Analysis
-
max time kernel
67s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 18:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe
-
Size
384KB
-
MD5
67164c4680d767fcc5dbe48c3586444c
-
SHA1
059cea33a907a59d6f41b2aceef3571bf2a4ceb0
-
SHA256
9c21c7149cf5980ee64d5fbb3f78a336b122cf7e92335718bcc5fa45e9dafb25
-
SHA512
0db0054182afcb6c3b8564457224598985958fe409503a3b1954852bd9f54ecb5ee0bb68d7a8551f369836d7e825c1bb6cda9f47f66aa43ce10d6f1b30bfe31a
-
SSDEEP
6144:f5yaWtrA/WSo1rl3ALrlHQpn0BwK3SBDmhYfFQ:fTW6WSofcZ+KCIG
Malware Config
Extracted
F:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Ryuk family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation cbaTR.exe -
Deletes itself 1 IoCs
pid Process 4920 cbaTR.exe -
Executes dropped EXE 1 IoCs
pid Process 4920 cbaTR.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\users\\Public\\cbaTR.exe" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\dumpmeta.luac sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Red Orange.xml sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\SPPRedist.msi sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalPipcR_OEM_Perp-ul-phn.xrm-ms sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\en\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\ms\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ECHO\ECHO.INF sihost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ko-kr\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription4-ul-oob.xrm-ms sihost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\server_ok.gif sihost.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Grace-ppd.xrm-ms sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019VL_MAK_AE-ul-phn.xrm-ms sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN065.XML sihost.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest1-pl.xrm-ms sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProVL_KMS_Client-ul-oob.xrm-ms sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.scale-100.png sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\ITCKRIST.TTF sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ECHO\PREVIEW.GIF sihost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.PowerPivot.PowerPivot.x-none.msi.16.x-none.xml sihost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\core\dev\cef\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\tzdb.dat sihost.exe File opened for modification C:\Program Files\Java\jre-1.8\README.txt sihost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_18_b81900_40x40.png sihost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\PDDom.api sihost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Calibri Light-Constantia.xml sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019DemoR_BypassTrial180-ppd.xrm-ms sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Retail-pl.xrm-ms sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\PAPYRUS\PAPYRUS.ELM sihost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am_ET\LC_MESSAGES\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\pt-br\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\amd64\jvm.cfg sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\en-il\ui-strings.js sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial1-ul-oob.xrm-ms sihost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.powerpointmui.msi.16.en-us.xml sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessDemoR_BypassTrial365-ul-oob.xrm-ms sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019VL_KMS_Client_AE-ul-oob.xrm-ms sihost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\vlc.mo sihost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\apple-touch-icon-72x72-precomposed.png sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ICE\ICE.ELM sihost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\sqlxmlx.rll sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019VL_MAK_AE-ppd.xrm-ms sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019VL_MAK_AE-pl.xrm-ms sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] sihost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\vlc.mo sihost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\he-il\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019VL_MAK_AE-ul-oob.xrm-ms sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusMSDNR_Retail-ul-oob.xrm-ms sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019R_Trial-ppd.xrm-ms sihost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.contrast-white_scale-80.png sihost.exe File opened for modification C:\Program Files\VideoLAN\VLC\hrtfs\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\RyukReadMe.txt sihost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3442511616-637977696-3186306149-1000\{F8A3D9A2-9C53-4B24-89C0-CCF323A1F968} RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\WasEverActivated = "1" sihost.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4920 cbaTR.exe 4920 cbaTR.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4920 cbaTR.exe Token: SeShutdownPrivilege 3956 RuntimeBroker.exe Token: SeShutdownPrivilege 3956 RuntimeBroker.exe Token: SeShutdownPrivilege 3956 RuntimeBroker.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 15964 StartMenuExperienceHost.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2440 wrote to memory of 4920 2440 2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe 82 PID 2440 wrote to memory of 4920 2440 2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe 82 PID 4920 wrote to memory of 2840 4920 cbaTR.exe 86 PID 4920 wrote to memory of 2840 4920 cbaTR.exe 86 PID 4920 wrote to memory of 2724 4920 cbaTR.exe 49 PID 2840 wrote to memory of 4852 2840 cmd.exe 88 PID 2840 wrote to memory of 4852 2840 cmd.exe 88 PID 4920 wrote to memory of 3088 4920 cbaTR.exe 50 PID 4920 wrote to memory of 3168 4920 cbaTR.exe 51 PID 4920 wrote to memory of 3568 4920 cbaTR.exe 55 PID 4920 wrote to memory of 3744 4920 cbaTR.exe 56 PID 4920 wrote to memory of 3860 4920 cbaTR.exe 57 PID 4920 wrote to memory of 3956 4920 cbaTR.exe 58 PID 4920 wrote to memory of 4056 4920 cbaTR.exe 59 PID 4920 wrote to memory of 3476 4920 cbaTR.exe 60 PID 4920 wrote to memory of 3976 4920 cbaTR.exe 75 PID 4920 wrote to memory of 4520 4920 cbaTR.exe 76
