Overview
overview
10Static
static
700FAEE82AB...AD.exe
windows7-x64
1001D2E2B398...A9.exe
windows7-x64
100B760ABF10...23.exe
windows7-x64
100B8E9BC319...20.exe
windows7-x64
100D0E7D8626...E5.exe
windows7-x64
100E9765528C...69.exe
windows7-x64
100c9fa52ace...7a.exe
windows7-x64
715f7ea290d...8c.exe
windows7-x64
101CB8203982...26.exe
windows7-x64
101CF69170F7...5E.exe
windows7-x64
101CFEDCBA10...0E.exe
windows7-x64
71DD70E8036...25.exe
windows7-x64
101E229029B2...DA.exe
windows7-x64
101F5FEB3211...6D.exe
windows7-x64
101FD11B5CBB...ED.exe
windows7-x64
1021977fc851...61.exe
windows7-x64
1021e1bc4340...01.exe
windows7-x64
72C3542B5D9...85.exe
windows7-x64
73ac7f91e37...38.exe
windows7-x64
103c0fe521f6...16.exe
windows7-x64
1041c53e90f0...4a.exe
windows7-x64
10467c2b23b7...be.exe
windows7-x64
105b79b6a814...b0.exe
windows7-x64
10712affaa8b...1).exe
windows7-x64
18b04af13b7...21.exe
windows7-x64
10Analysis
-
max time kernel
1800s -
max time network
1645s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-07-2024 19:21
Behavioral task
behavioral1
Sample
00FAEE82AB5B800CF6DBE97AFD39790B856AD1EC25DC7ED8F798ACA702BEE7AD.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
01D2E2B398D6017D5114464E39C40E9243AE492106CCA8B2D3EB1A95F9E228A9.exe
Resource
win7-20240704-en
Behavioral task
behavioral3
Sample
0B760ABF108DB9BF5EA14F96A53F6D8E1B36FCC28BC75114E923482157B89A23.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
0B8E9BC31964C9433BD5CC20E556CFD0590C3B17B0DB23CDC3AD0547683F3820.exe
Resource
win7-20240705-en
Behavioral task
behavioral5
Sample
0D0E7D86268F7ACD51E9D4AC94F016034FB949B605B21405CBA0B5581E4532E5.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
0E9765528C4E8FDCFF83FA07A78F5E73B41B3D9295159C823FE3B1F97C113469.exe
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
0c9fa52ace8019b43c91f4859ecddfde6705141b9283fef05c6c4c37a5c1777a.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
15f7ea290d832bc32ebf660690b42616264fc0be8969934c1f8d7e5a5d3cd18c.exe
Resource
win7-20240704-en
Behavioral task
behavioral9
Sample
1CB82039822CB89811F42B2C3BDBB4256D85D66E942CD69F38D3CB123596C926.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
1CF69170F7419E097EB71B514C01D2A028C95D0605F8B91C90A2E28B3216775E.exe
Resource
win7-20240705-en
Behavioral task
behavioral11
Sample
1CFEDCBA10B4C90789F2C4A6A1CE2C3D4197058E574942400F571BC5D06DF70E.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe
Resource
win7-20240704-en
Behavioral task
behavioral13
Sample
1E229029B2D3FF00EDDE061B1AAF470EE437FA8196D97FAD2C2C6C9EDE5B44DA.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
1F5FEB3211A640804B3951DE9EA2037EFCB0D6EE1019D8853F98DAFD6132A76D.exe
Resource
win7-20240705-en
Behavioral task
behavioral15
Sample
1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe
Resource
win7-20240708-en
Behavioral task
behavioral17
Sample
21e1bc4340221fbccee28d59333c20b20755e34e2f3391b90837172bd07fbf01.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
2C3542B5D9AB4EED2DD88CD74A02236A944AFD76E8717F65DCD544912229CA85.exe
Resource
win7-20240705-en
Behavioral task
behavioral19
Sample
3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win7-20240704-en
Behavioral task
behavioral21
Sample
41c53e90f0861b068eaa512edff28a586128f808b437122399347bcb3774914a.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
467c2b23b785df7b45758143387e9cc5a588718ae0640b3f01b1c19679b011be.exe
Resource
win7-20240708-en
Behavioral task
behavioral23
Sample
5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
712affaa8b84e8fb7d4e71feb6c1074185bc43b5a2f265fbfb248f7ed40a5489 (1).exe
Resource
win7-20240705-en
Behavioral task
behavioral25
Sample
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
Resource
win7-20240704-en
General
-
Target
1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe
-
Size
2.0MB
-
MD5
249aada560c223d2da8155bb1be20992
-
SHA1
cba2450471ca63043885e26d19ab72f2dda38fd2
-
SHA256
1fd11b5cbb32f4cd5e7947f25e900bb4e59c1c5a21922f0a842ec62c20faf2ed
-
SHA512
5bc77d39d87a382a40d11ca8402cc43f16eea74fd742a72edc7d2cd003cd059ddecc68e98c33490be90913f522c4a5bc3c8a8470f9db1efb9be6d97b9637afae
-
SSDEEP
49152:6Q9RshfjHef9POYbasCy3ctSSA7FkaH37:nCrHefdnl
