Analysis
-
max time kernel
103s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 12:40
Static task
static1
Behavioral task
behavioral1
Sample
ffdd6cbf5a3a6998bd8260f2a093afd0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ffdd6cbf5a3a6998bd8260f2a093afd0N.exe
Resource
win10v2004-20240802-en
General
-
Target
ffdd6cbf5a3a6998bd8260f2a093afd0N.exe
-
Size
91KB
-
MD5
ffdd6cbf5a3a6998bd8260f2a093afd0
-
SHA1
7ed2d8f62176a287461a035e89aed29aa7dd4411
-
SHA256
41bdfc53b9cbdb047bf48ae94a89e31eca93cd439c27e52aa261197fe1772934
-
SHA512
7396323ccd1c131bec9dd1af9934d8bbb397fce2c62adf2b3f48d0a9e510d4bd0e3b492ad7a46e87f9bcffa456f562e5ff3ac3699846c1a60022f1af6e38bd59
-
SSDEEP
1536:FAwEmBGz1lNNqDaG0PoxhlzmKAwEmBGz1lNNqDaG0Poxhlzm/:FGmUXNQDaG0A8KGmUXNQDaG0A8/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 3192 xk.exe 2252 IExplorer.exe 1184 WINLOGON.EXE 4764 CSRSS.EXE 228 SERVICES.EXE 3456 LSASS.EXE 3848 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\IExplorer.exe ffdd6cbf5a3a6998bd8260f2a093afd0N.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr ffdd6cbf5a3a6998bd8260f2a093afd0N.exe File opened for modification C:\Windows\SysWOW64\shell.exe ffdd6cbf5a3a6998bd8260f2a093afd0N.exe File created C:\Windows\SysWOW64\shell.exe ffdd6cbf5a3a6998bd8260f2a093afd0N.exe File created C:\Windows\SysWOW64\Mig2.scr ffdd6cbf5a3a6998bd8260f2a093afd0N.exe File created C:\Windows\SysWOW64\IExplorer.exe ffdd6cbf5a3a6998bd8260f2a093afd0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\xk.exe ffdd6cbf5a3a6998bd8260f2a093afd0N.exe File opened for modification C:\Windows\xk.exe ffdd6cbf5a3a6998bd8260f2a093afd0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffdd6cbf5a3a6998bd8260f2a093afd0N.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\Desktop\ ffdd6cbf5a3a6998bd8260f2a093afd0N.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile ffdd6cbf5a3a6998bd8260f2a093afd0N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 3192 xk.exe 2252 IExplorer.exe 1184 WINLOGON.EXE 4764 CSRSS.EXE 228 SERVICES.EXE 3456 LSASS.EXE 3848 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3508 wrote to memory of 3192 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 84 PID 3508 wrote to memory of 3192 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 84 PID 3508 wrote to memory of 3192 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 84 PID 3508 wrote to memory of 2252 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 85 PID 3508 wrote to memory of 2252 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 85 PID 3508 wrote to memory of 2252 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 85 PID 3508 wrote to memory of 1184 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 86 PID 3508 wrote to memory of 1184 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 86 PID 3508 wrote to memory of 1184 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 86 PID 3508 wrote to memory of 4764 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 88 PID 3508 wrote to memory of 4764 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 88 PID 3508 wrote to memory of 4764 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 88 PID 3508 wrote to memory of 228 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 89 PID 3508 wrote to memory of 228 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 89 PID 3508 wrote to memory of 228 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 89 PID 3508 wrote to memory of 3456 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 91 PID 3508 wrote to memory of 3456 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 