Analysis
-
max time kernel
190s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
b288393a94c86b1188517d2d7acdd7afb95c39004e70aeea726003039695d072.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b288393a94c86b1188517d2d7acdd7afb95c39004e70aeea726003039695d072.exe
Resource
win10v2004-20220812-en
General
-
Target
b288393a94c86b1188517d2d7acdd7afb95c39004e70aeea726003039695d072.exe
-
Size
20KB
-
MD5
05418a25ff7a33ff66c0a8759a816df0
-
SHA1
3e4ce8819797c20c4ea84f5e9bcbabecade61795
-
SHA256
b288393a94c86b1188517d2d7acdd7afb95c39004e70aeea726003039695d072
-
SHA512
7e060197e1011453b07954e7fcf864910fae1ab50872a12223f02f5979275ea099fc65da2ab45c66eb9df1dfd9e95903acdb9ba359f516f48c781cd6ceb3e6de
-
SSDEEP
192:1l5E3krTuntKy0peHDfCpHfBv+I4QwXt9V+jqu0G5KDJB0:1M3PnQoHDCpHf4I4Qwdc0G5KDJS
Malware Config
Signatures
-
Drops file in Drivers directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe b288393a94c86b1188517d2d7acdd7afb95c39004e70aeea726003039695d072.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe -
Executes dropped EXE 4 IoCs
pid Process 932 winlogon.exe 2832 AE 0124 BE.exe 4748 winlogon.exe 4796 winlogon.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation b288393a94c86b1188517d2d7acdd7afb95c39004e70aeea726003039695d072.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation AE 0124 BE.exe -
Loads dropped DLL 3 IoCs
pid Process 2832 AE 0124 BE.exe 4748 winlogon.exe 4796 winlogon.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Windows\Downloaded Program Files\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Fonts\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Desktop.ini AE 0124 BE.exe -
Drops autorun.inf file 1 TTPs 27 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\V:\Autorun.inf winlogon.exe File opened for modification \??\Z:\Autorun.inf winlogon.exe File opened for modification \??\E:\Autorun.inf winlogon.exe File opened for modification \??\H:\Autorun.inf winlogon.exe File opened for modification \??\I:\Autorun.inf winlogon.exe File opened for modification \??\J:\Autorun.inf winlogon.exe File opened for modification \??\U:\Autorun.inf winlogon.exe File opened for modification C:\Autorun.inf winlogon.exe File opened for modification \??\F:\Autorun.inf winlogon.exe File opened for modification \??\G:\Autorun.inf winlogon.exe File opened for modification \??\N:\Autorun.inf winlogon.exe File opened for modification \??\Q:\Autorun.inf winlogon.exe File opened for modification \??\M:\Autorun.inf winlogon.exe File opened for modification \??\T:\Autorun.inf winlogon.exe File opened for modification \??\W:\Autorun.inf winlogon.exe File opened for modification \??\A:\Autorun.inf winlogon.exe File opened for modification \??\O:\Autorun.inf winlogon.exe File opened for modification \??\S:\Autorun.inf winlogon.exe File opened for modification \??\B:\Autorun.inf winlogon.exe File opened for modification \??\K:\Autorun.inf winlogon.exe File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\autorun.inf AE 0124 BE.exe File opened for modification D:\Autorun.inf winlogon.exe File opened for modification \??\L:\Autorun.inf winlogon.exe File opened for modification \??\P:\Autorun.inf winlogon.exe File opened for modification \??\R:\Autorun.inf winlogon.exe File opened for modification \??\X:\Autorun.inf winlogon.exe File opened for modification \??\Y:\Autorun.inf winlogon.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\regedit.exe AE 0124 BE.