Analysis
-
max time kernel
168s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe
-
Size
216KB
-
MD5
4b28fb3cdcf9813756a9fe13659a710b
-
SHA1
e3768d1fe2491b376f79c3e1518999fc524a8b9e
-
SHA256
c70e39a8d1d215a851fe3746b0bc5137c1e26f243ffbbb32113c69a450d6d6d1
-
SHA512
5aeb51ac0eb809614657246fc3e7c7245415b6eeebc8653219371aeb8ed171856c2aca1f04711aa12c6449c336c086f0fa2c922bb765e0fe19be700a26e3e20a
-
SSDEEP
3072:jEGh0oYl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGalEeKcAEcGy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BC300F9B-94B6-42bc-95F4-57548A46D161} 2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A2B248FF-9212-4b76-9D15-B245E737384D}\stubpath = "C:\\Windows\\{A2B248FF-9212-4b76-9D15-B245E737384D}.exe" {66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C00692F1-C1DF-487f-80FD-A2A2EAD10192} {947CE26D-A281-4a21-86BA-73B200D20293}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{75E9A09F-800B-47b7-BC73-991D7957B1A6} {C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0352F02-3831-4928-8FFB-A4584A37A702} {75E9A09F-800B-47b7-BC73-991D7957B1A6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{64CC959B-2C60-407b-B3A5-E276003746A0} {BC300F9B-94B6-42bc-95F4-57548A46D161}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}\stubpath = "C:\\Windows\\{66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exe" {64CC959B-2C60-407b-B3A5-E276003746A0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{947CE26D-A281-4a21-86BA-73B200D20293} {A2B248FF-9212-4b76-9D15-B245E737384D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BC300F9B-94B6-42bc-95F4-57548A46D161}\stubpath = "C:\\Windows\\{BC300F9B-94B6-42bc-95F4-57548A46D161}.exe" 2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{64CC959B-2C60-407b-B3A5-E276003746A0}\stubpath = "C:\\Windows\\{64CC959B-2C60-407b-B3A5-E276003746A0}.exe" {BC300F9B-94B6-42bc-95F4-57548A46D161}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652} {64CC959B-2C60-407b-B3A5-E276003746A0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A2B248FF-9212-4b76-9D15-B245E737384D} {66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{947CE26D-A281-4a21-86BA-73B200D20293}\stubpath = "C:\\Windows\\{947CE26D-A281-4a21-86BA-73B200D20293}.exe" {A2B248FF-9212-4b76-9D15-B245E737384D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{75E9A09F-800B-47b7-BC73-991D7957B1A6}\stubpath = "C:\\Windows\\{75E9A09F-800B-47b7-BC73-991D7957B1A6}.exe" {C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0352F02-3831-4928-8FFB-A4584A37A702}\stubpath = "C:\\Windows\\{A0352F02-3831-4928-8FFB-A4584A37A702}.exe" {75E9A09F-800B-47b7-BC73-991D7957B1A6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C00692F1-C1DF-487f-80FD-A2A2EAD10192}\stubpath = "C:\\Windows\\{C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exe" {947CE26D-A281-4a21-86BA-73B200D20293}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3771F344-10CA-408b-8F7D-2F0A7ABA6448} {A0352F02-3831-4928-8FFB-A4584A37A702}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3771F344-10CA-408b-8F7D-2F0A7ABA6448}\stubpath = "C:\\Windows\\{3771F344-10CA-408b-8F7D-2F0A7ABA6448}.exe" {A0352F02-3831-4928-8FFB-A4584A37A702}.exe -
Executes dropped EXE 8 IoCs
