Analysis
-
max time kernel
167s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 15:33
Static task
static1
Behavioral task
behavioral1
Sample
da04780940bb213204bc5fa9821108d5e9f51c72c4ddcbb36475ed7183fffdf6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
da04780940bb213204bc5fa9821108d5e9f51c72c4ddcbb36475ed7183fffdf6.exe
Resource
win10v2004-20221111-en
General
-
Target
da04780940bb213204bc5fa9821108d5e9f51c72c4ddcbb36475ed7183fffdf6.exe
-
Size
20KB
-
MD5
220a139a07ef5b9caf068eaf9ce1ab70
-
SHA1
4403877c8008ed60bb7d743c5d484ceffd4df5f3
-
SHA256
da04780940bb213204bc5fa9821108d5e9f51c72c4ddcbb36475ed7183fffdf6
-
SHA512
7e8c99c581b6ba177216f10728dbdfdd3e5917db90333fc7bc2fe10294e406b8e62baa14071b1a792310d39d2500fe893efd39ec88450042b28e3ef79e8dad15
-
SSDEEP
192:1l5E3krTuntKy0peHDfCpHfBv+I4QwXt9V+jqu0G5KDJBJd:1M3PnQoHDCpHf4I4Qwdc0G5KDJ1
Malware Config
Signatures
-
Drops file in Drivers directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe da04780940bb213204bc5fa9821108d5e9f51c72c4ddcbb36475ed7183fffdf6.exe -
Executes dropped EXE 4 IoCs
pid Process 2264 winlogon.exe 1804 AE 0124 BE.exe 1152 winlogon.exe 5056 winlogon.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation AE 0124 BE.exe Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation da04780940bb213204bc5fa9821108d5e9f51c72c4ddcbb36475ed7183fffdf6.exe Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation winlogon.exe -
Loads dropped DLL 3 IoCs
pid Process 1804 AE 0124 BE.exe 1152 winlogon.exe 5056 winlogon.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Windows\Downloaded Program Files\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Fonts\desktop.ini AE 0124 BE.exe File opened for modification C:\Windows\Media\Desktop.ini AE 0124 BE.exe -
Drops autorun.inf file 1 TTPs 27 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\G:\Autorun.inf winlogon.exe File opened for modification \??\T:\Autorun.inf winlogon.exe File opened for modification \??\Z:\Autorun.inf winlogon.exe File opened for modification \??\Y:\Autorun.inf winlogon.exe File opened for modification \??\F:\Autorun.inf winlogon.exe File opened for modification \??\H:\Autorun.inf winlogon.exe File opened for modification \??\K:\Autorun.inf winlogon.exe File opened for modification \??\P:\Autorun.inf winlogon.exe File opened for modification \??\S:\Autorun.inf winlogon.exe File opened for modification \??\U:\Autorun.inf winlogon.exe File opened for modification \??\V:\Autorun.inf winlogon.exe File opened for modification \??\E:\Autorun.inf winlogon.exe File opened for modification \??\X:\Autorun.inf winlogon.exe File opened for modification \??\A:\Autorun.inf winlogon.exe File opened for modification C:\Autorun.inf winlogon.exe File opened for modification \??\Q:\Autorun.inf winlogon.exe File opened for modification \??\W:\Autorun.inf winlogon.exe File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\autorun.inf AE 0124 BE.exe File opened for modification \??\J:\Autorun.inf winlogon.exe File opened for modification \??\N:\Autorun.inf winlogon.exe File opened for modification \??\R:\Autorun.inf winlogon.exe File opened for modification D:\Autorun.inf winlogon.exe File opened for modification \??\I:\Autorun.inf winlogon.exe File opened for modification \??\M:\Autorun.inf winlogon.exe File opened for modification \??\B:\Autorun.inf winlogon.exe File opened for modification \??\L:\Autorun.inf winlogon.exe File opened for modification \??\O:\Autorun.inf winlogon.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\regedit.exe AE 0124 BE.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\INF\netrtwlane_13.inf AE 0124 BE.exe File opened for modification C:\Windows\INF\PERFLIB\0C0A AE 0124 BE.exe File opened for modification C:\Windows\INF\PNRPSvc\0407 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationFramework.Aero2\v4.0_4.0.0.0__31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ASP.NETWebAdminFiles\default.aspx AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe AE 0124 BE.exe File opened for modification C:\Windows\apppatch\ja-JP\AcRes.dll.mui AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Speech\ja-JP AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationBuildTasks.resources\v4.0_4.0.0.0_ja_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ja\System.ComponentModel.Composition.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Data\f091eefc9995f0971e4c1a5d394ca967\System.Data.ni.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_32\System.Printing\v4.0_4.0.0.0__31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\DE\System.EnterpriseServices.