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.12.0.Microsoft.Office.Interop.Graph\15.0.0.0__71e9bce111e9429c\Policy.12.0.Microsoft.Office.Interop.Graph.config AE 0124 BE.exe File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\Read Me.url AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Audio\it-IT\CL_LocalizationData.psd1 AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Video\VF_viddrv_driverblocklist.ps1 AE 0124 BE.exe File opened for modification C:\Windows\Help\mui\0410\msdasc.chm AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Primitives\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceModel.Primitives.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.NetTcp\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceModel.NetTcp.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Office.Word.AddInProxy.v9.0\9.0.0.0__b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\AuditPolicy42d3d2cc#\00194bf840ef92b2565b539f29704dc8\AuditPolicyGPManagedStubs.Interop.ni.dll.aux AE 0124 BE.exe File opened for modification C:\Windows\Fonts\serf1257.fon AE 0124 BE.exe File opened for modification C:\Windows\L2Schemas\WWAN_profile_v8.xsd AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Transactions.Bridge.Dtc.resources\v4.0_4.0.0.0_it_b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.WindowsRuntime.resources\v4.0_4.0.0.0_fr_b77a5c561934e089 AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Data\f091eefc9995f0971e4c1a5d394ca967\System.Data.ni.dll AE 0124 BE.exe File opened for modification C:\Windows\debug\NetSetup.LOG AE 0124 BE.exe File opened for modification C:\Windows\INF\mdmadc.inf AE 0124 BE.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_mfc100kor_x86 AE 0124 BE.exe File opened for modification C:\Windows\Cursors\aero_person_xl.cur AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_64\PresentationCore\v4.0_4.0.0.0__31bf3856ad364e35\GlobalMonospace.CompositeFont AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Routing.resources\v4.0_4.0.0.0_de_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xml.XPath.XDocument\v4.0_4.0.0.0__b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.Tpm.Commands.Resources\v4.0_10.0.0.0_de_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_64\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.11.0.office\15.0.0.0__71e9bce111e9429c AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\Microsoft.Ic1a2041b# AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\scheduled\Maintenance\de-DE AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\WindowsUpdate\RC_WaaSMedic.ps1 AE 0124 BE.exe File opened for modification C:\Windows\INF\ServiceModelEndpoint 3.0.0.0\0000 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0\10.0.0.0__b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Activities.resources AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.PolicyManagement.PolicyManager.Resources\v4.0_10.0.0.0_de_31bf3856ad364e35\Microsoft.Security.ApplicationId.PolicyManagement.PolicyManager.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions.resources\v4.0_4.0.0.0_fr_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Workflow.Runtime.resources\v4.0_4.0.0.0_es_31bf3856ad364e35\System.Workflow.Runtime.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.AppV.AppVClientWmi\v4.0_10.0.0.0__31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Windows.Diagnosis.Commands.UpdateDiagReport.Resources\v4.0_1.0.0.0_fr_31bf3856ad364e35\Microsoft.Windows.Diagnosis.Commands.UpdateDiagReport.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Office.Interop.Access.Dao AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\445e1976593e6b3b2072e606af9be0ae\System.Xml.ni.dll.aux AE 0124 BE.exe File opened for modification C:\Windows\L2Schemas\OneX_v1.xsd AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.Services.resources\v4.0_4.0.0.0_es_b77a5c561934e089\System.Data.Services.