Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:24
Static task
static1
Behavioral task
behavioral1
Sample
f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe
Resource
win10v2004-20240802-en
General
-
Target
f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe
-
Size
91KB
-
MD5
af90cf445fd9666a30271f431e4934c0
-
SHA1
1be90f45f3fb6a0b10ad23a51f0e6552791475d1
-
SHA256
f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40
-
SHA512
a713ea79d38bf0050a74e4076ff8478e926c4203616c9ef9ff6eab2ece795177d0df1e45bcd1e02fb81a5798baf341b81204ab9f25bb5db87f8dc2d9160cf9bc
-
SSDEEP
1536:FAwEmBGz1lNNqDaG0PoxhlzmUAwEmBGz1lNNqDaG0Poxhlzm3:FGmUXNQDaG0A8UGmUXNQDaG0A83
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 4156 xk.exe 4180 IExplorer.exe 3608 WINLOGON.EXE 2396 CSRSS.EXE 4620 SERVICES.EXE 1776 LSASS.EXE 4108 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\IExplorer.exe f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe File opened for modification C:\Windows\SysWOW64\shell.exe f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe File created C:\Windows\SysWOW64\shell.exe f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe File created C:\Windows\SysWOW64\Mig2.scr f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe File created C:\Windows\xk.exe f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\Desktop\ f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 4156 xk.exe 4180 IExplorer.exe 3608 WINLOGON.EXE 2396 CSRSS.EXE 4620 SERVICES.EXE 1776 LSASS.EXE 4108 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3940 wrote to memory of 4156 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 82 PID 3940 wrote to memory of 4156 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 82 PID 3940 wrote to memory of 4156 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 82 PID 3940 wrote to memory of 4180 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 83 PID 3940 wrote to memory of 4180 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 83 PID 3940 wrote to memory of 4180 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 83 PID 3940 wrote to memory of 3608 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 84 PID 3940 wrote to memory of 3608 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 84 PID 3940 wrote to memory of 3608 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 84 PID 3940 wrote to memory of 2396 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 85 PID 3940 wrote to memory of 2396 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 85 PID 3940 wrote to memory of 2396 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 85 PID 3940 wrote to memory of 4620 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 86 PID 3940 wrote to memory of 4620 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 86 PID 3940 wrote to memory of 4620 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 86 PID 3940 wrote to memory of 1776 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 87 PID 3940 wrote to memory of 1776 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 87 PID 3940 wrote to memory of 1776 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 87 PID 3940 wrote to memory of 4108 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 88 PID 3940 wrote to memory of 4108 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 88 PID 3940 wrote to memory of 4108 3940 f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe 88 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe"C:\Users\Admin\AppData\Local\Temp\f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3940 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4156
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4180
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3608
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2396
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4620
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1776
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4108
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5945aeb686de446b6fa12268c4d2a2d65
SHA10fdb64d481f8f6c1253ad5a9a15a6872d99e9d7e
SHA256adea3f8b4005eb2f1226394499c4cfeb8fef2b77495740187e9a4e19228feba8
SHA512c79aa1e01d852b1efe02b6afa0a4e5ae644d437ac30dba65b3f141672a29053c7333ef41572ad847e1881d8ce196e0f733c2d8ab57c5c22d0e5beb8bce7f6382
-
Filesize
91KB
MD5bdfda761b25b1d338e36d4b5512d17ae
SHA16568aaace434f8644a0f42e784dce35b9642e808
SHA2565ca1d763a3b0edacd42dcc76ef2f21d479b1fc91d88a9faebc39e45b3b6f5b3a
SHA5129f85335bbdff5cf4fe996559b6e9c5e8a55bf884754139342ec68a5e7cb8481299e309e2dc964276e0a1063a751bd9ff09f0ec49f7cdd2985a4952750ba1dba7
-
Filesize
91KB
MD5a4ed292a111c81d309c3ed1cb18de870
SHA113cb321f0092807a3efa1a687c019b5b953b5d87
SHA2569e238b9f2f6a76a127bf33e4e6323b99c806c54e7f5425fe10d2f3545ab8989c
SHA5125cbfe18fd24f57e61cb0bd5c3ab23a9a34d779984784c5e638681fb36fa5cecc6df8b74462a9c2192ae15ecef0da5d1216ce8cabea4af24140e8f80535541d2c
-
Filesize
91KB
MD5f430b459ff726536b1bb0cc55ebe7e25
SHA13dd28d8bfec7132f91353ac10f43d166818e73e5
SHA256b9db7a39d92d666b4e30f4a6e3a59b52ec6b87c1ef9bd45d343024d275b93fcb
SHA5120139324f53346699ea7d087a14a98cd7353563c3f40c7250c22b16d65f919323854c30143fd92a946f8d2bc793069c29c57fe4f3e966293d358b4b515da78d84
-
Filesize
91KB
MD529e911fe09744d1abfa72b743be6bc01
SHA13c226f8f3d4cfc94f8e3efaf1f855f57f8bb74be
SHA2561c7daf793a1e12b47b7b42e4b3e88765824eb39119495cbf0e8a410bc5d268d8
SHA51232cd8c9725f5ba58e10efc055d0331f9b59894289dd3dd5a113dddfdc9cdf8e6083bb2241dcd8cdbf086a0b6a1a5ed58e75cbe4949aa26e0dce0e468d004d4c3
-
Filesize
91KB
MD5af90cf445fd9666a30271f431e4934c0
SHA11be90f45f3fb6a0b10ad23a51f0e6552791475d1
SHA256f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40
SHA512a713ea79d38bf0050a74e4076ff8478e926c4203616c9ef9ff6eab2ece795177d0df1e45bcd1e02fb81a5798baf341b81204ab9f25bb5db87f8dc2d9160cf9bc
-
Filesize
91KB
MD5fed2f19935d7fd1f7bb82aa792a4a127
SHA10fde36f072eae4eaa5aaa056eb29d1a55ef222f6
SHA2564ca4b190fe8126c68ff83b014b1b155c85c463c46cd3ab97bd46568b58947306
SHA51248f031a2f9852e06968a741d3857442668dfbc1c09e71c45f26defba29d304f2b82eb5ff743b51bc362641eb2efda0712ab8bfd176b4e5ae1cf3b7da81785bd0
-
Filesize
91KB
MD50b9a47b56b3522f5641754b5e8abbf33
SHA1f282400784f077f692e52bd8813521a29ed7cedf
SHA256a587d23ad0773368d2f1a8310910ac2185abbe059a5e99f750e9bb4b4e0b957e
SHA5125e6d6b8eaacecb025690a454772a333aa9c778ece259710f4fa95946e50a7e944e1d93bb7f6b1a1e93abe26fc009145aaead58cd58b923b9d035b1cb9ad7e4bd