pid Process 2604 {BC300F9B-94B6-42bc-95F4-57548A46D161}.exe 4552 {64CC959B-2C60-407b-B3A5-E276003746A0}.exe 1092 {66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exe 1788 {A2B248FF-9212-4b76-9D15-B245E737384D}.exe 1716 {947CE26D-A281-4a21-86BA-73B200D20293}.exe 3348 {C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exe 3684 {75E9A09F-800B-47b7-BC73-991D7957B1A6}.exe 376 {A0352F02-3831-4928-8FFB-A4584A37A702}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{64CC959B-2C60-407b-B3A5-E276003746A0}.exe {BC300F9B-94B6-42bc-95F4-57548A46D161}.exe File created C:\Windows\{A2B248FF-9212-4b76-9D15-B245E737384D}.exe {66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exe File created C:\Windows\{C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exe {947CE26D-A281-4a21-86BA-73B200D20293}.exe File created C:\Windows\{75E9A09F-800B-47b7-BC73-991D7957B1A6}.exe {C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exe File created C:\Windows\{A0352F02-3831-4928-8FFB-A4584A37A702}.exe {75E9A09F-800B-47b7-BC73-991D7957B1A6}.exe File created C:\Windows\{BC300F9B-94B6-42bc-95F4-57548A46D161}.exe 2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe File created C:\Windows\{66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exe {64CC959B-2C60-407b-B3A5-E276003746A0}.exe File created C:\Windows\{947CE26D-A281-4a21-86BA-73B200D20293}.exe {A2B248FF-9212-4b76-9D15-B245E737384D}.exe File created C:\Windows\{3771F344-10CA-408b-8F7D-2F0A7ABA6448}.exe {A0352F02-3831-4928-8FFB-A4584A37A702}.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1820 2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe Token: SeIncBasePriorityPrivilege 2604 {BC300F9B-94B6-42bc-95F4-57548A46D161}.exe Token: SeIncBasePriorityPrivilege 4552 {64CC959B-2C60-407b-B3A5-E276003746A0}.exe Token: SeIncBasePriorityPrivilege 1092 {66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exe Token: SeIncBasePriorityPrivilege 1788 {A2B248FF-9212-4b76-9D15-B245E737384D}.exe Token: SeIncBasePriorityPrivilege 1716 {947CE26D-A281-4a21-86BA-73B200D20293}.exe Token: SeIncBasePriorityPrivilege 3348 {C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exe Token: SeIncBasePriorityPrivilege 3684 {75E9A09F-800B-47b7-BC73-991D7957B1A6}.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2604 1820 2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe 96 PID 1820 wrote to memory of 2604 1820 2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe 96 PID 1820 wrote to memory of 2604 1820 2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe 96 PID 1820 wrote to memory of 4584 1820 2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe 97 PID 1820 wrote to memory of 4584 1820 2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe 97 PID 1820 wrote to memory of 4584 1820 2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe 97 PID 2604 wrote to memory of 4552 2604 {BC300F9B-94B6-42bc-95F4-57548A46D161}.exe 98 PID 2604 wrote to memory of 4552 2604 {BC300F9B-94B6-42bc-95F4-57548A46D161}.exe 98 PID 2604 wrote to memory of 4552 2604 {BC300F9B-94B6-42bc-95F4-57548A46D161}.exe 98 PID 2604 wrote to memory of 4476 2604 {BC300F9B-94B6-42bc-95F4-57548A46D161}.exe 99 PID 2604 wrote to memory of 4476 2604 {BC300F9B-94B6-42bc-95F4-57548A46D161}.exe 99 PID 2604 wrote to memory of 4476 2604 {BC300F9B-94B6-42bc-95F4-57548A46D161}.exe 99 PID 4552 wrote to memory of 1092 4552 {64CC959B-2C60-407b-B3A5-E276003746A0}.exe 101 PID 4552 wrote to memory of 1092 4552 {64CC959B-2C60-407b-B3A5-E276003746A0}.exe 101 PID 4552 wrote to memory of 1092 4552 {64CC959B-2C60-407b-B3A5-E276003746A0}.exe 101 PID 4552 wrote to memory of 3360 4552 {64CC959B-2C60-407b-B3A5-E276003746A0}.exe 100 PID 4552 wrote to memory of 3360 4552 {64CC959B-2C60-407b-B3A5-E276003746A0}.exe 100 PID 4552 wrote to memory of 3360 4552 {64CC959B-2C60-407b-B3A5-E276003746A0}.exe 100 PID 1092 wrote to memory of 1788 1092 {66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exe 106 PID 1092 wrote to memory of 1788 1092 {66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exe 106 PID 1092 wrote to memory of 1788 1092 {66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exe 106 PID 1092 wrote to memory of 1976 1092 {66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exe 107 PID 1092 wrote to memory of 1976 1092 {66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exe 107 PID 1092 wrote to memory of 1976 1092 {66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exe 107 PID 1788 wrote to memory of 1716 1788 {A2B248FF-9212-4b76-9D15-B245E737384D}.exe 108 PID 1788 wrote to memory of 1716 1788 {A2B248FF-9212-4b76-9D15-B245E737384D}.exe 108 PID 1788 wrote to memory of 1716 1788 {A2B248FF-9212-4b76-9D15-B245E737384D}.exe 108 PID 1788 wrote to memory of 3796 1788 {A2B248FF-9212-4b76-9D15-B245E737384D}.exe 109 PID 1788 wrote to memory of 3796 1788 {A2B248FF-9212-4b76-9D15-B245E737384D}.exe 109 PID 1788 wrote to memory of 3796 1788 {A2B248FF-9212-4b76-9D15-B245E737384D}.exe 109 PID 1716 wrote to memory of 3348 1716 {947CE26D-A281-4a21-86BA-73B200D20293}.exe 113 PID 1716 wrote to memory of 3348 1716 {947CE26D-A281-4a21-86BA-73B200D20293}.exe 113 PID 1716 wrote to memory of 3348 1716 {947CE26D-A281-4a21-86BA-73B200D20293}.exe 113 PID 1716 wrote to memory of 3408 1716 {947CE26D-A281-4a21-86BA-73B200D20293}.exe 114 PID 1716 wrote to memory of 3408 1716 {947CE26D-A281-4a21-86BA-73B200D20293}.exe 114 PID 1716 wrote to memory of 3408 1716 {947CE26D-A281-4a21-86BA-73B200D20293}.exe 114 PID 3348 wrote to memory of 3684 3348 {C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exe 115 PID 3348 wrote to memory of 3684 3348 {C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exe 115 PID 3348 wrote to memory of 3684 3348 {C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exe 115 PID 3348 wrote to memory of 4784 3348 {C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exe 116 PID 3348 wrote to memory of 4784 3348 {C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exe 116 PID 3348 wrote to memory of 4784 3348 {C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exe 116 PID 3684 wrote to memory of 376 3684 {75E9A09F-800B-47b7-BC73-991D7957B1A6}.exe 123 PID 3684 wrote to memory of 376 3684 {75E9A09F-800B-47b7-BC73-991D7957B1A6}.exe 123 PID 3684 wrote to memory of 376 3684 {75E9A09F-800B-47b7-BC73-991D7957B1A6}.exe 123 PID 3684 wrote to memory of 3648 3684 {75E9A09F-800B-47b7-BC73-991D7957B1A6}.exe 124 PID 3684 wrote to memory of 3648 3684 {75E9A09F-800B-47b7-BC73-991D7957B1A6}.exe 124 PID 3684 wrote to memory of 3648 3684 {75E9A09F-800B-47b7-BC73-991D7957B1A6}.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\{BC300F9B-94B6-42bc-95F4-57548A46D161}.exeC:\Windows\{BC300F9B-94B6-42bc-95F4-57548A46D161}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\{64CC959B-2C60-407b-B3A5-E276003746A0}.exeC:\Windows\{64CC959B-2C60-407b-B3A5-E276003746A0}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{64CC9~1.EXE > nul4⤵PID:3360
-
-
