Analysis
-
max time kernel
50s -
max time network
87s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
23-10-2023 17:34
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.9254fdd849c2461cd245c2835d89e11439f03e8043162a40f0885ff4daa3837fexe_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.9254fdd849c2461cd245c2835d89e11439f03e8043162a40f0885ff4daa3837fexe_JC.exe
Resource
win10v2004-20231023-en
Errors
General
-
Target
NEAS.9254fdd849c2461cd245c2835d89e11439f03e8043162a40f0885ff4daa3837fexe_JC.exe
-
Size
255KB
-
MD5
7962e9c20825e1ba91bafb7f18f529d8
-
SHA1
9b1d4702738d978579360a746f284b96e3a059f9
-
SHA256
9254fdd849c2461cd245c2835d89e11439f03e8043162a40f0885ff4daa3837f
-
SHA512
a348a43bc26c2e8fcb1925a1dea1e5caba84c6024faf030233c1bbfa9d89d9c987555c71a257d52425613d3ae35bbaf57ff852ec21fc13fb97d83ce4ec33e703
-
SSDEEP
3072:Hv1BNdeJA6mSC5P4rb0DGicNBS619PKJGeUq618lb:zPoA6BC5Qrb0DGrBS61NuUqh
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
Extracted
djvu
http://zexeq.com/raud/get.php
-
extension
.ithh
-
offline_id
9FgVtzPuDnE9NZWeLG9q9D2SjzVyIqJJ4jFNKXt1
-
payload_url
http://colisumy.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-cGZhpvUKxk Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0811JOsie
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Detected Djvu ransomware 4 IoCs
resource yara_rule behavioral1/memory/2684-24-0x0000000001DC0000-0x0000000001EDB000-memory.dmp family_djvu behavioral1/memory/2856-27-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2856-287-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2856-322-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 8 IoCs
resource yara_rule behavioral1/memory/472-240-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/588-245-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/472-247-0x0000000002A20000-0x000000000330B000-memory.dmp family_glupteba behavioral1/memory/472-248-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/588-249-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/588-266-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/472-283-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/588-296-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AC86.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1268 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AC86.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AC86.exe -
Deletes itself 1 IoCs
pid Process 1276 Process not Found -
Executes dropped EXE 7 IoCs
pid Process 2684 A89E.exe 2856 A89E.exe 2256 AC86.exe 2432 F02C.exe 760 toolspub2.exe 472 d21cbe21e38b385a41a68c5e6dd32f4c.exe 1684 kos2.exe -
Loads dropped DLL 7 IoCs
pid Process 2684 A89E.exe 2628 regsvr32.exe 2432 F02C.exe 2432 F02C.exe 2432 F02C.exe 2432 F02C.exe 2432 F02C.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3024 icacls.exe -
resource yara_rule behavioral1/files/0x000a0000000155be-34.dat themida behavioral1/memory/2256-57-0x00000000001F0000-0x00000000007C2000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AC86.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 api.2ip.ua 28 api.2ip.ua -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2256 AC86.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2684 set thread context of 2856 2684 A89E.