Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2023, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d3976730f6d995523a17c80b41c370b0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.d3976730f6d995523a17c80b41c370b0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.d3976730f6d995523a17c80b41c370b0.exe
-
Size
80KB
-
MD5
d3976730f6d995523a17c80b41c370b0
-
SHA1
50fe5d8e0e4aa01019d933053dde61dd15f0cb5a
-
SHA256
3d3290eb8b714eb7863e10ce9946c1d55300aa557386c125859c43a050eb4f6d
-
SHA512
62aea37c0515eb0d79cc4d94ea806bc3e9e63a3a35f59b2bec48e55df98039898dbebe6d6f2fe4065a5d0b75c13f139f9a86538f7ae87479a9db00b3402beae3
-
SSDEEP
1536:5v5JMoORizUPliPsm/gL16ZpQGf6MgHN+PhuLGR/11RRj3Y:R5JxOMUMPsgQvRMY+PhGGR/11/I
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\o4262027.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\j6262022.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\o4262027.exe\"" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\j6262022.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\j6262022.exe" m4623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\o4262027.exe\"" NEAS.d3976730f6d995523a17c80b41c370b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\o4262027.exe\"" qm4623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\o4262027.exe\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\j6262022.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\j6262022.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\o4262027.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\o4262027.exe\"" m4623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\j6262022.exe" NEAS.d3976730f6d995523a17c80b41c370b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\j6262022.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\o4262027.exe\"" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\j6262022.exe" qm4623.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NEAS.d3976730f6d995523a17c80b41c370b0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" qm4623.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" m4623.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qm4623.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" m4623.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" NEAS.d3976730f6d995523a17c80b41c370b0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe -
Adds policy Run key to start application 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N4128c = "\"C:\\Windows\\_default26202.pif\"" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\f1464Adm = "\"C:\\Users\\Admin\\AppData\\Local\\dv692700x\\yesbron.com\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N4128c = "\"C:\\Windows\\_default26202.pif\"" qm4623.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run NEAS.d3976730f6d995523a17c80b41c370b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N4128c = "\"C:\\Windows\\_default26202.pif\"" NEAS.d3976730f6d995523a17c80b41c370b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N4128c = "\"C:\\Windows\\_default26202.pif\"" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\f1464Adm = "\"C:\\Users\\Admin\\AppData\\Local\\dv692700x\\yesbron.com\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N4128c = "\"C:\\Windows\\_default26202.pif\"" services.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run NEAS.d3976730f6d995523a17c80b41c370b0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\f1464Adm = "\"C:\\Users\\Admin\\AppData\\Local\\dv692700x\\yesbron.com\"" NEAS.d3976730f6d995523a17c80b41c370b0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\f1464Adm = "\"C:\\Users\\Admin\\AppData\\Local\\dv692700x\\yesbron.com\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N4128c = "\"C:\\Windows\\_default26202.pif\"" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\f1464Adm = "\"C:\\Users\\Admin\\AppData\\Local\\dv692700x\\yesbron.com\"" qm4623.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\f1464Adm = "\"C:\\Users\\Admin\\AppData\\Local\\dv692700x\\yesbron.com\"" m4623.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\f1464Adm = "\"C:\\Users\\Admin\\AppData\\Local\\dv692700x\\yesbron.com\"" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N4128c = "\"C:\\Windows\\_default26202.pif\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\f1464Adm = "\"C:\\Users\\Admin\\AppData\\Local\\dv692700x\\yesbron.com\"" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N4128c = "\"C:\\Windows\\_default26202.pif\"" m4623.exe -
