Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 12:00
Behavioral task
behavioral1
Sample
040293257d37e0654993cfc32f70aa10N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
040293257d37e0654993cfc32f70aa10N.exe
Resource
win10v2004-20240802-en
General
-
Target
040293257d37e0654993cfc32f70aa10N.exe
-
Size
90KB
-
MD5
040293257d37e0654993cfc32f70aa10
-
SHA1
c64d7b3b768b83fb926d35c72862613fb55f7da9
-
SHA256
e4fcefeed3141bb3e55e666a8fe86652977df67933a515a0b6b4373892a4d0b0
-
SHA512
7e9e4147d1bc2c762e09ccedaaf45b36fefdf9284a306ca81459b02c8b2525cdab3c867f0e1048921e9005e29c9286452ac70f988a93f3880a948f50a0054d12
-
SSDEEP
1536:XRsjdLaslqdBXvTUL0Hnouy8VjpRsjdLaslqdBXvTUL0Hnouy8Vj:XOJKqsout9pOJKqsout9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 040293257d37e0654993cfc32f70aa10N.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 040293257d37e0654993cfc32f70aa10N.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 040293257d37e0654993cfc32f70aa10N.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 040293257d37e0654993cfc32f70aa10N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 040293257d37e0654993cfc32f70aa10N.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 4104 xk.exe 3896 IExplorer.exe 208 WINLOGON.EXE 4604 CSRSS.EXE 4224 SERVICES.EXE 4848 LSASS.EXE 4956 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 040293257d37e0654993cfc32f70aa10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 040293257d37e0654993cfc32f70aa10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 040293257d37e0654993cfc32f70aa10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 040293257d37e0654993cfc32f70aa10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 040293257d37e0654993cfc32f70aa10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 040293257d37e0654993cfc32f70aa10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 040293257d37e0654993cfc32f70aa10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 040293257d37e0654993cfc32f70aa10N.exe -
resource yara_rule behavioral2/memory/464-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234e0-8.dat upx behavioral2/files/0x00070000000234e4-106.dat upx behavioral2/files/0x00070000000234e8-113.dat upx behavioral2/memory/4104-111-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/3896-117-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234ea-119.dat upx behavioral2/memory/208-121-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/208-124-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234eb-126.dat upx behavioral2/memory/4604-131-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234ec-133.dat upx behavioral2/memory/4224-137-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234ee-139.dat upx behavioral2/files/0x00070000000234ef-146.dat upx behavioral2/memory/4848-144-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/4956-151-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/464-153-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 040293257d37e0654993cfc32f70aa10N.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell.exe 040293257d37e0654993cfc32f70aa10N.exe File created C:\Windows\SysWOW64\Mig2.scr 040293257d37e0654993cfc32f70aa10N.exe File created C:\Windows\SysWOW64\IExplorer.exe 040293257d37e0654993cfc32f70aa10N.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 040293257d37e0654993cfc32f70aa10N.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 040293257d37e0654993cfc32f70aa10N.exe File opened for modification C:\Windows\SysWOW64\shell.exe 040293257d37e0654993cfc32f70aa10N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 040293257d37e0654993cfc32f70aa10N.exe File created C:\Windows\xk.exe 040293257d37e0654993cfc32f70aa10N.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 040293257d37e0654993cfc32f70aa10N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 040293257d37e0654993cfc32f70aa10N.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop\ 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 040293257d37e0654993cfc32f70aa10N.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 040293257d37e0654993cfc32f70aa10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 040293257d37e0654993cfc32f70aa10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 040293257d37e0654993cfc32f70aa10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 040293257d37e0654993cfc32f70aa10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 040293257d37e0654993cfc32f70aa10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 040293257d37e0654993cfc32f70aa10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 040293257d37e0654993cfc32f70aa10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 040293257d37e0654993cfc32f70aa10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 040293257d37e0654993cfc32f70aa10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 040293257d37e0654993cfc32f70aa10N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 464 040293257d37e0654993cfc32f70aa10N.exe 464 040293257d37e0654993cfc32f70aa10N.