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\NCsscEko\\AEkkcYYw.exe," 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\ProgramData\\NCsscEko\\AEkkcYYw.exe," 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (57) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Control Panel\International\Geo\Nation AEkkcYYw.exe -
Deletes itself 1 IoCs
pid Process 2832 ucAQsMsQ.exe -
Executes dropped EXE 3 IoCs
pid Process 2832 ucAQsMsQ.exe 2756 AEkkcYYw.exe 2852 KYwMgMwk.exe -
Loads dropped DLL 38 IoCs
pid Process 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\ucAQsMsQ.exe = "C:\\Users\\Admin\\kQscIQwA\\ucAQsMsQ.exe" 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AEkkcYYw.exe = "C:\\ProgramData\\NCsscEko\\AEkkcYYw.exe" 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AEkkcYYw.exe = "C:\\ProgramData\\NCsscEko\\AEkkcYYw.exe" AEkkcYYw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\ucAQsMsQ.exe = "C:\\Users\\Admin\\kQscIQwA\\ucAQsMsQ.exe" ucAQsMsQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AEkkcYYw.exe = "C:\\ProgramData\\NCsscEko\\AEkkcYYw.exe" KYwMgMwk.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\kQscIQwA KYwMgMwk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\kQscIQwA\ucAQsMsQ KYwMgMwk.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico AEkkcYYw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 18 IoCs
pid Process 2728 reg.exe 2256 reg.exe 1040 reg.exe 1044 reg.exe 1320 reg.exe 1700 reg.exe 2824 reg.exe 1584 reg.exe 2008 reg.exe 1720 reg.exe 1944 reg.exe 2312 reg.exe 2588 reg.exe 3064 reg.exe 2172 reg.exe 2352 reg.exe 684 reg.exe 2096 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 2104 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 2104 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 2808 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 2808 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 2168 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 2168 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2868 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 2868 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2852 KYwMgMwk.exe 2756 AEkkcYYw.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 856 vssvc.exe Token: SeRestorePrivilege 856 vssvc.exe Token: SeAuditPrivilege 856 vssvc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe 2756 AEkkcYYw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2832 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 30 PID 2780 wrote to memory of 2832 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 30 PID 2780 wrote to memory of 2832 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 30 PID 2780 wrote to memory of 2832 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 30 PID 2780 wrote to memory of 2756 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 31 PID 2780 wrote to memory of 2756 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 31 PID 2780 wrote to memory of 2756 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 31 PID 2780 wrote to memory of 2756 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 31 PID 2780 wrote to memory of 2004 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 33 PID 2780 wrote to memory of 2004 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 33 PID 2780 wrote to memory of 2004 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 33 PID 2780 wrote to memory of 2004 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 33 PID 2004 wrote to memory of 3044 2004 cmd.exe 35 PID 2004 wrote to memory of 3044 2004 cmd.exe 35 PID 2004 wrote to memory of 3044 2004 cmd.exe 35 PID 2004 wrote to memory of 3044 2004 cmd.exe 35 PID 2780 wrote to memory of 2312 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 36 PID 2780 wrote to memory of 2312 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 36 PID 2780 wrote to memory of 2312 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 36 PID 2780 wrote to memory of 2312 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 36 PID 2780 wrote to memory of 1944 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 37 PID 2780 wrote to memory of 1944 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 37 PID 