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI NEAS.9254fdd849c2461cd245c2835d89e11439f03e8043162a40f0885ff4daa3837fexe_JC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI NEAS.9254fdd849c2461cd245c2835d89e11439f03e8043162a40f0885ff4daa3837fexe_JC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI NEAS.9254fdd849c2461cd245c2835d89e11439f03e8043162a40f0885ff4daa3837fexe_JC.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2192 NEAS.9254fdd849c2461cd245c2835d89e11439f03e8043162a40f0885ff4daa3837fexe_JC.exe 2192 NEAS.9254fdd849c2461cd245c2835d89e11439f03e8043162a40f0885ff4daa3837fexe_JC.exe 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1276 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2192 NEAS.9254fdd849c2461cd245c2835d89e11439f03e8043162a40f0885ff4daa3837fexe_JC.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2684 1276 Process not Found 28 PID 1276 wrote to memory of 2684 1276 Process not Found 28 PID 1276 wrote to memory of 2684 1276 Process not Found 28 PID 1276 wrote to memory of 2684 1276 Process not Found 28 PID 2684 wrote to memory of 2856 2684 A89E.exe 29 PID 2684 wrote to memory of 2856 2684 A89E.exe 29 PID 2684 wrote to memory of 2856 2684 A89E.exe 29 PID 2684 wrote to memory of 2856 2684 A89E.exe 29 PID 2684 wrote to memory of 2856 2684 A89E.exe 29 PID 2684 wrote to memory of 2856 2684 A89E.exe 29 PID 2684 wrote to memory of 2856 2684 A89E.exe 29 PID 2684 wrote to memory of 2856 2684 A89E.exe 29 PID 2684 wrote to memory of 2856 2684 A89E.exe 29 PID 2684 wrote to memory of 2856 2684 A89E.exe 29 PID 2684 wrote to memory of 2856 2684 A89E.exe 29 PID 1276 wrote to memory of 2256 1276 Process not Found 30 PID 1276 wrote to memory of 2256 1276 Process not Found 30 PID 1276 wrote to memory of 2256 1276 Process not Found 30 PID 1276 wrote to memory of 2256 1276 Process not Found 30 PID 1276 wrote to memory of 2592 1276 Process not Found 31 PID 1276 wrote to memory of 2592 1276 Process not Found 31 PID 1276 wrote to memory of 2592 1276 Process not Found 31 PID 1276 wrote to memory of 2592 1276 Process not Found 31 PID 1276 wrote to memory of 2592 1276 Process not Found 31 PID 2592 wrote to memory of 2628 2592 regsvr32.exe 32 PID 2592 wrote to memory of 2628 2592 regsvr32.exe 32 PID 2592 wrote to memory of 2628 2592 regsvr32.exe 32 PID 2592 wrote to memory of 2628 2592 regsvr32.exe 32 PID 2592 wrote to memory of 2628 2592 regsvr32.exe 32 PID 2592 wrote to memory of 2628 2592 regsvr32.exe 32 PID 2592 wrote to memory of 2628 2592 regsvr32.exe 32 PID 1276 wrote to memory of 2432 1276 Process not Found 35 PID 1276 wrote to memory of 2432 1276 Process not Found 35 PID 1276 wrote to memory of 2432 1276 Process not Found 35 PID 1276 wrote to memory of 2432 1276 Process not Found 35 PID 2432 wrote to memory of 760 2432 F02C.exe 37 PID 2432 wrote to memory of 760 2432 F02C.exe 37 PID 2432 wrote to memory of 760 2432 F02C.exe 37 PID 2432 wrote to memory of 760 2432 F02C.exe 37 PID 2432 wrote to memory of 472 2432 F02C.exe 38 PID 2432 wrote to memory of 472 2432 F02C.exe 38 PID 2432 wrote to memory of 472 2432 F02C.exe 38 PID 2432 wrote to memory of 472 2432 F02C.exe 38 PID 2432 wrote to memory of 1684 2432 F02C.exe 41 PID 2432 wrote to memory of 1684 2432 F02C.exe 41 PID 2432 wrote to memory of 1684 2432 F02C.exe 41 PID 2432 wrote to memory of 1684 2432 F02C.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.9254fdd849c2461cd245c2835d89e11439f03e8043162a40f0885ff4daa3837fexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.9254fdd849c2461cd245c2835d89e11439f03e8043162a40f0885ff4daa3837fexe_JC.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2192