Disables RegEdit via registry modification 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" m4623.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NEAS.d3976730f6d995523a17c80b41c370b0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" qm4623.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts csrss.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.d3976730f6d995523a17c80b41c370b0.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation winlogon.exe -
Executes dropped EXE 7 IoCs
pid Process 3540 smss.exe 2808 winlogon.exe 2928 services.exe 2064 csrss.exe 4376 lsass.exe 484 qm4623.exe 3420 m4623.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1464Adm = "\"C:\\Windows\\system32\\s4827\\zh59927084y.exe\"" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\N4128c = "\"C:\\Windows\\j6262022.exe\"" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1464Adm = "\"C:\\Windows\\system32\\s4827\\zh59927084y.exe\"" qm4623.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1464Adm = "\"C:\\Windows\\system32\\s4827\\zh59927084y.exe\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\N4128c = "\"C:\\Windows\\j6262022.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\N4128c = "\"C:\\Windows\\j6262022.exe\"" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\N4128c = "\"C:\\Windows\\j6262022.exe\"" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1464Adm = "\"C:\\Windows\\system32\\s4827\\zh59927084y.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1464Adm = "\"C:\\Windows\\system32\\s4827\\zh59927084y.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\N4128c = "\"C:\\Windows\\j6262022.exe\"" qm4623.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1464Adm = "\"C:\\Windows\\system32\\s4827\\zh59927084y.exe\"" NEAS.d3976730f6d995523a17c80b41c370b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\N4128c = "\"C:\\Windows\\j6262022.exe\"" NEAS.d3976730f6d995523a17c80b41c370b0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1464Adm = "\"C:\\Windows\\system32\\s4827\\zh59927084y.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\N4128c = "\"C:\\Windows\\j6262022.exe\"" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1464Adm = "\"C:\\Windows\\system32\\s4827\\zh59927084y.exe\"" m4623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\N4128c = "\"C:\\Windows\\j6262022.exe\"" m4623.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: lsass.exe File opened (read-only) \??\R: lsass.exe File opened (read-only) \??\V: lsass.exe File opened (read-only) \??\W: lsass.exe File opened (read-only) \??\E: lsass.exe File opened (read-only) \??\G: lsass.exe File opened (read-only) \??\L: lsass.exe File opened (read-only) \??\O: lsass.exe File opened (read-only) \??\P: lsass.exe File opened (read-only) \??\U: lsass.exe File opened (read-only) \??\X: lsass.exe File opened (read-only) \??\Y: lsass.exe File opened (read-only) \??\Z: lsass.exe File opened (read-only) \??\J: lsass.exe File opened (read-only) \??\M: lsass.exe File opened (read-only) \??\N: lsass.exe File opened (read-only) \??\S: lsass.exe File opened (read-only) \??\T: lsass.exe File opened (read-only) \??\I: lsass.exe File opened (read-only) \??\K: lsass.exe File opened (read-only) \??\Q: lsass.exe -