2780 wrote to memory of 1944 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 37 PID 2780 wrote to memory of 1944 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 37 PID 2780 wrote to memory of 684 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 39 PID 2780 wrote to memory of 684 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 39 PID 2780 wrote to memory of 684 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 39 PID 2780 wrote to memory of 684 2780 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 39 PID 3044 wrote to memory of 2668 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 45 PID 3044 wrote to memory of 2668 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 45 PID 3044 wrote to memory of 2668 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 45 PID 3044 wrote to memory of 2668 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 45 PID 3044 wrote to memory of 1044 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 47 PID 3044 wrote to memory of 1044 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 47 PID 3044 wrote to memory of 1044 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 47 PID 3044 wrote to memory of 1044 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 47 PID 3044 wrote to memory of 1040 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 48 PID 3044 wrote to memory of 1040 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 48 PID 3044 wrote to memory of 1040 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 48 PID 3044 wrote to memory of 1040 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 48 PID 3044 wrote to memory of 1700 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 50 PID 3044 wrote to memory of 1700 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 50 PID 3044 wrote to memory of 1700 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 50 PID 3044 wrote to memory of 1700 3044 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 50 PID 2668 wrote to memory of 2104 2668 cmd.exe 53 PID 2668 wrote to memory of 2104 2668 cmd.exe 53 PID 2668 wrote to memory of 2104 2668 cmd.exe 53 PID 2668 wrote to memory of 2104 2668 cmd.exe 53 PID 2104 wrote to memory of 1960 2104 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 54 PID 2104 wrote to memory of 1960 2104 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 54 PID 2104 wrote to memory of 1960 2104 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 54 PID 2104 wrote to memory of 1960 2104 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 54 PID 1960 wrote to memory of 2808 1960 cmd.exe 56 PID 1960 wrote to memory of 2808 1960 cmd.exe 56 PID 1960 wrote to memory of 2808 1960 cmd.exe 56 PID 1960 wrote to memory of 2808 1960 cmd.exe 56 PID 2104 wrote to memory of 2728 2104 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 57 PID 2104 wrote to memory of 2728 2104 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 57 PID 2104 wrote to memory of 2728 2104 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 57 PID 2104 wrote to memory of 2728 2104 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 57 PID 2104 wrote to memory of 2824 2104 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 58 PID 2104 wrote to memory of 2824 2104 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 58 PID 2104 wrote to memory of 2824 2104 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 58 PID 2104 wrote to memory of 2824 2104 1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe 58 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe"C:\Users\Admin\AppData\Local\Temp\1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\kQscIQwA\ucAQsMsQ.exe"C:\Users\Admin\kQscIQwA\ucAQsMsQ.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
PID:2832
-
-
C:\ProgramData\NCsscEko\AEkkcYYw.exe"C:\ProgramData\NCsscEko\AEkkcYYw.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2756
