Analysis
-
max time kernel
150s -
max time network
99s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
31/12/2022, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
13942eba94d3c13cedda849761d56f66b58961c379aa75dcff0f4eb89d21e514.exe
Resource
win10-20220812-en
General
-
Target
13942eba94d3c13cedda849761d56f66b58961c379aa75dcff0f4eb89d21e514.exe
-
Size
255KB
-
MD5
bd3db429f581640d3eb1776b3ccb40df
-
SHA1
2b4652ad817110ad673d8be392e42bd2f781ded8
-
SHA256
13942eba94d3c13cedda849761d56f66b58961c379aa75dcff0f4eb89d21e514
-
SHA512
ba3f978eb738fea15561b40d2ac55afbc4548bf0863ca5746dcb4f29a6a74e1c4322f8f8b8d816dd5086825a8caf484226ac087547be7521c93b54c6a33bb7c4
-
SSDEEP
3072:a5wTPtgnLVJiilLR7Kzip1dKOGZk/97olmqW9IpnN27hZY:JgLaillK+RCZk/97vTIBoZY
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/2656-147-0x00000000006D0000-0x00000000006D9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2072 D49A.exe 4684 Iqpoqhfidqa.exe -
Deletes itself 1 IoCs
pid Process 2420 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2072 set thread context of 3000 2072 D49A.exe 75 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
pid pid_target Process procid_target 1228 2072 WerFault.exe 66 4036 2072 WerFault.exe 66 4192 2072 WerFault.exe 66 4232 2072 WerFault.exe 66 4248 2072 WerFault.exe 66 4260 2072 WerFault.exe 66 3044 2072 WerFault.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 13942eba94d3c13cedda849761d56f66b58961c379aa75dcff0f4eb89d21e514.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 13942eba94d3c13cedda849761d56f66b58961c379aa75dcff0f4eb89d21e514.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 13942eba94d3c13cedda849761d56f66b58961c379aa75dcff0f4eb89d21e514.exe -
Checks processor information in registry 2 TTPs 44 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier D49A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data D49A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz D49A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier D49A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status D49A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 D49A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 D49A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier D49A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data D49A.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier D49A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet D49A.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor D49A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information D49A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status D49A.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 D49A.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 D49A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 D49A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information D49A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz D49A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision D49A.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 D49A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString D49A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor D49A.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Toolbar Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" Process not Found -
Modifies registry class 20 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Process not Found Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Process not Found Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Process not Found Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Process not Found Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Process not Found -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2420 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2656 13942eba94d3c13cedda849761d56f66b58961c379aa75dcff0f4eb89d21e514.exe 2656 13942eba94d3c13cedda849761d56f66b58961c379aa75dcff0f4eb89d21e514.exe 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2420 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2656 13942eba94d3c13cedda849761d56f66b58961c379aa75dcff0f4eb89d21e514.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4684 Iqpoqhfidqa.