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Drops file in Program Files directory
- Modifies registry class
PID:2724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3088
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3168
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3568
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3744
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3860
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4056
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3476
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:3976
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\users\Public\cbaTR.exe"C:\users\Public\cbaTR.exe" C:\Users\Admin\AppData\Local\Temp\2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\cbaTR.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\cbaTR.exe" /f4⤵
- Adds Run key to start application
PID:4852
-
-
-
-
C:\Windows\system32\werfault.exewerfault.exe /hc /shared Global\dc215572fc2045d8af96047c1e1ff259 /t 3888 /p 38601⤵PID:10820
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:15964
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:19088
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:19256
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:20056
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:21036
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:12796
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:13036
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:8204
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:28136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD55f8e884d8c792eaa5d84b66967ddd2ac
SHA183909f01f24c54b57a64c094f923007733d9ac27
SHA256c2016b0f8a583fc2326e836de1edc5d7cbe00dfe6c27782ac84ae1ea7fc1f0cb
SHA5126640f857d91efcc5018bf33bf3b32ae76e7eca3748075bb6420d6e45edded5eadf93a8a8e9cfcf6683838df6e3ac1377d9c8018ef63953b875676e95694f054a
-
Filesize
209KB
MD57c8cc8bbbe198a6cae54fb0964676335
SHA1b53733e615d5a271fee43af561cbdd10a3476c29
SHA256d14f10bbd277fb1a0aa9871e7c5c8a3b2fc5b2f891c6823efa108c92c19530d2
SHA512a9bb5eb14f2a31a21fbac58d4dda46436c2e52fe3c6ac516e054bd8c2ad0b7b1ce73fd513e3b397b7c6ca1d1f0f97bb3da1257c8d792ba6184db99d5bf0a978c
-
Filesize
188KB
MD5a3d22aca1c0ee4e1c389aa5e5a28b447
SHA100978478dbbab1a70990294bbee8a4f8d889b343
SHA25680a8d80d30b84bc0fc478dd7aa381c3e2c3adc375168e439ccbc9bc3f8620e0c
SHA5123fdc2e1f3b9d2310483bba2db9cc8abe404961d742f899eee94bc98f1c76289af3991aac56903bba63a3eb5969dfdd73de1959f132607b9c56e5af3ce0aae0a2
-
Filesize
57KB
MD54beedc2f8daa191155ee6510cf9f59f3
SHA14985bdf656de34d3b603a15ce99add9d2c2bc17e
SHA2564519ccc49fbe9f95e338cfcd08998e3db9cc00a1b4f8c4240f2d2604f852ce87
SHA512141701f0635374c4810202ecd26cac6435ed95b0b9b15c4a293f12cb15a0ff25fa80c3fb502f4f010e6191d9881e12b1fa725affece19e04ac9e95ee06153d3b
-
Filesize
5KB
MD51966951fa8015fdcf1b5e236e7ba82c1
SHA17e1e9ea2b7b1120852d5667ec3cc35e8409f65bf