Drops file in System32 directory 61 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\s4827\smss.exe m4623.exe File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exe NEAS.d3976730f6d995523a17c80b41c370b0.exe File created C:\Windows\SysWOW64\s4827\zh59927084y.exe NEAS.d3976730f6d995523a17c80b41c370b0.exe File opened for modification C:\Windows\SysWOW64\s4827\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\s4827\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\s4827\smss.exe NEAS.d3976730f6d995523a17c80b41c370b0.exe File created C:\Windows\SysWOW64\s4827\smss.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\s4827\smss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\s4827\smss.exe lsass.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll qm4623.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll smss.exe File created C:\Windows\SysWOW64\s4827\winlogon.exe smss.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll m4623.exe File created C:\Windows\SysWOW64\c_26202k.com qm4623.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll NEAS.d3976730f6d995523a17c80b41c370b0.exe File opened for modification C:\Windows\SysWOW64\s4827 winlogon.exe File created C:\Windows\SysWOW64\s4827\lsass.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\s4827 lsass.exe File opened for modification C:\Windows\SysWOW64\s4827\services.exe winlogon.exe File created C:\Windows\SysWOW64\s4827\domlist.txt cmd.exe File created C:\Windows\SysWOW64\c_26202k.com NEAS.d3976730f6d995523a17c80b41c370b0.exe File opened for modification C:\Windows\SysWOW64\s4827 smss.exe File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exe smss.exe File opened for modification C:\Windows\SysWOW64\s4827\smss.exe services.exe File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exe lsass.exe File opened for modification C:\Windows\SysWOW64\s4827\csrss.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\c_26202k.com csrss.exe File opened for modification C:\Windows\SysWOW64\s4827 qm4623.exe File created C:\Windows\SysWOW64\s4827\zh59927084y.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\s4827\smss.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exe services.exe File opened for modification C:\Windows\SysWOW64\c_26202k.com qm4623.exe File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exe qm4623.exe File opened for modification C:\Windows\SysWOW64\s4827 m4623.exe File created C:\Windows\SysWOW64\s4827\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\c_26202k.com smss.exe File created C:\Windows\SysWOW64\s4827\services.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\c_26202k.com lsass.exe File opened for modification C:\Windows\SysWOW64\s4827\smss.exe qm4623.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll csrss.exe File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exe m4623.exe File opened for modification C:\Windows\SysWOW64\s4827 NEAS.d3976730f6d995523a17c80b41c370b0.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exemsatr.bin smss.exe File opened for modification C:\Windows\SysWOW64\s4827 csrss.exe File created C:\Windows\SysWOW64\s4827\m4623.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\s4827\smss.exe NEAS.d3976730f6d995523a17c80b41c370b0.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll lsass.exe File opened for modification C:\Windows\SysWOW64\s4827\domlist.txt lsass.exe File opened for modification C:\Windows\SysWOW64\c_26202k.com winlogon.exe File created C:\Windows\SysWOW64\s4827\csrss.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\c_26202k.com services.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll services.exe File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exe csrss.exe File opened for modification C:\Windows\SysWOW64\c_26202k.com NEAS.d3976730f6d995523a17c80b41c370b0.exe File opened for modification C:\Windows\SysWOW64\s4827 services.exe File created C:\Windows\SysWOW64\s4827\c.bron.tok.txt lsass.exe File opened for modification C:\Windows\SysWOW64\c_26202k.com m4623.exe File created C:\Windows\SysWOW64\s4827\zh59927084y.exemsatr.bin smss.exe File opened for modification C:\Windows\SysWOW64\s4827\lsass.exe winlogon.exe -