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4684 Iqpoqhfidqa.exe 3000 rundll32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4684 Iqpoqhfidqa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2420 Process not Found 2420 Process not Found -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2072 2420 Process not Found 66 PID 2420 wrote to memory of 2072 2420 Process not Found 66 PID 2420 wrote to memory of 2072 2420 Process not Found 66 PID 2072 wrote to memory of 4684 2072 D49A.exe 74 PID 2072 wrote to memory of 4684 2072 D49A.exe 74 PID 2072 wrote to memory of 4684 2072 D49A.exe 74 PID 2072 wrote to memory of 3000 2072 D49A.exe 75 PID 2072 wrote to memory of 3000 2072 D49A.exe 75 PID 2072 wrote to memory of 3000 2072 D49A.exe 75 PID 2072 wrote to memory of 3000 2072 D49A.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\13942eba94d3c13cedda849761d56f66b58961c379aa75dcff0f4eb89d21e514.exe"C:\Users\Admin\AppData\Local\Temp\13942eba94d3c13cedda849761d56f66b58961c379aa75dcff0f4eb89d21e514.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2656
-
C:\Users\Admin\AppData\Local\Temp\D49A.exeC:\Users\Admin\AppData\Local\Temp\D49A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 9962⤵
- Program crash
PID:1228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 10082⤵
- Program crash
PID:4036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 10842⤵
- Program crash
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 11242⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 11042⤵
- Program crash
PID:4248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 11922⤵
- Program crash
PID:4260
-
-
C:\Users\Admin\AppData\Local\Temp\Iqpoqhfidqa.exe"C:\Users\Admin\AppData\Local\Temp\Iqpoqhfidqa.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4684
-
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 14442⤵
- Program crash
PID:3044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD568b2d64b878603ee02fcebb9899c38e1
SHA1fb517f2c2a85e6dc1d78096e8f92dbd860bccb48
SHA256ceb103d831d43292b43e7c04016f586f89f7b6ca382905c51399e6fe13e471c6
SHA5120e6db2b4484db790fc8ebeeee1d073986e4971766927d2ff4f7bcb08ec66e30a16a80d03b6866748fbbc91a59b0f11afb241ee9bb3b4d8783222c83a3e16e6fd
-
Filesize
3KB
MD52bf467eb5b9849766bbeaf369f660932
SHA1379ecc09f68d991e26b042e05733249f24abf6f1
SHA256d94477eb5e0e2211a80cceeaaa6e4ca2d3a2fa601399a3c3d305b91c79f729fb
SHA512a61ee3201065c8e6a486d7e51273ff753364af636247cb7181fa92d0c21a60e76b5c7b46a21cd6e0c6b8de7b32f92738129983e7ccb7ac992cd1061b4aa33f98
-
Filesize
6.7MB
MD5b7b91e43de4b4eed1a8e57ecd93c45a3
SHA1eeedab7d2f864dae66666e23a3684bb3b1014cca
SHA256b896146165c8f4b760f91b8999b7a3e50c4da4a7fb1beb5e794955c2bf18517c
SHA512d98401f531ac9c0cede432e22cd7e954da7eda2c71bce352dd40f640e9b8d80e511b60844f069b804b7d9014947a35165bd145a2313411e12bfd0b9644a3c343
-
Filesize
6.7MB
MD5b7b91e43de4b4eed1a8e57ecd93c45a3
SHA1eeedab7d2f864dae66666e23a3684bb3b1014cca
SHA256b896146165c8f4b760f91b8999b7a3e50c4da4a7fb1beb5e794955c2bf18517c
SHA512d98401f531ac9c0cede432e22cd7e954da7eda2c71bce352dd40f640e9b8d80e511b60844f069b804b7d9014947a35165bd145a2313411e12bfd0b9644a3c343
-
Filesize
1.4MB
MD5526b7ca434081a2cde3a52401145e6d1
SHA14a56c2f0a375fd61e8c735b8e01b82c5d937f23d
SHA25657c3c745da3abd3efb910c157bad430f5dc74a3aab48334e4f8f1a93c68d7d67
SHA51257b54dcdd7f99cde495e202e2e8f85278afdd6a4bd31c9593975d890942cecac0a482602ddf0e6f04dc4b37517414b65949a2c506c9c7f04197ec53845834f2d
-
Filesize
1.4MB
MD5526b7ca434081a2cde3a52401145e6d1
SHA14a56c2f0a375fd61e8c735b8e01b82c5d937f23d
SHA25657c3c745da3abd3efb910c157bad430f5dc74a3aab48334e4f8f1a93c68d7d67
SHA51257b54dcdd7f99cde495e202e2e8f85278afdd6a4bd31c9593975d890942cecac0a482602ddf0e6f04dc4b37517414b65949a2c506c9c7f04197ec53845834f2d
-
Filesize
3.5MB
MD5e46489e6f67972c624a8ef215d26db53
SHA1304fdfc6918d97480f65c80891baeb63e55ee3e0
SHA256c34565954052e885c9978fc2b50cf32cc98a67ba9851689101ed5bfffa9bdce4
SHA5126c65ad50bde38b2d6b5880f998e67ac431daa783be6baf925a84f1bb439b04806d1a612f4537363940325bb2aa6d1e692379215a63d1e80ac997fc1a9eb47ac1
-
Filesize
25KB
MD55b23c3c0737a95edb85275ec17c2923b
SHA1c0ce1821e48a1cc74c7470a74e3cd37f19a4b65f
SHA256c25b7fbfc7f07cf3e1effa0e3d6471690900cf5125e78221f4a3c83c8455151e
SHA512dd2b15441a4e3de3c86957b1f7c3061778985681e1f9ab80c6f04d0f1456d337fda7c30e6fca8b82fc26f8bfc9014cee17ccf0e1c60b319dab5eb24a61c832f0
-
Filesize
1KB
MD5c9890816476283f7abd8cd6a6f8925da
SHA1c64f783fe4b77871917a398a6cda64f72e29caf2
SHA256784f75a13d595f338fcd00f299c5e49d3c29b1820d396267be66aa920feb2317
SHA51247da4f52ba86cb288bf3bc4bf5f58dd0791ebf5beb968e771e9da1443631761f15b2b74f2cbe23768dce293d5092ff41276e5a7bb8e68526a648242b2b9a7eed