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.AddIn.Contract\2.0.0.0__b03f5f7f11d50a3a\System.AddIn.Contract.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.W708fc392#\e0d84dc25c6b76503171beec9d740dde AE 0124 BE.exe File opened for modification C:\Windows\Boot\DVD\EFI\BCD AE 0124 BE.exe File opened for modification C:\Windows\Boot\DVD\EFI\en-US\efisys_noprompt.bin AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting.resources\v4.0_4.0.0.0_it_b77a5c561934e089\System.Runtime.Remoting.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Controls.Ribbon.resources\v4.0_4.0.0.0_es_b77a5c561934e089\System.Windows.Controls.Ribbon.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.ServiceProcess.Resources\2.0.0.0_ja_b03f5f7f11d50a3a\System.ServiceProcess.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.Resources\2.0.0.0_ja_b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\Boot\EFI\et-EE AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.DirectoryServices.Protocols.Resources\2.0.0.0_it_b03f5f7f11d50a3a\System.DirectoryServices.Protocols.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Bluetooth\RS_DriverProblem.ps1 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.ApplicationServices.resources\v4.0_4.0.0.0_de_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.DirectoryServices.AccountManagement.Resources\3.5.0.0_it_b77a5c561934e089 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Conversion.v4.0.resources\v4.0_4.0.0.0_ja_b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms.DataVisualization.resources\v4.0_4.0.0.0_de_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics.resources\v4.0_4.0.0.0_it_b77a5c561934e089\SMDiagnostics.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\Fonts\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Fonts\segoeui.ttf AE 0124 BE.exe File opened for modification C:\Windows\ImmersiveControlPanel\images\logo.contrast-white_scale-400.png AE 0124 BE.exe File opened for modification C:\Windows\INF\netrtl64.inf AE 0124 BE.exe File opened for modification C:\Windows\INF\SMSvcHost 4.0.0.0\0407 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.PolicyManagement.PolicyModel\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.Security.ApplicationId.PolicyManagement.PolicyModel.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Messaging\2.0.0.0__b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatioaec034ca# AE 0124 BE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ b288393a94c86b1188517d2d7acdd7afb95c39004e70aeea726003039695d072.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ AE 0124 BE.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3048 b288393a94c86b1188517d2d7acdd7afb95c39004e70aeea726003039695d072.exe 932 winlogon.exe 2832 AE 0124 BE.exe 4748 winlogon.exe 4796 winlogon.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3048 wrote to memory of 932 3048 b288393a94c86b1188517d2d7acdd7afb95c39004e70aeea726003039695d072.exe 79 PID 3048 wrote to memory of 932 3048 b288393a94c86b1188517d2d7acdd7afb95c39004e70aeea726003039695d072.exe 79 PID 3048 wrote to memory of 932 3048 b288393a94c86b1188517d2d7acdd7afb95c39004e70aeea726003039695d072.exe 79 PID 932 wrote to memory of 2832 932 winlogon.exe 80 PID 932 wrote to memory of 2832 932 winlogon.exe 80 PID 932 wrote to memory of 2832 932 winlogon.exe 80 PID 932 wrote to memory of 4748 932 winlogon.exe 81 PID 932 wrote to memory of 4748 932 winlogon.exe 81 PID 932 wrote to memory of 4748 932 winlogon.exe 81 PID 2832 wrote to memory of 4796 2832 AE 0124 BE.exe 82 PID 2832 wrote to memory of 4796 2832 AE 0124 BE.exe 82 PID 2832 wrote to memory of 4796 2832 AE 0124 BE.