Drops file in Windows directory 36 IoCs
description ioc Process File opened for modification C:\Windows\Ad10218\qm4623.exe winlogon.exe File opened for modification C:\Windows\j6262022.exe services.exe File opened for modification C:\Windows\o4262027.exe NEAS.d3976730f6d995523a17c80b41c370b0.exe File opened for modification C:\Windows\j6262022.exe winlogon.exe File opened for modification C:\Windows\_default26202.pif winlogon.exe File opened for modification C:\Windows\Ad10218 winlogon.exe File opened for modification C:\Windows\o4262027.exe winlogon.exe File opened for modification C:\Windows\j6262022.exe qm4623.exe File opened for modification C:\Windows\_default26202.pif m4623.exe File created C:\Windows\j6262022.exe qm4623.exe File created C:\Windows\j6262022.exe NEAS.d3976730f6d995523a17c80b41c370b0.exe File opened for modification C:\Windows\o4262027.exe services.exe File opened for modification C:\Windows\j6262022.exe m4623.exe File created C:\Windows\o4262027.exe qm4623.exe File created C:\Windows\j6262022.exe winlogon.exe File opened for modification C:\Windows\j6262022.exe NEAS.d3976730f6d995523a17c80b41c370b0.exe File opened for modification C:\Windows\_default26202.pif smss.exe File opened for modification C:\Windows\j6262022.exe csrss.exe File opened for modification C:\Windows\o4262027.exe qm4623.exe File opened for modification C:\Windows\o4262027.exe m4623.exe File created C:\Windows\o4262027.exe NEAS.d3976730f6d995523a17c80b41c370b0.exe File opened for modification C:\Windows\_default26202.pif NEAS.d3976730f6d995523a17c80b41c370b0.exe File opened for modification C:\Windows\o4262027.exe csrss.exe File opened for modification C:\Windows\_default26202.pif csrss.exe File opened for modification C:\Windows\o4262027.exe lsass.exe File opened for modification C:\Windows\_default26202.pif lsass.exe File created C:\Windows\_default26202.pif NEAS.d3976730f6d995523a17c80b41c370b0.exe File opened for modification C:\Windows\o4262027.exe smss.exe File created C:\Windows\Ad10218\qm4623.exe winlogon.exe File opened for modification C:\Windows\_default26202.pif qm4623.exe File created C:\Windows\_default26202.pif qm4623.exe File created C:\Windows\o4262027.exe winlogon.exe File opened for modification C:\Windows\j6262022.exe smss.exe File opened for modification C:\Windows\_default26202.pif services.exe File opened for modification C:\Windows\j6262022.exe lsass.exe File created C:\Windows\_default26202.pif winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 4528 net.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ NEAS.d3976730f6d995523a17c80b41c370b0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe 2808 winlogon.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4060 wrote to memory of 3540 4060 NEAS.d3976730f6d995523a17c80b41c370b0.exe 92 PID 4060 wrote to memory of 3540 4060 NEAS.d3976730f6d995523a17c80b41c370b0.exe 92 PID 4060 wrote to memory of 3540 4060 NEAS.d3976730f6d995523a17c80b41c370b0.exe 92 PID 3540 wrote to memory of 2808 3540 smss.exe 94 PID 3540 wrote to memory of 2808 3540 smss.exe 94 PID 3540 wrote to memory of 2808 3540 smss.exe 94 PID 2808 wrote to memory of 2928 2808 winlogon.exe 98 PID 2808 wrote to memory of 2928 2808 winlogon.exe 98 PID 2808 wrote to memory of 2928 2808 winlogon.exe 98 PID 2808 wrote to memory of 2064 2808 winlogon.exe 100 PID 2808 wrote to memory of 2064 2808 winlogon.exe 100 PID 2808 wrote to memory of 2064 2808 winlogon.exe 100 PID 2808 wrote to memory of 4376 2808 winlogon.exe 102 PID 2808 wrote to memory of 4376 2808 winlogon.exe 102 PID 2808 wrote to memory of 4376 2808 winlogon.exe 102 PID 2808 wrote to memory of 484 2808 winlogon.exe 104 PID 2808 wrote to memory of 484 2808 winlogon.exe 104 PID 2808 wrote to memory of 484 2808 winlogon.exe 104 PID 2808 wrote to memory of 3420 2808 