Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 13:57
Static task
static1
Behavioral task
behavioral1
Sample
loggnp.exe
Resource
win7-20241023-en
General
-
Target
loggnp.exe
-
Size
1.3MB
-
MD5
47daa94b04ff038ade5342c9de2d93e7
-
SHA1
e8918b3c526002213b94b5d497d63d2b98f6c354
-
SHA256
7d75b643c71063ea63b7cf241bf138c5546ac59399456776938ae1dee6dcfd0a
-
SHA512
abbfb1417edfde19694759d63ae175192ce180e937b443e4b485c32eee22389f319a618f9883934a6f878fd5d6530ab7b1f6058f616e79906f6adb8bb9115bf2
-
SSDEEP
24576:xuDXTIGaPhEYzUzA0nOLYuVuoWIT/ntnA0zggkJboApVzHLEQrdCNYffzHLS:kDjlabwz9OLYdm9zItRnzzG4fzu
Malware Config
Signatures
-
Detect Umbral payload 4 IoCs
resource yara_rule behavioral2/files/0x000a000000023b93-8.dat family_umbral behavioral2/memory/2352-17-0x000001DB38CA0000-0x000001DB38D22000-memory.dmp family_umbral behavioral2/files/0x000a000000023b94-108.dat family_umbral behavioral2/memory/3892-116-0x00000167BD010000-0x00000167BD092000-memory.dmp family_umbral -
Umbral family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1508 powershell.exe 2816 powershell.exe 3568 powershell.exe 1876 powershell.exe 2008 powershell.exe 3712 powershell.exe 3100 powershell.exe 2188 powershell.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Cc.exe File opened for modification C:\Windows\System32\drivers\etc\hosts CcC.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation loggnp.exe -
Executes dropped EXE 2 IoCs
pid Process 2352 Cc.exe 3892 CcC.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 26 discord.com 27 discord.com 34 discord.com 35 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com 31 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4088 cmd.exe 4968 PING.EXE 5064 cmd.exe 3428 PING.EXE -
Detects videocard installed 1 TTPs 2 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4384 wmic.exe 3116 wmic.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4968 PING.EXE 3428 PING.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2352 Cc.exe 1508 powershell.exe 1508 powershell.exe 3100 powershell.exe 3100 powershell.exe 2188 powershell.exe 2188 powershell.exe 468 powershell.exe 468 powershell.exe 3568 powershell.exe 3568 powershell.exe 3892 CcC.exe 2816 powershell.exe 2816 powershell.exe 1876 powershell.exe 1876 powershell.exe 2008 powershell.exe 2008 powershell.exe 3160 powershell.exe 3160 powershell.exe 3712 powershell.exe 3712 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2352 Cc.exe Token: SeIncreaseQuotaPrivilege 3348 wmic.exe Token: SeSecurityPrivilege 3348 wmic.exe Token: SeTakeOwnershipPrivilege 3348 wmic.exe Token: SeLoadDriverPrivilege 3348 wmic.exe Token: SeSystemProfilePrivilege 3348 wmic.exe Token: SeSystemtimePrivilege 3348 wmic.exe Token: SeProfSingleProcessPrivilege 3348 wmic.exe Token: SeIncBasePriorityPrivilege 3348 wmic.exe Token: SeCreatePagefilePrivilege 3348 wmic.exe Token: SeBackupPrivilege 3348 wmic.exe Token: SeRestorePrivilege 3348 wmic.exe Token: SeShutdownPrivilege 3348 wmic.exe Token: SeDebugPrivilege 3348 wmic.exe Token: SeSystemEnvironmentPrivilege 3348 wmic.exe Token: SeRemoteShutdownPrivilege 3348 wmic.exe Token: SeUndockPrivilege 3348 wmic.exe Token: SeManageVolumePrivilege 3348 wmic.exe Token: 33 3348 wmic.exe Token: 34 3348 wmic.exe Token: 