SHA256b11de0e25fc2c753b0732f208465c311b5c097fd826d84c5285d8594e99a3b8f
SHA51268f14e8fd8eb0b5eb40bbc9cbfb8f80d394daf011c51f727f4d6aaed8029a1055e0fba8708a4cf9e509f98f56d592d2ff42b669f641e1bb2ba1a299d06c39e78
-
Filesize
7KB
MD5f232cdae26dae3fe1ebd3457abe7d733
SHA16e363812f31770b79b0201d4d2ddc7e6c3461697
SHA256210da55a14ed9fbc1c937b9d1159980e7b471931009c2b03ebddafca4b715a10
SHA512383d99b8e5abe6674150a073bde46ac1e963d455f8da833be67bb7fbe3f56606f85cc2276e2ffc8d5a2912960bbd48a565f37f6d69410658d44d28586ab45953
-
Filesize
12KB
MD59258082e53d266f8e97f9bb69b9ceef8
SHA103f1d09f3246bbedbef9182803cfed8a54f7d473
SHA2562b9637fe1415bf6fb98b9eeae166640ccdc8219b6d46a004a85df80fa13d2395
SHA512fb4fd3063397a7881d730bf01457309e12d7439d06db9cfc6310d5cd9f5245228f3bb707940d7d2cd3b8a389c4e3de832f7e7291ddd010d3a855c8d319de1a9f
-
Filesize
5KB
MD529971a51efbb398a983339bed6493aec
SHA15b260cf17b90ddb0efbcae5ff70a259ca37e1477
SHA25603b7d45d4b2b3b14d370afc442b22b021b2ecbd9fb4f3305c88b8a1701bd54d8
SHA5120319db676e7aaa887b683f0a2c557104d173a3917ce94757590bc9f383441834a29ee405f1081e6b503eba95ea8db9aa87d12bc12e5d3fc942c86ccf11520da2
-
Filesize
9KB
MD59cb33b24fce09842b4a7e8e2d97d209b
SHA1317e5388a3c1938344ec1386a6cb75741c377682
SHA256fa54699058d0e403e5b73e0a437c3c8db81c241fb91b7aa5f20fbec81d4d28ec
SHA512c92b960e970407e517cfe0780c9795354a0ce27ac7b8dbea106c90d875cc0bf5765dbafb7da451f0c23f35ed3107a271d1cc7647332a99ea053bd011d5b2a612
-
Filesize
11KB
MD5888e314c66c83f14ca60aeb3e6725b1d
SHA1f7be535214534f046a30ace5a5c2b974aee3d3b0
SHA256e60af7b290326115d35de8fa56ca42ba6a8ed20849304e99bc093bf38454be53
SHA512e579bf23d1a89f35f0d3bf5f50166e3c9b9ec54a506ce52c66b2c0436523b94c38c24214cd5c180c57eee2de092e6a4cd039dff7061171f96c0431371f6013db
-
Filesize
11KB
MD5d2fb006f00545b5c234a90d4a1bce832
SHA15417c6ca3750f10795d4cd415a42307c22a846a3
SHA2566631202793e0b334cadcb6f242862f77f0cd3f6a2f6c4d3204d286297bb340e3
SHA512c02b4569fb00393fc085b125482a7f963fdfe979809ec1432bcca5ba75e5acbbc875bd3fc19baa5b331c9c84c00b737a03f0bfb9ac601c813c58fadc08406bcf
-
Filesize
13KB
MD516c205e11f21a85c92038aa95fa788e1
SHA1c3a0bf6765c6057bac73cae3b2686bff02cd1486
SHA256ead088d991d7348122e506037ef177bc8332e5de26e96533772e37f60f37a7f9
SHA512117842559af971bae2731a7fd844ef8846f17634947167f74508c9a5bde58e18e562748df955f6004f9f59b7d22c148ac7d97c6c87858466027208657e47b745
-
Filesize
14KB
MD54a3bef5570f59c9c136b454cefb00bd2
SHA16d0ddfe7b367bfb064f9daaf30f4382f95df277b
SHA256d43e22d090608d892b4b58e8f0eaf85ddf781cdeba7d7f1efa326844d84bd001
SHA512436c52b38db54da3a5350757db678eaf6ab28e5057748c6ef61800ca3d15dff1c68278c472a52221ed5e52db6681618f59a2641da600ca1c586658f1ff9ff5e1
-
Filesize
5KB
MD5a098c1f34316363b55e23c73935c860b
SHA140abfdc219989aafc0ff5287b38319ebfb7c49b7
SHA256fa2ff6ccaff37b298a58a08b75b25d2e22b08b48f4dd048dd75af55faf3416c7
SHA5121933b57a0b2f2733116a5a89167fcae48745fdc78befec7341e715904c30f98f0a47388eb3c4a648628e1d9c39bda2e7fdc2f917727c4de86968ab51994f1c5e
-
Filesize
9KB
MD5c09f029a06c8155fc6225456ab7cd877
SHA1f77352c6b8de9165483272bf8714962fdceb2e28
SHA2567cbfe2cc361210e755f682a7fc3356c725627ef58ce4b4f257d59db176206d5a