winlogon.exe 107 PID 2808 wrote to memory of 3420 2808 winlogon.exe 107 PID 2808 wrote to memory of 3420 2808 winlogon.exe 107 PID 2808 wrote to memory of 2680 2808 winlogon.exe 110 PID 2808 wrote to memory of 2680 2808 winlogon.exe 110 PID 2808 wrote to memory of 2680 2808 winlogon.exe 110 PID 2808 wrote to memory of 4516 2808 winlogon.exe 113 PID 2808 wrote to memory of 4516 2808 winlogon.exe 113 PID 2808 wrote to memory of 4516 2808 winlogon.exe 113 PID 2808 wrote to memory of 1048 2808 winlogon.exe 115 PID 2808 wrote to memory of 1048 2808 winlogon.exe 115 PID 2808 wrote to memory of 1048 2808 winlogon.exe 115 PID 4376 wrote to memory of 2216 4376 lsass.exe 128 PID 4376 wrote to memory of 2216 4376 lsass.exe 128 PID 4376 wrote to memory of 2216 4376 lsass.exe 128 PID 2216 wrote to memory of 4528 2216 cmd.exe 130 PID 2216 wrote to memory of 4528 2216 cmd.exe 130 PID 2216 wrote to memory of 4528 2216 cmd.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d3976730f6d995523a17c80b41c370b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d3976730f6d995523a17c80b41c370b0.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\s4827\smss.exe"C:\Windows\system32\s4827\smss.exe" ~Brontok~Log~2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\s4827\winlogon.exe"C:\Windows\system32\s4827\winlogon.exe" ~Brontok~Is~The~Best~3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\s4827\services.exe"C:\Windows\system32\s4827\services.exe" ~Brontok~Serv~4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:2928
-
-
C:\Windows\SysWOW64\s4827\csrss.exe"C:\Windows\system32\s4827\csrss.exe" ~Brontok~SpreadMail~4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:2064
-
-
C:\Windows\SysWOW64\s4827\lsass.exe"C:\Windows\system32\s4827\lsass.exe" ~Brontok~Network~4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net view /domain > "C:\Windows\system32\s4827\domlist.txt"5⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\net.exenet view /domain6⤵
- Discovers systems in the same network
PID:4528
-
-
-
-
C:\Windows\Ad10218\qm4623.exe"C:\Windows\Ad10218\qm4623.exe" ~Brontok~Back~Log~4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:484
-
-
C:\Windows\SysWOW64\s4827\m4623.exe"C:\Windows\system32\s4827\m4623.exe" ~Brontok~Back~Log~4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:3420
-
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe" /delete /y4⤵PID:2680
-
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe" 17:08 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Local\jalak-93927015-bali.com"4⤵PID:4516
-
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe" 11:03 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Local\jalak-93927015-bali.com"4⤵PID:1048
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD5b97dbc852bf17917c1c1e5aeaf1826ca
SHA13a537b4665bacf29d8715aaa5356f294a332c1f4
SHA256ac03a0c97c16bfb0ba81af1f3e93429329d78bf5de7b841d9edd2650393d7016
SHA512877bb74be291d5fc77fe9b8d789633a78cd3d7662353ddeda45ae1017849026ac5d07883046bd2f05477e1f940e79eb272134b04032943d91f631e9dbf0ecddd
-
Filesize
80KB
MD543fd53591b23de318764d164fda8d5f1
SHA188195bd4fad43a2ca2e317673ffdf0af1820429d
SHA2562d63654a742add802525bb71c6f5ec5052bec40db1d205f1226a13cbdadcc39a
SHA512b81b88b28437312714fb1f057c48f591fe6bbe8e80bb65be482f6b35e698948e999ea96d744eba38ea32ce58f342ebe91702313d56d120bab2111fafd9f2c483
-
Filesize
80KB
MD5d3976730f6d995523a17c80b41c370b0
SHA150fe5d8e0e4aa01019d933053dde61dd15f0cb5a
SHA2563d3290eb8b714eb7863e10ce9946c1d55300aa557386c125859c43a050eb4f6d
SHA51262aea37c0515eb0d79cc4d94ea806bc3e9e63a3a35f59b2bec48e55df98039898dbebe6d6f2fe4065a5d0b75c13f139f9a86538f7ae87479a9db00b3402beae3
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD543fd53591b23de318764d164fda8d5f1
SHA188195bd4fad43a2ca2e317673ffdf0af1820429d
SHA2562d63654a742add802525bb71c6f5ec5052bec40db1d205f1226a13cbdadcc39a
SHA512b81b88b28437312714fb1f057c48f591fe6bbe8e80bb65be482f6b35e698948e999ea96d744eba38ea32ce58f342ebe91702313d56d120bab2111fafd9f2c483
