Resubmissions
04-09-2024 19:57
240904-ypnyzsvgkr 704-09-2024 19:55
240904-ynfk8avgkm 304-09-2024 19:54
240904-ymlqvawgka 304-09-2024 19:52
240904-yleadawgjc 304-09-2024 19:49
240904-yjwrmsvfqr 3Analysis
-
max time kernel
197s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
Desktop.zip
Resource
win10v2004-20240802-en
General
-
Target
Desktop.zip
-
Size
103KB
-
MD5
6e8c0176ba284d48b1ff88cdd5cc3988
-
SHA1
df499bed81bafc1e137d4d38382e1fa231ebdded
-
SHA256
a1346e8404edd7f045280c1583c11f15da6222e0e9260274b043e405d108525f
-
SHA512
a83d89f264207091328f89b42b210d78abb45a9e8f9b09770e8b3b813b39f30d1fc9541aff6b4349a44db823a8701ca54aa157cca9035266c16558a1d877d1de
-
SSDEEP
3072:awcutZlxq7F1othGc4JmgvFxgMZ5onKQsAmnDr8/wD2:awcutZ0o/5gvFxxonXsxDr8/wD2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4296 Spoofer.exe -
Loads dropped DLL 2 IoCs
pid Process 4296 Spoofer.exe 4296 Spoofer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 5036 msedge.exe 5036 msedge.exe 3856 identity_helper.exe 3856 identity_helper.exe 208 msedge.exe 208 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3184 7zG.exe Token: 35 3184 7zG.exe Token: SeSecurityPrivilege 3184 7zG.exe Token: SeSecurityPrivilege 3184 7zG.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 3184 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5036 wrote to memory of 3320 5036 msedge.exe 93 PID 5036 wrote to memory of 3320 5036 msedge.exe 93 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 3736 5036 msedge.exe 95 PID 5036 wrote to memory of 4828 5036 msedge.exe 96 PID 5036 wrote to memory of 4828 5036 msedge.exe 96 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97 PID 5036 wrote to memory of 2572 5036 msedge.exe 97
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Desktop.zip1⤵PID:2768
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd10746f8,0x7ffcd1074708,0x7ffcd10747182⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1744,5330550360325661219,17166546767601898898,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1860 /prefetch:22⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1744,5330550360325661219,17166546767601898898,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1744,5330550360325661219,17166546767601898898,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1744,5330550360325661219,17166546767601898898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1744,5330550360325661219,17166546767601898898,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1744,5330550360325661219,17166546767601898898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1744,5330550360325661219,17166546767601898898,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1744,5330550360325661219,17166546767601898898,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3596 /prefetch:82⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1744,5330550360325661219,17166546767601898898,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1744,5330550360325661219,17166546767601898898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1744,5330550360325661219,17166546767601898898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1744,5330550360325661219,17166546767601898898,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1744,5330550360325661219,17166546767601898898,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4812 /prefetch:82⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1744,5330550360325661219,17166546767601898898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1744,5330550360325661219,17166546767601898898,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1744,5330550360325661219,17166546767601898898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1744,5330550360325661219,17166546767601898898,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2428 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4300
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1336
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Desktop\" -spe -an -ai#7zMap15787:76:7zEvent68341⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3184
-
C:\Users\Admin\Downloads\Desktop\Spoofer.exe"C:\Users\Admin\Downloads\Desktop\Spoofer.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
5KB
MD531b9f9c337872496a4f2eccb15c1618c
SHA1d38503e839093cfdabd5cc86e80b0e79437a3285
SHA25686ec6e29781dc856827904472c9d2ae2314f62b947654439a4f99aac96fed84f
SHA512cf1265b46eed7c56cb4f9e07edeaa15b3398ebf5b5b8f9e26c0f37420debdf8eea450a463241487be119b679218abcf42cab946caa786735566229add229cf2d
-
Filesize
6KB
MD51d9780e420e3299e2fef19fdce601d7c
SHA10d71cc5e72820aca2d476ce40ac43a3c7ac20fba
SHA256f754827cb7002172b0ec92276df971274ecb1807025490124780311cd8652045
SHA512528b22218f923dcbcbb270bd85784eee6c09284e79f2872c598b14604640dae93e0200f5bbaa86c62c9689baa99d1fd38bb0240ad3ca96a1a464137f7f83f24f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD597be0d20bc01c17c55153e6f162ffb64
SHA10ce50d0364827702a2141dc4b0cd274687ec6c62
SHA2561726ed163fe09770950b5288875d9a88d82c8689a8b173c80ce2ea77407e035e
SHA5127a5b6c0222279621191098ac69976548f1e3e78c298fbdb597303ee9f008cbb03769bba74814c75f7e4371e57c7c5478dab2b9e4a9ce34ad3c476d963821dca8
-
Filesize
10KB
MD5d08a083fadacb1511e1c844b9d6e27fd
SHA126b61e1e820367c0348c0da4f55937dbfc7f58bd
SHA256ad4f67f695acc276e1d114440e0b495a8f0703bc4d423611463585982c1a6ab1
SHA512c8801249c404fbee39721cebfc26b7df65a9b6267414e7e32d63b52ad3cade7a69f6cd4691e2828ac020c64a34db07df05cc1af3f96da3558e52180ff6f0a74b
-
Filesize
103KB
MD56e8c0176ba284d48b1ff88cdd5cc3988
SHA1df499bed81bafc1e137d4d38382e1fa231ebdded
SHA256a1346e8404edd7f045280c1583c11f15da6222e0e9260274b043e405d108525f
SHA512a83d89f264207091328f89b42b210d78abb45a9e8f9b09770e8b3b813b39f30d1fc9541aff6b4349a44db823a8701ca54aa157cca9035266c16558a1d877d1de
-
Filesize
121KB
MD581a6c377381c2e4db6b1175bba14ab51
SHA104780c6253648851ca0cd8f7904a27338af50332
SHA256b14d6280e84663b70f1c032273de04ebbc27f782c2e58682fed0db9b44657d4a
SHA512caffecc70b77ae2cc7778b0e5407d1889953b85ac3fffbcf4942b1cb1f9d0877bf8c84fb27562e7db68c30a35a6119b979661d2ea0f9790b0c4cb2e1a73ce6dd
-
Filesize
58KB
MD5868fd5f1ab2d50204c6b046fe172d4b8
SHA1f2b43652ef62cba5f6f04f32f16b6b89819bc978
SHA256104e5817ece4831e9989d8937c8dfe55d581db6b5bc8e22a1b492ca872eda70e
SHA512402a0402b318539f26eac2fcd890700d2103f8eabd4b5289b64e2cdb5c30f4bb2b18f342c8a1ecc2cafb3f1d4258387a5300f9a86056f27b176b3fe995f9fc9d
-
Filesize
128KB
MD5f57fb935a9a76e151229f547c2204bba
SHA14021b804469816c3136b40c4ceb44c8d60ed15f5
SHA256a77277af540d411ae33d371cc6f54d7b0a1937e0c14db7666d32c22fc5dca9c0
SHA512cd9fc3fc460eba6a1b9f984b794940d28705ecb738df8595c2341abe4347141db14a9ff637c9f902e8742f5c48bbb61da7d5e231cc5b2bad2e8746c5a3e3e6ed