Analysis
-
max time kernel
149s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 06:27
Behavioral task
behavioral1
Sample
Jungle24-Tipps_signiert.pdf
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Jungle24-Tipps_signiert.pdf
Resource
win10v2004-20240508-en
General
-
Target
Jungle24-Tipps_signiert.pdf
-
Size
242KB
-
MD5
9f9b5cdce2066028222be5df5a53f613
-
SHA1
cbc8aa5af8a31e97930c1be79f2b2daa5d807850
-
SHA256
28867d22cc0200a12e0540e4fa4be01d6b524fc3cee2746a913915aca4531df9
-
SHA512
c9212193074f86b02e656219d411076b27ebb4a9e0217fdbecb84a263a9b3ea504bb60c4f53db467cf66e58882ac1fb06969b47bbf9c46683f8d932f3400cc39
-
SSDEEP
3072:VgjFUN1Kq55PAwP3NMtP46mpnsKHppXTFpBAQ1GElp2FD4hfZ:vN1KovNMt0pnhpDpxPQlCZ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2816 2520 AcroRd32.exe 81 PID 2520 wrote to memory of 2816 2520 AcroRd32.exe 81 PID 2520 wrote to memory of 2816 2520 AcroRd32.exe 81 PID 2816 wrote to memory of 2964 2816 AdobeCollabSync.exe 82 PID 2816 wrote to memory of 2964 2816 AdobeCollabSync.exe 82 PID 2816 wrote to memory of 2964 2816 AdobeCollabSync.exe 82 PID 2520 wrote to memory of 4936 2520 AcroRd32.exe 83 PID 2520 wrote to memory of 4936 2520 AcroRd32.exe 83 PID 2520 wrote to memory of 4936 2520 AcroRd32.exe 83 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 3804 4936 RdrCEF.exe 84 PID 4936 wrote to memory of 5020 4936 RdrCEF.exe 85 PID 4936 wrote to memory of 5020 4936 RdrCEF.exe 85 PID 4936 wrote to memory of 5020 4936 RdrCEF.exe 85 PID 4936 wrote to memory of 5020 4936 RdrCEF.exe 85 PID 4936 wrote to memory of 5020 4936 RdrCEF.exe 85 PID 4936 wrote to memory of 5020 4936 RdrCEF.exe 85 PID 4936 wrote to memory of 5020 4936 RdrCEF.exe 85 PID 4936 wrote to memory of 5020 4936 RdrCEF.exe 85 PID 4936 wrote to memory of 5020 4936 RdrCEF.exe 85 PID 4936 wrote to memory of 5020 4936 RdrCEF.exe 85 PID 4936 wrote to memory of 5020 4936 RdrCEF.exe 85 PID 4936 wrote to memory of 5020 4936 RdrCEF.exe 85 PID 4936 wrote to memory of 5020 4936 RdrCEF.exe 85 PID 4936 wrote to memory of 5020 4936 RdrCEF.exe 85
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Jungle24-Tipps_signiert.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe" -c2⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe" -c --type=collab-renderer --proc=28163⤵PID:2964
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe" GetChannelUri4⤵PID:4732
-
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5FEEFA7BBF6700D728ACAFCA88F1EB56 --mojo-platform-channel-handle=1720 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3804
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=4E8853D2D93DF237CA46B76F3683F08D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=4E8853D2D93DF237CA46B76F3683F08D --renderer-client-id=2 --mojo-platform-channel-handle=1736 --allow-no-sandbox-job /prefetch:13⤵PID:5020
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=91C3E3CCE03BC3C3ED5612FD5FADCAFC --mojo-platform-channel-handle=2140 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1132
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2075685E164438933349BB674D86DCFC --mojo-platform-channel-handle=1928 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3064
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8E3E9DF34ED35F76CB471CE012AE3987 --mojo-platform-channel-handle=1952 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4604