35 3348 wmic.exe Token: 36 3348 wmic.exe Token: SeIncreaseQuotaPrivilege 3348 wmic.exe Token: SeSecurityPrivilege 3348 wmic.exe Token: SeTakeOwnershipPrivilege 3348 wmic.exe Token: SeLoadDriverPrivilege 3348 wmic.exe Token: SeSystemProfilePrivilege 3348 wmic.exe Token: SeSystemtimePrivilege 3348 wmic.exe Token: SeProfSingleProcessPrivilege 3348 wmic.exe Token: SeIncBasePriorityPrivilege 3348 wmic.exe Token: SeCreatePagefilePrivilege 3348 wmic.exe Token: SeBackupPrivilege 3348 wmic.exe Token: SeRestorePrivilege 3348 wmic.exe Token: SeShutdownPrivilege 3348 wmic.exe Token: SeDebugPrivilege 3348 wmic.exe Token: SeSystemEnvironmentPrivilege 3348 wmic.exe Token: SeRemoteShutdownPrivilege 3348 wmic.exe Token: SeUndockPrivilege 3348 wmic.exe Token: SeManageVolumePrivilege 3348 wmic.exe Token: 33 3348 wmic.exe Token: 34 3348 wmic.exe Token: 35 3348 wmic.exe Token: 36 3348 wmic.exe Token: SeDebugPrivilege 1508 powershell.exe Token: SeDebugPrivilege 3100 powershell.exe Token: SeDebugPrivilege 2188 powershell.exe Token: SeDebugPrivilege 468 powershell.exe Token: SeIncreaseQuotaPrivilege 4376 wmic.exe Token: SeSecurityPrivilege 4376 wmic.exe Token: SeTakeOwnershipPrivilege 4376 wmic.exe Token: SeLoadDriverPrivilege 4376 wmic.exe Token: SeSystemProfilePrivilege 4376 wmic.exe Token: SeSystemtimePrivilege 4376 wmic.exe Token: SeProfSingleProcessPrivilege 4376 wmic.exe Token: SeIncBasePriorityPrivilege 4376 wmic.exe Token: SeCreatePagefilePrivilege 4376 wmic.exe Token: SeBackupPrivilege 4376 wmic.exe Token: SeRestorePrivilege 4376 wmic.exe Token: SeShutdownPrivilege 4376 wmic.exe Token: SeDebugPrivilege 4376 wmic.exe Token: SeSystemEnvironmentPrivilege 4376 wmic.exe Token: SeRemoteShutdownPrivilege 4376 wmic.exe Token: SeUndockPrivilege 4376 wmic.exe Token: SeManageVolumePrivilege 4376 wmic.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 3244 wrote to memory of 2352 3244 loggnp.exe 89 PID 3244 wrote to memory of 2352 3244 loggnp.exe 89 PID 2352 wrote to memory of 3348 2352 Cc.exe 93 PID 2352 wrote to memory of 3348 2352 Cc.exe 93 PID 2352 wrote to memory of 2432 2352 Cc.exe 95 PID 2352 wrote to memory of 2432 2352 Cc.exe 95 PID 2352 wrote to memory of 1508 2352 Cc.exe 97 PID 2352 wrote to memory of 1508 2352 Cc.exe 97 PID 2352 wrote to memory of 3100 2352 Cc.exe 102 PID 2352 wrote to memory of 3100 2352 Cc.exe 102 PID 2352 wrote to memory of 2188 2352 Cc.exe 104 PID 2352 wrote to memory of 2188 2352 Cc.exe 104 PID 2352 wrote to memory of 468 2352 Cc.exe 106 PID 2352 wrote to memory of 468 2352 Cc.exe 106 PID 2352 wrote to memory of 4376 2352 Cc.exe 108 PID 2352 wrote to memory of 4376 2352 Cc.exe 108 PID 2352 wrote to memory of 2256 2352 Cc.exe 110 PID 2352 wrote to memory of 2256 2352 Cc.exe 110 PID 2352 wrote to memory of 1908 2352 Cc.exe 112 PID 2352 wrote to memory of 1908 2352 Cc.exe 112 PID 2352 wrote to memory of 3568 2352 Cc.exe 114 PID 2352 wrote to memory of 3568 2352 Cc.exe 114 PID 2352 wrote to memory of 3116 2352 Cc.exe 116 PID 2352 wrote to memory of 3116 2352 Cc.exe 116 PID 2352 wrote to memory of 4088 2352 Cc.exe 118 PID 2352 wrote to memory of 4088 2352 Cc.exe 118 PID 4088 wrote to memory of 4968 4088 cmd.exe 120 PID 4088 wrote to memory of 4968 4088 cmd.exe 120 PID 3244 wrote to