Analysis
-
max time kernel
105s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 21:07
Behavioral task
behavioral1
Sample
489b9f9eb3059677c5d0d32554172bf0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
489b9f9eb3059677c5d0d32554172bf0N.exe
Resource
win10v2004-20240802-en
General
-
Target
489b9f9eb3059677c5d0d32554172bf0N.exe
-
Size
91KB
-
MD5
489b9f9eb3059677c5d0d32554172bf0
-
SHA1
ab97bb8b2a8c7507bd762b569d0228706f6e54ef
-
SHA256
d655522f4894624950eab7e21cfa6c927c70d9048aa25aa55e8c3fe8f8acd2ac
-
SHA512
46ccc5f8b2d3ffe8bedae9026938f39c4bc5224585c743b70711caea2ed632a5be460ffec59e5dd795e925ac3ada7d800990ad9ed00d4ad9203c87a79efe3777
-
SSDEEP
1536:XJRtlEnBHHIgabuYotV/JbJCX5SBijEJRtlEnBHHIgabuYotV/JbJCX5SBiE:XvtYxOuYotvYQIjEvtYxOuYotvYQIE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 489b9f9eb3059677c5d0d32554172bf0N.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 489b9f9eb3059677c5d0d32554172bf0N.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 489b9f9eb3059677c5d0d32554172bf0N.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 489b9f9eb3059677c5d0d32554172bf0N.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 372 xk.exe 2340 IExplorer.exe 384 WINLOGON.EXE 3200 CSRSS.EXE 4092 SERVICES.EXE 5064 LSASS.EXE 3028 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 489b9f9eb3059677c5d0d32554172bf0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 489b9f9eb3059677c5d0d32554172bf0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 489b9f9eb3059677c5d0d32554172bf0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 489b9f9eb3059677c5d0d32554172bf0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 489b9f9eb3059677c5d0d32554172bf0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 489b9f9eb3059677c5d0d32554172bf0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 489b9f9eb3059677c5d0d32554172bf0N.exe -
resource yara_rule behavioral2/memory/3468-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x000700000002346e-8.dat upx behavioral2/files/0x0007000000023472-106.dat upx behavioral2/files/0x0007000000023476-111.dat upx behavioral2/memory/372-113-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/2340-119-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023478-120.dat upx behavioral2/files/0x0007000000023479-127.dat upx behavioral2/memory/384-125-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/3200-132-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x000700000002347a-134.dat upx behavioral2/memory/4092-136-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x000700000002347b-142.dat upx behavioral2/memory/4092-140-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x000700000002347c-147.dat upx behavioral2/memory/5064-149-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/3028-154-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/3468-156-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 489b9f9eb3059677c5d0d32554172bf0N.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe 489b9f9eb3059677c5d0d32554172bf0N.exe File created C:\Windows\SysWOW64\shell.exe 489b9f9eb3059677c5d0d32554172bf0N.exe File created C:\Windows\SysWOW64\Mig2.scr 489b9f9eb3059677c5d0d32554172bf0N.exe File created C:\Windows\SysWOW64\IExplorer.exe 489b9f9eb3059677c5d0d32554172bf0N.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 489b9f9eb3059677c5d0d32554172bf0N.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 489b9f9eb3059677c5d0d32554172bf0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 489b9f9eb3059677c5d0d32554172bf0N.exe File created C:\Windows\xk.exe 489b9f9eb3059677c5d0d32554172bf0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 489b9f9eb3059677c5d0d32554172bf0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\Desktop\ 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 489b9f9eb3059677c5d0d32554172bf0N.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 489b9f9eb3059677c5d0d32554172bf0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 489b9f9eb3059677c5d0d32554172bf0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 489b9f9eb3059677c5d0d32554172bf0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 489b9f9eb3059677c5d0d32554172bf0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 489b9f9eb3059677c5d0d32554172bf0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 489b9f9eb3059677c5d0d32554172bf0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 489b9f9eb3059677c5d0d32554172bf0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 489b9f9eb3059677c5d0d32554172bf0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 489b9f9eb3059677c5d0d32554172bf0N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 3468 489b9f9eb3059677c5d0d32554172bf0N.