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=B0FCACB6A8BA083D61099AF201939C93 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=B0FCACB6A8BA083D61099AF201939C93 --renderer-client-id=7 --mojo-platform-channel-handle=2356 --allow-no-sandbox-job /prefetch:13⤵PID:3348
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
92KB
MD59829698573a21360f49388cedba0dd43
SHA1e9ac1d8238a01b979d47e3c9661770bac5c152cd
SHA256948bdc0b38c80085fe5331689470a071e9aed3f01893ec53e2160129cfdef1e4
SHA5120f77594fc9c460a8ddf473e1256a3c4c8fa853bbcb1c64c90a147d91b12560c0366a1fd3a2979a22160210e2c2fb2e09d782483b8ff618dadcad20108d6ea0b7
-
Filesize
92KB
MD537e08e435b525261888ba44c9f089f6a
SHA1da20c5c277b9b71412ba887927da48c5df69cedf
SHA256c18d991802a8c2591b8a1b5f2b7758a6f5767c9c0e9af7823d62b7d065515766
SHA5122fd749223c19a4e6a7a31704a6c9bc0a83f94d527ad24fd53c05b3e089a4fddd7d8a558031ec37ccc60cd7cdbaac3a8e625aa607538bdbc27d9d7c41c7d7cc11
-
Filesize
92KB
MD5f9a87dafe81854a0b5d4c26d13dcddc1
SHA1d7b6a3a052928354190a45a396f02be1e5a14143
SHA2562c00d325770cc339362078731fff25b81ee8d85118bdb92a669764986367e432
SHA51242d1b6cbdfd37606adcb9893872a42b34281fa3a35bfe6e23f8be6586dbc266955129d99ebf52220ae3ebbb031afd41f792efae2c52356b32ea209dd4ba6acef
-
Filesize
92KB
MD5aebe0d2eb7a2077a55e57a955e62406a
SHA13f811b8148f12220f4b45699135e6d21c9847d8a
SHA25687aa4c64348b534771f03919b5bdca09596e89f6e0cca0a992bb3d290ec4155a
SHA512efa1b082925a4e478fcea74764bbacb91d43da8c01c4b360a34e6f7402af23f91c93b5e91c6266120e144b5300e8dae73a62a7b6d7c4328410128f6a72a7baed
-
Filesize
92KB
MD5fb47b65d0b99c155ffa995771040dba7
SHA1d1eb3a2b0dd9b617ab665f56229e05e3858a3d3a
SHA2564efe839585ded94d4dd6a7401f5c1dfd09933fb35d90f900df9aede7105939fb
SHA512ede07e7354ee1351d5a211a79819559df213beeee378ba13f92e0b6f3f6502027553cd5a7b2f6e630665780bdbddc0695c89b90740055af0e89c817a2e1af8a7
-
Filesize
92KB
MD5f5bc36314a0e3906eada611e4c4bb2f1
SHA1b1c76941c2ac5660a0dd2c9be8ed7e8eb9e28a46
SHA2565c3d2d1fd38cd3efecf3cd063a21ee0682c474c177a7b00f9b11a0674fe899fd
SHA512f9d82f310dd2cd0f54305665757a9bf31e01ee259ee081ce0e7e9df6b29cdf8beaede734f6e9c0bc26ec4d18c6bc427d97568c1a83e7a9bfc809db96bd906845
-
Filesize
92KB
MD59917ac23b6e5638213b997350932c01a
SHA18cf10fedb72cfc7e001eaa1e1d250d29e799c7ae
SHA256b80c857176c4717d5c392e5bf3385fd92a4858099b7588fd74916544bf0a81f6
SHA512c7b6457bef93e64c72ea1e6a62ebb00b8e930ebd358ae5fe06bd25742973466ac18ba059ef29e46676be68f21a307236d74b16dd820973afd39f7560993347f2
-
Filesize
92KB
MD5245950c48f668cf2fcb3c64778e64089
SHA13a5a14c820f58e35a3fc6f5de29669f0840587d8
SHA256a027cf12f2055635a3020f08e0448b2f0314791260ccd25570426088c5b0e307
SHA5124fc8448536663b551cc716d78715f06d4ed217fbdf755924f0b30aebbb6212798a61c6638f919d5c14bdb6998d6a12f0ca37281f3c7f484c1821fbfc98d4a24d
-
Filesize
12KB
MD553e683a3ad0bac06b344cf4260782fc2
SHA1a65253c43bacf2a39e2723b92bfa182bc37d961c
SHA25655986c8288e7f0ec4516ad4051cd5e8b62c8ecc6ace264a231b83931ddb6f1e1
SHA5122d720d4be7523197253f5a0e564bd79cc3648805415305db19afe60a0c19c5ac775da0dbd0ed77aad4b802bf94fa7ec5d79b80d836b51f2f4566c0b8180b3fe2
-
Filesize
12KB
MD50f64c3531d30f20faf9d6e6cb963d0f3
SHA15185a4b64bd04b5b7c8f0d76d0342e95bb2d2858
SHA25635955097eaa81fc3a2222c541dab95518446285280cf05bbab855d3ab3bc9c77
SHA51218face21ce9abc2b3094bc540d0d7766c79baba81540dad7eb5c551cff956d63d07b3a51d1005796dcec3e19904d51a55bcbf28fd987ca0db1c3cfa231f08abf