Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2025 06:17
Behavioral task
behavioral1
Sample
df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe
Resource
win10v2004-20250207-en
General
-
Target
df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe
-
Size
1.7MB
-
MD5
9bce9dae679419198574f4c9837085db
-
SHA1
62a24f1ee057e936f3bf01749ecd7e3675d0f10d
-
SHA256
df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8
-
SHA512
9647610d36379a789ab45e21b1997eeff560058cf55374b0a404be9474becca566ec0dd97cbb49b8d54da811bb5fe1e4d2e3e6de9b8fd57825181d611019f467
-
SSDEEP
24576:6G5C8hr/Vz9ih9i38xVEL/QQPL6BH8kQqNgQ+uH6FqgtMok4+iL:I8hJz8eDsH8kQqNs86F1yU
Malware Config
Signatures
-
Detects Trigona ransomware 14 IoCs
resource yara_rule behavioral2/memory/3200-0-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/3200-1-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/3200-2-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/3200-4-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/3200-5-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/3200-10-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/3200-1034-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/3200-4571-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/3200-5213-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/3200-9957-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/3200-18652-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/3200-24428-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/3200-24429-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona behavioral2/memory/3200-24430-0x0000000000400000-0x00000000005D1000-memory.dmp family_trigona -
Trigona
A ransomware first seen at the beginning of the 2022.
-
Trigona family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 2412 7644 Process not Found -
Drops startup file 1 IoCs
description ioc Process File created \??\c:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\99173AF9FD7D25164A812A19A4C082F4 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe" df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification F:\$RECYCLE.BIN\S-1-5-21-189444705-1272902858-1305688695-1000\desktop.ini df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\$Recycle.Bin\S-1-5-21-189444705-1272902858-1305688695-1000\desktop.ini df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\desktop.ini df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Trial-ul-oob.xrm-ms df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Trial-ul-oob.xrm-ms df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\PresentationFramework.resources.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\legal\javafx\gstreamer.md df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files\Java\jdk-1.8\jre\bin\dtplugin\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files\VideoLAN\VLC\locale\eo\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN121.XML df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-white_scale-100.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\1033\STSUPLD.INTL.DLL df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\uk-ua\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files (x86)\Common Files\Microsoft Shared\TextConv\en-US\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\VideoLAN\VLC\lua\http\requests\browse.xml df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\WorldClockWideTile.contrast-black_scale-125.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ro-ro\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_altgr.xml df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Config\VMRConfig.json df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files (x86)\Microsoft\EdgeUpdate\Download\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.Sockets.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-black\MedTile.scale-125.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\LISTS\1033\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sl-si\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-white_scale-80.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014 df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\MEDIA\BREEZE.WAV df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-us\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial4-pl.xrm-ms df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Windows Media Player\Network Sharing\ContentDirectory.xml df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files\Java\jre-1.8\bin\plugin2\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ja-jp\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files (x86)\Windows Media Player\it-IT\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Console.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pl\System.Windows.Controls.Ribbon.resources.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.contrast-white_scale-140.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-125_kzf8qxf38zg5c\Assets\Images\SkypeTile.scale-125_contrast-black.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxBlockMap.xml df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\x64\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\api-ms-win-crt-string-l1-1-0.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_222222_256x240.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Windows Multimedia Platform\sqmapi.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageAppList.targetsize-36_altform-unplated_contrast-black.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\java-rmi.exe df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019XC2RVL_KMS_ClientC2R-ppd.xrm-ms df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail-pl.xrm-ms df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\PROOF\MSHY7FR.DLL df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageMedTile.scale-200_contrast-white.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-64_altform-lightunplated.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\pt-PT\View3d\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Common Files\System\es-ES\wab32res.dll.mui df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\AUDIOSEARCHLTS.DLL df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\UIAutomationClient.resources.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Windows Media Player\fr-FR\setup_wm.exe.mui df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-white\MedTile.scale-125.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\listening.slk df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001B-0000-1000-0000000FF1CE.xml df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\VideoLAN\VLC\plugins\video_output\libwgl_plugin.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\LiveTile\5px.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-runtime-l1-1-0.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\VideoLAN\VLC\plugins\demux\libnsc_plugin.dll df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\GamesXboxHubAppList.scale-200_contrast-white.png df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File created \??\c:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\ja-JP\how_to_decrypt.hta df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Retail-pl.xrm-ms df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EDGE\PREVIEW.GIF df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2612 MicrosoftEdgeUpdate.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe"C:\Users\Admin\AppData\Local\Temp\df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
PID:3200
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzQ2OTUwODMwIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2612
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5bcb0e4e997579be05cdf5a8f54d1c444
SHA1b5979c9e9f843e050b5509f7d3aa32573f15902c
SHA256506f0f63594a5a60a6f06de8a094be3298ab365e5a8b3396b21d585d63edf7cf
SHA512218fc3a1e6b0ae2eaf158d555a19c53daca109dd887e9be6ef987226f4fb255dc8fbd0a21a541d68e07a639cc30d4818d28507752ff11aba7ece43bae573290b
-
Filesize
12KB
MD519cce605e11537f8f293d77f734fedfd
SHA1e31a5d395af92ff9a3d22c9282c17641d2ca3507
SHA25636c1a245357d2fc31ad609fe10d6b57fc84935fff1a21393798d9cce5030b730
SHA5121c864dd35d9a7872fa19044f630b969a325744f951885cf472b2f50ea52eb3ea59e555a815f746cc093fc37962537eff605f04d4a90710632aaf4f53c49c042d