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 372 xk.exe 2340 IExplorer.exe 384 WINLOGON.EXE 3200 CSRSS.EXE 4092 SERVICES.EXE 5064 LSASS.EXE 3028 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3468 wrote to memory of 372 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 85 PID 3468 wrote to memory of 372 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 85 PID 3468 wrote to memory of 372 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 85 PID 3468 wrote to memory of 2340 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 87 PID 3468 wrote to memory of 2340 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 87 PID 3468 wrote to memory of 2340 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 87 PID 3468 wrote to memory of 384 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 88 PID 3468 wrote to memory of 384 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 88 PID 3468 wrote to memory of 384 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 88 PID 3468 wrote to memory of 3200 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 89 PID 3468 wrote to memory of 3200 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 89 PID 3468 wrote to memory of 3200 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 89 PID 3468 wrote to memory of 4092 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 91 PID 3468 wrote to memory of 4092 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 91 PID 3468 wrote to memory of 4092 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 91 PID 3468 wrote to memory of 5064 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 92 PID 3468 wrote to memory of 5064 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 92 PID 3468 wrote to memory of 5064 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 92 PID 3468 wrote to memory of 3028 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 93 PID 3468 wrote to memory of 3028 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 93 PID 3468 wrote to memory of 3028 3468 489b9f9eb3059677c5d0d32554172bf0N.exe 93 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 489b9f9eb3059677c5d0d32554172bf0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 489b9f9eb3059677c5d0d32554172bf0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 489b9f9eb3059677c5d0d32554172bf0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\489b9f9eb3059677c5d0d32554172bf0N.exe"C:\Users\Admin\AppData\Local\Temp\489b9f9eb3059677c5d0d32554172bf0N.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3468 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:372
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2340
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:384
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3200
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4092
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5064
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5e325e06da92472c1c0205324c03e7f4d
SHA1a16daa2b73d8920e70b7f72bd781ad8f2038540f
SHA2562a08d24a4893e72316ad0e7a5f920c944dd4417cdf92928527fe6102328fe20c
SHA5125b69d033e51a869a2d0855e79bc61eb93cb6c7172f702289017405853273c65c13d97da738a1352fd352e870f8d9c7bc44bbc3b4ef5c722e48618fb63be002d4
-
Filesize
91KB
MD51729b4e9ffb6e54d299371978aea2238
SHA1902f592ea15468274ba2ce49c036ee06a864f653
SHA2560ea17a10982f54a05c801cbcdc7530ddccc7ff315caf978849467fdc2ed9bf37
SHA512972581dbc7ef8b13347e7ee4c180ef18ac6f96d3de6d32b12373983da0f772c5761827fef1ff39af09805bb1baafe3ea0266bfa649ed5e6f124391e9b2dc4dfc
-
Filesize
91KB
MD57381c3b5dd7f8e4156a8a47ba1685006
SHA131e74046fa61e446ad3e9f20496a883999be2b73
SHA256bac41a591614c30f89289168308f389d1c4e8314dbace7aadb9f1c32bd99f79d
SHA51289190e242898838b43d72d7fbee5658e1d01fbb086c21650faeeac790895c7abb9f1fe98a650ae0e1bd89fa48ba26d42d422d162ae9df3486b65fa824ff633fe
-
Filesize
91KB
MD595bfdd74e399432ffac8239b85d22ec6
SHA19a2bdeeb2c581ef3807819d9ea043565250e3201
SHA256a0d47d42b1c4f1b3ff01cb9aa724ad79757105ef31b41eaa0093ccc75b42a409
SHA512e8fce12ced754e30b0bd31a14035c703b6fa4bf196978731d8ea7190d43bb2fc8981f0ce69cf17c9f5bde78acadce446fbc2aa0a2a05fe0e9afb1412cc97a966
-
Filesize
91KB
MD5c6920bf2c3efcc8c7dd845faef7ca310
SHA1223155aea3f6afd99883d60585f67a461b7c5389
SHA256790706b19f702fe3bf659551ad2beaf6833a8491fa70dcfd421a4125f793bdef
SHA512da95e6c233e64ac6942bdb18c7e3ca145da57ce346d8ba4fd03c8977e7e25be4ca814afc02d922baf20dcbb13b3deabe4313a302352c74594366d276e66f3861
-
Filesize
91KB
MD5489b9f9eb3059677c5d0d32554172bf0
SHA1ab97bb8b2a8c7507bd762b569d0228706f6e54ef
SHA256d655522f4894624950eab7e21cfa6c927c70d9048aa25aa55e8c3fe8f8acd2ac
SHA51246ccc5f8b2d3ffe8bedae9026938f39c4bc5224585c743b70711caea2ed632a5be460ffec59e5dd795e925ac3ada7d800990ad9ed00d4ad9203c87a79efe3777
-
Filesize
91KB
MD51d90611fa9af24cc9ecf7a2d8d3f874c
SHA11e0aece78fbb677e1c6b92838a04de8c0bfc1c98
SHA2561100854c2d061c468d79cb3195f939e7233a818be8b0da162e2427b1a9088bd7
SHA512d95211520529fbbb92a08d0f9407c01c78e02bac87891bbb0231a0d181c07d2c0c54fa1be10aa8e39062409fc76007d862a767bcf7cad2979acdef17ab034a5c
-
Filesize
91KB
MD5c0e45867ddec5f08e85e79c11297a36b
SHA17aa5f761f36a873d5ce311ceaba4f9a020d46c22
SHA256e23a63f59c0bd440986417011a52ebf5ef2d27d5daf773215b2cdc50ae8dcab3
SHA5125ff8919f624ecbd12664a4d1ac1c4bcb1b294fdb39eaad45489b0b26c4351b63ae532f2175695a5653d57c2b85c25350060d6e79ec534e75bc8c3fff1fff65c5