C:\Windows\{66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exeC:\Windows\{66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\{A2B248FF-9212-4b76-9D15-B245E737384D}.exeC:\Windows\{A2B248FF-9212-4b76-9D15-B245E737384D}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\{947CE26D-A281-4a21-86BA-73B200D20293}.exeC:\Windows\{947CE26D-A281-4a21-86BA-73B200D20293}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\{C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exeC:\Windows\{C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\{75E9A09F-800B-47b7-BC73-991D7957B1A6}.exeC:\Windows\{75E9A09F-800B-47b7-BC73-991D7957B1A6}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\{A0352F02-3831-4928-8FFB-A4584A37A702}.exeC:\Windows\{A0352F02-3831-4928-8FFB-A4584A37A702}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
PID:376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{75E9A~1.EXE > nul9⤵PID:3648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C0069~1.EXE > nul8⤵PID:4784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{947CE~1.EXE > nul7⤵PID:3408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A2B24~1.EXE > nul6⤵PID:3796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{66BEC~1.EXE > nul5⤵PID:1976
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BC300~1.EXE > nul3⤵PID:4476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:4584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD59097253b8423448299beb8651233d885
SHA14eb63d11513c9408f624c38cc445fc11d8e52bfa
SHA25680ed34325f44a7172c0cb6f56a576c2be2a5e8cbae04fd25041bc34590c1d352
SHA5126405fc159bbc1598c95ce5af66dabed6a73688360e7d4edad440da091848a0a805e5d1a601d82207953e9fac02ed7e931ee105bbcc9cc8a85c2937f4641469ce
-
Filesize
216KB
MD5fb7abe0a5a0fbb4ceb6ffab2432df4a0
SHA16752940c4cabe51304bec50e480c173129a97165
SHA2561ed3aba46ffd655ab5450cb05c0ca5537482c2dd53d5a104338174beaf806c2a
SHA512bbbc0af549c4b29d59489eea89ed914c6b7643e2e142a8fc1e50cd0d248ec848443e69c24a69c988d95c1227a520827f3891519486d5876e5f6f814cfe7b08dd
-
Filesize
216KB
MD5f347357d27672839973567120e741f8a
SHA11578c063f68fd14a052695a373aa6aa7270b62e8
SHA256fe21302db29c2c0bc6f8828dd68cf8ae392976c22fb229fbc387aca481c5c28b
SHA5126385986b85f88b48dd4de34d8bb58717805e99405de22ecf0950194c4e5e4dd70f624fba4ea6b6040262a53ffe4e8b67534069820444ae7725133f998eb141b1
-
Filesize
216KB
MD5f0d0510b0a5c173dae060898342e4da4
SHA1a63d27c1c4624a2f1a647c45b8400a5ab3d46067
SHA2569dedf6835970fef2243bf0bf9dd8a480dbe114abe1d1314ab684504768877024
SHA51298d3031e9f63f981ec42f43d14aa897ee679799092ec064ebba6257155271f3c223f35a3969cc59c6af2334bfeb93b99f37b24c9d87934f76271b74a84ef2931
-
Filesize
216KB
MD5708c7b4956e0e45fd0aaaa40e27ac31c
SHA1998084f98903298753a6ba52f4bd5a27c9cadbc3
SHA2567027ab635bed8c45b6852e345aaaa0efd4cd3261b97cd3da5bcf91fcbd01955c
SHA512f0ace378056c4be8605f5d5b4a93b53ab2b9837e0c7af72d88f9a478b7bac3617e77e55228a0c6e5f548b313d2367d1afbac6eb572168dbc08a88b7663d44da7
-
Filesize
216KB
MD57456f649e98c26a9763921e4ff1bc58d
SHA18d0c5b2aecff8b60dcd91d871f07267f788b5fac
SHA25699587abd57cf5ac5bc101a324203caf5e9809d345046f53659374e220b6e10b7
SHA512e7ca61206914959fc5f5e4a31b8dcd8bc1ba0d56ef6a137ab128b1e503a083489dbff0ad13b2887f3e468773686945d7223e6414df3f5a979ef15fe59a03aa23
-
Filesize
216KB
MD538546caf4454ab441165b2b06e384c56
SHA1666057437ad167dc08af16f49676547fdf1c3c6b
SHA2569ce57e5feb9a188054cb6ce73b55d68d73b6a4be587147289ccd7dbf0ac7c46c
SHA5122d77ce0d74545a8630ace329256feee4ebfee9b8b504e9ceb71066fcda1fdbef1321497d15eeb5953f74a04237e1d444a55f47bf51b29b368891bdd081b56a3e
-
Filesize
216KB
MD5d95586aa4272267b109b56010a66ffed
SHA144d26567e38cdf8158fa222cc07c9f64a980e3a8
SHA256776931dae081728473ebfefeeff279c84ba0a6c87183eedcc6e338660c0e7868
SHA512e603965375a2225202f69712a77b0dd62795307a6366a3262219eb4580d26f15db9edaf984520a5bef6f5a78e83a61cc781bdaa67f588e3befec71c9c04abb4e