memory of 3892 3244 loggnp.exe 122 PID 3244 wrote to memory of 3892 3244 loggnp.exe 122 PID 3892 wrote to memory of 4300 3892 CcC.exe 124 PID 3892 wrote to memory of 4300 3892 CcC.exe 124 PID 3892 wrote to memory of 4340 3892 CcC.exe 126 PID 3892 wrote to memory of 4340 3892 CcC.exe 126 PID 3892 wrote to memory of 2816 3892 CcC.exe 128 PID 3892 wrote to memory of 2816 3892 CcC.exe 128 PID 3892 wrote to memory of 1876 3892 CcC.exe 130 PID 3892 wrote to memory of 1876 3892 CcC.exe 130 PID 3892 wrote to memory of 2008 3892 CcC.exe 132 PID 3892 wrote to memory of 2008 3892 CcC.exe 132 PID 3892 wrote to memory of 3160 3892 CcC.exe 134 PID 3892 wrote to memory of 3160 3892 CcC.exe 134 PID 3892 wrote to memory of 3324 3892 CcC.exe 136 PID 3892 wrote to memory of 3324 3892 CcC.exe 136 PID 3892 wrote to memory of 436 3892 CcC.exe 138 PID 3892 wrote to memory of 436 3892 CcC.exe 138 PID 3892 wrote to memory of 3596 3892 CcC.exe 140 PID 3892 wrote to memory of 3596 3892 CcC.exe 140 PID 3892 wrote to memory of 3712 3892 CcC.exe 142 PID 3892 wrote to memory of 3712 3892 CcC.exe 142 PID 3892 wrote to memory of 4384 3892 CcC.exe 144 PID 3892 wrote to memory of 4384 3892 CcC.exe 144 PID 3892 wrote to memory of 5064 3892 CcC.exe 151 PID 3892 wrote to memory of 5064 3892 CcC.exe 151 PID 5064 wrote to memory of 3428 5064 cmd.exe 153 PID 5064 wrote to memory of 3428 5064 cmd.exe 153 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2432 attrib.exe 4340 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\loggnp.exe"C:\Users\Admin\AppData\Local\Temp\loggnp.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Cc.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Cc.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
C:\Windows\SYSTEM32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Cc.exe"3⤵
- Views/modifies file attributes
PID:2432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RarSFX0\Cc.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵PID:2256
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:1908
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:3116
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Cc.exe" && pause3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\system32\PING.EXEping localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\CcC.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\CcC.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:4300
-
-
C:\Windows\SYSTEM32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\RarSFX0\CcC.exe"3⤵
- Views/modifies file attributes
PID:4340
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RarSFX0\CcC.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵PID:3324
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵PID:436
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:3596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:4384
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\RarSFX0\CcC.exe" && pause3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\system32\PING.EXEping localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3428
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
64B
MD5a67eee085e8f68aaffbfdb51503d6561
SHA129db9b41945c6a5d27d5836a1c780668eded65a0
