Analysis
-
max time kernel
14s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
efc673f29e02a3c1919dd07d658c103f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
efc673f29e02a3c1919dd07d658c103f.exe
Resource
win10v2004-20231222-en
General
-
Target
efc673f29e02a3c1919dd07d658c103f.exe
-
Size
406KB
-
MD5
efc673f29e02a3c1919dd07d658c103f
-
SHA1
1fba31063c536e6ac063c556a1f4a2d7c89473f0
-
SHA256
59bc9bfe9f8b4e283735f9723b4578fa009327eb098b04040b3658033829a947
-
SHA512
c3a3daffcefda06955b08f0e1bbccad11a058553fafde0622443ce8ca41ba5b39fabeacad9059b6e950e489e1d5d66de4ae14269ca2c228a419de4298cb7dc9d
-
SSDEEP
6144:it03a62hzpSNxV2qcJVLNyTiY6wDyIJ2r/blZ:Os52hzpHq8eTi30yIQrDlZ
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 2772 efc673f29e02a3c1919dd07d658c103f_3202.exe 3000 efc673f29e02a3c1919dd07d658c103f_3202a.exe 2556 efc673f29e02a3c1919dd07d658c103f_3202b.exe 2272 efc673f29e02a3c1919dd07d658c103f_3202c.exe 580 efc673f29e02a3c1919dd07d658c103f_3202d.exe 1904 efc673f29e02a3c1919dd07d658c103f_3202e.exe 1752 efc673f29e02a3c1919dd07d658c103f_3202f.exe 2428 efc673f29e02a3c1919dd07d658c103f_3202g.exe -
Loads dropped DLL 16 IoCs
pid Process 1628 efc673f29e02a3c1919dd07d658c103f.exe 1628 efc673f29e02a3c1919dd07d658c103f.exe 2772 efc673f29e02a3c1919dd07d658c103f_3202.exe 2772 efc673f29e02a3c1919dd07d658c103f_3202.exe 3000 efc673f29e02a3c1919dd07d658c103f_3202a.exe 3000 efc673f29e02a3c1919dd07d658c103f_3202a.exe 2556 efc673f29e02a3c1919dd07d658c103f_3202b.exe 2556 efc673f29e02a3c1919dd07d658c103f_3202b.exe 2272 efc673f29e02a3c1919dd07d658c103f_3202c.exe 2272 efc673f29e02a3c1919dd07d658c103f_3202c.exe 580 efc673f29e02a3c1919dd07d658c103f_3202d.exe 580 efc673f29e02a3c1919dd07d658c103f_3202d.exe 1904 efc673f29e02a3c1919dd07d658c103f_3202e.exe 1904 efc673f29e02a3c1919dd07d658c103f_3202e.exe 1752 efc673f29e02a3c1919dd07d658c103f_3202f.exe 1752 efc673f29e02a3c1919dd07d658c103f_3202f.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\efc673f29e02a3c1919dd07d658c103f_3202d.exe\"" efc673f29e02a3c1919dd07d658c103f_3202c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\efc673f29e02a3c1919dd07d658c103f_3202e.exe\"" efc673f29e02a3c1919dd07d658c103f_3202d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\efc673f29e02a3c1919dd07d658c103f_3202f.exe\"" efc673f29e02a3c1919dd07d658c103f_3202e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\efc673f29e02a3c1919dd07d658c103f_3202g.exe\"" efc673f29e02a3c1919dd07d658c103f_3202f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\efc673f29e02a3c1919dd07d658c103f_3202.exe\"" efc673f29e02a3c1919dd07d658c103f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\efc673f29e02a3c1919dd07d658c103f_3202a.exe\"" efc673f29e02a3c1919dd07d658c103f_3202.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\efc673f29e02a3c1919dd07d658c103f_3202b.exe\"" efc673f29e02a3c1919dd07d658c103f_3202a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\efc673f29e02a3c1919dd07d658c103f_3202c.exe\"" efc673f29e02a3c1919dd07d658c103f_3202b.exe -
Modifies registry class 16 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = a52fee745682380e efc673f29e02a3c1919dd07d658c103f_3202b.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} efc673f29e02a3c1919dd07d658c103f_3202c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = a52fee745682380e efc673f29e02a3c1919dd07d658c103f_3202c.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} efc673f29e02a3c1919dd07d658c103f_3202f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = a52fee745682380e efc673f29e02a3c1919dd07d658c103f_3202f.