Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 04:18
Behavioral task
behavioral1
Sample
ccfcf87feeddec8308f2a7d21aecc250N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ccfcf87feeddec8308f2a7d21aecc250N.exe
Resource
win10v2004-20240802-en
General
-
Target
ccfcf87feeddec8308f2a7d21aecc250N.exe
-
Size
91KB
-
MD5
ccfcf87feeddec8308f2a7d21aecc250
-
SHA1
19a6bf3c53c2ec4f0664b2a675313290b2e83f32
-
SHA256
57bf98785249fe473e15b2080237a4e34981b407f6a14e7e0caaa7fcb8b4166c
-
SHA512
1ba94e61c665e14c7c923578a8e091af2894d421f1bb571a089386d7f1d637391604e81f4570839a3dcb52509432a05c271b4b20d2035ab8b080fc4df2389f6d
-
SSDEEP
1536:XJRtlEnBHHIgabuYotV/JbJCX5SBijJRtlEnBHHIgabuYotV/JbJCX5SBiE:XvtYxOuYotvYQIjvtYxOuYotvYQIE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" ccfcf87feeddec8308f2a7d21aecc250N.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ccfcf87feeddec8308f2a7d21aecc250N.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ccfcf87feeddec8308f2a7d21aecc250N.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ccfcf87feeddec8308f2a7d21aecc250N.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 3164 xk.exe 3640 IExplorer.exe 3156 WINLOGON.EXE 1348 CSRSS.EXE 3684 SERVICES.EXE 4020 LSASS.EXE 1364 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ccfcf87feeddec8308f2a7d21aecc250N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command ccfcf87feeddec8308f2a7d21aecc250N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ccfcf87feeddec8308f2a7d21aecc250N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell ccfcf87feeddec8308f2a7d21aecc250N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command ccfcf87feeddec8308f2a7d21aecc250N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command ccfcf87feeddec8308f2a7d21aecc250N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ccfcf87feeddec8308f2a7d21aecc250N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" ccfcf87feeddec8308f2a7d21aecc250N.exe -
resource yara_rule behavioral2/memory/4528-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234d4-8.dat upx behavioral2/files/0x00070000000234d8-106.dat upx behavioral2/memory/3164-112-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234dc-113.dat upx behavioral2/memory/3640-118-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234de-121.dat upx behavioral2/memory/3156-125-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234df-127.dat upx behavioral2/memory/1348-132-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234e0-134.dat upx behavioral2/memory/3684-139-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/4020-145-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/4020-147-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/1364-153-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/4528-154-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" ccfcf87feeddec8308f2a7d21aecc250N.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe ccfcf87feeddec8308f2a7d21aecc250N.exe File created C:\Windows\SysWOW64\shell.exe ccfcf87feeddec8308f2a7d21aecc250N.exe File created C:\Windows\SysWOW64\Mig2.scr ccfcf87feeddec8308f2a7d21aecc250N.exe File created C:\Windows\SysWOW64\IExplorer.exe ccfcf87feeddec8308f2a7d21aecc250N.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe ccfcf87feeddec8308f2a7d21aecc250N.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr ccfcf87feeddec8308f2a7d21aecc250N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe ccfcf87feeddec8308f2a7d21aecc250N.exe File created C:\Windows\xk.exe ccfcf87feeddec8308f2a7d21aecc250N.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccfcf87feeddec8308f2a7d21aecc250N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" ccfcf87feeddec8308f2a7d21aecc250N.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\Desktop\ ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" ccfcf87feeddec8308f2a7d21aecc250N.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ccfcf87feeddec8308f2a7d21aecc250N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ccfcf87feeddec8308f2a7d21aecc250N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ccfcf87feeddec8308f2a7d21aecc250N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command ccfcf87feeddec8308f2a7d21aecc250N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile ccfcf87feeddec8308f2a7d21aecc250N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command ccfcf87feeddec8308f2a7d21aecc250N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command ccfcf87feeddec8308f2a7d21aecc250N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ccfcf87feeddec8308f2a7d21aecc250N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command ccfcf87feeddec8308f2a7d21aecc250N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 3164 xk.exe 