SHA512e60d0a5886c1a03fd1a0a9dbe93d178a20ed7fa09276fba9f41d412a47fe1ed0a101ded0300655549b4660f44ed4db0c0849486f8b9682f56fb9668c9560cc1d
-
Filesize
10KB
MD5434844f33d1ee0f0f202a5de2f565987
SHA133b1275dec2f5551cfaafcc64af2e8fd6e2fadae
SHA256e88d20c938aa5f937067422050e4661d03c5d7d23e2d4756718fa73748c37b31
SHA5128bbd2c21885000fa8a31bbef66b48be7ba14d9dafc535ac5390639d6e6dbc841136f7d3acc423219d5672c8e534ee41c6bd9be9218d13f3783adf316bcd88e8f
-
Filesize
9KB
MD5f5646a57f034a2f21300355241f21466
SHA1591d9e47630dc06a8e7f4d136f910c45f95010b7
SHA256c6c3fa92e5c244e42d590ce152804f291521ed73518f95e65bd1be6d61ce5038
SHA5127d0ee2e1b809a67516bee4061ae3076c2dea3df88a4398cfe83ce6548145528940952a5c5f058518f188c64dd08a4c7f5db704cd984e5c698203cac780f886fb
-
Filesize
5KB
MD5a866eadb1ccff099fcdedc98826c2dd4
SHA1923d2d519359e61b32547b5163570377ac50c1c9
SHA256cc00cabad042d4b6f2e255472676b6f7ced76f05df872f9252a945d2b9983fa2
SHA5124faa7412ee4fc7e32785dd05507b36360bc0155952dd16ac0f0ba385ce034fb72689b6fe250ce6348dab260c968bae18794f8db8b7e091311f0ab815992d158b
-
Filesize
8KB
MD52d411ae1216d5af952a56db6b8dbcc30
SHA19bab02eb3961677582043e20ff7ab246033c074f
SHA25616912e089368181d1418acd944e295de1915e7117c0d0a81229a3b6e59edf79c
SHA512e8633a34ccb78dc7a78fe64fe89ee8c82cf770b09f83d247147c79efa2031d6cd6e1294ef092616edf10e7ebbfbf40b98485391d764264d07271cfe08630a3c2
-
Filesize
9KB
MD57105b362ede66f2054b370bb89d91180
SHA13f069724b709e9bd6f96645d191e936ec21c4c8c
SHA2565a0872cfdd9c356fcbe90f76689523426f89e7eb367f605389a3ce963f70cd96
SHA5124f3137ef9d03985020111a590a7bf927a903668655c51c15a6ea652fe8a45f8d48a8b8d9187963dd96cbad0bb2b5149a42c3ddb4a1982e39a47f710c46b74475
-
Filesize
16KB
MD51c41a23dd51d1d8ddb4db47d3842db90
SHA1e231f71b651dbcd8513e0a7ae4df0070927a90c2
SHA2561dfc889f77472626b2abbbd6e4e653b68f8899051ede4b757097521f936fb2fc
SHA51259b2a039066d7503f8fa3bc9b35d5ab33ae0011db8c456ccb57cac19de9a39c3c436d1975d7c213bedd46e630da19a97114dbf80711c5cdab9d713c4bfb26abf
-
Filesize
8KB
MD558d4253caf518f4219a5e7bbee82ccaf
SHA129c564ce4037f9f111c46c93db8ab85805b2c6cb
SHA256b96368cc5a8339bdec7b956318b0be0e949b1cc299c225d181632893875306d0
SHA512c708175542fdc661fe557a71066958b41c4001f233154a4b5fd3a25559483cbe8a0d38751ec28b4d1536e98e7c2cf3f863b3f7163609a33f456c26dc6103b299
-
Filesize
5KB
MD51ca4b32d7698a593295c3b470884a07d
SHA1c4c70a05cf1fa1f8ae97b79c80eccdd178dc5cbe
SHA256691a2c3080a347b159c82e3c31b62fe1d6ed1c8423e17d6fe5249e188194dbe4
SHA5127840b3b7005faeddd900adfef2e95453d8b5b156719deb959c6000ff8f483c8e11b044518476b18a1082afd56546fad0bd0e9c643b65679b9c1fa3b261f6424e
-
Filesize
10KB
MD50d83355f7f9622f6ac69c39769691d42
SHA126e25f9dde3eb39d096854307c4b29a5bd0bc98c
SHA25638738015854e81f5c46b9dc489d8dcc662b44ccd066d1a22d4b0bf230ea3888e
SHA512d73a95b4ac2c0053a9ee5818987bee17b01e24242d20016f9270ebab6574a123a97e76ae3ae87574f35ce5d3e52587ec3480d9d996b1acd4ead1f5d28e6ced20
-
Filesize
7KB
MD5193910556fd574db21e34b9af8295393
SHA1bac5deffebbf5271af9924afd2fdd21d58b8e72d
SHA256c046bb8a39664ae3401e347d4a9e85b299969cdef57cefe470371204e381e711