-
Filesize
80KB
MD543fd53591b23de318764d164fda8d5f1
SHA188195bd4fad43a2ca2e317673ffdf0af1820429d
SHA2562d63654a742add802525bb71c6f5ec5052bec40db1d205f1226a13cbdadcc39a
SHA512b81b88b28437312714fb1f057c48f591fe6bbe8e80bb65be482f6b35e698948e999ea96d744eba38ea32ce58f342ebe91702313d56d120bab2111fafd9f2c483
-
Filesize
80KB
MD543fd53591b23de318764d164fda8d5f1
SHA188195bd4fad43a2ca2e317673ffdf0af1820429d
SHA2562d63654a742add802525bb71c6f5ec5052bec40db1d205f1226a13cbdadcc39a
SHA512b81b88b28437312714fb1f057c48f591fe6bbe8e80bb65be482f6b35e698948e999ea96d744eba38ea32ce58f342ebe91702313d56d120bab2111fafd9f2c483
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD5b97dbc852bf17917c1c1e5aeaf1826ca
SHA13a537b4665bacf29d8715aaa5356f294a332c1f4
SHA256ac03a0c97c16bfb0ba81af1f3e93429329d78bf5de7b841d9edd2650393d7016
SHA512877bb74be291d5fc77fe9b8d789633a78cd3d7662353ddeda45ae1017849026ac5d07883046bd2f05477e1f940e79eb272134b04032943d91f631e9dbf0ecddd
-
Filesize
80KB
MD543fd53591b23de318764d164fda8d5f1
SHA188195bd4fad43a2ca2e317673ffdf0af1820429d
SHA2562d63654a742add802525bb71c6f5ec5052bec40db1d205f1226a13cbdadcc39a
SHA512b81b88b28437312714fb1f057c48f591fe6bbe8e80bb65be482f6b35e698948e999ea96d744eba38ea32ce58f342ebe91702313d56d120bab2111fafd9f2c483
-
Filesize
80KB
MD54df7724d22a01c65922ae506b49009e7
SHA1c0c28051117cea36c7f77821f3788459338c4e5e
SHA256fecc70848657d04d9ca03c99c3c88f7364aaf6f33684210991d297354b2628f2
SHA5122a1e174dda22d0f1d4446d74344cfa36f0876e8b1d92256ec5d04c8109d351073349008c1295e6c99e0b31eb20997af8f0a311066cbffd85e89966c5678fe387
-
Filesize
80KB
MD5d3976730f6d995523a17c80b41c370b0
SHA150fe5d8e0e4aa01019d933053dde61dd15f0cb5a
SHA2563d3290eb8b714eb7863e10ce9946c1d55300aa557386c125859c43a050eb4f6d
SHA51262aea37c0515eb0d79cc4d94ea806bc3e9e63a3a35f59b2bec48e55df98039898dbebe6d6f2fe4065a5d0b75c13f139f9a86538f7ae87479a9db00b3402beae3
-
Filesize
80KB
MD5d3976730f6d995523a17c80b41c370b0
SHA150fe5d8e0e4aa01019d933053dde61dd15f0cb5a
SHA2563d3290eb8b714eb7863e10ce9946c1d55300aa557386c125859c43a050eb4f6d
SHA51262aea37c0515eb0d79cc4d94ea806bc3e9e63a3a35f59b2bec48e55df98039898dbebe6d6f2fe4065a5d0b75c13f139f9a86538f7ae87479a9db00b3402beae3
-
Filesize
80KB
MD5d3976730f6d995523a17c80b41c370b0
SHA150fe5d8e0e4aa01019d933053dde61dd15f0cb5a
SHA2563d3290eb8b714eb7863e10ce9946c1d55300aa557386c125859c43a050eb4f6d
SHA51262aea37c0515eb0d79cc4d94ea806bc3e9e63a3a35f59b2bec48e55df98039898dbebe6d6f2fe4065a5d0b75c13f139f9a86538f7ae87479a9db00b3402beae3
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD5b97dbc852bf17917c1c1e5aeaf1826ca
SHA13a537b4665bacf29d8715aaa5356f294a332c1f4
SHA256ac03a0c97c16bfb0ba81af1f3e93429329d78bf5de7b841d9edd2650393d7016
SHA512877bb74be291d5fc77fe9b8d789633a78cd3d7662353ddeda45ae1017849026ac5d07883046bd2f05477e1f940e79eb272134b04032943d91f631e9dbf0ecddd
-
Filesize
80KB
MD5b97dbc852bf17917c1c1e5aeaf1826ca
SHA13a537b4665bacf29d8715aaa5356f294a332c1f4
SHA256ac03a0c97c16bfb0ba81af1f3e93429329d78bf5de7b841d9edd2650393d7016
SHA512877bb74be291d5fc77fe9b8d789633a78cd3d7662353ddeda45ae1017849026ac5d07883046bd2f05477e1f940e79eb272134b04032943d91f631e9dbf0ecddd
-
Filesize
80KB
MD5b97dbc852bf17917c1c1e5aeaf1826ca
SHA13a537b4665bacf29d8715aaa5356f294a332c1f4
SHA256ac03a0c97c16bfb0ba81af1f3e93429329d78bf5de7b841d9edd2650393d7016
SHA512877bb74be291d5fc77fe9b8d789633a78cd3d7662353ddeda45ae1017849026ac5d07883046bd2f05477e1f940e79eb272134b04032943d91f631e9dbf0ecddd
-
Filesize
80KB
MD54df7724d22a01c65922ae506b49009e7
SHA1c0c28051117cea36c7f77821f3788459338c4e5e
SHA256fecc70848657d04d9ca03c99c3c88f7364aaf6f33684210991d297354b2628f2
SHA5122a1e174dda22d0f1d4446d74344cfa36f0876e8b1d92256ec5d04c8109d351073349008c1295e6c99e0b31eb20997af8f0a311066cbffd85e89966c5678fe387
-
Filesize
80KB
MD54df7724d22a01c65922ae506b49009e7
SHA1c0c28051117cea36c7f77821f3788459338c4e5e
SHA256fecc70848657d04d9ca03c99c3c88f7364aaf6f33684210991d297354b2628f2