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} efc673f29e02a3c1919dd07d658c103f_3202a.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} efc673f29e02a3c1919dd07d658c103f_3202d.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} efc673f29e02a3c1919dd07d658c103f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = a52fee745682380e efc673f29e02a3c1919dd07d658c103f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = a52fee745682380e efc673f29e02a3c1919dd07d658c103f_3202.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} efc673f29e02a3c1919dd07d658c103f_3202b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = a52fee745682380e efc673f29e02a3c1919dd07d658c103f_3202d.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} efc673f29e02a3c1919dd07d658c103f_3202.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = a52fee745682380e efc673f29e02a3c1919dd07d658c103f_3202a.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} efc673f29e02a3c1919dd07d658c103f_3202e.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = a52fee745682380e efc673f29e02a3c1919dd07d658c103f_3202e.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2772 1628 efc673f29e02a3c1919dd07d658c103f.exe 43 PID 1628 wrote to memory of 2772 1628 efc673f29e02a3c1919dd07d658c103f.exe 43 PID 1628 wrote to memory of 2772 1628 efc673f29e02a3c1919dd07d658c103f.exe 43 PID 1628 wrote to memory of 2772 1628 efc673f29e02a3c1919dd07d658c103f.exe 43 PID 2772 wrote to memory of 3000 2772 efc673f29e02a3c1919dd07d658c103f_3202.exe 42 PID 2772 wrote to memory of 3000 2772 efc673f29e02a3c1919dd07d658c103f_3202.exe 42 PID 2772 wrote to memory of 3000 2772 efc673f29e02a3c1919dd07d658c103f_3202.exe 42 PID 2772 wrote to memory of 3000 2772 efc673f29e02a3c1919dd07d658c103f_3202.exe 42 PID 3000 wrote to memory of 2556 3000 efc673f29e02a3c1919dd07d658c103f_3202a.exe 41 PID 3000 wrote to memory of 2556 3000 efc673f29e02a3c1919dd07d658c103f_3202a.exe 41 PID 3000 wrote to memory of 2556 3000 efc673f29e02a3c1919dd07d658c103f_3202a.exe 41 PID 3000 wrote to memory of 2556 3000 efc673f29e02a3c1919dd07d658c103f_3202a.exe 41 PID 2556 wrote to memory of 2272 2556 efc673f29e02a3c1919dd07d658c103f_3202b.exe 40 PID 2556 wrote to memory of 2272 2556 efc673f29e02a3c1919dd07d658c103f_3202b.exe 40 PID 2556 wrote to memory of 2272 2556 efc673f29e02a3c1919dd07d658c103f_3202b.exe 40 PID 2556 wrote to memory of 2272 2556 efc673f29e02a3c1919dd07d658c103f_3202b.exe 40 PID 2272 wrote to memory of 580 2272 efc673f29e02a3c1919dd07d658c103f_3202c.exe 39 PID 2272 wrote to memory of 580 2272 efc673f29e02a3c1919dd07d658c103f_3202c.exe 39 PID 2272 wrote to memory of 580 2272 efc673f29e02a3c1919dd07d658c103f_3202c.exe 39 PID 2272 wrote to memory of 580 2272 efc673f29e02a3c1919dd07d658c103f_3202c.exe 39 PID 580 wrote to memory of 1904 580 efc673f29e02a3c1919dd07d658c103f_3202d.exe 38 PID 580 wrote to memory of 1904 580 efc673f29e02a3c1919dd07d658c103f_3202d.exe 38 PID 580 wrote to memory of 1904 580 efc673f29e02a3c1919dd07d658c103f_3202d.exe 38 PID 580 wrote to memory of 1904 580 efc673f29e02a3c1919dd07d658c103f_3202d.exe 38 PID 1904 wrote to memory of 1752 1904 efc673f29e02a3c1919dd07d658c103f_3202e.exe 37 PID 1904 wrote to memory of 1752 1904 efc673f29e02a3c1919dd07d658c103f_3202e.exe 37 PID 1904 wrote to memory of 1752 1904 efc673f29e02a3c1919dd07d658c103f_3202e.exe 37 PID 1904 wrote to memory of 1752 1904 efc673f29e02a3c1919dd07d658c103f_3202e.exe 37 PID 1752 wrote to memory of 2428 1752 efc673f29e02a3c1919dd07d658c103f_3202f.exe 36 PID 1752 wrote to memory of 2428 1752 efc673f29e02a3c1919dd07d658c103f_3202f.exe 36 PID 1752 wrote to memory of 2428 1752 efc673f29e02a3c1919dd07d658c103f_3202f.exe 36 PID 1752 wrote to memory of 2428 1752 efc673f29e02a3c1919dd07d658c103f_3202f.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\efc673f29e02a3c1919dd07d658c103f.exe"C:\Users\Admin\AppData\Local\Temp\efc673f29e02a3c1919dd07d658c103f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1628 -