3640 IExplorer.exe 3156 WINLOGON.EXE 1348 CSRSS.EXE 3684 SERVICES.EXE 4020 LSASS.EXE 1364 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4528 wrote to memory of 3164 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 84 PID 4528 wrote to memory of 3164 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 84 PID 4528 wrote to memory of 3164 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 84 PID 4528 wrote to memory of 3640 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 85 PID 4528 wrote to memory of 3640 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 85 PID 4528 wrote to memory of 3640 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 85 PID 4528 wrote to memory of 3156 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 86 PID 4528 wrote to memory of 3156 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 86 PID 4528 wrote to memory of 3156 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 86 PID 4528 wrote to memory of 1348 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 88 PID 4528 wrote to memory of 1348 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 88 PID 4528 wrote to memory of 1348 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 88 PID 4528 wrote to memory of 3684 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 89 PID 4528 wrote to memory of 3684 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 89 PID 4528 wrote to memory of 3684 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 89 PID 4528 wrote to memory of 4020 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 90 PID 4528 wrote to memory of 4020 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 90 PID 4528 wrote to memory of 4020 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 90 PID 4528 wrote to memory of 1364 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 91 PID 4528 wrote to memory of 1364 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 91 PID 4528 wrote to memory of 1364 4528 ccfcf87feeddec8308f2a7d21aecc250N.exe 91 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ccfcf87feeddec8308f2a7d21aecc250N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ccfcf87feeddec8308f2a7d21aecc250N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" ccfcf87feeddec8308f2a7d21aecc250N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccfcf87feeddec8308f2a7d21aecc250N.exe"C:\Users\Admin\AppData\Local\Temp\ccfcf87feeddec8308f2a7d21aecc250N.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4528 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3164
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3640
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3156
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1348
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3684
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4020
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1364
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5e7d985516dd7390422be7e7f9a05ba6b
SHA1ed78dff5f429a08551c33aa922d0b91f844e275e
SHA256d257fb6f09a7a64c2a81bb5bbe968a938a0ecf557fce4874f745641ab7fd228d
SHA512e68a3e94f5805d5527aacb8654097db0d5ee3e3a9383da0391f7a9d869cc24ab25e62f890cc4a584d7d51fedf8b491a1a5925453d0124bb420be1be6cc401370
-
Filesize
91KB
MD5e6d4e8824bb96b90d1e3fb7bbcccb157
SHA1037a2cb49888fad778f7d0e6c43ea03688596b59
SHA2569dd82a1176d6d51298de48e7b717846bff896dd47de4427d53ae3adb4168502e
SHA5122f9d5f7ff2111db4b4fb4f9a975db9f84a9ec7525a31ba736e954b5d665f927c49d958356f01e74241eed741c689e6e04faab42b4b0d0bffbae605d7c2e55903
-
Filesize
91KB
MD5ccfcf87feeddec8308f2a7d21aecc250
SHA119a6bf3c53c2ec4f0664b2a675313290b2e83f32
SHA25657bf98785249fe473e15b2080237a4e34981b407f6a14e7e0caaa7fcb8b4166c
SHA5121ba94e61c665e14c7c923578a8e091af2894d421f1bb571a089386d7f1d637391604e81f4570839a3dcb52509432a05c271b4b20d2035ab8b080fc4df2389f6d
-
Filesize
91KB
MD5199e30ce0dee4d4cd881a8c83a1c818f
SHA1044b77fb54a952b055af97448f1bc44046a1ea82
SHA256a1275324f01042064f2fcc5cc2c234a6fc916335d9a382c6e90d60ca1375b545
SHA512092df21d052ef1b51aa1dd35e7551b0590721d530d246eb7cfb0a9cae5507b2549e985f6bbd0eedc6e184eb755a6b6616293333fae0c7679548b48dcb44008bc
-
Filesize
91KB
MD5bd377de9f18a6b9d99daa073a7105239
SHA1ff8dbae5ba6803431441de94cc5a5d6c6c7e7969
SHA2562678ca3f2d1bdcef1df141262988e473758149545382d00c8bc99a7d0ba7ac11
SHA512fcb590c0c4d767a8fabf232b4bee36c4fc761b41d97128a3e89f8ce1cb9a3fb714fb2b1440bcbbfcd2fb1b406199374dfb604a172946b061ebe27ccec276229d
-
Filesize
91KB
MD52870296fc2746bf8ed14f3f4d0aca286
SHA151cc8eddfe5b9a68ce1811b6ebea400887d6202e
SHA256485faa033cf27728a3d5439ca0e98b454ba5991d348d4505faa2e892bbb47efe
SHA512483041faefb1035d0d926ffbf6c6ab83c1f0e9b3d24ef63e58d1194f6ea2f9f56209ca31b09eee46be6018de6e656f675825244434da9aef1295de8b0b5b23b5