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED"2⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exeC:\Users\Admin\AppData\Local\Temp\1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED"4⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exeC:\Users\Admin\AppData\Local\Temp\1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED"6⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exeC:\Users\Admin\AppData\Local\Temp\1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED"8⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exeC:\Users\Admin\AppData\Local\Temp\1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED"10⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exeC:\Users\Admin\AppData\Local\Temp\1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2868 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1720
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵
- Modifies registry key
PID:2352
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- UAC bypass
- Modifies registry key
PID:2256
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2172
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵
- Modifies registry key
PID:3064
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- UAC bypass
- Modifies registry key
PID:1320
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2096
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵
- Modifies registry key
PID:2588
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
- Modifies registry key
PID:2008
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2728
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
PID:2824
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
- Modifies registry key
PID:1584
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1044
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:1040
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
- Modifies registry key
PID:1700
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2312
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:1944
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:684
-
-
C:\ProgramData\HIsYwEEk\KYwMgMwk.exeC:\ProgramData\HIsYwEEk\KYwMgMwk.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
PID:2852
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:856
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "127342275-2763853833687602801079498635-1138898945-789512422717967128-2025997701"1⤵PID:2096
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD51c0525237140b9f0dddd6cb9e55dc5d4
SHA133994a882d1ffd759edbbabc123528e61126d2ec
SHA25652d3f7557d6f392bb2db290c8346c17e246cd46824cd6d7f9bbf7ce45b2543e1
SHA51264f1a930c85fbf5e9750c57fa6a2b50f135488027ef089bced62a9d037e451f27c065a7e4468d222885bea0db909bb55d52815917d2378e47cbbea5d17be6e9f
-
C:\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\background.png.exe
Filesize2.1MB
MD5fa732687a3a16e3ac1450f3888fe65bc
SHA11b7ce28f6f2dfd1f26d21a56ac13f81281f102ac
SHA256547a39ec04d0780e0eb62e04553bba1fa689487968fa84b4f0117b3a6330cbf3
SHA5129316b73aa96aded2295340d05784dd22dcdc1a234e11513d320d3c1c53f9573b69103613c6395813f2c08831ce52bb992299186e7599697907e599adf06e096e
-
Filesize
2.0MB
MD5406c8edd609bb709aab57c93169e93be
SHA1c0d5ec19e5d25249037456653df360d9d0119764
SHA256a10b94be5cc29be8b3af070e49b6ec40fe9225f494fe5192775b1a9ee1ced200
SHA51229831f7ffb87c892e21f2eea2992d85c4bf5ae5f9ab23f9721e0d630453fbf2e7745fbdfd22e53056b242ee6598c9ade63e412852ad4ad986b882ef67d9a171c
-
Filesize
2.0MB
MD5d481605abce95ff92b9ffdc2195aeae8
SHA1509927f8d998801046df2286a612eb61a59b83cc
SHA256abeb282f03f05ed5801e887d612651b6e506d1576e00c9bc3a0070f2bdbdb957
SHA512f58b1881f2ae41c829110d026e18edb31dbc1333254ce09d1a9c515eff70cf2ff155828cd7fe1e19d147908d5f6203198d37987a04897d1ca26610579f321552
-
C:\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\superbar.png.exe
Filesize2.0MB
MD5f94296c8d2d4bf3ef6dec3cfdfd3275e
SHA1bcc94054c5052f2bb869bd0b2d343c4dd23757b9
SHA256bafb44e0fbd5322eadb53508b085f1ac45effa24b4c2ec0f5db384d9e646fe7e
SHA51200f17b6a47cbaccda0aac1273306b234f2e3bd87650396d96d5270a04b59c619866663b70ff0873ce2cbdbe5b708b44517af1494b80b4f420f5a2322baf9ad97
-
C:\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\background.png.exe
Filesize2.2MB
MD5aa1616a5f0b7570c4b52dce694258c6f
SHA14333e30562f12e3274c7d9c1c1494d028250b141
SHA256a5add67d4bfe98e800d4df138b65ec0b978f01d6a6577af5b0efb7777efacb66
SHA5121bc54e72b6b562037c5401ecd98b77e47d608e68f5ca21f7b604a3040384279c0e31815f6e1d8695b7952e9b640e079b6580a19bec8147a8cfa9c635fc0631e3