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2772
-
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202t.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202t.exe1⤵PID:2176
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202u.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202u.exe2⤵PID:1260
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202v.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202v.exe3⤵PID:1672
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202w.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202w.exe4⤵PID:1236
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202x.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202x.exe5⤵PID:2804
-
-
-
-
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202y.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202y.exe1⤵PID:2960
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202s.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202s.exe1⤵PID:2032
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202r.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202r.exe1⤵PID:2092
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202q.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202q.exe1⤵PID:900
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202p.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202p.exe1⤵PID:1856
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202o.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202o.exe1⤵PID:1032
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202n.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202n.exe1⤵PID:1616
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202m.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202m.exe1⤵PID:2376
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202l.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202l.exe1⤵PID:2208
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202k.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202k.exe1⤵PID:2824
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202j.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202j.exe1⤵PID:1492
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202i.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202i.exe1⤵PID:2188
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202h.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202h.exe1⤵PID:1972
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202g.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202g.exe1⤵
- Executes dropped EXE
PID:2428
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202f.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202f.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1752
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202e.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202e.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1904
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202d.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202d.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:580
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202c.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202c.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2272
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202b.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202b.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2556
-
\??\c:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202a.exec:\users\admin\appdata\local\temp\efc673f29e02a3c1919dd07d658c103f_3202a.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5320711e3605d89e1a4538f8a3d1fe12a
SHA18cd9fb04b05bc0f5a1ff4aa6fb540c156d61f0bf
SHA2564c3749956f18da62229ce6348a6398b7ded9c5e245ee508760f3d1840baa3ebf
SHA512dee724f06d5e7ec2932e224d875f9fc850acb83a4bf2a29c90f9bec27ed95ff2c53b51d7c645be3f2b0b64ad3923e581ae7496f97689c1776163a1cdc29b9056
-
Filesize
30KB
MD59fd04b49f98c05f266409e73bc0d15dc
SHA1e393fff1477d645fd948155ae2eb6295eea38be2
SHA256044698b903e508d6c2db44eaff32bc636111ac5d4ec19256f9f20adc4ab66732
SHA512aec5b3f43fccac6d341c739d803e8dbdfd789a11a0628008b92bd2e341bf2e01e57cd8d07d9da776cfed7a3494b0604b2e6a01206864bf2cac334ae06e0435a8
-
Filesize
19KB
MD5b1b005e1802558cad437d53ddeb624ed
SHA15fe60c701a613619556aef7fc7498f2109c9cf12
SHA2561402395a4b2fe5b6c8aefb0415eefe26155c7fd08bf1dd7d86b864e3b77e37e4
SHA512012404c1ffb175961af31293c9190aca200b09a275af122033c2be9fa6b5fe0e91d9a30e6f1e369c05b1f47552e13b30cedaad8dd87ae8706a0328df3c2d9d3b
-
Filesize
38KB
MD524fe933f2ec2e0a439a36939e4bda69d
SHA186cf7ace2b758e885ec48b06b3175ef6a753ab26
SHA2561711ecc6471b73a033c9677939681696228a856a6ea147ba539bd26e89cc243a
SHA5126893ea4a16c559df2320ea7a03dc7bd799a562b9320dee934f52eff49417a922d4de88eca217778570ce8fe8bf2c360ff4c189ae314a263ba9757ccfce48717f
-
Filesize
31KB
MD5d705a9f752f856dae2ed30f09f0e8e72
SHA17e86dfceb64fbdc03e2b7994ac8a036bfc0402e2
SHA25613f5c021bf4662e8ed49b776d2770eb45f7052e19c7fbf31cfc911cfbf4e252d
SHA51266a390b8391b7171ffa49ef4b4033283726cdb2ccde8cce629e24e89f40f19ddd5dfdb9193b35daa22d27d6734b498fee4794058e37c58fb1d743ad6282ef158
-
Filesize
69KB
MD5eed508558421d6f7042301c15dbd9954
SHA1b6b974d69fe8d7a7614006009f3b4f742ede67f2
SHA256410cb04d923de7bcedec368ac4cdb1cb70c6e7676f2a040b4692542da0af7944
SHA512c2f214553ab26172b9a1ac75a0308fa6076b8a04139327a56c3e48bad3c8ce8e6bd2b8ec7e51ea587a9fc65178552ea9c5aa9b8ea4a5d791cf2935b15dd7b273
-
Filesize
21KB
MD5013e4b5bb78ae09e53861875ef9a62d9
SHA1865e9593e6114d49f35b04ce18e4a5f55a00d636
SHA256186b641dd3f4a7f032d7c666a3ca842ff46e935c0c50e0ed00ff0a64531d88f1
SHA512c5ffde916fda763fdb13e5d7b7b3aee6efc067b1c7432ae9baf2c9cccd167f057cf338ce9fe6c3ff2248a2ac399d2812bca68f48ec84cf195772c4bb4563be5d
-
Filesize
19KB
MD55b44c5906e4e80fef3b4e2567ca8ffd1
SHA169c05bf4c3749988ee82fbf7c69168b1e2d93224
SHA256720ceb9ab84eda1cc0b795f62aec54b2832eda246d8a42cb2e9723b1bff7e262
SHA512a76c650ba26bde44f4b8475c88b1d1acebc58024d7ef58d32076746dd9ab4fc19ee4dd0c11d52113add5c4e221fed69c98ece51a06d6f4ad0f50b4dca5e8ca14
-
Filesize
29KB
MD53e68671eb740aff55645a01217e30f4d
SHA13549ab75bb5c64e6d8f93aa8a4f4c3b0c62c63d0
SHA2562bfc89c0d048511a6265e8461cfdc58e8e90da10b5a617e4d006d4400f1b87df
SHA5120563649b07bdcd300bd73df51ba2882f3aa42c6abff187f58d9f47f249296deeb58747bc51b40ba51d97875a3fec68fbf34661cfa4b452660466d3739a716dd0
-
Filesize
30KB
MD5351fa0878ed6b2b4edeb89b07f7fd090
SHA198615f8837f96195b2bc0dc34e21bc667cd7db08
SHA2565cbb359509075fa09701624f618afbf1b2d5d5d1112a97ffef9e99487e45ee0d
SHA5125bba6c7a08653a38e9e4c32a0324e0cb00ad690d0243332691b9939ca5d510ce8774a117eae93aa40a960bc038b434849322f1803cf9ce33a435e4a4a3088c96
-
Filesize
52KB
