Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
18/12/2022, 05:37
Static task
static1
General
-
Target
1157ea0956dc16b02ec3bd423f4918eaa7b2a557ca1434e7712d60f27a9296d5.exe
-
Size
213KB
-
MD5
4be19c225dec3c3f617ca1b69dd3ea80
-
SHA1
4ea93c69cb9a0aa8ea9b29a7aa7cb00d5c644d63
-
SHA256
1157ea0956dc16b02ec3bd423f4918eaa7b2a557ca1434e7712d60f27a9296d5
-
SHA512
45d8ea0577e73f1f43512dc2e27426ca2a9977bc9415ba850261a4f48948d2218437a24f1d78300ed77645620ec1aa11e0cf4fb2d690533d93f04f67880d3b33
-
SSDEEP
6144:6UkMDLfqEkS+buxpCwcUrZOU9g3C6IKU0VB:6UkerYbuupUrgUySfbO
Malware Config
Extracted
danabot
23.236.181.126:443
123.253.35.251:443
66.85.173.3:443
-
embedded_hash
8F56CD73F6B5CD5D7B17B0BA61E70A82
-
type
loader
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/2276-133-0x00000000001F0000-0x00000000001F9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 3 IoCs
flow pid Process 37 4312 rundll32.exe 38 4312 rundll32.exe 57 4312 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 3940 FBD9.exe 4992 agtrsgw -
Loads dropped DLL 1 IoCs
pid Process 4312 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4312 set thread context of 2084 4312 rundll32.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3632 3940 WerFault.exe 87 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI agtrsgw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1157ea0956dc16b02ec3bd423f4918eaa7b2a557ca1434e7712d60f27a9296d5.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1157ea0956dc16b02ec3bd423f4918eaa7b2a557ca1434e7712d60f27a9296d5.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1157ea0956dc16b02ec3bd423f4918eaa7b2a557ca1434e7712d60f27a9296d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI agtrsgw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI agtrsgw -
Checks processor information in registry 2 TTPs 23 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Toolbar Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Process not Found -
Modifies registry class 30 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 820074001c0043465346160031000000000000000000100041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004100700070004400610074006100000042000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e003100000000009255ce34100054656d7000003a0009000400efbe6b55586c9255d4342e0000000000000000000000000000000000000000000000000074dc6900540065006d007000000014000000 Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 Process not Found -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2640 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2276 1157ea0956dc16b02ec3bd423f4918eaa7b2a557ca1434e7712d60f27a9296d5.exe 2276 1157ea0956dc16b02ec3bd423f4918eaa7b2a557ca1434e7712d60f27a9296d5.exe 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found 2640 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2276 1157ea0956dc16b02ec3bd423f4918eaa7b2a557ca1434e7712d60f27a9296d5.exe 4992 agtrsgw -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeShutdownPrivilege 2640 Process not Found Token: SeCreatePagefilePrivilege 2640 Process not Found Token: SeShutdownPrivilege 2640 Process not Found Token: SeCreatePagefilePrivilege 2640 Process not Found Token: SeShutdownPrivilege 2640 Process not Found Token: SeCreatePagefilePrivilege 2640 Process not Found Token: SeShutdownPrivilege 2640 Process not Found Token: SeCreatePagefilePrivilege 2640 Process not Found Token: SeShutdownPrivilege 2640 Process not Found Token: SeCreatePagefilePrivilege 2640 Process not Found Token: SeShutdownPrivilege 2640 Process not Found Token: SeCreatePagefilePrivilege 2640 Process not Found Token: SeShutdownPrivilege 2640 Process not Found Token: SeCreatePagefilePrivilege 2640 Process not Found Token: SeShutdownPrivilege 2640 Process not Found Token: SeCreatePagefilePrivilege 2640 Process not Found Token: SeShutdownPrivilege 2640 Process not Found Token: SeCreatePagefilePrivilege 2640 Process not Found Token: SeShutdownPrivilege 2640 Process not Found Token: SeCreatePagefilePrivilege 2640 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2640 Process not Found 2640 Process not Found -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2640 wrote to memory of 3940 