Analysis
-
max time kernel
169s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe
Resource
win10v2004-20220812-en
General
-
Target
f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe
-
Size
140KB
-
MD5
0d0075ea26ef867e92a283adfee277f0
-
SHA1
bc9a42b2a1be0e668bb2be536a0b257e45050633
-
SHA256
f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
-
SHA512
dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
SSDEEP
1536:v4Jf83W8W60IL26ApmJS7f8dJ1kiCXlTug/X8FaCaKaG//ZaGD5:AJCD54mJS7f2LkiCXl5/MMzu//ZaGD
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\WinSit.exe" f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\WinSit.exe" Fun.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\WinSit.exe" SVIQ.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\WinSit.exe" dc.exe -
Executes dropped EXE 4 IoCs
pid Process 2132 Fun.exe 3372 SVIQ.EXE 4596 dc.exe 4812 dc.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dc2k5 = "C:\\Windows\\SVIQ.EXE" f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run SVIQ.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fun = "C:\\Windows\\system\\Fun.exe" SVIQ.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dc = "C:\\Windows\\dc.exe" SVIQ.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fun = "C:\\Windows\\system\\Fun.exe" f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run Fun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dc2k5 = "C:\\Windows\\SVIQ.EXE" SVIQ.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dc = "C:\\Windows\\dc.exe" dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dc2k5 = "C:\\Windows\\SVIQ.EXE" dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fun = "C:\\Windows\\system\\Fun.exe" dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fun = "C:\\Windows\\system\\Fun.exe" Fun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dc = "C:\\Windows\\dc.exe" Fun.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dc2k5 = "C:\\Windows\\SVIQ.EXE" Fun.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dc = "C:\\Windows\\dc.exe" f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\Win.exe Fun.exe File opened for modification C:\Windows\SysWOW64\config\Win.exe SVIQ.EXE File opened for modification C:\Windows\SysWOW64\WinSit.exe dc.exe File opened for modification C:\Windows\SysWOW64\Penx.dat Fun.exe File opened for modification C:\Windows\SysWOW64\WinSit.exe f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe File opened for modification C:\Windows\SysWOW64\config\Win.exe f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe File opened for modification C:\Windows\SysWOW64\WinSit.exe Fun.exe File opened for modification C:\Windows\SysWOW64\config\Win.exe dc.exe File opened for modification C:\Windows\SysWOW64\Xpen.dat Fun.exe File created C:\Windows\SysWOW64\WinSit.exe f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe File created C:\Windows\SysWOW64\config\Win.exe f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe File opened for modification C:\Windows\SysWOW64\WinSit.exe SVIQ.EXE -
Drops file in Windows directory 34 IoCs
description ioc Process File opened for modification C:\Windows\dc.exe f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe File created C:\Windows\inf\Other.exe f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe File opened for modification C:\Windows\wininit.ini f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe File opened for modification C:\Windows\wininit.ini Fun.exe File opened for modification C:\Windows\wininit.ini SVIQ.EXE File opened for modification C:\Windows\inf\Other.exe f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe File created C:\Windows\system\Fun.exe SVIQ.EXE File created C:\Windows\Help\Other.exe f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe File opened for modification C:\Windows\dc.exe SVIQ.EXE File opened for modification C:\Windows\SVIQ.exe SVIQ.EXE File created C:\Windows\SVIQ.EXE f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe File opened for modification C:\Windows\SVIQ.EXE Fun.exe File opened for modification C:\Windows\Help\Other.exe SVIQ.EXE File created C:\Windows\SVIQ.EXE SVIQ.EXE File opened for modification C:\Windows\wininit.ini dc.exe File opened for modification C:\Windows\dc.exe dc.exe File created C:\Windows\system\Fun.exe f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe File opened for modification C:\Windows\SVIQ.EXE f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe File created C:\Windows\system\Fun.exe Fun.exe File opened for modification C:\Windows\inf\Other.exe Fun.exe File opened for modification C:\Windows\Help\Other.exe Fun.exe File opened for modification C:\Windows\Help\Other.exe dc.exe File opened for modification C:\Windows\system\Fun.exe Fun.exe File created C:\Windows\dc.exe f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe File opened for modification C:\Windows\inf\Other.exe SVIQ.EXE File opened for modification C:\Windows\system\Fun.exe SVIQ.EXE File created C:\Windows\SVIQ.EXE dc.exe File opened for modification C:\Windows\inf\Other.exe dc.exe File opened for modification C:\Windows\Help\Other.exe f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe File opened for modification C:\Windows\dc.exe Fun.exe File created C:\Windows\system\Fun.exe dc.exe File created C:\Windows\dc.exe dc.exe File opened for modification C:\Windows\system\Fun.exe f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe File opened for modification C:\Windows\system\Fun.exe dc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3628 f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe 3628 f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe 3628 f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe 3628 f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe 2132 Fun.exe 2132 Fun.exe 3372 SVIQ.EXE 3372 SVIQ.EXE 3372 SVIQ.EXE 3372 SVIQ.EXE 4596 dc.exe 4596 dc.exe 4812 dc.exe 4812 dc.exe 4596 dc.exe 4596 dc.exe 3372 SVIQ.EXE 3372 SVIQ.EXE 2132 Fun.exe 2132 Fun.exe 3628 f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe 3628 f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe 4596 dc.exe 4596 dc.exe 3372 SVIQ.EXE 3372 SVIQ.EXE 2132 Fun.exe 2132 Fun.exe 4596 dc.exe 4596 dc.exe 3372 SVIQ.EXE 3372 SVIQ.EXE 2132 Fun.exe 2132 Fun.exe 4596 dc.exe 4596 dc.exe 3372 SVIQ.EXE 3372 SVIQ.EXE 2132 Fun.exe 2132 Fun.exe 4596 dc.exe 4596 dc.exe 3372 SVIQ.EXE 3372 SVIQ.EXE 2132 Fun.exe 2132 Fun.exe 4596 dc.exe 4596 dc.exe 3372 SVIQ.EXE 3372 SVIQ.EXE 2132 Fun.exe 2132 Fun.exe 4596 dc.exe 4596 dc.exe 3372 SVIQ.EXE 3372 SVIQ.EXE 2132 Fun.exe 2132 Fun.exe 4596 dc.exe 4596 dc.exe 3372 SVIQ.EXE 3372 SVIQ.EXE 2132 Fun.exe 2132 Fun.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3628 f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe 3628 f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe 2132 Fun.exe 2132 Fun.exe 3372 SVIQ.EXE 3372 SVIQ.EXE 4596 dc.exe 4596 dc.exe 4812 dc.exe 4812 dc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3628 wrote to memory of 2132 3628 f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe 79 PID 3628 wrote to memory of 2132 3628 f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe 79 PID 3628 wrote to memory of 2132 3628 f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe 79 PID 2132 wrote to memory of 3372 2132 Fun.exe 80 PID 2132 wrote to memory of 3372 2132 Fun.exe 80 PID 2132 wrote to memory of 3372 2132 Fun.exe 80 PID 3372 wrote to memory of 4596 3372 SVIQ.EXE 81 PID 3372 wrote to memory of 4596 3372 SVIQ.EXE 81 PID 3372 wrote to memory of 4596 3372 SVIQ.EXE 81 PID 3628 wrote to memory of 4812 3628 f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe 82 PID 3628 wrote to memory of 4812 3628 f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe 82 PID 3628 wrote to memory of 4812 3628 f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe"C:\Users\Admin\AppData\Local\Temp\f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\system\Fun.exeC:\Windows\system\Fun.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SVIQ.EXEC:\Windows\SVIQ.EXE3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\dc.exeC:\Windows\dc.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4596
-
-
-
-
C:\Windows\dc.exeC:\Windows\dc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4812
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD50d0075ea26ef867e92a283adfee277f0
SHA1bc9a42b2a1be0e668bb2be536a0b257e45050633
SHA256f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
SHA512dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
Filesize
140KB
MD50d0075ea26ef867e92a283adfee277f0
SHA1bc9a42b2a1be0e668bb2be536a0b257e45050633
SHA256f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
SHA512dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
Filesize
140KB
MD50d0075ea26ef867e92a283adfee277f0
SHA1bc9a42b2a1be0e668bb2be536a0b257e45050633