SHA5122a1e174dda22d0f1d4446d74344cfa36f0876e8b1d92256ec5d04c8109d351073349008c1295e6c99e0b31eb20997af8f0a311066cbffd85e89966c5678fe387
-
Filesize
80KB
MD54df7724d22a01c65922ae506b49009e7
SHA1c0c28051117cea36c7f77821f3788459338c4e5e
SHA256fecc70848657d04d9ca03c99c3c88f7364aaf6f33684210991d297354b2628f2
SHA5122a1e174dda22d0f1d4446d74344cfa36f0876e8b1d92256ec5d04c8109d351073349008c1295e6c99e0b31eb20997af8f0a311066cbffd85e89966c5678fe387
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD5b97dbc852bf17917c1c1e5aeaf1826ca
SHA13a537b4665bacf29d8715aaa5356f294a332c1f4
SHA256ac03a0c97c16bfb0ba81af1f3e93429329d78bf5de7b841d9edd2650393d7016
SHA512877bb74be291d5fc77fe9b8d789633a78cd3d7662353ddeda45ae1017849026ac5d07883046bd2f05477e1f940e79eb272134b04032943d91f631e9dbf0ecddd
-
Filesize
80KB
MD543fd53591b23de318764d164fda8d5f1
SHA188195bd4fad43a2ca2e317673ffdf0af1820429d
SHA2562d63654a742add802525bb71c6f5ec5052bec40db1d205f1226a13cbdadcc39a
SHA512b81b88b28437312714fb1f057c48f591fe6bbe8e80bb65be482f6b35e698948e999ea96d744eba38ea32ce58f342ebe91702313d56d120bab2111fafd9f2c483
-
Filesize
80KB
MD54df7724d22a01c65922ae506b49009e7
SHA1c0c28051117cea36c7f77821f3788459338c4e5e
SHA256fecc70848657d04d9ca03c99c3c88f7364aaf6f33684210991d297354b2628f2
SHA5122a1e174dda22d0f1d4446d74344cfa36f0876e8b1d92256ec5d04c8109d351073349008c1295e6c99e0b31eb20997af8f0a311066cbffd85e89966c5678fe387
-
Filesize
80KB
MD5d3976730f6d995523a17c80b41c370b0
SHA150fe5d8e0e4aa01019d933053dde61dd15f0cb5a
SHA2563d3290eb8b714eb7863e10ce9946c1d55300aa557386c125859c43a050eb4f6d
SHA51262aea37c0515eb0d79cc4d94ea806bc3e9e63a3a35f59b2bec48e55df98039898dbebe6d6f2fe4065a5d0b75c13f139f9a86538f7ae87479a9db00b3402beae3
-
Filesize
80KB
MD5d3976730f6d995523a17c80b41c370b0
SHA150fe5d8e0e4aa01019d933053dde61dd15f0cb5a
SHA2563d3290eb8b714eb7863e10ce9946c1d55300aa557386c125859c43a050eb4f6d
SHA51262aea37c0515eb0d79cc4d94ea806bc3e9e63a3a35f59b2bec48e55df98039898dbebe6d6f2fe4065a5d0b75c13f139f9a86538f7ae87479a9db00b3402beae3
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD5b97dbc852bf17917c1c1e5aeaf1826ca
SHA13a537b4665bacf29d8715aaa5356f294a332c1f4
SHA256ac03a0c97c16bfb0ba81af1f3e93429329d78bf5de7b841d9edd2650393d7016
SHA512877bb74be291d5fc77fe9b8d789633a78cd3d7662353ddeda45ae1017849026ac5d07883046bd2f05477e1f940e79eb272134b04032943d91f631e9dbf0ecddd
-
Filesize
80KB
MD543fd53591b23de318764d164fda8d5f1
SHA188195bd4fad43a2ca2e317673ffdf0af1820429d
SHA2562d63654a742add802525bb71c6f5ec5052bec40db1d205f1226a13cbdadcc39a
SHA512b81b88b28437312714fb1f057c48f591fe6bbe8e80bb65be482f6b35e698948e999ea96d744eba38ea32ce58f342ebe91702313d56d120bab2111fafd9f2c483
-
Filesize
80KB
MD54df7724d22a01c65922ae506b49009e7
SHA1c0c28051117cea36c7f77821f3788459338c4e5e
SHA256fecc70848657d04d9ca03c99c3c88f7364aaf6f33684210991d297354b2628f2
SHA5122a1e174dda22d0f1d4446d74344cfa36f0876e8b1d92256ec5d04c8109d351073349008c1295e6c99e0b31eb20997af8f0a311066cbffd85e89966c5678fe387
-
Filesize
80KB
MD5d3976730f6d995523a17c80b41c370b0
SHA150fe5d8e0e4aa01019d933053dde61dd15f0cb5a
SHA2563d3290eb8b714eb7863e10ce9946c1d55300aa557386c125859c43a050eb4f6d
SHA51262aea37c0515eb0d79cc4d94ea806bc3e9e63a3a35f59b2bec48e55df98039898dbebe6d6f2fe4065a5d0b75c13f139f9a86538f7ae87479a9db00b3402beae3
-
Filesize
80KB
MD5d3976730f6d995523a17c80b41c370b0
SHA150fe5d8e0e4aa01019d933053dde61dd15f0cb5a
SHA2563d3290eb8b714eb7863e10ce9946c1d55300aa557386c125859c43a050eb4f6d
SHA51262aea37c0515eb0d79cc4d94ea806bc3e9e63a3a35f59b2bec48e55df98039898dbebe6d6f2fe4065a5d0b75c13f139f9a86538f7ae87479a9db00b3402beae3
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD5b97dbc852bf17917c1c1e5aeaf1826ca
SHA13a537b4665bacf29d8715aaa5356f294a332c1f4
SHA256ac03a0c97c16bfb0ba81af1f3e93429329d78bf5de7b841d9edd2650393d7016
SHA512877bb74be291d5fc77fe9b8d789633a78cd3d7662353ddeda45ae1017849026ac5d07883046bd2f05477e1f940e79eb272134b04032943d91f631e9dbf0ecddd
-
Filesize
80KB
MD543fd53591b23de318764d164fda8d5f1