SHA2566e155bcc98f4e175a8701f030b73b14d9002b175ef58a19cb9010af3964e36b4
SHA5127923bc74260e77d62b20cf510b79e0422563469ec3543084a989db154b1e39370f1a6e6c6e73caa7471d0974a693b1beb4fd2ddfb14b0b5c58650b5df3c32d81
-
Filesize
944B
MD596ff1ee586a153b4e7ce8661cabc0442
SHA1140d4ff1840cb40601489f3826954386af612136
SHA2560673399a2f37c89d455e8658c4d30b9248bff1ea47ba40957588e2bc862976e8
SHA5123404370d0edb4ead4874ce68525dc9bcbc6008003682646e331bf43a06a24a467ace7eff5be701a822d74c7e065d0f6a0ba0e3d6bc505d34d0189373dcacb569
-
Filesize
948B
MD528ef595a6cc9f47b8eccb22d4ed50d6c
SHA14335de707324b15eba79017938c3da2752d3eea5
SHA2563abd14d4fe7b5697b2fa84993e7183f4fd2580be5b4e5150da15ddda5a9560b9
SHA512687b7849faa62a4dabc240b573afa163f0cda9a80be61cebe28ef1461777744d73b465ac92d065093228068540846e79c899445057f5b906f9b9fa9868132208
-
Filesize
1KB
MD505f6f27c298dbb70ed7a51b844ada2a4
SHA1d498076720a0ce3efe3c5afa9d18155f73f42b7b
SHA256df90c1970460fa1b165594fb1b5d2ac3b2c6df11118bef7d6cc97972987809a5
SHA5124dce5fe2d21fb57fd05d0139c3b29d887e62884fd3128e1d6718a61e98eaaca7ea6ed45accb1fd761323671bb159ac911c520fd3bd8e71d027ca69308984d7e6
-
Filesize
944B
MD52979eabc783eaca50de7be23dd4eafcf
SHA1d709ce5f3a06b7958a67e20870bfd95b83cad2ea
SHA256006cca90e78fbb571532a83082ac6712721a34ea4b21f490058ffb3f521f4903
SHA51292bc433990572d9427d0c93eef9bd1cc23fa00ed60dd0c9c983d87d3421e02ce3f156c6f88fe916ef6782dbf185cbce083bc0094f8c527f302be6a37d1c53aba
-
Filesize
948B
MD5966914e2e771de7a4a57a95b6ecfa8a9
SHA17a32282fd51dd032967ed4d9a40cc57e265aeff2
SHA25698d3c70d7004fa807897317bd6cd3e977b9b6c72d4d2565aca0f9f8b1c315cba
SHA512dc39c7124a9c7c8d4c7e8e16290c46360b8d9a8f4e43edaacbbeb09bdcf20159a53db54d2b322372001b6a3de52b2f88e9088b5fdbc7638816ae0d122bb015f5
-
Filesize
1KB
MD5276798eeb29a49dc6e199768bc9c2e71
SHA15fdc8ccb897ac2df7476fbb07517aca5b7a6205b
SHA256cd0a1056e8f1b6cb5cb328532239d802f4e2aa8f8fcdc0fcb487684bd68e0dcc
SHA5120d34fce64bbefc57d64fa6e03ca886952263d5f24df9c1c4cce6a1e8f5a47a9a21e9820f8d38caa7f7b43a52336ce00b738ea18419aaa7c788b72e04ce19e4f2
-
Filesize
1KB
MD5eeb6ad386d143f278077171fc01a81e8
SHA143cff1bd7240965bfb2f10e47c0cec0f94332e2d
SHA25659d62f9472b4c00b7cae0ee702789fa2b0042c468e4de9421d2430f9973eb00d
SHA512b40f003e6d97adaaf05809f06d12df01984943d9eb6c44eaeffef90df8de0040373150c9714b11a42db5189b7064eeed0609a39f6f1feb91b05dd1835333e8f2
-
Filesize
492KB
MD54e6a63942f5205cc84a200ebc4aebc2e
SHA119ff74550c41a562e1b2b9cbe3c67608f685aefc
SHA256fef58748adf375c23f2604f9c422f353a7fc969ca32bab8bf965b2648bf178d4
SHA51234eb34a4358cfdf19563616659915ef0a895cbf1d37181fa4c003c1d904744c0ce664f56a287b2f2eb631e0f73af90e08b252d4bd090fe5054ed14890c251729
-
Filesize
492KB
MD59e1d91acd2ee7f84fdb7374b66b28cf9
SHA136701c1a18a9fafe10e3d8fa2318453d7d193d5f
SHA256fe47fabeb2de30c850fda2ee6f5af68de6197e84f748d2d81855db4a27755703
SHA512eaf5e72e466dd31083156ad71f73bfa474219c2b4a753ec2ef1f7514ac3706a8d20018d07432a9ef68779300b8f13378a767625d8ea8722a1dab12ba91c0514a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD54028457913f9d08b06137643fe3e01bc
SHA1a5cb3f12beaea8194a2d3d83a62bdb8d558f5f14
SHA256289d433902418aaf62e7b96b215ece04fcbcef2457daf90f46837a4d5090da58
SHA512c8e1eef90618341bbde885fd126ece2b1911ca99d20d82f62985869ba457553b4c2bf1e841fd06dacbf27275b3b0940e5a794e1b1db0fd56440a96592362c28b