SHA256f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
SHA512dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
Filesize
140KB
MD50d0075ea26ef867e92a283adfee277f0
SHA1bc9a42b2a1be0e668bb2be536a0b257e45050633
SHA256f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
SHA512dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
Filesize
140KB
MD50d0075ea26ef867e92a283adfee277f0
SHA1bc9a42b2a1be0e668bb2be536a0b257e45050633
SHA256f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
SHA512dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
Filesize
140KB
MD50d0075ea26ef867e92a283adfee277f0
SHA1bc9a42b2a1be0e668bb2be536a0b257e45050633
SHA256f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
SHA512dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
Filesize
140KB
MD50d0075ea26ef867e92a283adfee277f0
SHA1bc9a42b2a1be0e668bb2be536a0b257e45050633
SHA256f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
SHA512dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
Filesize
140KB
MD50d0075ea26ef867e92a283adfee277f0
SHA1bc9a42b2a1be0e668bb2be536a0b257e45050633
SHA256f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
SHA512dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
Filesize
140KB
MD50d0075ea26ef867e92a283adfee277f0
SHA1bc9a42b2a1be0e668bb2be536a0b257e45050633
SHA256f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
SHA512dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
Filesize
140KB
MD50d0075ea26ef867e92a283adfee277f0
SHA1bc9a42b2a1be0e668bb2be536a0b257e45050633
SHA256f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
SHA512dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
Filesize
63KB
MD5311e9c33fc5ade3a9513dc478b1d745e
SHA16e23b7eaaec62a5ce5dc50d369aa6df6a0cf09c5
SHA256a7d4c03318583798f4c61cf348a95b2e1cf524cd091569fc142462cea6ea003b
SHA512cefc27471bfb95fd68fe9027d4fb76fbb5422045bff19f0b41c2c624693daedd4d1cc8b2b6c185623c48d89f84668ea52681a8db738f89e371b5ae4a87707de3
-
Filesize
140KB
MD50d0075ea26ef867e92a283adfee277f0
SHA1bc9a42b2a1be0e668bb2be536a0b257e45050633
SHA256f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
SHA512dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
Filesize
140KB
MD50d0075ea26ef867e92a283adfee277f0
SHA1bc9a42b2a1be0e668bb2be536a0b257e45050633
SHA256f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
SHA512dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
Filesize
140KB
MD50d0075ea26ef867e92a283adfee277f0
SHA1bc9a42b2a1be0e668bb2be536a0b257e45050633
SHA256f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
SHA512dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
Filesize
140KB
MD50d0075ea26ef867e92a283adfee277f0
SHA1bc9a42b2a1be0e668bb2be536a0b257e45050633
SHA256f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
SHA512dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
Filesize
140KB
MD50d0075ea26ef867e92a283adfee277f0
SHA1bc9a42b2a1be0e668bb2be536a0b257e45050633
SHA256f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
SHA512dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
Filesize
140KB
MD50d0075ea26ef867e92a283adfee277f0
SHA1bc9a42b2a1be0e668bb2be536a0b257e45050633
SHA256f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
SHA512dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
Filesize
140KB
MD50d0075ea26ef867e92a283adfee277f0
SHA1bc9a42b2a1be0e668bb2be536a0b257e45050633
SHA256f5054c2bb66e494291017caa2e884f35177b5e5afac9b2c2c4bb4698a51baf9c
SHA512dbb1416acf9d663fd8c3c1f2ca34c4f6df569d8a531071c2b0eba9dff3e8abf04706b82319a9ccb16db9fa455104019291c68a8b0961d74ef3eda1568bbbd8bc
-
Filesize
41B
MD5e839977c0d22c9aa497b0b1d90d8a372
SHA1b5048e501399138796b38f3d3666e1a88c397e83
SHA256478db7f82fd7ef4860f7acd2f534ec303175500d7f4e1e36161d31c900d234e2
SHA5124c8ba5a26b6f738f8d25c32d019cee63e9a32d28e3aeb8fe31b965d7603c24a3539e469c8eb569747b47dadc9c43cdd1066ddb37ed8138bee5d0c74b5d0c275d
-
Filesize
41B
MD5e839977c0d22c9aa497b0b1d90d8a372
SHA1b5048e501399138796b38f3d3666e1a88c397e83
SHA256478db7f82fd7ef4860f7acd2f534ec303175500d7f4e1e36161d31c900d234e2
SHA5124c8ba5a26b6f738f8d25c32d019cee63e9a32d28e3aeb8fe31b965d7603c24a3539e469c8eb569747b47dadc9c43cdd1066ddb37ed8138bee5d0c74b5d0c275d
-
Filesize
41B
MD5e839977c0d22c9aa497b0b1d90d8a372
SHA1b5048e501399138796b38f3d3666e1a88c397e83
SHA256478db7f82fd7ef4860f7acd2f534ec303175500d7f4e1e36161d31c900d234e2
SHA5124c8ba5a26b6f738f8d25c32d019cee63e9a32d28e3aeb8fe31b965d7603c24a3539e469c8eb569747b47dadc9c43cdd1066ddb37ed8138bee5d0c74b5d0c275d