SHA512cabc0d896c388e4162ff0b9b5fa0893f5d40f5f83a752b4c69d2a5e83e590e45e7829daaec70bb071ce8cbf164ad1da06c05c7a9eddcaa3d63f1856f771fa087
-
Filesize
8KB
MD56272ea8635dbc110d10d0bb69c4f3030
SHA187e2441328e0c16f6b16a45d89c8d5be2fe5f447
SHA2561cb866e160c0e5f2bd1eadb4b81ac2028cd3b5072578567d97aeeda95297c5e2
SHA5121c4df82c3fdb2b9172594a41463a1fc8b9d351867ec72f468c9de2b9b2b38db46f3e402d00d0d7ee5351b8ea5950c36ecd6d164e33befdff25355f67def040f9
-
Filesize
7KB
MD542a28a2e78254b4050aea04c0ecf2e12
SHA12fe66d853b974d9d38ffd2a8b0ab4f092903c91d
SHA2561411616407a0da021470c9af7490f31bd460060c63082bf07f99b06007870527
SHA512da7bac0d4797a27bbe41833c5998cfb708e6626f4b779a3104f7881e6f303cd956f5b609c0fcbf817bdf8be002d70d97cf40fb973ceaaed1181404f3c9401849
-
Filesize
13KB
MD5033b2c877cdbf19792245098cf9ecdb3
SHA1ccfe3b93e0bb7202d411f3ae6ef14dc5c2952c67
SHA256d0d42255bed5169cb777a41e449a54a7b4a2ba73b57e36df68003e6b525f1339
SHA5120cdd900030ac7117eeaf25217cb38a0a4fd50cb860924a310e37c83e5c189f4b79734724d9630c24cf8542a8d5e931f32e5ad29e6d92340ce867899186e16682
-
Filesize
9KB
MD51fff335be5bec2c7d082530b4b1a12d6
SHA1e168bf4d2941626909dfe82d387755ecb477413d
SHA25602d9256cb22e371339ebd449caffc47d98ac6a1a93b23a7f5dfce6441e8bb493
SHA512fc0c1c35c66bfc3c95ea4e5c6cadb4132f505eb6914be6796ed4f3716c9e0ddf1a79bc9d083d0646ca44cbd0862627158660caf389204016d3bfa8f55be61e8a
-
Filesize
9KB
MD594b30669ca8381bb412addd4a646937c
SHA1116ca8c46b71e39bff389a92eb326ced60fc26dc
SHA256d4041f0f50b1ed415a1778c4587cf3f4574db6cb661e3d74cb95b3c1499d1d97
SHA512defbdffc9beef0eafa9c66598a876d1bb08fe603116628d6ebf2704ba1423d4bffd39cb90041258d3a7a2f05b74d983ae725879d8772e93b257ccceda1289bb7
-
Filesize
7KB
MD5116d3dba8a023d4d4a00ee655d5a1048
SHA1d86fe50b39c028ec33b99a8a05b888293df0542c
SHA256b6bae81a6d149798b5ac761b8a17d87592c5b90008dc3663a558ae590a1ccdf9
SHA5123fcc508e3a3adda84725a07eb993275cb09a5457ef32493795c4c3502255a74343c3eb07b2debb725744b88024db33fedb944ea5ec142d0158970000a7150040
-
Filesize
6KB
MD50c09a7c431eeb862fb4f4279ce70385a
SHA1b059605bff4bb2dbb4d7cbbd4eac2c3240cfa415
SHA256e40a5321e7fdfa0f0405cb6ceda34a1be2c3b1e1634d15ba72443058ab34458e
SHA51246a740dc30a35d243f3af25ef6780812ea76227d8c917dac85eb5f110246385116036efcb01446a6c91a001d91ec9564be017df104f7e347233a8fce883d2727
-
Filesize
8KB
MD50a34657239623fd0f7d6b74bb06f424a
SHA1227815649986aa5a4d4326d4b3da69e7808c97fd
SHA256d7f508979d88c939974940fd5bc85f7a84877b123b6c7f85847630efe68b159d
SHA51267dfde5ac95a917ef986879046280df2ac936100506976f7182388559a17531889f92a845a416f36667c6f64925e47fc0551fe5d36334f63c973434c08ed736e
-
Filesize
9KB
MD554ee63d18c635b5ac9fe96199cdcbf67
SHA1e91a128a392380ed42cb85ed73edf6a37016a4dd
SHA256002651f75e72bdc70601081f86d54216fbdd28fd457f3607304c0a66f51630d1
SHA51269ae75197a60b0dc3d33e63a256c589cf8582fca681e356f0bd0cb7951659ec190ea5cf7163e1f96c296c297aca50a3b08298055e307685c5c5f0e803deda97f
-
Filesize
17KB
MD5085c3d0ba12a051a4b1bd16856ebd190
SHA17cfcfe46b3d6d58cd894b0e1a82a5eda943e52d3
SHA2564cd59341f176d861392c1aab87de3a37c6a71bdfee2efdc420b4e4d684dd72a9
SHA512e2a8440482a397cfe7d35c6aec038c391cb59346c91ecc18d43988134013544bba08c8dac8396516e1ccef7fb03e65033c21009809b72584c7c88ff3197caa7c