-
C:\Users\Admin\AppData\Local\Temp\A89E.exeC:\Users\Admin\AppData\Local\Temp\A89E.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\A89E.exeC:\Users\Admin\AppData\Local\Temp\A89E.exe2⤵
- Executes dropped EXE
PID:2856 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\76d99681-5527-4c76-94ae-195471ec0b4b" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\A89E.exe"C:\Users\Admin\AppData\Local\Temp\A89E.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:1980
-
-
-
C:\Users\Admin\AppData\Local\Temp\AC86.exeC:\Users\Admin\AppData\Local\Temp\AC86.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2256
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\B721.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\B721.dll2⤵
- Loads dropped DLL
PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\F02C.exeC:\Users\Admin\AppData\Local\Temp\F02C.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
PID:760 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵PID:2268
-
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"2⤵
- Executes dropped EXE
PID:472
-
-
C:\Users\Admin\AppData\Local\Temp\kos2.exe"C:\Users\Admin\AppData\Local\Temp\kos2.exe"2⤵
- Executes dropped EXE
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"2⤵PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\set16.exe"C:\Users\Admin\AppData\Local\Temp\set16.exe"1⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\is-4939Q.tmp\is-7E4B2.tmp"C:\Users\Admin\AppData\Local\Temp\is-4939Q.tmp\is-7E4B2.tmp" /SL4 $90122 "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1281875 522242⤵PID:3044
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 203⤵PID:2308
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 204⤵PID:280
-
-
-
C:\Program Files (x86)\MyBurn\MyBurn.exe"C:\Program Files (x86)\MyBurn\MyBurn.exe" -i3⤵PID:1192
-
-
C:\Program Files (x86)\MyBurn\MyBurn.exe"C:\Program Files (x86)\MyBurn\MyBurn.exe" -s3⤵PID:2508
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:1392
-
-
-
C:\Users\Admin\AppData\Local\Temp\K.exe"C:\Users\Admin\AppData\Local\Temp\K.exe"1⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\1930.exeC:\Users\Admin\AppData\Local\Temp\1930.exe1⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\1930.exe"C:\Users\Admin\AppData\Local\Temp\1930.exe"2⤵PID:892
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:836
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1268
-
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2004
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2496
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20231023174223.log C:\Windows\Logs\CBS\CbsPersist_20231023174223.cab1⤵PID:1512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5f0fd986799e64ba888a8031782181dc7
SHA1df5a8420ebdcb1d036867fbc9c3f9ca143cf587c
SHA256a85af12749a97eeae8f64b767e63780978c859f389139cd153bedb432d1bfb4f
SHA51209d8b0a6e39139c1853b5f05b1f87bbed5f38b51562cd3da8eb87be1125e8b28c2a3409d4977359cf8551a76c045de39c0419ddcef6459d9f87e10a945545233
-
Filesize
2.1MB
MD5f0fd986799e64ba888a8031782181dc7
SHA1df5a8420ebdcb1d036867fbc9c3f9ca143cf587c
SHA256a85af12749a97eeae8f64b767e63780978c859f389139cd153bedb432d1bfb4f