SHA188195bd4fad43a2ca2e317673ffdf0af1820429d
SHA2562d63654a742add802525bb71c6f5ec5052bec40db1d205f1226a13cbdadcc39a
SHA512b81b88b28437312714fb1f057c48f591fe6bbe8e80bb65be482f6b35e698948e999ea96d744eba38ea32ce58f342ebe91702313d56d120bab2111fafd9f2c483
-
Filesize
80KB
MD5d3976730f6d995523a17c80b41c370b0
SHA150fe5d8e0e4aa01019d933053dde61dd15f0cb5a
SHA2563d3290eb8b714eb7863e10ce9946c1d55300aa557386c125859c43a050eb4f6d
SHA51262aea37c0515eb0d79cc4d94ea806bc3e9e63a3a35f59b2bec48e55df98039898dbebe6d6f2fe4065a5d0b75c13f139f9a86538f7ae87479a9db00b3402beae3
-
Filesize
80KB
MD5d3976730f6d995523a17c80b41c370b0
SHA150fe5d8e0e4aa01019d933053dde61dd15f0cb5a
SHA2563d3290eb8b714eb7863e10ce9946c1d55300aa557386c125859c43a050eb4f6d
SHA51262aea37c0515eb0d79cc4d94ea806bc3e9e63a3a35f59b2bec48e55df98039898dbebe6d6f2fe4065a5d0b75c13f139f9a86538f7ae87479a9db00b3402beae3
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD5b97dbc852bf17917c1c1e5aeaf1826ca
SHA13a537b4665bacf29d8715aaa5356f294a332c1f4
SHA256ac03a0c97c16bfb0ba81af1f3e93429329d78bf5de7b841d9edd2650393d7016
SHA512877bb74be291d5fc77fe9b8d789633a78cd3d7662353ddeda45ae1017849026ac5d07883046bd2f05477e1f940e79eb272134b04032943d91f631e9dbf0ecddd
-
Filesize
80KB
MD543fd53591b23de318764d164fda8d5f1
SHA188195bd4fad43a2ca2e317673ffdf0af1820429d
SHA2562d63654a742add802525bb71c6f5ec5052bec40db1d205f1226a13cbdadcc39a
SHA512b81b88b28437312714fb1f057c48f591fe6bbe8e80bb65be482f6b35e698948e999ea96d744eba38ea32ce58f342ebe91702313d56d120bab2111fafd9f2c483
-
Filesize
80KB
MD54df7724d22a01c65922ae506b49009e7
SHA1c0c28051117cea36c7f77821f3788459338c4e5e
SHA256fecc70848657d04d9ca03c99c3c88f7364aaf6f33684210991d297354b2628f2
SHA5122a1e174dda22d0f1d4446d74344cfa36f0876e8b1d92256ec5d04c8109d351073349008c1295e6c99e0b31eb20997af8f0a311066cbffd85e89966c5678fe387
-
Filesize
80KB
MD5d3976730f6d995523a17c80b41c370b0
SHA150fe5d8e0e4aa01019d933053dde61dd15f0cb5a
SHA2563d3290eb8b714eb7863e10ce9946c1d55300aa557386c125859c43a050eb4f6d
SHA51262aea37c0515eb0d79cc4d94ea806bc3e9e63a3a35f59b2bec48e55df98039898dbebe6d6f2fe4065a5d0b75c13f139f9a86538f7ae87479a9db00b3402beae3
-
Filesize
80KB
MD5d3976730f6d995523a17c80b41c370b0
SHA150fe5d8e0e4aa01019d933053dde61dd15f0cb5a
SHA2563d3290eb8b714eb7863e10ce9946c1d55300aa557386c125859c43a050eb4f6d
SHA51262aea37c0515eb0d79cc4d94ea806bc3e9e63a3a35f59b2bec48e55df98039898dbebe6d6f2fe4065a5d0b75c13f139f9a86538f7ae87479a9db00b3402beae3
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD57765c26490034b48d88bda6243c8e711
SHA199b4544505f5097838563a848debede647e89a90
SHA256ec95bf2c498a6d610eec8824792084fac6233a1b7b5fe86842671ecaf843728a
SHA512ebd4ed208956216543ba06e4d28bf96eb1414fe415c0f4249b50781e02f0d2b8398c8c6d4248e8427ae4525aefdee2c42c60493288807ead1398b6633bcc1b85
-
Filesize
80KB
MD5b97dbc852bf17917c1c1e5aeaf1826ca
SHA13a537b4665bacf29d8715aaa5356f294a332c1f4
SHA256ac03a0c97c16bfb0ba81af1f3e93429329d78bf5de7b841d9edd2650393d7016
SHA512877bb74be291d5fc77fe9b8d789633a78cd3d7662353ddeda45ae1017849026ac5d07883046bd2f05477e1f940e79eb272134b04032943d91f631e9dbf0ecddd
-
Filesize
80KB
MD543fd53591b23de318764d164fda8d5f1
SHA188195bd4fad43a2ca2e317673ffdf0af1820429d
SHA2562d63654a742add802525bb71c6f5ec5052bec40db1d205f1226a13cbdadcc39a
SHA512b81b88b28437312714fb1f057c48f591fe6bbe8e80bb65be482f6b35e698948e999ea96d744eba38ea32ce58f342ebe91702313d56d120bab2111fafd9f2c483
-
Filesize
80KB
MD5d3976730f6d995523a17c80b41c370b0
SHA150fe5d8e0e4aa01019d933053dde61dd15f0cb5a
SHA2563d3290eb8b714eb7863e10ce9946c1d55300aa557386c125859c43a050eb4f6d
SHA51262aea37c0515eb0d79cc4d94ea806bc3e9e63a3a35f59b2bec48e55df98039898dbebe6d6f2fe4065a5d0b75c13f139f9a86538f7ae87479a9db00b3402beae3
-
Filesize
80KB
MD5d3976730f6d995523a17c80b41c370b0
SHA150fe5d8e0e4aa01019d933053dde61dd15f0cb5a
SHA2563d3290eb8b714eb7863e10ce9946c1d55300aa557386c125859c43a050eb4f6d
SHA51262aea37c0515eb0d79cc4d94ea806bc3e9e63a3a35f59b2bec48e55df98039898dbebe6d6f2fe4065a5d0b75c13f139f9a86538f7ae87479a9db00b3402beae3