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\b288393a94c86b1188517d2d7acdd7afb95c39004e70aeea726003039695d072.exe"C:\Users\Admin\AppData\Local\Temp\b288393a94c86b1188517d2d7acdd7afb95c39004e70aeea726003039695d072.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Drops autorun.inf file
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\AE 0124 BE.exe"C:\Windows\AE 0124 BE.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4796
-
-
-
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4748
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5dc0c9beb8b6a093118c5b2e7c4f20dd4
SHA1611f1fb8d691d1528c85575a5274e3d371caa035
SHA256d22d6ea6aaf06b06ab15a19d9303448d8577c919f9ac9d9b2b00285dc386fea9
SHA512254613e1c1ef1ff1fc317a6c4e355b938e4547c61972afa5d7fdd1f876b5f099c2b062ccbe9a0b429fd89c923aad23aa3c2003d541074bf4c056039c86c6910a
-
Filesize
40KB
MD5f990bb9c5bbfcfed300f1a4b8c1776d7
SHA1c55cc13efeca1f31320d5bdf07c0513fb0768407
SHA25692d71e037493bd6b3bb75577025f26f1dfa3fe847fc5c444048b3c50d1448df2
SHA51253bd0ffbac91b382908b218a2af96316bf46a500ba942e0d29ae0a2c56c307403b59d31a3e5882af9042f7ff99c33ad3f5de790d15431ccf379d19cacb583985
-
Filesize
40KB
MD5f990bb9c5bbfcfed300f1a4b8c1776d7
SHA1c55cc13efeca1f31320d5bdf07c0513fb0768407
SHA25692d71e037493bd6b3bb75577025f26f1dfa3fe847fc5c444048b3c50d1448df2
SHA51253bd0ffbac91b382908b218a2af96316bf46a500ba942e0d29ae0a2c56c307403b59d31a3e5882af9042f7ff99c33ad3f5de790d15431ccf379d19cacb583985
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
40KB
MD5f990bb9c5bbfcfed300f1a4b8c1776d7
SHA1c55cc13efeca1f31320d5bdf07c0513fb0768407
SHA25692d71e037493bd6b3bb75577025f26f1dfa3fe847fc5c444048b3c50d1448df2
SHA51253bd0ffbac91b382908b218a2af96316bf46a500ba942e0d29ae0a2c56c307403b59d31a3e5882af9042f7ff99c33ad3f5de790d15431ccf379d19cacb583985
-
Filesize
40KB
MD5f990bb9c5bbfcfed300f1a4b8c1776d7
SHA1c55cc13efeca1f31320d5bdf07c0513fb0768407
SHA25692d71e037493bd6b3bb75577025f26f1dfa3fe847fc5c444048b3c50d1448df2
SHA51253bd0ffbac91b382908b218a2af96316bf46a500ba942e0d29ae0a2c56c307403b59d31a3e5882af9042f7ff99c33ad3f5de790d15431ccf379d19cacb583985
-
Filesize
40KB
MD5f990bb9c5bbfcfed300f1a4b8c1776d7
SHA1c55cc13efeca1f31320d5bdf07c0513fb0768407
SHA25692d71e037493bd6b3bb75577025f26f1dfa3fe847fc5c444048b3c50d1448df2
SHA51253bd0ffbac91b382908b218a2af96316bf46a500ba942e0d29ae0a2c56c307403b59d31a3e5882af9042f7ff99c33ad3f5de790d15431ccf379d19cacb583985
-
Filesize
40KB
MD5f990bb9c5bbfcfed300f1a4b8c1776d7
SHA1c55cc13efeca1f31320d5bdf07c0513fb0768407
SHA25692d71e037493bd6b3bb75577025f26f1dfa3fe847fc5c444048b3c50d1448df2
SHA51253bd0ffbac91b382908b218a2af96316bf46a500ba942e0d29ae0a2c56c307403b59d31a3e5882af9042f7ff99c33ad3f5de790d15431ccf379d19cacb583985
-
Filesize
25B
MD5589b6886a49054d03b739309a1de9fcc
SHA10ec1dff7a03f13dea28eea5e754d5b0e5e1dc308
SHA256564815feb9c5bdadb145cd0d16738c4e5fbc6a46cf65c62ac6a985c43d1939e8
SHA5124b6f567398863aba39eec00e9f071364b79d5c29867b93fb968725e10e33a9bfff60f8ab6acceae44e715a35ec7139d12da06c33fa074b6be02ff5357c53c0eb
-
Filesize
25B
MD5589b6886a49054d03b739309a1de9fcc
SHA10ec1dff7a03f13dea28eea5e754d5b0e5e1dc308
SHA256564815feb9c5bdadb145cd0d16738c4e5fbc6a46cf65c62ac6a985c43d1939e8
SHA5124b6f567398863aba39eec00e9f071364b79d5c29867b93fb968725e10e33a9bfff60f8ab6acceae44e715a35ec7139d12da06c33fa074b6be02ff5357c53c0eb