SHA51209d8b0a6e39139c1853b5f05b1f87bbed5f38b51562cd3da8eb87be1125e8b28c2a3409d4977359cf8551a76c045de39c0419ddcef6459d9f87e10a945545233
-
Filesize
2.1MB
MD5f0fd986799e64ba888a8031782181dc7
SHA1df5a8420ebdcb1d036867fbc9c3f9ca143cf587c
SHA256a85af12749a97eeae8f64b767e63780978c859f389139cd153bedb432d1bfb4f
SHA51209d8b0a6e39139c1853b5f05b1f87bbed5f38b51562cd3da8eb87be1125e8b28c2a3409d4977359cf8551a76c045de39c0419ddcef6459d9f87e10a945545233
-
Filesize
2.1MB
MD5f0fd986799e64ba888a8031782181dc7
SHA1df5a8420ebdcb1d036867fbc9c3f9ca143cf587c
SHA256a85af12749a97eeae8f64b767e63780978c859f389139cd153bedb432d1bfb4f
SHA51209d8b0a6e39139c1853b5f05b1f87bbed5f38b51562cd3da8eb87be1125e8b28c2a3409d4977359cf8551a76c045de39c0419ddcef6459d9f87e10a945545233
-
Filesize
754KB
MD5c0c8ac71b407b963e21cf6b7becb2b8f
SHA1d2e3add2c36b5fdc8fc060a8d32982d17e75da16
SHA2569fd78aa12eca29eece14f6f7dc7ac4db02adafd323b035c5db52924990a2c567
SHA512596cea1b1ca23337d98a59f5ad5f050cfbf888a2e1b7754e49a41d2badfe49f781a080bc696edbb6467951f59567e22052a07cdf04500121322f2dc1c7e91e86
-
Filesize
4.1MB
MD5e07292958722028e07698d827fb01372
SHA1e4fac70e2d33ccce7bb489e0c0573dcd4a11faea
SHA25657b979138aaaa3c2551e2958b6e0320839d59a06fc060948c796f88158b5f09a
SHA5129b5dead51cdedf20ebccd9a50ea639fb8bb66a64684b91f66a670d54eb80df4dd869a6e607b80f7b74cd980d38d22da2a76af3ab99d160bb9b77758f3579c5a1
-
Filesize
4.1MB
MD5e07292958722028e07698d827fb01372
SHA1e4fac70e2d33ccce7bb489e0c0573dcd4a11faea
SHA25657b979138aaaa3c2551e2958b6e0320839d59a06fc060948c796f88158b5f09a
SHA5129b5dead51cdedf20ebccd9a50ea639fb8bb66a64684b91f66a670d54eb80df4dd869a6e607b80f7b74cd980d38d22da2a76af3ab99d160bb9b77758f3579c5a1
-
Filesize
4.1MB
MD5e07292958722028e07698d827fb01372
SHA1e4fac70e2d33ccce7bb489e0c0573dcd4a11faea
SHA25657b979138aaaa3c2551e2958b6e0320839d59a06fc060948c796f88158b5f09a
SHA5129b5dead51cdedf20ebccd9a50ea639fb8bb66a64684b91f66a670d54eb80df4dd869a6e607b80f7b74cd980d38d22da2a76af3ab99d160bb9b77758f3579c5a1
-
Filesize
4.1MB
MD5e07292958722028e07698d827fb01372
SHA1e4fac70e2d33ccce7bb489e0c0573dcd4a11faea
SHA25657b979138aaaa3c2551e2958b6e0320839d59a06fc060948c796f88158b5f09a
SHA5129b5dead51cdedf20ebccd9a50ea639fb8bb66a64684b91f66a670d54eb80df4dd869a6e607b80f7b74cd980d38d22da2a76af3ab99d160bb9b77758f3579c5a1
-
Filesize
754KB
MD5c0c8ac71b407b963e21cf6b7becb2b8f
SHA1d2e3add2c36b5fdc8fc060a8d32982d17e75da16
SHA2569fd78aa12eca29eece14f6f7dc7ac4db02adafd323b035c5db52924990a2c567
SHA512596cea1b1ca23337d98a59f5ad5f050cfbf888a2e1b7754e49a41d2badfe49f781a080bc696edbb6467951f59567e22052a07cdf04500121322f2dc1c7e91e86
-
Filesize
754KB
MD5c0c8ac71b407b963e21cf6b7becb2b8f
SHA1d2e3add2c36b5fdc8fc060a8d32982d17e75da16
SHA2569fd78aa12eca29eece14f6f7dc7ac4db02adafd323b035c5db52924990a2c567
SHA512596cea1b1ca23337d98a59f5ad5f050cfbf888a2e1b7754e49a41d2badfe49f781a080bc696edbb6467951f59567e22052a07cdf04500121322f2dc1c7e91e86
-
Filesize
754KB
MD5c0c8ac71b407b963e21cf6b7becb2b8f
SHA1d2e3add2c36b5fdc8fc060a8d32982d17e75da16
SHA2569fd78aa12eca29eece14f6f7dc7ac4db02adafd323b035c5db52924990a2c567
SHA512596cea1b1ca23337d98a59f5ad5f050cfbf888a2e1b7754e49a41d2badfe49f781a080bc696edbb6467951f59567e22052a07cdf04500121322f2dc1c7e91e86
-
Filesize
754KB
MD5c0c8ac71b407b963e21cf6b7becb2b8f
SHA1d2e3add2c36b5fdc8fc060a8d32982d17e75da16
SHA2569fd78aa12eca29eece14f6f7dc7ac4db02adafd323b035c5db52924990a2c567
