ee55df3ef9d82cf156c552aef6e6637090af27f617239a45d2904d895454ec6d35561381f18a6660a3946936eed682b41b
-
Filesize
126KB
MD5e6ebd6e8caece7ad9ac398c454fab8e8
SHA1b8fb014cf4cea7326c01322adae76c8d44789a56
SHA256fc7d561d37479e33151ab02aa7d7e7783de7e7fbbb98704a7b39f8e80aa0e9bc
SHA512f84cebd97de895335151fca0a711cdd27926b907a7e59af896a846381299acca4658f87a94b54216d3bf262f9bc8bc7c0459d48d7f0e07bdf9af428f340ad595
-
Filesize
107KB
MD51763bd54dfaa64c1455ffc3455888b40
SHA19140c472511721de529c2232e11d3d643e157458
SHA256156fa2e38b81077705de0cb08fef76a4910083b4d87f2a5f34b4e0ba22d3ae2c
SHA51201f8ee51869953d0a3ec65381ab023fc1b802789e3a8c867e313bc53796db4a081e171e6caa6aed23513260e616968b48c2481a2cf67d571f5a61a9553b8bb50
-
Filesize
107KB
MD5a2e8719899f5ea84529a937d509d7581
SHA1ebda792f05a73254da2f3ebf1c39dede3233d7d7
SHA2564edbb99816d8ef717fc4942f8e9e3f986e58579040e94d8ed2b1bb97700a0950
SHA512a5c74303669118d5e52acb131ed326b2be4b63d5200a38a9406e958d2403f45aafdea4730b410302cc15a367105d332ff113f919f2fbfc305ee8d885632856b6
-
Filesize
96KB
MD5bbd9efe8199538bcf7994991af34acb3
SHA14354faf1c925dc11f87a4353798ff80dae21c453
SHA256f8609af21937c4f0e344bbb400d67f853f0c051aec1b23a47ba32d1522c7d908
SHA512d5dbd838e15b28e6e1ba84cc47efee2217e2a95826cc8aa09aa1a47fab50af956c04b8684f83e14f972cc46121b69bf866999699f5b6558f708aa7350f7d63b2
-
Filesize
4.3MB
MD53c46e85bca20fb2c41c77af9c3f7659e
SHA15e29a127c29359da8682c113e4f288eab11bcc61
SHA25676f3a52918cd2e86a02dab0ec800711c58910c19ac5e7bb5f051ad1b52ac8df9
SHA5124163f4a3cc0a20379db9803f7e5df79a95d09ddca86379c4b2b192ff9e6134aeee14ef07f142fb38cfae48581072877bd723855c5fb29d5f135eb0a23f5414b2
-
Filesize
4.2MB
MD5a3c39ac4e75c066189f8b3516c1381bd
SHA12b624ea475759f6a929f06a56819e8d46c45e8ad
SHA2562558fd654eb2f530046114f810902b46eb15a217c9d252442ef86ec964820cc9
SHA512bd39340a8789e271f43dfbdcaf6ab0d63340744bf5e9c458af4dd4eaa41de35276448d0cd6d0c89c86850ab9a610a5890964324b8b3aeeaa112a3126ad4fe33c
-
Filesize
72KB
MD5858eaa0d6df4a277514c56b522f5ccb4
SHA130724d2284024850b5d18b2acc2c2660f701b4bf
SHA256d30eb71aa93c25c37f6b7e00a28b2ed42a1b456d9d64655d511c98417e170ac7
SHA5123df9b856663f46d2032105548f7a046168742f324150eee2002cf52913ee86291b1a54de03ed5f746892e85359067307a5ccef0d47c95540ac2648be6cdaedba
-
Filesize
72KB
MD57086cb89f0ff1997f0b9c326aa153efe
SHA1eaa4fd90bc4603c53e54498d603a1bdbf40d8335
SHA256a80efa6a94f84b4cedc7bce0ef20d242a7fe89e746e455fc608425081d47550f
SHA5122eefe3d7f9a911ef29845e523eea7af3a8854cb434df7814727d168c4cb5892983080b55f11d9fafec4e65dee82d363d15f2383b5f2c3d6c735d76ad3d832beb
-
Filesize
100KB
MD51d62fc0d94ec901e47c8c68eea1679e0
SHA1dd2357083925a545091cd7c73d7d3f4676037499
SHA2564ee8e441b48f7c35a9aef573fd037895f90a041573d5dab7b7c504c00933437d
SHA51257de04a5c6f8600bf3539a165a25d308c53f570bc9b6c1c9b1d734986481e76dd57259df507eb89e64a1b99e64eacd888f4ddaca780664b01b5079466d7d1b5d
-
Filesize
91KB
MD52c7a3935e482c0cc1e9ad3fe0e174190
SHA11c53897ec98b1702ec39f679d14a5d431eb08f27
SHA256891c573080c945e9a6e7d4c06a3d0e7b2b194a7537696f81f281e06421d9177a
SHA51255ec353142ea9fa17cd5f9c7bf830b6ca37f490d168e5ec892c71418e6beaa4a99dc1913dac8ce2b95198d281c6fa7da069169f51982b5870efc15da434702ce
-
Filesize
99KB
MD51597699aa93c6700f778148c8cdde7a2
SHA16cfb20d92b367e6c60c5d17e9cec699401c19163
SHA25679e7d6169e198aff018926c6f758a0b53a120a49b5e64668a54bb0690edf1d06
SHA512e208c518c3895f5cad57c5cf3eb3eedef94ab6bd2874dbcee77c6e7d512a5dc17862d44c1ab16d4aac76588e70d0d24aa13e48dbac9cfe5c160540a1925dbf80
-
Filesize
100KB
MD534529925a174732dac4273f1ad9ec1d9
SHA1634bfd9cece3a6665c557f1e5debc74621e910a1
SHA256e66d5aa9835434e0cd033af6f35922bcfa8255c2438f5f194a9f52def50c3757
SHA5128f204b143baec82417891e3301f919c98db8e563cdf8acd655981a33935f29697822c84e86d106c594290fae3d97e43f34351c3262f2ecb78b666f4bc7079872
-
Filesize
98KB
MD5ae7817bfebbd3e684a8250a5fdc45095
SHA1daf2297bf7c94eb03186c1327d509beeb75e5bef
SHA2563c2eacd3ed98de1109a99d74c2b68bb4911a1381e356bffaabee18ca2374d9a8
SHA512b686db90ddceb1077a407ebe1c01e3e31a5628b3a53e2f2b6d76c6d0e8792d8797fed8f4958871938e163243ee6eb836308747b929ef3777fe1d20adb1da9f96
-
Filesize
80KB
MD59bf9bd0db8ec787abacfbf82067b3f86
SHA169bc12d5dedbeb0fc1a785c6db4dc768c6ea686a
SHA25618abe9cf8fb271dc71c0035a816efbf02bff313225881f03de7d0ffdfada20ee
SHA51271d443a05337a719d7172fa5de325edb1f9aa6b8e1fd3af12c4f068c5ef75313cb4f57db94be7197155dbd1c108db77099253fc8b52f3097ad456a9bf9fb5ece
-
Filesize
79KB
MD5699f7b77493d4b41e2eaa39725e97d81
SHA12b34c38472c9d9429b1443c45763a262ca1e32c6
SHA2567e5b51de16f5ca6bf9dfa6b133e108921bda3bb5383053f9c3d322e0ddb03288
SHA5128a717ffbedc8305865097c641ac5ef77d081d3204468b8365dcd76736fe4c55fac48ada38d26d6402477ca8086586d13be301f0e8c55b40fa7810074d19b832f
-
Filesize
96KB
MD53812d93e6065e1f41a75babe6c94d5e1
SHA17b0c9db5a2f4fd01ac575e37cf21409c197352fb
SHA2566dca493dc2e22d6930c245ed453002b4b9e017a135d691f3fd4dd20f4e64be91
SHA51212b82a20f25b1811d0a894b965ebbb9f232527506ea42d4b7c9c131910a88e79793a18001e4d0b3d5bfed631c3388d4e5f6c1c5250eea9fa49d4aaa8684ae4be
-
Filesize
4.3MB
MD527ebd57eae413e91c9ac20852bb1ff34
SHA1946e405437fb2ba1097bc772793d1a06bd2f1cb6
SHA256c5f42c6bd913a914ad35082132ba6b97ec487abd1c51bdc42c4c8539b69fa780
SHA512b35586cef44329ef0b2cfa2beab0fcde4148ed1f69e9bacae312649f27d8d98f6bbe7fc3a85f6634d27b7f7db548acadd4d1506000e8f72ea1d9444e7836b53a
-
Filesize
4.6MB
MD529d6dc4eb23ff2f3d5f3ef0edc9fb10a
SHA15b0a79d543bf70c01212c6d142e6ecc2d7eabeab
SHA256c1a338f23a36e7387868c964a6963c6f998cfea38d496ac0eeeab58d4c99c7e1
SHA51218f9e05947f7120b50fb03120fd62f24a90d4ab92bb8734692457ded5ff68f00c599bf4129481c48421e8cb082820a44b2c57d7c3e9f35056ab47031825b699c
-
Filesize
94KB
MD5109902595d026aa8e919abda560db732
SHA1220eb1b2a12cc950da844f45c212bc67a31e2a69
SHA256f01c24263d7ad7c3d8acaf03afd90ce335250c81056b081c5404c8b2d80de12e
SHA512e5d380e55f8e26ef0d7d0f5a7f2d6d6bf6a15104637e8c58e84e1bacf7ae0009800f568d67438ee6d642bb950a533a7112a7b248abb2f97cf828f9150f5317e5
-
Filesize
94KB
MD582c4b1fc102cc56225573a5c4da2ed9c
SHA1402c188414d1eb6ada03e8467d8fad71ebe7805b
SHA2563ec0930084debe7297abf6b131ea9e766705a30a49b14e4e94923480b8a4f8db
SHA512f3865eb4ea0dddec641725621f62d2cd227a418e71da139759507fb8ea540c65e8a14a1587a54d3baafa6b8a598559254da6f778514075f20c3c0fb95d1d8502
-
Filesize
122KB
MD5134504713343a523735941d2bfc7bf70
SHA1a01d528207ad10d1a4ecdb391f3d8e32c6756a1f
SHA256eb766d0a5aa0fa122031bf239f534acddd7fa6bcb3273d61f11cf9e00f12fb8f
SHA5125d5b5652ebf11d56a02cbf464916809b1c35f2396298794eafac82a42a85c630bebb2c05db22ed66ec4cff3cc60912574dc761ec0621aaf27cec7ff3b937dc5e
-
Filesize
112KB
MD509d5d62795b80f80b4140ad901087c5d
SHA17c7b99e1706a04ce0fd6408fc963463b305fbdc5
SHA256b42441bcfd4ec380557fa394a1c3fd9ad79c977a5342f1a91c81deb52c61c0f1
SHA512f68862274ffd79c8540df676b7e279af1a85b788eaaa85be1f3e76258b56dc3c67ea91957984cff82dacd879b86f79f328408a605bf8574824c43d0d2ff8ec4a
-
Filesize
121KB
MD5d96c1a90b652116e5b7c25bcec53faa9
SHA1d0e650658e01823ab7246aeb9e7f98c2e0eafbf6
SHA256386f50ee1d318856b6dbfb604e610e92955952d8739ebb3b8918920949d9d2e2
SHA512edc245116cb60b7aa0254d9aa4815a8a4d6d089856af1183c055511f89599ed5958fd69125179a90aa3eec18191ad24846160d5dbf45c480b42d2a900ad6da0c
-
Filesize
122KB
MD590e77e5f644b7ea4b581c9729c6f4474
SHA18064478e5d40e1a99d91e0f8fddff2bd6fb5ff59
SHA256cce0dda00324fa14324a5ee86379368d3b0a52ba39dbe15007a3331f1256e582
SHA5122297672a668ad415ad31ec47bb044494740eedfa639afec474ec9b9fc0e541a977dcb0cf3738901fab6c2e7a04dfe7f51613060ee3d6e20fe18f120e0f667264
-
Filesize
120KB
MD56defe8d76e5b2f1e5110817663583177
SHA15acc0d7140ef07abc81f171b015eafd8033b34bc
SHA256aada01ae46bbefba87e9a628e7013660ef8255b046bef352fec9c97f448d95ef
SHA512b999cb0e3d2068ef21ad2700ad94481c226024333f9293daa8fc2e44c0691ce9e0d142761979553bdd2083fabd13f85aa195af6897c85f0e6e4188ed5639d2b6
-
Filesize
102KB
MD5cf192318c42b7f775bdbfb80f810f73d
SHA1e3d8a0a23891c6bb8d2d7d80c8f796087e6125f5
SHA256e595bbfea5c674ccaf90a76a94653b27b345836090f93f70c4883e2d36bd70f2
SHA5121362eb4b1e545edb7abf070d6d7201832e6e204091d4a65e49b0ec7df607c44e5b7ca70f0461d7ae72a26d7434d46821422cdec197a56929c3341ffc62a0c532
-
Filesize
101KB
MD50b557ecf13fc7fda17583b0385e3dcfe
SHA18c61403a928b9fce6d811d15fbd5945c0602a7d0
SHA256813c92db6741b5bf9ec781f0f1305cf56301d08891821d4dee27b40625baefe1
SHA5126910b1d8fac7ae9f265ff43eabcba0e9556c7076347488bbd19b2ee91abbed852449d27c2860528644fb130644783cfa2ae1c60463e27302ee279a4292a8c6f7
-
Filesize
118KB
MD524f81f1a20245c5e5a6b5042102f344e
SHA1779ea8770626d50722d5955b9c55afe6a5b3c98b
SHA256ca29a954dfc141f8417b1241aa9525d6317085b49e709dc84deeb6f136616a60
SHA51253e4dbbebc18b42f193116629e7f8d20a54a520b74d68e72009ef7efe633a986adecb228e6b84f304923c92482922b1e93d3096ca4746738735277524563fe49
-
Filesize
4.7MB
MD51bc91ac24b927fd9a6519c8b3f848066
SHA1a9a2bc8e0d4e1807516b53fea9e6d475eb81458a
SHA256882e60eb4e78bec631f2cd795c7711a2d08642d1a4b034a93d1f00818d31a6e6
SHA512dbac5cc9898e496bfacb8b29d473194594feb1e572806ff95102e21a9662e15ac6fac51ca6a6d543d7cb2fc19aae01f28dbd64ba26295029d3072800a0f8f182
-
Filesize
107KB
MD541dac702d539c69221add599c9d97522
SHA167e796fb6d0bf7c4b6338c13bb63f9f0da1b7f5e
SHA2566f1a6e817b2184ff851e165a18c6a538c2035a80978da767d9e14bff3acf7baa
SHA5129b4cf9128486c2abfcc1249db7a86e5329b46310bc323a9b38bf6ac61e567a0ca047df1a4cd4620c3f9fd135d7a0583e23dd8ff2bceabd587e6d23cd107fe3a4
-
Filesize
107KB
MD58d7489bd306c1b87e8c7433b4cdb79dd
SHA19212f2f69e3325df9481cb5ee2cf660fae17640c
SHA256076fd15b190adbaf0763810d24ee67348c558cc56a66840238b3c58362cb430a
SHA512473f8bf9b3a0b3c6ab54ee2ee8b997636fb10cb9e99cb54c7b6c3196f3036948fbec6a7060ff1fbc2429db913c11882e9532f13407fd6d110ce35e9e77bcff14
-
Filesize
193KB
MD5cc1e23af248e0ce295851784a5cd74df
SHA102627b6c9735f4370c5df9ded51b76941b829f3e
SHA25666dce895bfd2730a293198f48228ea5ac3596943e7526c2c1c379a6184886276
SHA512e61afdace87f79e4004563d250692113796ec5d5b480aa62dda50e157643743dd0f2327020cae918dc606fbed767d5111e3696164b734d72940bb16b3d985749
-
Filesize
55KB
MD5b76d25f73d751352ed0d81f9c8ba3040
SHA13be1eda16c822233f150e4088db060bc7aba7d50
SHA256f40f64abf4cf3cc4a0fd34fbe1c639700fdfaf9069e09a1fe1923361b55b2870
SHA512320d586906d2d68fc23d15f326d1205cfb7ef4ab5811ffaaa15265ca0d3a1ad27200d24b98081c66d788043128e46ed9297b0e43eb2278c7f651831047ed8471
-
Filesize
28KB
MD5d8727f947364a29295681e2b45eccbda
SHA130f57b4ebf546bf253d2cc3e446985cb6be9d9bf
SHA25609dbcbab7c03cbb31d49e57187384a4d20f4a4dcbbcf8d48f23db3f467ae9a1e
SHA512d92e543b83a2bc6997f2bc6268d5d37afcb6a1ffd07c27a04b119654f7066cdbe423f6a5ae68a1c4fadd9462176d7aafe8a2e9434da1d90c6f8f20c903260adc
-
Filesize
28KB
MD5ee46d5c0c1c0ebb3eabb783e6df07068
SHA13d82a85ae1ab4d5fa5199c241ac39ce6a6973279
SHA25601c5bd1fc6d2d07eb17180ea45a84eba4a4cbf695d5f13fc5b5fcae2febfe0f7
SHA512c37672b71444c1d0bce83be9d2459f5d9bea7b09db1e183c6857d8e311786e05bf893f031397cd0bdbbf91c90f0df432aa261f3b4975fd3e976bb4599254219d
-
Filesize
55KB
MD54b198e3f5b55881690c5cbb15bdeec19
SHA1333b9808725bfef2ada9a1f4c647bcb890ffb627
SHA2566d01d0b294ae0db33155ec8e3511fefe6d423423e93e3c781698e28afe3e33b2
SHA5126879fbd055c10ffefb031937154095458a02ccd7693a4a90715caf6dac903c0eefe9ac52f20769850af5471a77b2cf30066a4c68232c5d8e34ba15aac0afd4a7
-
Filesize
27KB
MD5d4ebf7b052f86a3266f60ef37b4b08a9
SHA144a4b6cdf5e31938846ed05db422cb3b89b5d505
SHA25641ba3c94956486132a724b8f89d12919e424de7c87a997ddbf74fe18e4181811
SHA512ee11415af2e6f188cc1c04cc66c382d58f3665c3f0d9dea97abd0756482508a21177112fb7c25859902c94a314e1f1816442bcae67787722c7f3b9930e8373f7
-
Filesize
55KB
MD5922087437428cd75b372c5f72773a69e
SHA1fd999d5eeb475bf8ad7256825800d02b7d86455d
SHA25605b3d60acd93afbab7e50b4194f85d8d0944027a51c64f05aed1ef5fef86b6c8
SHA512a0c0ba2c035155f6791ca04c01435d4340c5c5c1362a64eb4fa1b125f8e883afc9145c062cbdb4b49eecd7f7bc81c4f10d4457746550a52db551c05e1155761c
-
Filesize
270KB
MD5a00a47098d55c17b1fe69c9afc6c6b65
SHA1ad426c19f7e0a6a12fd8e6c611d25bc727e167ac
SHA256677032e6b73beffbd3e6c6b23285593ba70c793663f7786c67f59d81f5d0062b
SHA5121c057c631b7cd46aea2a3750395b65f0fd27b3df29191199a38329ce2413587117faf65d64ab9c89ce43b5f016526b21f1755be4b9f0c05e8890bb8bca3aaf57
-
Filesize
270KB
MD5a00a47098d55c17b1fe69c9afc6c6b65
SHA1ad426c19f7e0a6a12fd8e6c611d25bc727e167ac
SHA256677032e6b73beffbd3e6c6b23285593ba70c793663f7786c67f59d81f5d0062b
SHA5121c057c631b7cd46aea2a3750395b65f0fd27b3df29191199a38329ce2413587117faf65d64ab9c89ce43b5f016526b21f1755be4b9f0c05e8890bb8bca3aaf57
-
Filesize
270KB
MD5a00a47098d55c17b1fe69c9afc6c6b65
SHA1ad426c19f7e0a6a12fd8e6c611d25bc727e167ac
SHA256677032e6b73beffbd3e6c6b23285593ba70c793663f7786c67f59d81f5d0062b
SHA5121c057c631b7cd46aea2a3750395b65f0fd27b3df29191199a38329ce2413587117faf65d64ab9c89ce43b5f016526b21f1755be4b9f0c05e8890bb8bca3aaf57