-
Filesize
11KB
MD5960d66a1171c6d1fbd89565cfdbfc052
SHA1cecfd86d3cfb861f31283a54d2bf7458d41187fa
SHA2566d96f0872a3158a8968f212a2cf8d1d2abf44db0509ab03aecd69c94694851b7
SHA512cbf681fe6e38fbb5fc753136dcd597dbda0cb8a6584c17859c5d37a1241e3ecf5f1ba14be85cfdc49f58a7983a3c061ffd79ae6ce9820e3a7523c8538b460345
-
Filesize
17KB
MD5d2ad56546bf413de8309a715c2302d8b
SHA1bffa516d90ee687e65134bbe4b2e368278a23231
SHA256b4115d85bbf38b7ab89dcf684f5c1a807be412120394689359027207d3ec4767
SHA5129bfbb4af61948f00d89b0fdd76fe4a65c04131a6798d8a4f49255120dde0f289d8f55447e17960d33b8acd04c06f3f1fa993fcfb0a50d2fe937fe8e44d040b7b
-
Filesize
8KB
MD5e846ffc2e5dedb5f3b8e5ec9d9a60afa
SHA13da0d2abed01efbfa8d768a14e5b34f40a4691e8
SHA25608aedde14d3878cf90bc84da26eace5a7f2167417fcbfc692675916af2576c2d
SHA512721a675dabe8c619df83da1cbf4e013030e11907342a8172faaf6618b148c6bfa6ba86d3f3c4a4498fbcd842e0f210ffc2229f3baa6ee03f8dac026f7f841a53
-
Filesize
10KB
MD5c9e869876773359827279da3cc0f3734
SHA1de57eecdb09f03a00c81379d031010ec18b677ed
SHA25681865a15dc8448e6a28ae9c8df0a66687d555343c7b68d030532fbe7c8f8539b
SHA51241e7f0cfe7170967cdfccc8c0c7e7bbb91d91285e685c7d392c7c0b9f60908195f2eac3ed18df46d5e93a09929259f304045d7e7e30aded20810e9e93d4ddc54
-
Filesize
14KB
MD58e701841b8e0639e4ec4da10c7c8fc79
SHA11d006523b764bdebf4eea0ca55d78a77a77b844d
SHA256f99c694049f0f3b7eefd2ff1d56a98d0f3d86ca846689b4fc884ca21cb936dcb
SHA512ad9030fb2d15baeb58313dda8106528ff2234a2b8c14067e55998508130a9b969efaeb2a8c3cdecb6aac5ab6e062d48b94326d9d6ba34e881166f0bb92a4fe62
-
Filesize
8KB
MD559cb1ef03211ce719de7b8c596418cca
SHA163e27e1fdedb9a452b36398eca2b78c7b5840951
SHA256f94785d863948f9119361d972ae13e7e96870aa0c412c3552547c90afcb670a5
SHA51214bfd516c32315186c029dc4dc67a336b3f96c3c18cae36a87e21d93d1ac41def4b206023c9afd6e5609f0adb0a78ae002576eba2fb8093bd09b385a69f04440
-
Filesize
5KB
MD564f4a4e3463c8f0efab3a31bdca8ce81
SHA112da1e93fbb68640658b99824af92feaa98fb05d
SHA25662388b685acefcfda29eb7ec8f80e0120b7f9fca6cab225783539e1187e7278e
SHA5128518ef0c435a1c6fc54fed427e0048b293babbe207c67750d582845cec427b124058482058b1319a87f959e514b316153664eeb493ea8d9988f031fe3833cea0
-
Filesize
8KB
MD5f49c61667e2f47cb065c0860eec0cfc3
SHA11724e0a6f09696aaa6f0168bf220206131daae43
SHA256586b1ee41603db0ebb705991503c6c0b65c945adf696a09e4faaf360eeb6d5a6
SHA5122817a41196ae335c4b0f0e7b48b04ce3a90424c8a588372af53bc764e7088a864fe7f68e1cf01e3d931424a1e05bf180910c48f8da43159716222a56f28e6c16
-
Filesize
9KB
MD53ff4b9e14e22a2aa9cfc152cce569395
SHA1ab1be884ac5604b8ead2cedb2b8a488a45a5847d
SHA25627c0626580d31e7033b21d3a8c03f336f5ec34d7f1fe56ed1dd55c02a3537d94
SHA51237bef8d908dd951409245c6f3ff2c0b62e4bf21fba43d001a9f2eff5fa9849dd0620ba998efc9174bb012449384eaedfc13b02254886c7cbf2a743a3ecd72030
-
Filesize
12KB
MD573ecec39bf7e3b573b0d606f2c1fa0e5
SHA15fea3d929c2a019eab1d316cd3c764883740dd25
SHA256eaa88a29bdb27622260622361b68f8af85cb03405db4f580037d010dd682de55
SHA5124573d713f5a64bb982f3c74d6942dd83f8925611cdf4846e0a964350205e28f8573b123566e133c127ceabc4a582d4459fb86ae651c7a7a4781b158c97397903
-
Filesize
18KB