MD575a304d3edbbbbccb31d1d824aa5fa49
SHA10a95015f0e9e531edd38806108444fcc459cee12
SHA256a83444c9679d7ba1a6fdf3d908ce58f31b3cdea91ebdceb2ff30e02897555a3a
SHA5123eeda27b5a233d49d84a93f16e238455228e7fd5038b90e85737f26b05e59267db3d33d8a4bc7bdf5cd076b51b4e721a0b5eb58e22bba3b42bbc2cac908121d3
-
Filesize
45KB
MD5349302d06086dc2843e3d95f63ee6c3b
SHA1d698de35c20e1e9ef6a2363332c1e9cbf31c326e
SHA25619774b237ca458d4a3e76afc2783abcc66e825aa636362e9936f9565f79a5cf0
SHA5126070dfd2f8c31fdd5ded4407170805c4c1eb8585c3490696859bfd85b5d054cf4ac67c5181dd44703f7e68cf4828c91575626ffda71482e802e6af7b910070ee
-
Filesize
34KB
MD5fa4b3e9c5ece1b5c20e3be4b65e0e9d3
SHA13329cec16ebeafe45021327f5c1ed0a6ad86d233
SHA256aec08d566e0491beb702a4d5cb74b43f1b534f2c1b1dae7f8c7981f96dcc2d85
SHA5128366d7035394f31702958c64bc5010e80bff4672f25b4e9835505ae52bf3c33680f3ebab18e36a50d2277bf27c8465691417e8e48346423f1d97dd04912555e4
-
Filesize
18KB
MD594fcfd8c4bd3718d177ea943712929bc
SHA171159950c5a43fa7c8afa205ca615054aa05d259
SHA2569d5b7e7182520e849fb688183328316afc2c33aa4326faeb59d0dd57bac302da
SHA51262ca5ae28cc3d93d009c56ab54515f9d229ce3d11fc0d5c4915327c70d6c22fdabeb2f356264df91148cefa638bb4b93a31e3098a9dd87e397dda6546d2ec21f
-
Filesize
14KB
MD53ea466f067ab3654ce386f57ce87e722
SHA181a82ae056ba4d739ce2cd99f17d420f645f592a
SHA2560e49997251c5d484f1164f6b242e8292eae81b07fa1b9ebb9e02799b598dda0f
SHA512a869c577cfb119c2fc5110dcc7c9bcb753aea3538d46ae769bee86a75ed2919e520fe8130ef98dc32bf31fdcda7acc928126baa7042e18e6c01dc3ae34405c81
-
Filesize
1KB
MD58021feacc914e0ec54d135ab83cb023a
SHA1dc6dc3bb812ace88a33581ba3f1acedd8cacfba5
SHA25662007a7371e3f8876536473e947693b04b3c8cfc5252981d293bb03a6e7c500f
SHA5129cd106c5d3fe30bdb3de0632ae5eef6ab9b44e5b7d6d1102167d722fcf39bca740359fa11983c5f1b790566acf61248eda4127c7d4538d37446608e469f162e7
-
Filesize
69KB
MD5decc09668eac0fb89a78e7b488df05bb
SHA132258564fdf44d6149d0e30b77f05c7d764e9ea1
SHA2561879541734952d4a78b3e2be87cf4a3931d4654e906f060431871815f2859cd9
SHA51221f8e4123ce392faaf57bc4b2c4ce1f9c9a0a4bbe7babddaf434d8032e0b6701ea4f18763e5530921ca03d47a761862efb4c80c1596d7c3806969f608f1a80b6
-
Filesize
70KB
MD52aa30feed6bc00860356f1fcedc941cb
SHA10979d1e7cf7534c9b3a393767d1c4ba33fa022d2
SHA256578b99045d89da21cc94f25928bf8d2f6bd889b8478d8f13b016ec924b92baef
SHA512cd354ffe8c05274de72558e6d377bdc313da1bbfe76d72b0893c38feec477b80941f22751c88e93c2d29ccb176eb80b009e2c72874fe9c1788fcf4941eb2363c
-
Filesize
16KB
MD58c44497dd3d06741cc932d80e0a97c40
SHA1c2362b09cbe20466412279cc1f724d1d6295657b
SHA2567b29405ef28ce020c0eed2b0f7508a67028e80f1f9467547a2d78b8f888d08d8
SHA51263be3364042fbc9c10c1ddd491b48d5c1d2af9db3995e0bc79d1d28fe981d4e84627d5394875608bfa14b65c40672662fac4f25f6da46fe82f46bd79957a4d70
-
Filesize
56KB
MD5f1ea7156bbc9715d90dab30ef5255bdd
SHA1d8a480bded69a684fdea32a3d2dd4e2c90ba01bc
SHA256fd9e4e3d749c8591463dc8c56854716e76d357e44f429c6ec682bb15b16be8ce
SHA512984397cfab84bb54714252f744c5949610542bb541991e7f31525f118113a8ef5e4d02b6b78a242df1545518dc2691f09ccf4802713f9f3eb939bfb80be14243
-
Filesize
5KB
MD512a744efac1fb32a6a4067fb5714493f
SHA17316523d6443db62dfab62ca3490c49c2ee8f6b3
SHA2568651af73099ee5360373862eb24974899bce3d582ec579971b28acceda7273f7
SHA512865a98cd9cab9ba2bd29eb6e0603c406fbd365910d9632c8c8a2125b62b1944fd590f9b4c7053675a0d1bc1cd878bce30733604520b8d5088faabbc78f570291
-
Filesize
2KB
MD57a847db72ba00484ec4e15b0cdc87a78
SHA127c7dd9373993e28188105ee0df7b2d2b1ae7580
SHA25644cf23eb34772a4ba7dff3415299a5dfa2dbbaf3d385bf66c780a1ef4be010b4
SHA5121639eedfd0431de49c86855bc28ebc99c1bea6cd56e376b41ad9c6d97703bca0ed0afc8ec3f08dfa54d1256b4ff8a8554b011ca78097f8c09d53ffc2febf0a02