SHA512596cea1b1ca23337d98a59f5ad5f050cfbf888a2e1b7754e49a41d2badfe49f781a080bc696edbb6467951f59567e22052a07cdf04500121322f2dc1c7e91e86
-
Filesize
754KB
MD5c0c8ac71b407b963e21cf6b7becb2b8f
SHA1d2e3add2c36b5fdc8fc060a8d32982d17e75da16
SHA2569fd78aa12eca29eece14f6f7dc7ac4db02adafd323b035c5db52924990a2c567
SHA512596cea1b1ca23337d98a59f5ad5f050cfbf888a2e1b7754e49a41d2badfe49f781a080bc696edbb6467951f59567e22052a07cdf04500121322f2dc1c7e91e86
-
Filesize
1.8MB
MD55909231d51287959e7c6f61038dad087
SHA1d875efc40844d3726f50af6db154c6ecbe01fe79
SHA256d5837f122ea59855766faee62ce084fe35442c496d42297fb9753b543d1eda77
SHA512e1ef01ac0289037ce288d4ed37c40bbdff30768055c16e0150b5e7897eaa5714d9c1570a88c9acda30ed5c734e0d2eb55af41b47e3c043a809f4c44ad6ff2f26
-
Filesize
1.7MB
MD503be9ec49eb58c13661ae55d31a21952
SHA17337aa5287d120c1b4f41125745410b55600db54
SHA256d2742315faa88146619c6212e8cce4c791c2c31b0bd0a59b3246a0a51c8e6827
SHA512628c54145293ba5aa24cef64f3bb66b6d96d91463b6ddc7da0d2d5ca8aa54dc8a07d5fd6658ab2801dc19bb6ded573a9be6d4cadfd88652f4baa282a750f9fe8
-
Filesize
11.5MB
MD56020dace849357f1667a1943c8db7291
SHA13cb1268ae732e93e9420e353200f0998d7b1920f
SHA256ebf0fbb2d06f3a42839c341b052cfe7b8b4e0b7e93a5f37a3c426f27a762e63a
SHA51281d8cea19b6bf63aaf7f9f5b94e5d388febc3cbac961d652fbab8c971748dd79760ad265fc6e456d32b4ef67e1257cc3b1f488f79e8a698df61092545bd8a283
-
Filesize
11.5MB
MD56020dace849357f1667a1943c8db7291
SHA13cb1268ae732e93e9420e353200f0998d7b1920f
SHA256ebf0fbb2d06f3a42839c341b052cfe7b8b4e0b7e93a5f37a3c426f27a762e63a
SHA51281d8cea19b6bf63aaf7f9f5b94e5d388febc3cbac961d652fbab8c971748dd79760ad265fc6e456d32b4ef67e1257cc3b1f488f79e8a698df61092545bd8a283
-
Filesize
8KB
MD5ac65407254780025e8a71da7b925c4f3
SHA15c7ae625586c1c00ec9d35caa4f71b020425a6ba
SHA25626cd9cc9a0dd688411a4f0e2fa099b694b88cab6e9ed10827a175f7b5486e42e
SHA51227d87730230d9f594908f904bf298a28e255dced8d515eb0d97e1701078c4405f9f428513c2574d349a7517bd23a3558fb09599a01499ea54590945b981b17ab
-
Filesize
8KB
MD5ac65407254780025e8a71da7b925c4f3
SHA15c7ae625586c1c00ec9d35caa4f71b020425a6ba
SHA25626cd9cc9a0dd688411a4f0e2fa099b694b88cab6e9ed10827a175f7b5486e42e
SHA51227d87730230d9f594908f904bf298a28e255dced8d515eb0d97e1701078c4405f9f428513c2574d349a7517bd23a3558fb09599a01499ea54590945b981b17ab
-
Filesize
4.2MB
MD5cfb47eefb1364872657b05199443bb25
SHA100227917c1dae8fc6f17fdff65741be4f5e57485
SHA2567f4f53a9d3da9de64473196fa04ee1dd681f9ca3cdcccab4e1539fc03ab55102
SHA51281ead4f60b3d0d5069e9443a5023004e1ee17c42a65cba3b4326ad1d17af5a11a81c4b598d8e1b14a086da60f45fd93e5199ca6b1ffb7a6cc7932ded5701c1a6
-
Filesize
4.2MB
MD5cfb47eefb1364872657b05199443bb25
SHA100227917c1dae8fc6f17fdff65741be4f5e57485
SHA2567f4f53a9d3da9de64473196fa04ee1dd681f9ca3cdcccab4e1539fc03ab55102
SHA51281ead4f60b3d0d5069e9443a5023004e1ee17c42a65cba3b4326ad1d17af5a11a81c4b598d8e1b14a086da60f45fd93e5199ca6b1ffb7a6cc7932ded5701c1a6
-
Filesize
4.2MB
MD5cfb47eefb1364872657b05199443bb25
SHA100227917c1dae8fc6f17fdff65741be4f5e57485
SHA2567f4f53a9d3da9de64473196fa04ee1dd681f9ca3cdcccab4e1539fc03ab55102
SHA51281ead4f60b3d0d5069e9443a5023004e1ee17c42a65cba3b4326ad1d17af5a11a81c4b598d8e1b14a086da60f45fd93e5199ca6b1ffb7a6cc7932ded5701c1a6
-
Filesize
642KB
MD5e57693101a63b1f934f462bc7a2ef093
SHA12748ea8c66b980f14c9ce36c1c3061e690cf3ce7
SHA25671267ff94c9fc72cbffaeed3bc2f33cef1eeb1887c29c574d7f26595d1a6235f
SHA5123dcda686a85b19a9c7b4c96d132e90ed43c7df13ce9456beb2b88c278d8068cc3abcbfe25b1607c7b8281d276efb24809730f352927b326254f3208cbdf54a3e
-
Filesize
642KB
MD5e57693101a63b1f934f462bc7a2ef093
SHA12748ea8c66b980f14c9ce36c1c3061e690cf3ce7
SHA25671267ff94c9fc72cbffaeed3bc2f33cef1eeb1887c29c574d7f26595d1a6235f
SHA5123dcda686a85b19a9c7b4c96d132e90ed43c7df13ce9456beb2b88c278d8068cc3abcbfe25b1607c7b8281d276efb24809730f352927b326254f3208cbdf54a3e
-
Filesize
1.5MB
MD5665db9794d6e6e7052e7c469f48de771
SHA1ed9a3f9262f675a03a9f1f70856e3532b095c89f
SHA256c1b31186d170a2a5755f15682860b3cdc60eac7f97a2db9462dee7ca6fcbc196
SHA51269585560e8ac4a2472621dd4da4bf0e636688fc5d710521b0177461f773fcf2a4c7ddb86bc812ecb316985729013212ccfa4992cd1c98f166a4a510e17fcae74
-
Filesize
1.5MB
MD5665db9794d6e6e7052e7c469f48de771
SHA1ed9a3f9262f675a03a9f1f70856e3532b095c89f
SHA256c1b31186d170a2a5755f15682860b3cdc60eac7f97a2db9462dee7ca6fcbc196
SHA51269585560e8ac4a2472621dd4da4bf0e636688fc5d710521b0177461f773fcf2a4c7ddb86bc812ecb316985729013212ccfa4992cd1c98f166a4a510e17fcae74
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
1.5MB
MD5b224196c88f09b615527b2df0e860e49
SHA1f9ae161836a34264458d8c0b2a083c98093f1dec
SHA2562a11969fcc1df03533ad694a68d56f0e3a67ce359663c3cf228040ab5baa5ed8
SHA512d74376c5bd3ba19b8454a17f2f38ab64ad1005b6372c7e162230c822c38f6f8c7d87aef47ef04cb6dceedc731046c30efa6720098cc39b15addd17c809b8296d
-
Filesize
1.5MB
MD5b224196c88f09b615527b2df0e860e49
SHA1f9ae161836a34264458d8c0b2a083c98093f1dec
SHA2562a11969fcc1df03533ad694a68d56f0e3a67ce359663c3cf228040ab5baa5ed8
SHA512d74376c5bd3ba19b8454a17f2f38ab64ad1005b6372c7e162230c822c38f6f8c7d87aef47ef04cb6dceedc731046c30efa6720098cc39b15addd17c809b8296d
-
Filesize
260KB
MD5f39a0110a564f4a1c6b96c03982906ec
SHA108e66c93b575c9ac0a18f06741dabcabc88a358b
SHA256f794a557ad952ff155b4bfe5665b3f448453c3a50c766478d070368cab69f481
SHA512c6659f926f95a8bed1ff779c8445470c3089823abe8c1199f591c313ecee0bd793478cdaab95905c0e8ae2a2b18737daabe887263b7cde1eaaa9ee6976ff7d00
-
Filesize
260KB
MD5f39a0110a564f4a1c6b96c03982906ec
SHA108e66c93b575c9ac0a18f06741dabcabc88a358b
SHA256f794a557ad952ff155b4bfe5665b3f448453c3a50c766478d070368cab69f481
SHA512c6659f926f95a8bed1ff779c8445470c3089823abe8c1199f591c313ecee0bd793478cdaab95905c0e8ae2a2b18737daabe887263b7cde1eaaa9ee6976ff7d00
-
Filesize
260KB
MD5f39a0110a564f4a1c6b96c03982906ec
SHA108e66c93b575c9ac0a18f06741dabcabc88a358b
SHA256f794a557ad952ff155b4bfe5665b3f448453c3a50c766478d070368cab69f481
SHA512c6659f926f95a8bed1ff779c8445470c3089823abe8c1199f591c313ecee0bd793478cdaab95905c0e8ae2a2b18737daabe887263b7cde1eaaa9ee6976ff7d00
-
Filesize
260KB
MD5f39a0110a564f4a1c6b96c03982906ec
SHA108e66c93b575c9ac0a18f06741dabcabc88a358b
SHA256f794a557ad952ff155b4bfe5665b3f448453c3a50c766478d070368cab69f481
SHA512c6659f926f95a8bed1ff779c8445470c3089823abe8c1199f591c313ecee0bd793478cdaab95905c0e8ae2a2b18737daabe887263b7cde1eaaa9ee6976ff7d00
-
Filesize
2.1MB
MD5f0fd986799e64ba888a8031782181dc7
SHA1df5a8420ebdcb1d036867fbc9c3f9ca143cf587c
SHA256a85af12749a97eeae8f64b767e63780978c859f389139cd153bedb432d1bfb4f
SHA51209d8b0a6e39139c1853b5f05b1f87bbed5f38b51562cd3da8eb87be1125e8b28c2a3409d4977359cf8551a76c045de39c0419ddcef6459d9f87e10a945545233
-
Filesize
2.1MB
MD5f0fd986799e64ba888a8031782181dc7
SHA1df5a8420ebdcb1d036867fbc9c3f9ca143cf587c