MD54a5da3e03beb2c25dc55be8dac46a54f
SHA11bbac5fb53232ee8bdab944a4623d58d12c4c68c
SHA256bb29527877771882010e8864302445c5376190bd7861e2b4ff0c9b68668910b7
SHA5126fd0ead575d19ffb08612dd0b151ccdddd686514762c21106eb6573b6a0fe0ba8bb7f4724f55be9de7d6b6afed2c58e529780b42733d0897cd592b48471d016c
-
Filesize
8KB
MD5346462bef0d2a78f9871efe4f6013bc3
SHA17444b9173420800f076ff745bb76465a7e8aa87d
SHA2566ff4a296418d64f92570401bb785474757f9a833f7388436aadd06a0be4fcbca
SHA512344cf9349fa39c43d3b5a1842a03248f0a42387927bba0e0f0e631565f4c98155cdea39cf2b90ac7a18be2163c3ba028ffc85b7d6ccd699a48f9b7cab09e66a3
-
Filesize
8KB
MD5a7524e170615fc269c6b799889090256
SHA1e6c24755d473c5b179db48bf84405901544295dd
SHA256dbdf22df0f59ae978e9ebcba512d067dd4cb9f663ed5bce7ee7ca8a57b0f713a
SHA512641675445efe71dfb0092f79da9a05227fbd2eb19448b0d9c297c441d022d6dea0c9d0e3dc9805694406d0618fbea587006849091b59ee7ba3a8749642622eca
-
Filesize
10KB
MD5d3b2bec857ebca4e92939dde246e5b20
SHA13704bd2d37df609df6b2020b1b83a85b8e17acd6
SHA256888ce3c914953dd6539a3fff449ca0cb3e895c5eef34ff003c450f2449f59547
SHA51235a4fd876d8b5fe0cf683cd60f946484e141fc78fc29cb3b5efac9b36b2b7382292884b86537f077c44e2f04f01f519fd4b78eed027e5ca6f814dd87d302c220
-
Filesize
10KB
MD54205ee6719170b8d3271665e9b2d08a5
SHA1bbc87ba4be36525ca8bb0e05cf73aa7805208c23
SHA2569090af06df1ca3410e16e0a1de57435fc404ea3f01816be9510f92e91be9c965
SHA512c5547117ab9d8570505e4e131ca164fe6d83843bb0b24900f7691e81f76773ab72d389b7e8979cd2da9c05e5b1a5bf900a48fb04cd065c52c70540e6c4930709
-
Filesize
12KB
MD5148ac17cdc2c5ce727eb59471997c795
SHA115472e3cb5821dd2caa217a0f668cf0a2791b41e
SHA256b4a317d95089dea740b029465f57a27601385fa0c74979694af36f7391cafd99
SHA512121dcd82b944ce856e726dc0b69cc048742b23d904309f5bff5c37ab92323b923813ee6960cd8b108a9c978b2d57e00641a2d5063cf4d8e611d0b5a6df2cc633
-
Filesize
5KB
MD5dcac3a0d3e4b109fda1fd5790c7ef10f
SHA119e40a9461cd8fad3782365954c7b2417b89e786
SHA2567279cecb13f7badf7e96aec6665a49c2c7c2be8c71feab6a79bf5e845bbf6ff7
SHA5128146a9bb742342b52fab952584bd5d1dc27ecd57dc83a76febd1669e1c6cf0ecaa71f908d8a6ddd3515b9c67adb476213157b324d0c02f43ddc9bd9e710a17e8
-
Filesize
642B
MD501236c41157e9576695baedb780041aa
SHA10bfdac415c396ae25b25aa759eb423c9b4c7a155
SHA256aa751383bbd472fbd3046ecd02542e6f34b8fec094b4e7216448d6cc9f52158b
SHA512e10d8b4a98227e392927dc5989204ee9b36a0fcff0d863d2fd14bae0dec776934b59cc20cbbdeb64fa5901d51d5e93b1fcd242c99fa2e3747bd43101c8ae7c0b
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_5ab270f5-f3a9-47d1-97d7-bbd50acf9955
Filesize52B
MD593a5aadeec082ffc1bca5aa27af70f52
SHA147a92aee3ea4d1c1954ed4da9f86dd79d9277d31
SHA256a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294
SHA512df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45
-
Filesize
170KB
MD531bd0f224e7e74eee2847f43aae23974
SHA192e331e1e8ad30538f38dd7ba31386afafa14a58
SHA2568b0a5fb13309623c3518473551cb1f55d38d8450129d4a3c16b476f7b2867d7d
SHA512a13f05a12b084ef425f542ff4be824bbccb5dbdfe085af8b7e19d81a6bcba4b8c1debcc38f6b57bc9265a4db21eed70852ece8cc62b3ef14c47fca3035a55249
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda