Analysis
-
max time kernel
154s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 11:33
Static task
static1
Behavioral task
behavioral1
Sample
ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe
Resource
win10v2004-20220812-en
General
-
Target
ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe
-
Size
408KB
-
MD5
87a3e3d92f26d64f3a06870178ab8cfc
-
SHA1
04f73ee223453b60f791f2d672c90ffbbd99d635
-
SHA256
ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313
-
SHA512
a17e037f2b6fbd382231c6f53039aee25b4212d5284ce649a6ef6ae5c755a43ce4beee39aa3ec6b60177eb1d3b9943626302ca36cc08137421090da315fe04e2
-
SSDEEP
6144:FYp7doardk1z6m4fY5v18RKzd4BoeAFooG/sLk/mDpQMIq1Peh8dd9s+x:euardpwvuR2AopFlGsLkUxNeh6dh
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3496 smss.exe 64 smss.exe -
Adds Run key to start application 2 TTPs 36 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\explorer.sys smss.exe File opened for modification C:\Windows\SysWOW64\explorer.sys smss.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\WINDOWS\Cursors\smss.exe ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe File created C:\WINDOWS\Prefetch\SVCHOST.EXE-2B6L01C596K2.pf ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe -
Modifies registry key 1 TTPs 18 IoCs
pid Process 1108 reg.exe 2572 reg.exe 780 reg.exe 4972 reg.exe 1176 reg.exe 4556 reg.exe 4916 reg.exe 1216 reg.exe 4580 reg.exe 1308 reg.exe 1092 reg.exe 4732 reg.exe 4784 reg.exe 4984 reg.exe 2248 reg.exe 4196 reg.exe 4252 reg.exe 4520 reg.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1096 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 64 smss.exe 3496 smss.exe 64 smss.exe 64 smss.exe 3496 smss.exe 3496 smss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1096 wrote to memory of 4760 1096 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 79 PID 1096 wrote to memory of 4760 1096 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 79 PID 1096 wrote to memory of 4760 1096 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 79 PID 1096 wrote to memory of 4292 1096 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 80 PID 1096 wrote to memory of 4292 1096 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 80 PID 1096 wrote to memory of 4292 1096 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 80 PID 1096 wrote to memory of 4732 1096 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 83 PID 1096 wrote to memory of 4732 1096 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 83 PID 1096 wrote to memory of 4732 1096 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 83 PID 4760 wrote to memory of 1792 4760 cmd.exe 85 PID 4760 wrote to memory of 1792 4760 cmd.exe 85 PID 4760 wrote to memory of 1792 4760 cmd.exe 85 PID 4292 wrote to memory of 372 4292 cmd.exe 86 PID 4292 wrote to memory of 372 4292 cmd.exe 86 PID 4292 wrote to memory of 372 4292 cmd.exe 86 PID 372 wrote to memory of 1884 372 net.exe 87 PID 1792 wrote to memory of 4120 1792 net.exe 88 PID 372 wrote to memory of 1884 372 net.exe 87 PID 372 wrote to memory of 1884 372 net.exe 87 PID 1792 wrote to memory of 4120 1792 net.exe 88 PID 1792 wrote to memory of 4120 1792 net.exe 88 PID 1096 wrote to memory of 4196 1096 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 89 PID 1096 wrote to memory of 4196 1096 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 89 PID 1096 wrote to memory of 4196 1096 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 89 PID 1096 wrote to memory of 3496 1096 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 91 PID 1096 wrote to memory of 3496 1096 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 91 PID 1096 wrote to memory of 3496 1096 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 91 PID 4196 wrote to memory of 64 4196 cmd.exe 92 PID 4196 wrote to memory of 64 4196 cmd.exe 92 PID 4196 wrote to memory of 64 4196 cmd.exe 92 PID 3496 wrote to memory of 4972 3496 smss.exe 97 PID 3496 wrote to memory of 4972 3496 smss.exe 97 PID 3496 wrote to memory of 4972 3496 smss.exe 97 PID 3496 wrote to memory of 1176 3496 smss.exe 99 PID 3496 wrote to memory of 1176 3496 smss.exe 99 PID 3496 wrote to memory of 1176 3496 smss.exe 99 PID 3496 wrote to memory of 2248 3496 smss.exe 101 PID 3496 wrote to memory of 2248 3496 smss.exe 101 PID 3496 wrote to memory of 2248 3496 smss.exe 101 PID 3496 wrote to memory of 1216 3496 smss.exe 103 PID 3496 wrote to memory of 1216 