-
C:\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\watermark.png.exe
Filesize2.0MB
MD526244759a3847148f3dad637c7e4095c
SHA117aba6df78f6676e98a95e67f56dcda6142acddc
SHA2565f3c3748309d3f25554b2bb1d6ba83ac0f5008ae7bfd3e940b51292d02e39791
SHA512813a58e7a6d3f8f44a041780011a2327fcae9c1aa67594e89bc54b39e1bafd53cea431e06308d08cc7803a887fb9ca74571fcace2a6832167f2d1394b7c81856
-
Filesize
2.0MB
MD50d95bae14d13f17fd461327ffef80221
SHA1a40a2300412b0b5f06f8ddc58698fc9f4f80b2b4
SHA2563473302fbef4555f8506d6f3448696ffa0f82c506f84badd8a71500ddbfbd2f1
SHA512e9b0fe084d270e57cc8d989d883c164c16e6bbe938ed3783d218831f07343b462b75fc9fa92f1fdeffb4900b6a21e234c9ebaedcbd91f6e759b61ed5badaf313
-
Filesize
2.1MB
MD51d5fa4fc68e6e98b95b424cf06fc395c
SHA1b3dd97be55180c7a3daabb63b31bd9914ca1fa7d
SHA256af58bf4c70b62a1c3df66f6d4b8abde440458b22cf9c16cef7451e7742981eb0
SHA51282d4ce40a38d4f3fc0004f0aa689be1da09bc2392a422643d913a3c5e9c1f7adbc7a7b0f546b5ff7dca00a6d4df09cbe07cc77714fd85e7ab39ad44ed61f15f0
-
Filesize
2.0MB
MD554d3ba4614635a19d2064306fc9c46f6
SHA177f29da90bd0cb951b0dd6d2b87b08e457d4924f
SHA256e2b15be3505b8f34cbea89c504c07b2f6e4f0aaa46eec0c2a7618866c26b4962
SHA5121b9000d01c3bd9d40ffeb8ad2da11e9127fea6480e87d861f6bfe15c1a0ebab162d38b0fa2fe7102960a567d8c4651964a4d965db13fd4635280d7fbb431ce7b
-
Filesize
2.0MB
MD5b3b53bd0c23207778da75dde460698cb
SHA19992543e828bf91d52bd83035afe2c695685f7fd
SHA256ea60716903c397dd605de78919b1b357dbe6f2d534cab4bdce222584fcb8e55c
SHA512b63b64d4f7294a0b990ce23b745335e238c3ccf19d1768ffe145e8f04fdd3aa72317e2f49a04c8dab58dfed7b8b38e1492e4ebcf7cb85751ef6cb980beeca952
-
Filesize
2.1MB
MD5bc52ebe10fdb7e181e87660d2b4756ce
SHA15459af1d132e638472f22e9172ba1873bac49ee7
SHA256c065974edc34a01d2db316aec6d30646028ee3ec9e919c9a732353ef41be7ac2
SHA512157cc9f201cee942c86b56e411048fd211806e1d526a3894d1c4d7f557d2134701d16bcfb4a83d35edaa7cd0a4264554a54610b1d7bb55a6122d95fbd1138c01
-
Filesize
2.0MB
MD5c68f38c55bb8219feb661155ec03b694
SHA175f70330cd9e8e9f643c38cde17019e36aa0609f
SHA256c79b750965b876a97f287c0d38ca3e993de2b1faea53ba30414d98ff3be53445
SHA512bcb9498d852b70a5f0b624caacf8a1127d2dbcad974aac32f8839582a3421e6a6773574ea6fe0538277d6e81d10d2a65bfaa61e794b79c9ffc62f3b3009655ec
-
Filesize
2.0MB
MD595080955a746c395925a8a6c9fcd91de
SHA1f91736281e31ec78cb2a82391dc9c9062b99b4d7
SHA25635f7f9ac235ba44e53787308274e990db395c851214d5c7fd8a41c5398dde1c3
SHA51211a0e677183af40c1d4d0aa6c930774fbd1b891163977b17428e51a5ba2b13bf5a6a381f1466eea3adabf4d715add33eb8eb9e370b93bba0d076f6ec09f776af
-
Filesize
2.1MB
MD5310c796fb6ee912619fc9f4344a8e9b3
SHA1497f52051ffd8f525b154f53accc584c7728f0cd
SHA25616ac0f303d36a81813cd73020150e69f6984069e0c5b04ca27af753363019c1e
SHA5122aeeba1c4c0b48a65e19539faa721627ab698d7c3a969209aa1b5d78d44d32391e384aaa6aa3214ace0eb95ccd1d3ec9d380ac5ad6e73fe7bbb06da13d03499b
-
Filesize
2.1MB
MD595cd6865648900025d0314e364036dec
SHA19380ef467281a9c1c4d40eb1a2f682d8fbdb3903
SHA256b307f09fba9be0dd5d028c50c01acd7baafa7999dcd3cf3c23a16edda8e93c3c
SHA512b353c41e9bcda830e4054bfe9b160e2bb00d95ddfc9ede3948d5aa6d340beb5bba1f7d2bd0612816a931aac86b821b3bec547d742bf8b31633b573e2231bf3cb
-
Filesize
2.0MB
MD5ef57317b19d648b86d4ad895b4706281
SHA174240bde919933b73ff915a6ddf67f0348691dd4
SHA2560679b5a968406cfe3b25fdf9e4aac41fa9ea9a2d19267de83b53c7d1b716fcf9
SHA5127331cf241aa3e22b0190c3503ecfd2b6a3e1754f66501f47a871d6519e8389389d046f71aafdb941ed115329e3440369bffdaec264d9482b92c7a26c19f7e277
-
Filesize
2.0MB
MD5bc9cc32a1202f24b90796b7e27a3a3a8
SHA186d53bb00f54d851157b7d338f5fe82d74189f2e
SHA25642613158fd917ffbd2983f2e2dc5b07b05d6f094b62c90d2ed5fd44cacf2acd0
SHA512e2d2a980cf48f37cefb0aeb433fb3e379b30f3af02fb059076cd5d59f12b00199cecc00ae38c06470ca1646d3945e9ad0ddb79fc4c8119d3637af4ef437f8e72
-
Filesize
2.0MB
MD5ffe9f358c715615d66fccd8df315960c
SHA1153e1bf58b3ac62f243902d4ee277443f5472863
SHA25670842fc7d7b9adca0b15208be461444e4200c4415ae0ace5c800ae3ac3e491b5
SHA512560899c6384d12e3040e5fb9c1d96e3426a1736984a1a7e78e7e0825938cb6d2abfd566cf7ff505517c351d125c0627aaf39ea26e28a4e2189bb0a2d41d7cac2
-
Filesize
2.0MB
MD503e48c80cb37104c65ead66cefbee392
SHA1345cf78c15d3a9fc71517df086cc924979ab19da
SHA256832f5defe710e63879b1aefd5b068a91bfc81dbc26945b7d2de5bb42af6deccb
SHA5123bd977a565871143860ba25f825f89a1f77909782ed2ff93f5f2cdf8e0b2ec09d9b9cef19f7d5af670e377bd324101a9c4fc36d860438e7a08d689d7ec8f1191
-
Filesize
2.0MB
MD5fc7b57e72f4c7ef2b166929494bcffa1
SHA1063d82495638379d7c6ad1773e9eca1bf0603cdd
SHA2567e2592a114788f7a2f5ca9fc8bc23685e0106058308b304fef7b80f89174b326
SHA5123594a2f3534075aee011a09d73da34e2b0ddc6aefb5f687824c2ab1ec35c851a3594bcfec6a10e34e3ef90683d8d0d1861e946c1916fdbc412945c4eb9d9aa60
-
Filesize
2.1MB
MD53a9c05b23c3f2964cb0591234119c6e0
SHA16de497f9739d1eab085591335fb0018be8e33325
SHA256085ca1cfbc6ebedc522b20a018ae8843bc3acb502d526ed9983771381dadf05a
SHA5122bf00105e07f2c78c1db1b2919394995c63b43efc4e5a9dc033330e908417fc81b2de4555f4026d6d8d91ed7199d1ffe950ee682959ed6f432036939166774d9
-
Filesize
2.0MB
MD5299dab200c80fb4dc0ad7df39b202d26
SHA1c0606971dc36a1344b9f534e0dfce0978d69dadc
SHA256283c2facb1b0b1a0ec15e1651a133a47aa97fcdfd965c2ad58662272c9edbb1f
SHA512bb0bd332f1b5a8224223d22e73bb2c154e3a65d371f1ecf13280d593f5d4408796bbb72c1dfcc142296029e47d017c64c01478a222e7efafb7fcb5844339f8d0
-
Filesize
2.0MB
MD5bb35c86ba2e444dc21514f5c3b5df658
SHA1f624b7ff723e55ba971e7b0067ad6cc14e11df3e
SHA25673aaadf2eebf352cbd9c8c50a9f4c9a5579ce5afad971fe97c4ac30b99e94020
SHA51216e3051122907eec167003843996edbbe6b581c391f317415154b4bd8ad5ac842f067435679cad61db57b5225503162debb17d8839b2a67d2ca91c04a0d90111
-
Filesize
2.0MB
MD51536746c93a156a851b900afc2ff7e6e
SHA113b1422fab6be72aa98ab4452403ce98c44a99f1
SHA256bca2b9455ba314a2fa923cf062751afeac771e14b43150a171c863a65a3245ec
SHA512925fec6659a00322c5d8ab53e1aeb06ed87fbfe1c835b3735b71ecda36f62e8bd194d150fdf3cc75790269d117b147d5cc38b887fbc6a52d487aa96c34b5d237
-
Filesize
2.1MB
MD5a8d234af53465ae0e2899149c62e8118
SHA13dafa6a6471a9f95ea13c4baae498fba02da938d
SHA2561c2378383f80dbd526239695bd438a2de6f234d2059ecfe08a754abcb355e53d
SHA512fe03492605e7d6ae520e0f35371d57c52647c994e1b5d342dd8d09619031dfecc6865e4c89071712d7a998ecf0761a7d7d98ece0578df6936aca06f26a62216e
-
Filesize
2.1MB
MD5af53306ae21d202ffd11d9ced8823618
SHA1c55ab57d0c5e2b220d6747cba0088e836c68de8d
SHA2562790fabdbbddde5d506e3d57ccea1f5666025344b3a01e5e224ca96269a46c83
SHA512417665c50cb0aa501966b09d616845f35ef7a4bb5b8a2ef0102de642fa79e3c4078c2a5ca99cb78f3b8a981af8e15995cfcfc16d2b60d279403fda48787b04eb
-
Filesize
2.1MB
MD589a32fd050b8bc14c6f93bcdcda61925
SHA1948ecf0380000eae41b11b55e407ab76c4e8b9f4
SHA256756479197eeab19a1c9c8f45695c6a1ad69a7417481e81b20cdc11ef24a82d4e
SHA512d77974892b51351d9681fa7fc9162717f3d145324fab546553dd8ea011efcf2685d8fd6b9fdde98ba89c9bc7f746c57d83965e469f4f8aa9e1629bdd71f4ee73
-
Filesize
2.0MB
MD58fb061ef5cfdca32da2053978866f097
SHA1a3438c93d21e1df9c82ec816d68e42daf9cff18f
SHA256666043062d807a619da7a90c93bb599d40e2355e6167dfcfc2e62c33d761d6ba
SHA512416394e74987ca3cb6248325be8732ae19b1381dab742a6a5a1d0bd833dcaa04915fd8a8db553c8bca5933767e76cb597d22fa5e8c23d5b2aecde2cf59c5eacd
-
Filesize
2.1MB
MD52f6598d4618e4717db855f5196a79bf4
SHA19e0fb3ac8fd59509f420871984fc38bb58df0d3a
SHA25616d38585cbdf27a9c7239af61b1c5170aa63e88b313391156d469856bc3196a0
SHA51240e3529a390f32192e4ee4dbe0267f0edfc5bb5183d0bddbff3359caf1ef439ca7b849208035dffe01b9ebcb4d4bc5e4cff34218f25c5971974c801093b1fdd7
-
Filesize
2.0MB
MD58107f71e651fc55ee6a27e86fc57649b
SHA15f65633231d6750597b42f3c55305ffffb58fc9a
SHA256eaecee9418853503deaeb1af6286aa1a7e84c60b5d068e11495c8c210a35a6eb
SHA51207bf01fe98d8f3822e05c389c3fdf47ae49112fc6bca62b7a385f6b55dc11ec810b670f79406ca4e12cf284504a5ee5a3c0e3f0de38765a63d06a3b2d8703c40
-
Filesize
2.0MB
MD5de43028d68eae19792e573bc25964e16
SHA1048324bf04b7c93b7197d91b87274716cb05dc5e
SHA25660ccc134887a3976d1c996b3c28fb637a685ef9fe8ed7783ca40b341a0372952
SHA5121acd4369df514508d3d406ffbd2233d4ab4cf17bd1c2f23ef153fcdb5b4208a467116045ca32bcfe138b6b1e51d687eea68d0be351ed62ee6167ed0358a975fc
-
Filesize
2.0MB
MD5a0a98eaff4b0089a223a171df0f9eb6f
SHA1c41f346b4d6525dd0b81fdf92ba2628815445655
SHA2563c0764b488ca646a9e090528b893761745ccb5bf6dbc3e45e6ebf7f17c5f3a30
SHA51267c67f8c5500ba32fab17633e07c43553ce3afc1d211fef0650feda78c17e08ade2dadbbe4b2f612489b7ef42c6a380994814712ad831a713f1b54bd05e2d4eb
-
Filesize
2.0MB
MD56b2baf7e3087170e46e3b498ae743a3c
SHA1fd56c0c07be92ed0ff9d37a890d121be99684eb0