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 464 040293257d37e0654993cfc32f70aa10N.exe 4104 xk.exe 3896 IExplorer.exe 208 WINLOGON.EXE 4604 CSRSS.EXE 4224 SERVICES.EXE 4848 LSASS.EXE 4956 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 464 wrote to memory of 4104 464 040293257d37e0654993cfc32f70aa10N.exe 84 PID 464 wrote to memory of 4104 464 040293257d37e0654993cfc32f70aa10N.exe 84 PID 464 wrote to memory of 4104 464 040293257d37e0654993cfc32f70aa10N.exe 84 PID 464 wrote to memory of 3896 464 040293257d37e0654993cfc32f70aa10N.exe 85 PID 464 wrote to memory of 3896 464 040293257d37e0654993cfc32f70aa10N.exe 85 PID 464 wrote to memory of 3896 464 040293257d37e0654993cfc32f70aa10N.exe 85 PID 464 wrote to memory of 208 464 040293257d37e0654993cfc32f70aa10N.exe 86 PID 464 wrote to memory of 208 464 040293257d37e0654993cfc32f70aa10N.exe 86 PID 464 wrote to memory of 208 464 040293257d37e0654993cfc32f70aa10N.exe 86 PID 464 wrote to memory of 4604 464 040293257d37e0654993cfc32f70aa10N.exe 87 PID 464 wrote to memory of 4604 464 040293257d37e0654993cfc32f70aa10N.exe 87 PID 464 wrote to memory of 4604 464 040293257d37e0654993cfc32f70aa10N.exe 87 PID 464 wrote to memory of 4224 464 040293257d37e0654993cfc32f70aa10N.exe 88 PID 464 wrote to memory of 4224 464 040293257d37e0654993cfc32f70aa10N.exe 88 PID 464 wrote to memory of 4224 464 040293257d37e0654993cfc32f70aa10N.exe 88 PID 464 wrote to memory of 4848 464 040293257d37e0654993cfc32f70aa10N.exe 90 PID 464 wrote to memory of 4848 464 040293257d37e0654993cfc32f70aa10N.exe 90 PID 464 wrote to memory of 4848 464 040293257d37e0654993cfc32f70aa10N.exe 90 PID 464 wrote to memory of 4956 464 040293257d37e0654993cfc32f70aa10N.exe 91 PID 464 wrote to memory of 4956 464 040293257d37e0654993cfc32f70aa10N.exe 91 PID 464 wrote to memory of 4956 464 040293257d37e0654993cfc32f70aa10N.exe 91 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 040293257d37e0654993cfc32f70aa10N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 040293257d37e0654993cfc32f70aa10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 040293257d37e0654993cfc32f70aa10N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 040293257d37e0654993cfc32f70aa10N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\040293257d37e0654993cfc32f70aa10N.exe"C:\Users\Admin\AppData\Local\Temp\040293257d37e0654993cfc32f70aa10N.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:464 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4104
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3896
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:208
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4604
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4224
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4848
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4956
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5d7329391acc158892e40954bf59d345f
SHA1b751f623f471bcde8c6aaeec521c2916ee7e7fc0
SHA2568a358137e108e60c94018f90f82b9cd22247a841da939f4d2b2169c164bb806d
SHA512626f6aaf4d41960d9eb18e42d1669f803cabf185104f3d70dc4db3e2ea63a135433aff8fcc561fc7e9d5dfe28316f946b7ba7eccf11c03ff77accffc63ef7be0
-
Filesize
90KB
MD5157e90646af0893cf0479f9b67a99a20
SHA182db27f87b3dfc5418ddde13ba91ad7044195dcd
SHA256d1eb2b856a19b6a40f7f2ad29dd17e8cd1da76989df6fa1213a256b81f127913
SHA51249508ab3d9da551a8102e4e4c897503743d252b6ca24feb5fa9d291e5cce59019cacf480f268de124b3b4dd7fa9a46edb0f014274cc36048c6a5f3ed7aa46971
-
Filesize
90KB
MD5b3b20b5eba14b3e4e6841dca5222a266
SHA110d4e8c7e44fbcb5fcd59631b0314aa78d2d8975
SHA256ec6d9831bca08f35ce571431f09ca647ffd5b7f892dbd1623ad1768c235c7939
SHA5128be137db999464f901c58678d78b00041ecb5c7502db927fa3005e26b42647fef11d199d7e6694b229e9998ba760e535ed32d83a7009ba7cab688dced743393a
-
Filesize
90KB
MD57ca2451d2aac1f1d42895c22dbe8576a
SHA10b2b3c2d0c840dec0a924eab8b17513397cc0d1f
SHA25607aee95ead953f725d5a372c0977d159d67a0b2540bb30655cfab3a838010f23
SHA5128629938b1c182c74b3afffcefd1560f998402ba2c9683d7b6f45545bfabb1f3c33cda982bebb188d6502da8d6234ec11c99b6ce2482abae13bfefc154ebbd2f3
-
Filesize
90KB
MD5b0575eaf90cef71443ccc03bc494b0eb
SHA1971576b02e5cebbb31df8f87915a985b4f0c4509
SHA2561b0b84726104d95b0483428cf7c1ae7f6038b3a9e311d67cd05850a3d8b66733
SHA51254d858954d2a1f3d61a02ef4bb350c6559383feead3f2852f46412c7d2e1e660735a0ee373c9f6a9e52773cdf46aa4af99fca11469648fae1779763e06c23da8
-
Filesize
90KB
MD5040293257d37e0654993cfc32f70aa10
SHA1c64d7b3b768b83fb926d35c72862613fb55f7da9
SHA256e4fcefeed3141bb3e55e666a8fe86652977df67933a515a0b6b4373892a4d0b0
SHA5127e9e4147d1bc2c762e09ccedaaf45b36fefdf9284a306ca81459b02c8b2525cdab3c867f0e1048921e9005e29c9286452ac70f988a93f3880a948f50a0054d12
-
Filesize
90KB
MD565da409c15295849e2d650305df54e2a
SHA15695d2f4c916e7ca0802e3d3402e6fed09b51483
SHA256f7637db6ebc59c67546e15a94c627efb34e635f1c7cc6c1c0de2d095b2053bfe
SHA5127767beec2aaa7a37dec7ade9e37588af1301b36d9cb8287b537e29b7d1b640774e48296f479b85369ba070acbebe6d4fd5329a69d703986ad7c93ae2d693a0c6
-
Filesize
90KB
MD5c9faeaa44e9cfc4974294e719ea996be
SHA1bd4607002c0ffce3df28ce85d753309f279d1e1a
SHA256f5860aea92ae5f9666585b717e21be7102f843b6782232429ccaa38cb48efa40
SHA512fdc15b6ae9904d9933b498d5ed93501142c5627ec6ec7e0e89cd2c1b0e0df030837fc2c69b8fb295e10dccd1573decd8276d505271c836ab1a16c78fc44d43c8