3496 smss.exe 103 PID 3496 wrote to memory of 1216 3496 smss.exe 103 PID 3496 wrote to memory of 4784 3496 smss.exe 105 PID 3496 wrote to memory of 4784 3496 smss.exe 105 PID 3496 wrote to memory of 4784 3496 smss.exe 105 PID 3496 wrote to memory of 4984 3496 smss.exe 107 PID 3496 wrote to memory of 4984 3496 smss.exe 107 PID 3496 wrote to memory of 4984 3496 smss.exe 107 PID 3496 wrote to memory of 4556 3496 smss.exe 109 PID 3496 wrote to memory of 4556 3496 smss.exe 109 PID 3496 wrote to memory of 4556 3496 smss.exe 109 PID 3496 wrote to memory of 4580 3496 smss.exe 111 PID 3496 wrote to memory of 4580 3496 smss.exe 111 PID 3496 wrote to memory of 4580 3496 smss.exe 111 PID 3496 wrote to memory of 4916 3496 smss.exe 116 PID 3496 wrote to memory of 4916 3496 smss.exe 116 PID 3496 wrote to memory of 4916 3496 smss.exe 116 PID 3496 wrote to memory of 1108 3496 smss.exe 121 PID 3496 wrote to memory of 1108 3496 smss.exe 121 PID 3496 wrote to memory of 1108 3496 smss.exe 121 PID 3496 wrote to memory of 2572 3496 smss.exe 123 PID 3496 wrote to memory of 2572 3496 smss.exe 123 PID 3496 wrote to memory of 2572 3496 smss.exe 123 PID 3496 wrote to memory of 4196 3496 smss.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe"C:\Users\Admin\AppData\Local\Temp\ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\cmd.execmd /c net stop "SharedAccess"2⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\net.exenet stop "SharedAccess"3⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SharedAccess"4⤵PID:4120
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "wscsvc"2⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\net.exenet stop "wscsvc"3⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wscsvc"4⤵PID:1884
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe2⤵
- Adds Run key to start application
- Modifies registry key
PID:4732
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\WINDOWS\Cursors\smss.exe && exit2⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\WINDOWS\Cursors\smss.exeC:\WINDOWS\Cursors\smss.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:64
-
-
-
C:\WINDOWS\Cursors\smss.exeC:\WINDOWS\Cursors\smss.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:4972
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:1176
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:2248
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:1216
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:4784
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:4984
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:4556
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:4580
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:4916
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:1108
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:2572
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:4196
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:4252
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:4520
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:1308
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:1092
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:780
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD54b09c9c0a072b527cfb3cbeea416e632
SHA106654533af9e595c57451c578ce91549333792a2
SHA2568ff774a77b3e551f812ffc97720b92b1809b8148729bd64a35733657d10bf2d3
SHA512849627890d195046d130e36610b711b330488b463e583fb214a16cc07b69074ddb0338c6b8c7cf238e02605e0e874462a5ded4d718e7008a02bab09065b003ea
-
Filesize
372B
MD5c3c15654ff786d2a1a05d721ef3b8581
SHA14660b68243a219e7254264f13be933641de912b8
SHA2567783d35b63395d4e848a56da3ecd407dc79c4c6b656bbcf7ca5ad57b230af75a
SHA512d643766149f413f41cf84aec8eceafc33851a5a45bfa6a47da6901d7eab9b5780c7173da560fed31f20d94fe434d01bab70d48a88bf1c58b0aba5a78b0efc510
-
Filesize
104KB
MD54b09c9c0a072b527cfb3cbeea416e632
SHA106654533af9e595c57451c578ce91549333792a2
SHA2568ff774a77b3e551f812ffc97720b92b1809b8148729bd64a35733657d10bf2d3
SHA512849627890d195046d130e36610b711b330488b463e583fb214a16cc07b69074ddb0338c6b8c7cf238e02605e0e874462a5ded4d718e7008a02bab09065b003ea
-
Filesize
104KB
MD54b09c9c0a072b527cfb3cbeea416e632
SHA106654533af9e595c57451c578ce91549333792a2
SHA2568ff774a77b3e551f812ffc97720b92b1809b8148729bd64a35733657d10bf2d3
SHA512849627890d195046d130e36610b711b330488b463e583fb214a16cc07b69074ddb0338c6b8c7cf238e02605e0e874462a5ded4d718e7008a02bab09065b003ea