SHA2561d4234fa8c8147f04a2f3a9586f6836fc3ed6203664e76a33348f264903f4f1d
SHA5127933d8d789e029713248029b03020a8b0a38235c73a01c1cfebccacae9bfda2ff44774c62948a3f8baf2b17ef9bd5b311cfbaaf3de1b7455521597f3270bc6e5
-
Filesize
2.2MB
MD554a91406475145b7b75256f894f78a03
SHA1e6bbcaac1a5a56dc813c1dcac2ce2dd851f0acda
SHA256ccc7a98e7666804e1237b9b970359c3fe14bc2ddaca6d81f956759b7d1d768c1
SHA5124a533b9ade60b2d0ea9b22b501e4a10177520de4c65252575a6995b77287c519c4e00c4dfd8134815b55b534d18f3500ea44d201eeb86883f20217580f9d8fee
-
Filesize
2.2MB
MD553e8f9bf5362d713705759147ae98f6c
SHA1ff9f3e9835acf79b3e488c5ec665dd1f410faad1
SHA25664e77f8a2a68c2b7998891169aa830bbab8b793d6168d649f4b528e98777c29f
SHA51227356032353f41f940cc4107bc6c027994f1d30d150983a7d9cc4941d1c4683361ce8c4d9bc967925bf3106829ab9561cc3bf284061c5909587251e3b9766384
-
Filesize
2.0MB
MD5d22cd0d2092225fbec72a30bfa383473
SHA1ab12994023438d213cdbac57e2f72588595d056f
SHA256739090189c0cac2086020ca9861ce53d14e0027394b5e8c3305daa15615c6523
SHA512abc186f0e49df2470520a5c33328a9374cbf29bd1f4ac51aa71f013b89b190b322a2c46bae14a5ababaa6956584afc844f088a967a4e3d713b173ffb8a67ea05
-
Filesize
2.1MB
MD526c771dada743c0f5e1fbcb17e32589a
SHA1b7996da3c9f228567bbfcd26a9e3afb23a92dcc4
SHA256448f63bec994bd0b3cc9b788be3d4d941c6b46c3b452cc6031797798782914ea
SHA512946e0e18140255c62762f86f416dd55a1bd436007c7541d97bf868a15f742f783244e17a16d7f1264d8295503fc3d4a8c48f5623994ab3960bde68cad51110ee
-
Filesize
2.0MB
MD5c264e8d0e9d08ba651d31ca952ece5d0
SHA1ce95a0ef3d4178ece20d1c156998c8d9e02c3659
SHA25629b1daa0d41a2193c2c1705b7cb2ac75f5918e7a543581e34de7a76f852f8d0f
SHA5126dc91e5e8690f4b2b13fa43bb72fed159c77465d13a7a082a612eb6734a9e122ee6b5d3775d1d280fdc00624debe9b4fa5be6cd0191a7baac8ccb8d124d02943
-
Filesize
2.0MB
MD5277b319a9f81d9b751637613e39f7036
SHA1ea89874ac5fd2c3a4efb8a6b2c37d7fadf178d9a
SHA2566e3c56daf60945e79c506df53278fb5cab494782a877a5c9859ee553224d8d16
SHA5120e7ccee6fda2519f5f6bd2204e5d20608729357437450e062e5dacce84709190820ef1ad19f974b5a602a6a880a40824594ed9ee47fe7c798ce67ad17a418736
-
Filesize
2.0MB
MD5b5ecec4da53ce2f106a684abd78be005
SHA138700065732fcc1fad59f0105b4da2d3af3db274
SHA256aeee681da1dff0fe19b0fc5cf449bf771418ed60cecb328d8743bd70fd78b484
SHA512afc0e53dea0aaa1628d3f767fbe6dfea232bc24d7da99caf05ee6474cdf7cdcff586fb521e0ae23d7b8eb84526bf075191f6c061b8554a60d51297f1121239b8
-
Filesize
2.0MB
MD5f0171dc0d0f3360f0ac9544fe05a9f33
SHA12dc456af84e1afc7b695c34fa5d264b2b071b0af
SHA25633098d455cb90a300c76637e637097fc12e26c790879b393376342655c43c13b
SHA5123fa612fd0fe04d8522791278e3788fcd1995fbbd9a88dfdf62bf000520b5516f885d60e46dc00f2c68ff0bd4595286c6de579236598e0b83dac2cb6b05baba66
-
Filesize
2.0MB
MD5c254f16119a20990779c8f1efec3c832
SHA18e7469371d1d555c1a805a3de2e6f2e10e7301c1
SHA256d7d347f58b958675bb9d6ae850cfaeeac9ba47506f8a9d82b629394507b577c9
SHA512020db0c7a3e8f39fa3b9c9a042d28d7e2f14ce95cd49f0f1481f344a233aeb78887458f3382f944ce632a4990cf904bce493be789dc4da2a1b381cb558a416ba
-
Filesize
2.1MB
MD5554ac3a4dd49678f97a78ae17c4f132f
SHA10dffbf20a1b360c529ad0fce8140a5f6707ce014
SHA256c61098062de7e109f45af3f8958b52d2486ba74ab25cb00e75ef9d304cbe3886
SHA512d017cab9870cdb38cf0867757b85cfe4b5b769639f99db0d6d421844567018f48eca6445d22f7f44477ab68d57384381c86a75eeb0879caedafa24ed9927d98b
-
Filesize
2.0MB
MD5ba38db61af0bd21f3a399c9a8f09d051
SHA1175cd84c5100ef74427fac56d249eeed0327f95f
SHA256fad03be30ecb24762b5de36d7ebda106556fbc15aff953336c2d1ca7ae783dd7
SHA5129a6f5a72929052caedbf1f4e2f8d1cce399421f4375393763c1c3d74fc410e4f203e76d4d08308148f676bb78c2c940d144c960161e6072d3ed6c30d34311b3a
-
Filesize
6KB
MD59a73063ea181f944f88c3e2ed083f8af
SHA1f71c5a8667a65c8c0652f4ae7a4c6b57d6e89d25
SHA256dc9657a1a14d27171f4d1653a7ff404b5c77db4824a374c44492fe2dcf12bdec
SHA512a52276031ee722b6d1a6435ff2e8d833beafca5aec23bb7856ca8a8e177f3c5093fcceacd1cfc120c92191533e2e9abc8cbafba1d583707774c039ac3127678b
-
Filesize
4B
MD53201877f698cd8034549fade2ec40d4e
SHA1f2719587653c60f61cea82cbf0f27abaebbb7a33
SHA2564b4e0610ea887f75e5cf9dfcce4359cb58333e19fcefb59df22fe682985304d6
SHA512342051706643285518992cf655cbe3607fecf63fc7bab18ada7ef7f91299a1d25b677d4aee432b508e76fa80b75846f4d80475dd161d24b4f2e4737854b2158f
-
Filesize
4B
MD5391f72d916f1dd88297fc1ed0f9f1c48