-
Filesize
12KB
MD5ee43a4780ed5eb226f42054a7a04e776
SHA145bc6bfd2e470d36eb056c3b8b12b2f27e24ecbc
SHA256ec3c07619ddfcc2f05706dac36e2fb24b85cc9cdf271aae36ef82d357bf4fd43
SHA512661a433856248cc66da4df7350d91fabc6f27f3914f1562ff5366bcaa7e4c94c19daff695cd8a84594835514ae23f0837410f7cf3ba933a319e47aa6f929eba0
-
Filesize
37KB
MD53190b837faa56e5ff9d7a3a993bf6428
SHA19b5c81b6dc6ed87b2ea81fdb6341a5f05ae81070
SHA256fd777d10f90b5636163349876b0efee61a22a3461bfb45590458ab135413d357
SHA5128e14add315ffe0575d1e1b97fe0faa81ae5647c34521e1beeae08f68059f346e6ce23aed6c51178630d7d13810bbadd445d2e642374b4effcac4337ecaded21d
-
Filesize
27KB
MD5e055e69a17b99de096ca7ec213a1278c
SHA13b7d7a13fc37972b064fdd3e9cd2dc2786920e1e
SHA2564a0768d406985e1442b7b8036e418a47c89c808bbb3008379db7266817db211e
SHA5126e9ab3fa576b40e67ccdd926abc8d4d196eb4e42670430a0c1da5e2c99bc05b5d6106d34601f0702d60f2ef4da5aaee58319df2a71d14f5f8128f70dc0cd42df
-
Filesize
31KB
MD52391c543f5b360f80bd1aad713f76e69
SHA1dbb458c73dd2b8eae9ede179d5ba945590d40893
SHA256f3fbc5166ffdab5f0c8849ebb920af21f35b130e6616af89a542849cd6cd83e8
SHA51242a0a36a9e93c2ae8448bd78d244793a886b12f0a87e5778a271c5b0d6954efb272baf28ff0d9d6cc0142545d1dda994251b23d065a5076dfd8e6becd2093160
-
Filesize
31KB
MD59b34bc25a4756a298d83400d5179d188
SHA1cc690105ce23a335a8d8e2f9da832ded4946d035
SHA25623d2ed50776933b00c20c0c5cda8eb5790410a75f02d61fdcec042fadf21b19c
SHA5127af32a0c1935b6051b00f10f4a01f566843996e29e9f1f26b423392ce7ffa88c5a20b013d1649f5b7c646b4515ba77cdb783b6b087e928f8bf98bdf94d8e24c1
-
Filesize
18KB
MD5a50540393a1f5021c3546185bcd6d188
SHA138416cf0e20a865781b22c5da1c53a277520e0f8
SHA2567282b30ac1c83b2caba86eea9bf2982a91159cdec3d8ecc30179f6f5332fb877
SHA512262588537b2e1062cbf2ccaa44b2854d7c62d038a5bfd0cbadb073db669b90d801ce16d5953f22e943ae895cbe49471b1df5d5520f8bcd0c9cd4166df6f83782
-
Filesize
96KB
MD5858d9412239699762e875fd13775559c
SHA1317c85c0c67e249e4bffcc75d37df93df30bcd41
SHA256d0663519c60e77eae8cf51b075611e961ec81b44b7594ada4e6623172f2a4388
SHA512d8a403f9fc3dd1eef6172ed6d98cf3f98dd79c866fb36245139748aef43a56d4d1292b94a54bea3c468bbcf3e956d9b86848d91d136d1c53e1eec0fcd8b8b54f
-
Filesize
19KB
MD5bb970b841335da9ee396fbc9c07a21b6
SHA143637faeb91673ae2530cbf37833a78a5ce52866
SHA25612ce9758d4d04b035ed5b6055c2224ce9ffa957edd5bfa0e4bf2d768a8360696
SHA51251c6e8a0eee919de94cef0230f4bb07791d8e420c98ae554e8f67c26db07577eca15c1a6119d8f72020ba9654c2dcc42fc3c389aa273dab6230f6e371af39d71
-
Filesize
14KB
MD582eb777271b533ddd4af5a6e76733e06
SHA1b9ee2bd16056e0677a66c76712e398072b27f5e6
SHA25697ef5644d407e64de85e25b2c97013c7921fbc933261283437473c1a2bee2d3a
SHA512175361eaf9791f5e144ae7682dde80c4d7d5667b7154a9d7a0c2d620fd8181adcf71f53785895e379bd0002c0b00b8d198116febf86063ac08f2f4ec9c199c38
-
Filesize
23KB
MD55053a7cd969ac64a73059ac29f035b1d
SHA1a2b353249d28b097f92f914211df0796e7068a65
SHA2567343afe783630d5b383aed24253fb1293efe8b2f0bd40e181773f56ba5867a86
SHA5129cd6a24c6e3f196cbb2e4237929a8efa471c597bac7f2d9c8e5a8c609b51f305bf8ac5a3d0e55abb13ab6fe30c466c023bd1b03dd05f7ea53e3e6d2ac6c8ca1c
-
Filesize
13KB
MD5a8138f8850738c6ca44c6efc3cf74600
SHA1fcfc4411eff9cd8e53ca0ecd1fd6207ddfc4bfaf
SHA256aa4afc6717cae8f2d45694d9d04812e8d2f453d56755cd96defe175a236cb989
SHA512ac020ed334f5423a6835d71a278564a4364a26850292b2d47b7a6efa883c623c060db85db320b93303f15bb64d9ab794d62f58a62575a26965f6665faa8f49a0
-
Filesize
71KB
MD59d93ef58ffee95f0ae71cc50dea24b34
SHA1b6aa75fd33df4472a55dad763cf802372b6e5a9b
SHA25658c8fbe81b1fce1236906421496140a3417340e984c565ce65391247099d84d9