91 PID 3508 wrote to memory of 3456 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 91 PID 3508 wrote to memory of 3848 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 92 PID 3508 wrote to memory of 3848 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 92 PID 3508 wrote to memory of 3848 3508 ffdd6cbf5a3a6998bd8260f2a093afd0N.exe 92 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ffdd6cbf5a3a6998bd8260f2a093afd0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ffdd6cbf5a3a6998bd8260f2a093afd0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffdd6cbf5a3a6998bd8260f2a093afd0N.exe"C:\Users\Admin\AppData\Local\Temp\ffdd6cbf5a3a6998bd8260f2a093afd0N.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3508 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3192
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2252
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1184
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4764
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:228
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3456
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3848
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD598e100e9637f5452ee4da47b90a18a79
SHA10ae3bccf5b6786f453d99bb0d7276e8cefea5f7e
SHA2563b0f00f2d31d8dd38da09a5c6fc148f73b321d71e598844eaf06f73f5d037da0
SHA512378248996d1be7ba37833696a0b665ce9f4275c101945b59be5736777c2fac96ce8d8701f80c293a0a5a6dc73ac909c72da590f5ee85f7f0919fb58443da1a15
-
Filesize
91KB
MD5a979edd4d9aab26eb7d522b652c6bfa1
SHA1d71ea1fc83a6590f4cd4a4a3a2a0d6bcb4fe5a54
SHA256f322147e67ccee89771b9311d2fcab127c641c079ddea2cb48f6d4d03ce1957b
SHA5129dc92ac6d05ad8aa6a59368d68336a72f06ab9899c4532648c90841821e5189ed65892da14c383fda58a81ed0bccf0fdae31dd4fde765671e94ae48b0d917211
-
Filesize
91KB
MD5008ae98b5fdc58d915c8357a0aef1f4a
SHA1ec6f601c186ec81b26b4b28841e85466bc7484ed
SHA2561f411e584606f9fe5b84f591172c504a3cafe5833ed0982fa3f89aafb15efcd0
SHA512122bed7e940301ee1b1485399d612b96ddd0560d832e0fa62c6661bbfdef9b8bf2f9997cbeca73af51389f3f4225e5488aa8e04d7ffd8cbfb2e18db4dee26e96
-
Filesize
91KB
MD5d29da8b4259c77e04c71cce04425021f
SHA17e1f110e5ef2ed6b7905d6d63b225a4a4fc46888
SHA25623b5372df28e306521a4b279c34efebc7f1f43bd404e2be1dd1a470121a298d1
SHA51208d9fb01a2dfbc16eb0fc25b88e0f41465d4efe87045ed67441ea69474e9ecd18d4dc6669c8f9187ef0117c9848e481a4c0bb207114f71a9e343360f289a7142
-
Filesize
91KB
MD57c7549d12bb25f1ee86980d9a78e3315
SHA1c1be1ebaf41a778339c971f747c6213d801a5986
SHA256757f90d0d9e5daa6cd460255ade01279dc1d1e353a606bc8b55b803ada726e2e
SHA5120d280a3d982f0facc37d263dcee99d0dadf27fbeda3643ae9acf6450dfb93d63989ed03da4a0625ef365311e94866a677438bf455f4d43aed9fba8221ae98fe6
-
Filesize
91KB
MD5ffdd6cbf5a3a6998bd8260f2a093afd0
SHA17ed2d8f62176a287461a035e89aed29aa7dd4411
SHA25641bdfc53b9cbdb047bf48ae94a89e31eca93cd439c27e52aa261197fe1772934
SHA5127396323ccd1c131bec9dd1af9934d8bbb397fce2c62adf2b3f48d0a9e510d4bd0e3b492ad7a46e87f9bcffa456f562e5ff3ac3699846c1a60022f1af6e38bd59
-
Filesize
91KB
MD5b95f9816fa8d253e8035ea28df32c1e2
SHA1c74fe30dbc49c05fc14ffac939a33a4fedd80500
SHA2569dc257e6be058c758aec50da72269f14a47d3aa1a80e391f8e93a2709f7dc8a9
SHA51249d12a6e00e6edd8aa487e6ce7f451adff6609c23a63ebe42ab59517d191b4322133f58458cf4a32836e47d3de2073ec3ee499817cfb2e9544f70b3f9c0e5308
-
Filesize
91KB
MD5fb9ade2e555c1ed3bc19ce2ea484935c
SHA1f5201e6c172f806f19d63da256ebac460b174367
SHA2565a069ff47e8f2df0b9b6716de89107972dceb014c2d3a2074d0121e5a45fd3a9
SHA512f0912b60fa2f4584c3d3b28918b242fc1c1957c20e00815343b34795e37172fa4367e56cf611aaf03d518b51dba0b805807c479ed4371ae106c2aea37e87592d