SHA16400eecea03e30dab87ba4fe42282f3247510ae6
SHA256a395d8f967d6319f270fc5edf76271e52cf06edda295d6eac2ede7a1b584fd49
SHA51296f64e226af803efb7c3f63dd06f470923e7b5eb700d3d64ffd6f89db387eedf58f8f78e1a83f0a060c7431c024a38bda352da3e9d1dd7816c1ada41756cbbd3
-
Filesize
4B
MD5cb497ce5900d17aa62c338fea32b4eeb
SHA119f7835a13cbcecfa04de93bea3c81f22f4e24c8
SHA256078fb64d9588e813274f3abfd0fb82430cd3ef3a9c1eaa923d7466f763f8dfaa
SHA512dfdf3aacd74ea4425ab92d8e6b5e4999637dd9d5a667228cee50b469489b7a90081b31df36deb8197d2446952c440822a0dd7ad5b7b668cabd4e5827d0991197
-
Filesize
4B
MD525bcf9421d19e58a6d3108e961ba8505
SHA168bc5f10125e5f10c947a37c3c372603b83ce0a6
SHA256e92d26d423a163b1b13a831a9f7941d9674d259f652617393d8c00f3340061f1
SHA512e1f203afeb6e33fcf56e17237addd81ead116622083508f31c49d732bf722f7c0d2140cdc420fa7574694940ebe725469d08b78351f6f40e852e061c3c5f7d5e
-
Filesize
4B
MD5796faa30e0e2d1111e117c9955fee55b
SHA1cdbc2cd6e5608470911febe5628fdaab0db9a241
SHA2566729cc48edea24da0b8e4e6b24a0d39599abf8f6b99ac7f30bbfa4c85fc4f245
SHA512741d424c194f57c9fad4d82361c3cc82f70d603e8ca8624e4be9fcba5458405dd93c47187fc4da8f65f125f28c6966bb17efe1ae5ef3060ea47475bdd1b70f0a
-
Filesize
2.0MB
MD5188023f1078f8a7a8d85b2c51030967e
SHA1865f7913c152d250002c3c5b021a67d6051d9aa8
SHA2568d0c8d4d8707d5855efa0e3e21b6b1a5ea9329521cb7a029f61886595c1092dc
SHA512381412a25e5da7086ca4b833a97cd6374d827e6a46be4b4f39ff26214b7f7bf7bbef1f6bc9f1429c6211f95c0c06d33812b27a0620dd55b2e7af5e99416ab57a
-
Filesize
145KB
MD59d10f99a6712e28f8acd5641e3a7ea6b
SHA1835e982347db919a681ba12f3891f62152e50f0d
SHA25670964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc
SHA5122141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5
-
Filesize
1.0MB
MD54d92f518527353c0db88a70fddcfd390
SHA1c4baffc19e7d1f0e0ebf73bab86a491c1d152f98
SHA25697e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c
SHA51205a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452
-
Filesize
818KB
MD5a41e524f8d45f0074fd07805ff0c9b12
SHA1948deacf95a60c3fdf17e0e4db1931a6f3fc5d38
SHA256082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7
SHA51291bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f
-
Filesize
507KB
MD5c87e561258f2f8650cef999bf643a731
SHA12c64b901284908e8ed59cf9c912f17d45b05e0af
SHA256a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b
SHA512dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c
-
Filesize
445KB
MD51191ba2a9908ee79c0220221233e850a
SHA1f2acd26b864b38821ba3637f8f701b8ba19c434f
SHA2564670e1ecb4b136d81148401cd71737ccf1376c772fa513a3e176b8ce8b8f982d
SHA512da61b9baa2f2aedc5ecb1d664368afffe080f76e5d167494cea9f8e72a03a8c2484c24a36d4042a6fd8602ab1adc946546a83fc6a4968dfaa8955e3e3a4c2e50
-
Filesize
633KB
MD5a9993e4a107abf84e456b796c65a9899
SHA15852b1acacd33118bce4c46348ee6c5aa7ad12eb
SHA256dfa88ba4491ac48f49c1b80011eddfd650cc14de43f5a4d3218fb79acb2f2dbc
SHA512d75c44a1a1264c878a9db71993f5e923dc18935aa925b23b147d18807605e6fe8048af92b0efe43934252d688f8b0279363b1418293664a668a491d901aef1d9
-
Filesize
634KB
MD53cfb3ae4a227ece66ce051e42cc2df00
SHA10a2bb202c5ce2aa8f5cda30676aece9a489fd725
SHA25654fbe7fdf0fd2e95c38822074e77907e6a3c8726e4ab38d2222deeffa6c0ccaf
SHA51260d808d08afd4920583e540c3740d71e4f9dc5b16a0696537fea243cb8a79fb1df36004f560742a541761b0378bf0b5bc5be88569cd828a11afe9c3d61d9d4f1
-
Filesize
455KB
MD56503c081f51457300e9bdef49253b867
SHA19313190893fdb4b732a5890845bd2337ea05366e
SHA2565ebba234b1d2ff66d4797e2334f97e0ed38f066df15403db241ca9feb92730ea
SHA5124477dbcee202971973786d62a8c22f889ea1f95b76a7279f0f11c315216d7e0f9e57018eabf2cf09fda0b58cae2178c14dcb70e2dee7efd3705c8b857f9d3901
-
Filesize
444KB
MD52b48f69517044d82e1ee675b1690c08b
SHA183ca22c8a8e9355d2b184c516e58b5400d8343e0
SHA256507bdc3ab5a6d9ddba2df68aff6f59572180134252f5eb8cb46f9bb23006b496
SHA51297d9b130a483263ddf59c35baceba999d7c8db4effc97bcb935cb57acc7c8d46d3681c95e24975a099e701997330c6c6175e834ddb16abc48d5e9827c74a325b
-
Filesize
455KB
MD5e9e67cfb6c0c74912d3743176879fc44
SHA1c6b6791a900020abf046e0950b12939d5854c988
SHA256bacba0359c51bf0c74388273a35b95365a00f88b235143ab096dcca93ad4790c
SHA5129bba881d9046ce31794a488b73b87b3e9c3ff09d641d21f4003b525d9078ae5cd91d2b002278e69699117e3c85bfa44a2cc7a184a42f38ca087616b699091aec