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\1033\cscui.dll AE 0124 BE.exe File opened for modification C:\Windows\Cursors\size4_i.cur AE 0124 BE.exe File opened for modification C:\Windows\ImmersiveControlPanel\images\logo.contrast-white_scale-150.png AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Workflow.Runtime AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xml AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Workflow.Runtime.resources\v4.0_4.0.0.0_de_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.WorkflowServices\v4.0_4.0.0.0__31bf3856ad364e35\System.WorkflowServices.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\WindowsBase.Resources\3.0.0.0_es_31bf3856ad364e35\WindowsBase.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\INF\c_system.inf AE 0124 BE.exe File opened for modification C:\Windows\INF\c_wceusbs.inf AE 0124 BE.exe File opened for modification C:\Windows\Installer\b77b.msi AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xml.XPath AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\3082 AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.ManagementConsole.Resources\3.0.0.0_ja_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\Audio\es-ES AE 0124 BE.exe File opened for modification C:\Windows\Help\mui\0407\mmc.CHM AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Tpm.Commands.Resources\v4.0_10.0.0.0_de_31bf3856ad364e35\Microsoft.Tpm.Commands.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\dfsvc.exe.config AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\SQL\en\SqlWorkflowInstanceStoreSchemaUpgrade.sql AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\es\InstallUtil.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Transactions.Resources AE 0124 BE.exe File opened for modification C:\Windows\Media\Windows Ringin.wav AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer.Resources\v4.0_10.0.0.0_de_31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationUI.resources\v4.0_4.0.0.0_it_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Security\Roles\App_LocalResources\manageSingleRole.aspx.es.resx AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Security\Users\App_LocalResources\addUser.aspx.es.resx AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.Entity.resources\v4.0_4.0.0.0_de_b77a5c561934e089 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Web.resources\v4.0_4.0.0.0_ja_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\BITS\es-ES\CL_LocalizationData.psd1 AE 0124 BE.exe File opened for modification C:\Windows\diagnostics\system\PCW\VF_ProgramCompatibilityWizard.ps1 AE 0124 BE.exe File opened for modification C:\Windows\Globalization\Time Zone AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer.Resources\v4.0_10.0.0.0_en_31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.resources.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\aspnet_compiler.resources\v4.0_4.0.0.0_es_b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Workflow.ServiceCore.Resources\v4.0_3.0.0.0_ja_31bf3856ad364e35\Microsoft.PowerShell.Workflow.ServiceCore.Resources.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xaml.Hosting.resources\v4.0_4.0.0.0_fr_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Security\Wizard\App_LocalResources\wizardCreateRoles.ascx.resx AE 0124 BE.exe File opened for modification C:\Windows\apppatch\Custom\Custom64 AE 0124 BE.exe File opened for modification C:\Windows\Cursors\aero_arrow.cur AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.CertificateServices.PKIClient.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\pki.psd1 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.NetTcp\v4.0_4.0.0.0__b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\System.ServiceModel.WasHosting.dll AE 0124 BE.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Data.Entity.Resources\3.5.0.0_ja_b77a5c561934e089 AE 0124 BE.exe File opened for modification C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.W708fc392#\e0d84dc25c6b76503171beec9d740dde\Microsoft.Windows.Diagnosis.Commands.WriteDiagProgress.ni.dll AE 0124 BE.exe File opened for modification C:\Windows\INF\hdaudss.inf AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Activities.Build.resources\v4.0_4.0.0.0_fr_31bf3856ad364e35 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Office.Tools.Word\v4.0_10.0.0.0__b03f5f7f11d50a3a AE 0124 BE.exe File opened for modification C:\Windows\INF\hidbatt.PNF AE 0124 BE.exe File opened for modification C:\Windows\INF\ServiceModelEndpoint 3.0.0.0 AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Diagnostics.Process\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Diagnostics.Process.dll AE 0124 BE.