SHA5122373902d1a6455b6ce520e5a7600c01366d069afbca8540d7b1da841ddeb1cef620a7e99a436c2aeb75a1f78375c111bb0c93fa3910fb5e88572aa06fbe52997
-
Filesize
10KB
MD5019de2218d5fa8dd4f10d148f81b2579
SHA1f9d5ea08c4cd0c82533b842153ec2277177d7b42
SHA2569c2fd48fbe6b7f7e7dd96e3f2bb8547486f940b7227865abdedd03b856189c20
SHA51280be7092d9afc6d8b962e8e9e2b53029213ed70f4f88661429914e044f7dadfbf3937ad74ae1303b48627e440e5861d60cbab203a4815b886af7011e8bc7987d
-
Filesize
698B
MD5f1dfed0c27dca9a7ff904a9409438228
SHA151270930f3c9e6b69f115d0fe327ee30c3bb0fb5
SHA25608e0b3746d9a791d27809616374a98bc2789faabd91f4bbbb5ebe7b42874420d
SHA512e6a90b77c2c94461cc61935f0304c55acbf98f51978394059bcb328f9fbe50ef59586006a5496d604b6d7b7d4daa913e7b8a03c9e4b61862ade5f35819897745
-
Filesize
41KB
MD5403d6ddba1e36f9b645fb33cd99b1f6b
SHA1357e77b8d43322ff2ebaee068e3e7385954c7f1a
SHA25665ad60b842ed221c5acf106c2ba97a7f6e2a678893852797442c0ebd08ac1391
SHA512dd56fbfcc5025adeef31fe336584c4815f2debe28d75bb7b8f3b05d465034603383b10a46ba7cff0db48997fec6b654b3aa5756e9bbf72d0c924efe814b65c49
-
Filesize
73KB
MD55263c5111022a969336c24aa154818de
SHA13310003644ebfcd67c58c59fd262242c332228e2
SHA25695e86ddd97755095ff342bcb0a3362e0b1aa18d6e369a124ba5655397d2460ea
SHA512d3fa8cf7878c8156e4611e4d4bdb7c51cef5850d13292b505b849b60109898c0b0d62d0ef84f6c8a5c95d47cbe7e1babd2039fa41b13abc5b0f4875d3c6000f8
-
Filesize
24KB
MD5230f60a76a932f47d8a0ab271061d5ff
SHA1413bf50dbf640af157e23ff7bf86438bba70e2c4
SHA256cb0ba2ec632648d2b5ce1286b90d2ac6fa26cfe5016005452b8fbb124d738a85
SHA512ba3fd830f4f89d4dd4900128a0e839244b9f2064c20983e19498bbd5fcff7d5261bfd47c8c4cd127a5b4e64aa70c8509c540d7e3de7c791703e51fe264c0ddad
-
Filesize
14KB
MD5e1ccf3ccd354da01de702cca4c7eccf4
SHA11a30e6c849ac2537a30c2f22b93462bab62b7ea2
SHA25613ef51f69a9ee2d09c2e0412b11985b84dc85b5f455a12026dbb1aed2e7dfe9c
SHA5128ab7b4d15218e7686b17fef1282f952b5c712a73587df76880d5a4954fb384e94ff0459ebbd6032dab84fdf33e5091bcbaab8b9f2cc970557ec2ac590f0e2c6c
-
Filesize
27KB
MD532eac7f2fed2e1585e4b2d497bdd09a4
SHA1c5ef0a1cc7fa2721b8c95c2017729535c5eb947e
SHA2563060888497e8a33e5ca33513329afc3838bf9d2ebf9cabc8409ae0414546143d
SHA51204502e01aa3708a98c268399a836ff6e74ccc172dd3e77c163b4513f81971a0a84e9a92d0ddd76209ed905d15c7897c42a375824650730c9422bcc1c0aa5538d
-
Filesize
8KB
MD56f9452382c43981580a20e3a822c05f7
SHA1ef6eefa92078d5dd2347930f136e1f0958859dfb
SHA256ad62ede4fe1702af0c874df3f64e84b4f10b8c0622936c968b595dd5abdbb9e1
SHA512d61c38d6c41b576e8a7daba8fa685f5b8f8f1d61a3ceafb087772aa63ea641044cd8a9ba7e9643d7a65fc0f97578b7e8fdee285e6ce3bbde07cc90b4a70a1675
-
Filesize
160KB
MD5d8ded37011181007f53086fc5d0ab733
SHA140b67258e7b08e53ec3fb0370b47d074b6056f6f
SHA25634117d898dc5c9c538aa8b175f9f49057dbf358b9afd570d2c32f7d7750605e6
SHA5127bb367dd81bd9e8c95d6332142bac4b68a9b549a12ffcc4c07493ff2cd0f829bce0b5790c7fb10eaa677dff48abf7ff5532591f5c790875742dc19ae9cd3923c
-
Filesize
43KB
MD56679a1c495a625f14525b49ff77ee59f
SHA1b53da556b32ee542d3373b0d4ef13ac2f8d44d88
SHA256651954139cc48fc524179fb6447ac98ee4ea45e97bc99237aad71085fe2cb52a
SHA5126f577a9d5df7352e81fb97f4502b75879c84009852c9b8b41d333a303d292b182657680c87503ff20f49587c215f0197e44bfc5d13d2ca86ef2a1ed87602d72a
-
Filesize
52KB
MD57cd58e279e2137b9eefd522a34e1276f
SHA175c8c6039b6120c1e2e719c40789d48b1fbe3228
SHA25633d3aee75e466998b1bfd7e0b0097bfbee1dcd133e1de5a6131a680cac1de3de
SHA512c348308e2b12908dcfbb8aad4899602489549835886ae7f1c1a9a107728045cf15e2ec6fa1fecfaf56b46c3e14d9cff021355a5316c5b3b3e19609ecaaaa8b89
-
Filesize
73KB
MD5dbda419987163c85cdb25bbe64dc9d0c
SHA17a6dea32181b9e2f15e63caff967ce6a70201e4e