SHA256a85af12749a97eeae8f64b767e63780978c859f389139cd153bedb432d1bfb4f
SHA51209d8b0a6e39139c1853b5f05b1f87bbed5f38b51562cd3da8eb87be1125e8b28c2a3409d4977359cf8551a76c045de39c0419ddcef6459d9f87e10a945545233
-
Filesize
2.1MB
MD5f0fd986799e64ba888a8031782181dc7
SHA1df5a8420ebdcb1d036867fbc9c3f9ca143cf587c
SHA256a85af12749a97eeae8f64b767e63780978c859f389139cd153bedb432d1bfb4f
SHA51209d8b0a6e39139c1853b5f05b1f87bbed5f38b51562cd3da8eb87be1125e8b28c2a3409d4977359cf8551a76c045de39c0419ddcef6459d9f87e10a945545233
-
Filesize
2.1MB
MD5f0fd986799e64ba888a8031782181dc7
SHA1df5a8420ebdcb1d036867fbc9c3f9ca143cf587c
SHA256a85af12749a97eeae8f64b767e63780978c859f389139cd153bedb432d1bfb4f
SHA51209d8b0a6e39139c1853b5f05b1f87bbed5f38b51562cd3da8eb87be1125e8b28c2a3409d4977359cf8551a76c045de39c0419ddcef6459d9f87e10a945545233
-
Filesize
2.1MB
MD5f0fd986799e64ba888a8031782181dc7
SHA1df5a8420ebdcb1d036867fbc9c3f9ca143cf587c
SHA256a85af12749a97eeae8f64b767e63780978c859f389139cd153bedb432d1bfb4f
SHA51209d8b0a6e39139c1853b5f05b1f87bbed5f38b51562cd3da8eb87be1125e8b28c2a3409d4977359cf8551a76c045de39c0419ddcef6459d9f87e10a945545233
-
Filesize
2.1MB
MD5f0fd986799e64ba888a8031782181dc7
SHA1df5a8420ebdcb1d036867fbc9c3f9ca143cf587c
SHA256a85af12749a97eeae8f64b767e63780978c859f389139cd153bedb432d1bfb4f
SHA51209d8b0a6e39139c1853b5f05b1f87bbed5f38b51562cd3da8eb87be1125e8b28c2a3409d4977359cf8551a76c045de39c0419ddcef6459d9f87e10a945545233
-
Filesize
754KB
MD5c0c8ac71b407b963e21cf6b7becb2b8f
SHA1d2e3add2c36b5fdc8fc060a8d32982d17e75da16
SHA2569fd78aa12eca29eece14f6f7dc7ac4db02adafd323b035c5db52924990a2c567
SHA512596cea1b1ca23337d98a59f5ad5f050cfbf888a2e1b7754e49a41d2badfe49f781a080bc696edbb6467951f59567e22052a07cdf04500121322f2dc1c7e91e86
-
Filesize
754KB
MD5c0c8ac71b407b963e21cf6b7becb2b8f
SHA1d2e3add2c36b5fdc8fc060a8d32982d17e75da16
SHA2569fd78aa12eca29eece14f6f7dc7ac4db02adafd323b035c5db52924990a2c567
SHA512596cea1b1ca23337d98a59f5ad5f050cfbf888a2e1b7754e49a41d2badfe49f781a080bc696edbb6467951f59567e22052a07cdf04500121322f2dc1c7e91e86
-
Filesize
754KB
MD5c0c8ac71b407b963e21cf6b7becb2b8f
SHA1d2e3add2c36b5fdc8fc060a8d32982d17e75da16
SHA2569fd78aa12eca29eece14f6f7dc7ac4db02adafd323b035c5db52924990a2c567
SHA512596cea1b1ca23337d98a59f5ad5f050cfbf888a2e1b7754e49a41d2badfe49f781a080bc696edbb6467951f59567e22052a07cdf04500121322f2dc1c7e91e86
-
Filesize
1.7MB
MD503be9ec49eb58c13661ae55d31a21952
SHA17337aa5287d120c1b4f41125745410b55600db54
SHA256d2742315faa88146619c6212e8cce4c791c2c31b0bd0a59b3246a0a51c8e6827
SHA512628c54145293ba5aa24cef64f3bb66b6d96d91463b6ddc7da0d2d5ca8aa54dc8a07d5fd6658ab2801dc19bb6ded573a9be6d4cadfd88652f4baa282a750f9fe8
-
Filesize
8KB
MD5ac65407254780025e8a71da7b925c4f3
SHA15c7ae625586c1c00ec9d35caa4f71b020425a6ba
SHA25626cd9cc9a0dd688411a4f0e2fa099b694b88cab6e9ed10827a175f7b5486e42e
SHA51227d87730230d9f594908f904bf298a28e255dced8d515eb0d97e1701078c4405f9f428513c2574d349a7517bd23a3558fb09599a01499ea54590945b981b17ab
-
Filesize
4.2MB
MD5cfb47eefb1364872657b05199443bb25
SHA100227917c1dae8fc6f17fdff65741be4f5e57485
SHA2567f4f53a9d3da9de64473196fa04ee1dd681f9ca3cdcccab4e1539fc03ab55102
SHA51281ead4f60b3d0d5069e9443a5023004e1ee17c42a65cba3b4326ad1d17af5a11a81c4b598d8e1b14a086da60f45fd93e5199ca6b1ffb7a6cc7932ded5701c1a6
-
Filesize
4.2MB
MD5cfb47eefb1364872657b05199443bb25
SHA100227917c1dae8fc6f17fdff65741be4f5e57485
SHA2567f4f53a9d3da9de64473196fa04ee1dd681f9ca3cdcccab4e1539fc03ab55102
SHA51281ead4f60b3d0d5069e9443a5023004e1ee17c42a65cba3b4326ad1d17af5a11a81c4b598d8e1b14a086da60f45fd93e5199ca6b1ffb7a6cc7932ded5701c1a6
-
Filesize
642KB
MD5e57693101a63b1f934f462bc7a2ef093
SHA12748ea8c66b980f14c9ce36c1c3061e690cf3ce7
SHA25671267ff94c9fc72cbffaeed3bc2f33cef1eeb1887c29c574d7f26595d1a6235f
SHA5123dcda686a85b19a9c7b4c96d132e90ed43c7df13ce9456beb2b88c278d8068cc3abcbfe25b1607c7b8281d276efb24809730f352927b326254f3208cbdf54a3e
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
12KB
MD57cee19d7e00e9a35fc5e7884fd9d1ad8
SHA12c5e8de13bdb6ddc290a9596113f77129ecd26bc
SHA25658ee49d4b4f6def91c6561fc5a1b73bc86d8a01b23ce0c8ddbf0ed11f13d5ace
SHA512a6955f5aff467f199236ed8a57f4d97af915a3ae81711ff8292e66e66c9f7ee307d7d7aafce09a1bd33c8f7983694cb207fc980d6c3323b475de6278d37bdde8
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
1.5MB
MD5665db9794d6e6e7052e7c469f48de771
SHA1ed9a3f9262f675a03a9f1f70856e3532b095c89f
SHA256c1b31186d170a2a5755f15682860b3cdc60eac7f97a2db9462dee7ca6fcbc196
SHA51269585560e8ac4a2472621dd4da4bf0e636688fc5d710521b0177461f773fcf2a4c7ddb86bc812ecb316985729013212ccfa4992cd1c98f166a4a510e17fcae74
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
1.5MB
MD5b224196c88f09b615527b2df0e860e49
SHA1f9ae161836a34264458d8c0b2a083c98093f1dec
SHA2562a11969fcc1df03533ad694a68d56f0e3a67ce359663c3cf228040ab5baa5ed8
SHA512d74376c5bd3ba19b8454a17f2f38ab64ad1005b6372c7e162230c822c38f6f8c7d87aef47ef04cb6dceedc731046c30efa6720098cc39b15addd17c809b8296d
-
Filesize
1.5MB
MD5b224196c88f09b615527b2df0e860e49
SHA1f9ae161836a34264458d8c0b2a083c98093f1dec
SHA2562a11969fcc1df03533ad694a68d56f0e3a67ce359663c3cf228040ab5baa5ed8
SHA512d74376c5bd3ba19b8454a17f2f38ab64ad1005b6372c7e162230c822c38f6f8c7d87aef47ef04cb6dceedc731046c30efa6720098cc39b15addd17c809b8296d
-
Filesize
1.5MB
MD5b224196c88f09b615527b2df0e860e49
SHA1f9ae161836a34264458d8c0b2a083c98093f1dec
SHA2562a11969fcc1df03533ad694a68d56f0e3a67ce359663c3cf228040ab5baa5ed8
SHA512d74376c5bd3ba19b8454a17f2f38ab64ad1005b6372c7e162230c822c38f6f8c7d87aef47ef04cb6dceedc731046c30efa6720098cc39b15addd17c809b8296d
-
Filesize
1.5MB
MD5b224196c88f09b615527b2df0e860e49
SHA1f9ae161836a34264458d8c0b2a083c98093f1dec
SHA2562a11969fcc1df03533ad694a68d56f0e3a67ce359663c3cf228040ab5baa5ed8
SHA512d74376c5bd3ba19b8454a17f2f38ab64ad1005b6372c7e162230c822c38f6f8c7d87aef47ef04cb6dceedc731046c30efa6720098cc39b15addd17c809b8296d
-
Filesize
260KB
MD5f39a0110a564f4a1c6b96c03982906ec
SHA108e66c93b575c9ac0a18f06741dabcabc88a358b
SHA256f794a557ad952ff155b4bfe5665b3f448453c3a50c766478d070368cab69f481
SHA512c6659f926f95a8bed1ff779c8445470c3089823abe8c1199f591c313ecee0bd793478cdaab95905c0e8ae2a2b18737daabe887263b7cde1eaaa9ee6976ff7d00
-
Filesize
260KB
MD5f39a0110a564f4a1c6b96c03982906ec
SHA108e66c93b575c9ac0a18f06741dabcabc88a358b
SHA256f794a557ad952ff155b4bfe5665b3f448453c3a50c766478d070368cab69f481
SHA512c6659f926f95a8bed1ff779c8445470c3089823abe8c1199f591c313ecee0bd793478cdaab95905c0e8ae2a2b18737daabe887263b7cde1eaaa9ee6976ff7d00
-
Filesize
260KB
MD5f39a0110a564f4a1c6b96c03982906ec
SHA108e66c93b575c9ac0a18f06741dabcabc88a358b
SHA256f794a557ad952ff155b4bfe5665b3f448453c3a50c766478d070368cab69f481
SHA512c6659f926f95a8bed1ff779c8445470c3089823abe8c1199f591c313ecee0bd793478cdaab95905c0e8ae2a2b18737daabe887263b7cde1eaaa9ee6976ff7d00