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\JA\aspnet_compiler.resources.dll AE 0124 BE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ AE 0124 BE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ da04780940bb213204bc5fa9821108d5e9f51c72c4ddcbb36475ed7183fffdf6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winlogon.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3120 da04780940bb213204bc5fa9821108d5e9f51c72c4ddcbb36475ed7183fffdf6.exe 2264 winlogon.exe 1804 AE 0124 BE.exe 1152 winlogon.exe 5056 winlogon.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3120 wrote to memory of 2264 3120 da04780940bb213204bc5fa9821108d5e9f51c72c4ddcbb36475ed7183fffdf6.exe 83 PID 3120 wrote to memory of 2264 3120 da04780940bb213204bc5fa9821108d5e9f51c72c4ddcbb36475ed7183fffdf6.exe 83 PID 3120 wrote to memory of 2264 3120 da04780940bb213204bc5fa9821108d5e9f51c72c4ddcbb36475ed7183fffdf6.exe 83 PID 2264 wrote to memory of 1804 2264 winlogon.exe 84 PID 2264 wrote to memory of 1804 2264 winlogon.exe 84 PID 2264 wrote to memory of 1804 2264 winlogon.exe 84 PID 2264 wrote to memory of 1152 2264 winlogon.exe 85 PID 2264 wrote to memory of 1152 2264 winlogon.exe 85 PID 2264 wrote to memory of 1152 2264 winlogon.exe 85 PID 1804 wrote to memory of 5056 1804 AE 0124 BE.exe 86 PID 1804 wrote to memory of 5056 1804 AE 0124 BE.exe 86 PID 1804 wrote to memory of 5056 1804 AE 0124 BE.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\da04780940bb213204bc5fa9821108d5e9f51c72c4ddcbb36475ed7183fffdf6.exe"C:\Users\Admin\AppData\Local\Temp\da04780940bb213204bc5fa9821108d5e9f51c72c4ddcbb36475ed7183fffdf6.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Drops autorun.inf file
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\AE 0124 BE.exe"C:\Windows\AE 0124 BE.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:5056
-
-
-
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1152
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD51531a2a0d29fe54497ae5a6c38c61e6a
SHA1c1b04833da80e78a2382975abc6237eb9cab8544
SHA256e37006e05fcb85f5a982908ec598229b23fc0a646b46d7a6c35816160d77a253
SHA5120623459386175a91488c7fa8c10a4461aad8060163611f58914e49461d12f7af956ee816acaf18fd100f59ed69a06d3e139ad6210df68f41abc41fafdda4f46e
-
Filesize
40KB
MD51531a2a0d29fe54497ae5a6c38c61e6a
SHA1c1b04833da80e78a2382975abc6237eb9cab8544
SHA256e37006e05fcb85f5a982908ec598229b23fc0a646b46d7a6c35816160d77a253
SHA5120623459386175a91488c7fa8c10a4461aad8060163611f58914e49461d12f7af956ee816acaf18fd100f59ed69a06d3e139ad6210df68f41abc41fafdda4f46e
-
Filesize
40KB
MD51826e334f3ab77524b294ef6b5a0f0f7
SHA11b1e1ed114527772161a53c29d78b791a90139f1
SHA25643c701cf516c9bf7f751bfa131f90559f27e5e0b6bafa4e05d9c261b42ae5825
SHA5121f548148bf61879e6f4584360fdbf827495fef3279e6b8aa5b86597ee88ce07bcc50a2be2c8b9104c0a21f18b0281827331ed82c944bf740b5d2da3a7eff1dee
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
40KB
MD51531a2a0d29fe54497ae5a6c38c61e6a
SHA1c1b04833da80e78a2382975abc6237eb9cab8544
SHA256e37006e05fcb85f5a982908ec598229b23fc0a646b46d7a6c35816160d77a253
SHA5120623459386175a91488c7fa8c10a4461aad8060163611f58914e49461d12f7af956ee816acaf18fd100f59ed69a06d3e139ad6210df68f41abc41fafdda4f46e
-
Filesize
40KB
MD51531a2a0d29fe54497ae5a6c38c61e6a
SHA1c1b04833da80e78a2382975abc6237eb9cab8544
SHA256e37006e05fcb85f5a982908ec598229b23fc0a646b46d7a6c35816160d77a253
SHA5120623459386175a91488c7fa8c10a4461aad8060163611f58914e49461d12f7af956ee816acaf18fd100f59ed69a06d3e139ad6210df68f41abc41fafdda4f46e
-
Filesize
40KB
MD51531a2a0d29fe54497ae5a6c38c61e6a
SHA1c1b04833da80e78a2382975abc6237eb9cab8544
SHA256e37006e05fcb85f5a982908ec598229b23fc0a646b46d7a6c35816160d77a253
SHA5120623459386175a91488c7fa8c10a4461aad8060163611f58914e49461d12f7af956ee816acaf18fd100f59ed69a06d3e139ad6210df68f41abc41fafdda4f46e
-
Filesize
40KB
MD51531a2a0d29fe54497ae5a6c38c61e6a
SHA1c1b04833da80e78a2382975abc6237eb9cab8544
SHA256e37006e05fcb85f5a982908ec598229b23fc0a646b46d7a6c35816160d77a253
SHA5120623459386175a91488c7fa8c10a4461aad8060163611f58914e49461d12f7af956ee816acaf18fd100f59ed69a06d3e139ad6210df68f41abc41fafdda4f46e
-
Filesize
25B
MD5589b6886a49054d03b739309a1de9fcc
SHA10ec1dff7a03f13dea28eea5e754d5b0e5e1dc308
SHA256564815feb9c5bdadb145cd0d16738c4e5fbc6a46cf65c62ac6a985c43d1939e8
SHA5124b6f567398863aba39eec00e9f071364b79d5c29867b93fb968725e10e33a9bfff60f8ab6acceae44e715a35ec7139d12da06c33fa074b6be02ff5357c53c0eb
-
Filesize
25B
MD5589b6886a49054d03b739309a1de9fcc
SHA10ec1dff7a03f13dea28eea5e754d5b0e5e1dc308
SHA256564815feb9c5bdadb145cd0d16738c4e5fbc6a46cf65c62ac6a985c43d1939e8
SHA5124b6f567398863aba39eec00e9f071364b79d5c29867b93fb968725e10e33a9bfff60f8ab6acceae44e715a35ec7139d12da06c33fa074b6be02ff5357c53c0eb