SHA256c3c3dcfa00a444f4bf74c17c571a4ad9c465a74297737391aa2338b91c3e7007
SHA512e96642fe4a6a577f7ba22671caede31f96539421410d969e4f05946ac464682ea1fdb8c5a5b16ddd2f3b630f6cc48ecce9435b8f3c1546b956ae69de6015b4b1
-
Filesize
31KB
MD5e0338a9bf085ff216208bb0639ea237b
SHA14d16ef1603cedadd3a43de370adf16f8a86e7e82
SHA25611ab2d3b928cce538c1b2a689c40c0ad9e48150aaf671c2710fab28a7f206c95
SHA512b125ea0600bf6603330b960720b9fb506f592992ff8fbd4e8ff863a0c9709455f4f2d0bc52db1441eb616ad91fb3752910700ecd0ec0f9a60d67bce02b54866c
-
Filesize
45KB
MD565a0c86c847294c2b3c722bb2bfeff6f
SHA1b369f4e88de05ebabed143cbf111b8246b623f1c
SHA256cfc145c75cec63d9c1f1a257b15759a80ac3ca1f2c6f0b1767b273a58d7f10c5
SHA51210c801fbb1a0d726e7afa82121cbeae70efbf168d71e2dbb6657329aacb6f11ce5f2b462417b541753e0037b932635494eda4a1fc1a531452b48a5bc2cdb3c48
-
Filesize
25KB
MD5d283227bec27cb17bd798df117fbc128
SHA164567322df64e959800b4bb40be6d52218fc9e95
SHA2561d32b60d747ca55701bd0bfbb59955b6584f6ac24fce6def327adc2ff8c59b5d
SHA512cf20a78e0b2622f85acf3a2ef1c710d443266dfa119284a7f24c1265f2e8f080864fcf008a62116106216fe368bc5c094b127bcf6c194521e1771118273dbf4d
-
Filesize
91KB
MD5c52385087b3850c094d9f33b571ec03d
SHA1dc86ae68f150209a0a379b8ab92594fcaff0496b
SHA25630041b7ac55577d63f5dc088857e2316aa8e8e71f00facee1e0945de1b052b27
SHA51204b19c7f981130905d8f49342bc3b5f2e783cbe288c27d741f1c759405b41262f6e92951170bdc3e9543b87ff664986ab15e297e6a8ef8c956814f0cd66cb77a
-
Filesize
51KB
MD5b3813c8aa5e4cd90adaceefff5e06db6
SHA1e44f68fabfcd4ac0b172cd00cdf0e576efa9e52c
SHA256b87e38dee7f919393daf0d06610e22cb4e2c10f40076d950832469ee94e29c3a
SHA5127c856ce16f34f66d7c2552c6cb38235ac6c265e297ed0da50c6f6bcc2e13313cecdd5c76a1ca2ab78a253845b22370022356a88adc0cd6c95c75762f0a814c1e
-
Filesize
14KB
MD52ac05e6d81a786117bf4090285934b47
SHA107553246ec47b201064004cc8f3eada750ab21a1
SHA256a469a435208a14444d783a91f8d506a73594457f5cd93528339a25a49f876b38
SHA512bd6f5832349b33b7b25faafaf0ac88c36aefdc22d2a86a091f2e120afa2bb3316097a25cd4d09cc49bd3724b9b63c7b4391b66f31de02f24631385e8740b52ec
-
Filesize
42KB
MD551b71704d344406c22f24e7c4fec2728
SHA18d1097bacb9d7d2855f61b036c5d737ed0e66e8e
SHA256bcc3d513d80fc300c2f90c37f5d89596a532082257e2e7d5a92a2a2aa780091b
SHA512caf54e37a153c9a91c655c73de608c7c1baf8961a94b636fc73fc2dd711d27fe215cfcf5eaa0b85df06bbdc59710abcc9a063b5de3b8bece79a181496eda2887
-
Filesize
19KB
MD5bcc305c67b0fdea8a65e144def0193e2
SHA104e636c8f07c2ea826b7f7353f27ca69e2f7f699
SHA256f7515aa4c0c5f6bb5720b8bb5047eebc297c7dd0c4b4f324a71570d81421f8cc
SHA51247207fe38354b16853a31013507ab99c2e2959681e6ca0cfb68e7658ae5ccf88bd02a07b1411825c9e9cd304fd659bd8cf68869bb740a44f266da083f737d647
-
Filesize
28KB
MD59ec5c074e0e7e04cf745cb91a2a55eb1
SHA1b693d075f2f3d36b36de91459adcb5ba589a271e
SHA2561eb63cc142e613b89a70a7183b8c6c4078410785f3bb882e5d7288b639bd4362
SHA5122b998b2158a96671c5b66264bdfe7cf9a097a7c3dead83c82e475ad82741b03bd3e4a4d5d3345ba10861ac6c49e09bb5596b13096e7b49f6225995cacaddd995
-
Filesize
62KB
MD54a4e539652905a714d91bc4a2fd45572
SHA100879d8ff0c474107b8b5d484637f9654abccf7a
SHA2563ce0825295c95daec6ce59eff6944be18f1a98c309ea18489f41d70b4f0ed289
SHA512c82d0db2be8495895aa70813d90f8ee8d2156d765abe5ac400ce1a4453c64c4cc2102eeb549448f4895ebd03d887efe7aaa7e27e4d72120755e1ca2dafd7cd15
-
Filesize
28KB
MD5787d7c55325909d7e5586b375169496a
SHA1b56860f2fc160c7c490cf4607b1ecca7f1429b2a
SHA25626f8034dd9e9d872f70daa9886f1b5844d5c60431dd2871c138f71d0445b8b93
SHA512018a61384e096e1494525a255172ad0c0d257e3789ab354a94b82ad7c38fe4eb5f2c2f63084e4c219858fcd8bba1592e13f1e8273bde6038b32344c9fb3d0ca7