Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2024, 20:42 UTC
Static task
static1
Behavioral task
behavioral1
Sample
12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba.exe
Resource
win10v2004-20231222-en
General
-
Target
12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba.exe
-
Size
1.2MB
-
MD5
197d0bf6264e56daf68f482df98ca74a
-
SHA1
15c4e1204bae02e804d32e24f8946ffb1c8c6ed0
-
SHA256
12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba
-
SHA512
6d96a2ed523ad2c131074037cf5b83e9edf0444e4873785dffb8963cdba02c75b620f8405386431bebcbc1baa3ed44e29b68906714956b5001842eab13e1d0cb
-
SSDEEP
24576:e7tTp75vGetOrmT6VxjdP7mKf/el53YNEbqlrhV5L:e7QetOrmT6jpP7mK9EbKVL
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5020 Logo1_.exe 2212 12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\AppInfoDocument\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\core\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\zh-TW\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\WinMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fil-PH\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_2019.904.1644.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\ja\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\bin\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\{127177D8-4F94-46A4-ADF5-D3A01AC1FD03}\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-100_kzf8qxf38zg5c\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\pt-BR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\sr-latn-cs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\SlowMotionEditor\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\PlayReadyCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ms-MY\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Notifications\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\sd\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\include\win32\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-black\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba.exe File created C:\Windows\Logo1_.exe 12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe 5020 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4716 wrote to memory of 2856 4716 12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba.exe 84 PID 4716 wrote to memory of 2856 4716 12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba.exe 84 PID 4716 wrote to memory of 2856 4716 12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba.exe 84 PID 4716 wrote to memory of 5020 4716 12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba.exe 85 PID 4716 wrote to memory of 5020 4716 12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba.exe 85 PID 4716 wrote to memory of 5020 4716 12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba.exe 85 PID 5020 wrote to memory of 2968 5020 Logo1_.exe 88 PID 5020 wrote to memory of 2968 5020 Logo1_.exe 88 PID 5020 wrote to memory of 2968 5020 Logo1_.exe 88 PID 2968 wrote to memory of 344 2968 net.exe 89 PID 2968 wrote to memory of 344 2968 net.exe 89 PID 2968 wrote to memory of 344 2968 net.exe 89 PID 2856 wrote to memory of 2212 2856 cmd.exe 90 PID 2856 wrote to memory of 2212 2856 cmd.exe 90 PID 2856 wrote to memory of 2212 2856 cmd.exe 90 PID 5020 wrote to memory of 3336 5020 Logo1_.exe 78 PID 5020 wrote to memory of 3336 5020 Logo1_.exe 78
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba.exe"C:\Users\Admin\AppData\Local\Temp\12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4594.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba.exe"C:\Users\Admin\AppData\Local\Temp\12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba.exe"4⤵
- Executes dropped EXE
PID:2212
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:344
-
-
-
-
Network
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request176.178.17.96.in-addr.arpaIN PTRResponse176.178.17.96.in-addr.arpaIN PTRa96-17-178-176deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request75.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request75.159.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request23.160.77.104.in-addr.arpaIN PTRResponse23.160.77.104.in-addr.arpaIN PTRa104-77-160-23deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request0.204.248.87.in-addr.arpaIN PTRResponse0.204.248.87.in-addr.arpaIN PTRhttps-87-248-204-0lhrllnwnet
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request192.178.17.96.in-addr.arpaIN PTRResponse192.178.17.96.in-addr.arpaIN PTRa96-17-178-192deploystaticakamaitechnologiescom
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
176.178.17.96.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
75.159.190.20.in-addr.arpa
DNS Request
75.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
23.160.77.104.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.204.248.87.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
48.229.111.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
192.178.17.96.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5c75db7d2a5de1b427890b95716df0c29
SHA1766c65540536ca717cc13fba183b93c9b62764b8
SHA25622e2ebff999ae3c16599f5c2b6d617ea152b47139aa9b67d6e4ffe3497a2b92f
SHA51281f28c7226197d87fb49b72fdc899d39bdd0f5fdcc1803cd3976d1dfb8909d888d3814c29bf5b30f446940f3076c5227b1f22365ba7a1a8b5b194d4b3c7a3835
-
Filesize
570KB
MD5dad574dc885c341fcbc5d4c45c9c0c77
SHA1fcd18e3f3310a87353506f7f09b774f3e5c39683
SHA2568cb6c49965007baec775208b94e5c291131391f8d2872b19c99db5b06999b38e
SHA51231422b994f71763ea2a7e5ecba391b9bacf1f6ccc1e75f0179f319ade400010ec63f16c7fc48c0a13622b2ce74123e1853c06873fa5f993463e854b2edb104bb
-
Filesize
481KB
MD50c5536c6a3aefefb2d4cc1cfbb729119
SHA1660b05e7c4543df8ec6d4e80d6c8f3c9d667bf8c
SHA256297984cb1c691abf3614c0c64ed3ed1b8cbf2e2f2efae02e5392e110a717394c
SHA5129f833ca254c2e29c8fa9fe95ebeb6d62a686b99dd6597761ffb2797a0b50daa531a483f6047b8bbb059c2f15abe19aa030e67d2c1198624633146d76aebc7da8
-
Filesize
722B
MD53ed037f7d4e9dc7c4ea807506f5f8638
SHA1403393db289267bef36781eac8bf2d1c4e681e43
SHA25611846ad6851a229b42d9d08d5e1c935703607e8841b5a6ad48f3c2d5728bfdfc
SHA5121d3294983a231033927ca512c8307a22cdb929323b5345cd181548bea5ad14aab484e432fef8b81cbf7e2e44f09fe26e0895ae35d13e1da69ac69c36e22f5272
-
C:\Users\Admin\AppData\Local\Temp\12e7210413bdc8bb948539e36445da8d9607a803eb29d9512d2eb035583ff0ba.exe.exe
Filesize1.2MB
MD5da2926199d937e5e6dca8f15c189b9d3
SHA1bee107a4524b3a54768c7a01da8d9cd441b6d7d1
SHA256b3e408a3ab8f27a979dc6216f0177137edbf0b12aa0c9f0963a7d31cc30f4024
SHA512bf089cd73a1a1f90ec4c865f782f35b2c421449567ceae68b8c4a52e844cd1f0c413902aa87e9c305d79ac09b03ff23c6481919a585d72218e8247e130756768
-
Filesize
26KB
MD596561b006c0d21a4337e53c5d05029fd
SHA1ec489e1d92b52c53662f28cd591d068d60b24b16
SHA256a7af91485e93d2467d0dc2a1aafb6cda75418abdcae3b06302b78b943443b70c
SHA51281d1a972660b01d771cba47f3ed7567acb94c448ce2a190783340a4bdf0808e8ccf53a1bbe46998596d90ff264b385d51203cfd71f22cd501cde040490725a2e
-
Filesize
9B
MD5627f23e6a85295eecfbaa9418a5501ac
SHA13aedd6b4b0d60e753e17c129fc49c6157fd013da
SHA256f0b797dea0e5e1581d6d50754ef8f1f1a98209baa13b45563f349db53e3074ff
SHA51254bb1e93614c2c878e83bfa7ddd9c646242251a7de1225c4d4672c0703720b901f6336233824c1df544d6ffda1d2dcccd1217035cfd55416ef3399b362abf950