2640 Process not Found 87 PID 2640 wrote to memory of 3940 2640 Process not Found 87 PID 2640 wrote to memory of 3940 2640 Process not Found 87 PID 3940 wrote to memory of 4312 3940 FBD9.exe 88 PID 3940 wrote to memory of 4312 3940 FBD9.exe 88 PID 3940 wrote to memory of 4312 3940 FBD9.exe 88 PID 4312 wrote to memory of 2084 4312 rundll32.exe 91 PID 4312 wrote to memory of 2084 4312 rundll32.exe 91 PID 4312 wrote to memory of 2084 4312 rundll32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1157ea0956dc16b02ec3bd423f4918eaa7b2a557ca1434e7712d60f27a9296d5.exe"C:\Users\Admin\AppData\Local\Temp\1157ea0956dc16b02ec3bd423f4918eaa7b2a557ca1434e7712d60f27a9296d5.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2276
-
C:\Users\Admin\AppData\Local\Temp\FBD9.exeC:\Users\Admin\AppData\Local\Temp\FBD9.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Iseiuaqptde.dll,start2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 202093⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2084
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 4802⤵
- Program crash
PID:3632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3940 -ip 39401⤵PID:3804
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4728
-
C:\Users\Admin\AppData\Roaming\agtrsgwC:\Users\Admin\AppData\Roaming\agtrsgw1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4992
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k LocalService1⤵PID:1108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD51f23647522ffd63d38dbb6febd351649
SHA1581af68907a57e47eb392676c7d7126be0c32f66
SHA256838b5109203cd110392852d09c39c118cca1a47df78c703fd8ef48fae7f01f49
SHA512e020e82cc24b9e835cb11235f0729a8d22147dffb1fa8684fad99527c0a5c55453ff2c44137129e4931f235b4e13af16cb7c0188742cff29207d117a7b369e65
-
Filesize
671KB
MD5c1689ecbd9c73ee736b66fcede0f88ef
SHA15e4bc657ae1374769e739663b8c0e1182bc07a6b
SHA2568b5a811660cc79f4a5db1b34791328efe3b2a1f2caafa276167d7879ce799e4c
SHA512faac9f20a7f5180e6f08a28494258330889ebd21630b318d85053b7438fd73cff7d3f3838ffce74e7cca488f79be6110468d76913dc3c0951d83e70142b0bea0
-
Filesize
2.4MB
MD50bb2b15ca73128dbc816ea4ed583119c
SHA117d05964d9208ca1a27fd007ad5f41752cfa893e
SHA256295dfd4608b81ee276a04f1c58d806b7f906695e744cfe8234eca6360c555ca8
SHA512d58afa63c04cb95576e9a7b5ae026dc28526cee7a26c5e829c091356179f4d255503914398dd209c506743ab78f16cb84d862e2f8ae5f43282bfe2a3e7afe375
-
Filesize
2.4MB
MD50bb2b15ca73128dbc816ea4ed583119c
SHA117d05964d9208ca1a27fd007ad5f41752cfa893e
SHA256295dfd4608b81ee276a04f1c58d806b7f906695e744cfe8234eca6360c555ca8
SHA512d58afa63c04cb95576e9a7b5ae026dc28526cee7a26c5e829c091356179f4d255503914398dd209c506743ab78f16cb84d862e2f8ae5f43282bfe2a3e7afe375
-
Filesize
2.4MB
MD58e6e3352fdfc4a78c88b28385b57593c
SHA170ee7e2dcfac5f197ffd2fb10b80a720d543fbf9
SHA256b2a9f9983a7dcaf330024ac9ba62658d4822eea5554bab1a407381e6457774ab
SHA51239cedc0f5da371c7f1210f9257084d86583a37068625f290903f7b0876e921ef71a5d2d364a55a16b1f90c30c827b586a059d78af1740ba454a45b2ec709fda9
-
Filesize
2.4MB
MD58e6e3352fdfc4a78c88b28385b57593c
SHA170ee7e2dcfac5f197ffd2fb10b80a720d543fbf9
SHA256b2a9f9983a7dcaf330024ac9ba62658d4822eea5554bab1a407381e6457774ab
SHA51239cedc0f5da371c7f1210f9257084d86583a37068625f290903f7b0876e921ef71a5d2d364a55a16b1f90c30c827b586a059d78af1740ba454a45b2ec709fda9
-
Filesize
213KB
MD54be19c225dec3c3f617ca1b69dd3ea80
SHA14ea93c69cb9a0aa8ea9b29a7aa7cb00d5c644d63
SHA2561157ea0956dc16b02ec3bd423f4918eaa7b2a557ca1434e7712d60f27a9296d5
SHA51245d8ea0577e73f1f43512dc2e27426ca2a9977bc9415ba850261a4f48948d2218437a24f1d78300ed77645620ec1aa11e0cf4fb2d690533d93f04f67880d3b33
-
Filesize
213KB
MD54be19c225dec3c3f617ca1b69dd3ea80
SHA14ea93c69cb9a0aa8ea9b29a7aa7cb00d5c644d63
SHA2561157ea0956dc16b02ec3bd423f4918eaa7b2a557ca1434e7712d60f27a9296d5
SHA51245d8ea0577e73f1f43512dc2e27426ca2a9977bc9415ba850261a4f48948d2218437a24f1d78300ed77645620ec1aa11e0cf4fb2d690533d93f04f67880d3b33
-
Filesize
832KB
MD5a34dc11e70eae1756d5dcfb4544e20af
SHA1fe2d9b3e005e54b1985b8eea8d1e524158b96b12
SHA2566d689a2fbb270654499d0cce923ab811e013d701cfaa3ded00555af4d5152ec0
SHA512e311b77da5ce743e8772a612a346d9602d9295bdbbab32f519e3086d297f814f1505ee785bfb0e5d8e2c4f8e78e6a4c837135395bed7675cc21bfa642c817187