Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 22:05
Static task
static1
Behavioral task
behavioral1
Sample
dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe
Resource
win7-20220901-en
General
-
Target
dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe
-
Size
854KB
-
MD5
7cfe2e952780ae0a43d725ff1afdf539
-
SHA1
e813574b7586a374ee81e1ae1749d6214da56e21
-
SHA256
dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91
-
SHA512
a36b1cc8ec94b36dce24da6bcc29de3059f938c8280ba47164a1703d6ec4d61efa8b366ffadef4c1c1310a5a64e8393e82409f6599fe73cf74161c84865cef28
-
SSDEEP
12288:n9CewMixJ6X7DKKPhc/AsubBOEgIQLSV2E2HILMbTziCLQfKeKE22DzTXHz:n9CewMJVc/ARYEILI2E2oLQPiCCKE2S
Malware Config
Extracted
nanocore
1.2.2.0
processor.ddns.net:8778
5bb23e3c-21bd-4668-a566-023ef5da1692
-
activate_away_mode
true
-
backup_connection_host
processor.ddns.net
- backup_dns_server
-
buffer_size
65535
-
build_time
2015-03-31T23:41:41.391502136Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
8778
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
5bb23e3c-21bd-4668-a566-023ef5da1692
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
processor.ddns.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Executes dropped EXE 6 IoCs
Processes:
String.exeAdobeARMservice.exebthserv.exeString.exeAdobeARMservice.exebthserv.exepid process 3220 String.exe 976 AdobeARMservice.exe 4720 bthserv.exe 3568 String.exe 1604 AdobeARMservice.exe 2116 bthserv.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exeString.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation String.exe -
Processes:
dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exeString.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA String.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exeString.exebthserv.exedescription pid process target process PID 3764 set thread context of 3932 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe PID 3220 set thread context of 3568 3220 String.exe String.exe PID 4720 set thread context of 2116 4720 bthserv.exe bthserv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exedd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exeAdobeARMservice.exepid process 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3932 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3932 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3932 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 976 AdobeARMservice.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exeString.exepid process 3932 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe 3568 String.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
String.exepid process 3568 String.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exedd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exeAdobeARMservice.exeString.exebthserv.exeString.exeAdobeARMservice.exedescription pid process Token: SeDebugPrivilege 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe Token: SeDebugPrivilege 3932 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe Token: SeDebugPrivilege 976 AdobeARMservice.exe Token: SeDebugPrivilege 3220 String.exe Token: SeDebugPrivilege 4720 bthserv.exe Token: SeDebugPrivilege 3568 String.exe Token: SeDebugPrivilege 1604 AdobeARMservice.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exeAdobeARMservice.exeString.exebthserv.exedescription pid process target process PID 3764 wrote to memory of 3220 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe String.exe PID 3764 wrote to memory of 3220 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe String.exe PID 3764 wrote to memory of 3220 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe String.exe PID 3764 wrote to memory of 3932 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe PID 3764 wrote to memory of 3932 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe PID 3764 wrote to memory of 3932 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe PID 3764 wrote to memory of 3932 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe PID 3764 wrote to memory of 3932 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe PID 3764 wrote to memory of 3932 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe PID 3764 wrote to memory of 3932 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe PID 3764 wrote to memory of 3932 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe PID 3764 wrote to memory of 976 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe AdobeARMservice.exe PID 3764 wrote to memory of 976 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe AdobeARMservice.exe PID 3764 wrote to memory of 976 3764 dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe AdobeARMservice.exe PID 976 wrote to memory of 4720 976 AdobeARMservice.exe bthserv.exe PID 976 wrote to memory of 4720 976 AdobeARMservice.exe bthserv.exe PID 976 wrote to memory of 4720 976 AdobeARMservice.exe bthserv.exe PID 3220 wrote to memory of 3568 3220 String.exe String.exe PID 3220 wrote to memory of 3568 3220 String.exe String.exe PID 3220 wrote to memory of 3568 3220 String.exe String.exe PID 3220 wrote to memory of 3568 3220 String.exe String.exe PID 3220 wrote to memory of 3568 3220 String.exe String.exe PID 3220 wrote to memory of 3568 3220 String.exe String.exe PID 3220 wrote to memory of 3568 3220 String.exe String.exe PID 3220 wrote to memory of 3568 3220 String.exe String.exe PID 3220 wrote to memory of 1604 3220 String.exe AdobeARMservice.exe PID 3220 wrote to memory of 1604 3220 String.exe AdobeARMservice.exe PID 3220 wrote to memory of 1604 3220 String.exe AdobeARMservice.exe PID 4720 wrote to memory of 2116 4720 bthserv.exe bthserv.exe PID 4720 wrote to memory of 2116 4720 bthserv.exe bthserv.exe PID 4720 wrote to memory of 2116 4720 bthserv.exe bthserv.exe PID 4720 wrote to memory of 2116 4720 bthserv.exe bthserv.exe PID 4720 wrote to memory of 2116 4720 bthserv.exe bthserv.exe PID 4720 wrote to memory of 2116 4720 bthserv.exe bthserv.exe PID 4720 wrote to memory of 2116 4720 bthserv.exe bthserv.exe PID 4720 wrote to memory of 2116 4720 bthserv.exe bthserv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe"C:\Users\Admin\AppData\Local\Temp\dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\Desktop\String.exe"C:\Users\Admin\Desktop\String.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\Desktop\String.exe"C:\Users\Admin\Desktop\String.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:3568 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe"C:\Users\Admin\AppData\Local\Temp\dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3932 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe"4⤵
- Executes dropped EXE
PID:2116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
404B
MD515b6596d028baa2a113143d1828bcc36
SHA1f1be43126c4e765fe499718c388823d44bf1fef1
SHA256529f9fde2234067382b4c6fb8e5aee49d8a8b1b85c82b0bdae425fa2a0264f75
SHA512f2a6cb8498f596c7bf9178ea32a245dbb3657f43a179f378ce952ce5cb8580810cd67ef1efb623bcf6cd796d74e2c9b7bc42cb8665ead397546ce3b400181e83
-
Filesize
8B
MD5025370c404e0b04329fc6d989a31dfe4
SHA120b4575f07e6793388d15b66c69a13ad08fdbd3e
SHA2563a5fd4f896b64358d6b6baeb034f666ef4199dfa9ed8d2b75024ee02c8edcac5
SHA512f534323b0f11ed2231ce5c8e95cd786b89c441bd89a038a40f4644baadab983e567c35ac84ec97c8f7ba97a54cffd8aaccccd72b2378b746beee4cb211ca4a93
-
Filesize
10KB
MD53e06d8a3100e400ab1e628ce8deb2367
SHA15a1ec4e87d1750c4e4cdfd64d8e52fef35611dac
SHA256cbf1feeabb169c53706763f4b9d646ae2bff48af57023cc8a0f06231d428b846
SHA51256d59982f4c1acc122a8baafcefb4dc032cc38c0f1b5d138450635c560af2cdef389957b05e65b0c2e70fba2fc05f36a3f3bc247661a1fa5d077735b83bfd0d2
-
Filesize
10KB
MD53e06d8a3100e400ab1e628ce8deb2367
SHA15a1ec4e87d1750c4e4cdfd64d8e52fef35611dac
SHA256cbf1feeabb169c53706763f4b9d646ae2bff48af57023cc8a0f06231d428b846
SHA51256d59982f4c1acc122a8baafcefb4dc032cc38c0f1b5d138450635c560af2cdef389957b05e65b0c2e70fba2fc05f36a3f3bc247661a1fa5d077735b83bfd0d2
-
Filesize
10KB
MD5a940b261ec4480bf5c5cdeb063d64b50
SHA1a528f41956a077f99b9fca2dd862f9462bb08834
SHA256a5085e4a6b469e14c9386b9e02acc95d80c8ad7431c9c5a7b468a071758f9611
SHA512d7096cc7b569b2cf0a49270ee0cb011ff7a7c346abdd4a958c8abea21d66a043cf983cee7c8e73c125a21f5b4c0e259194248105549d853f02110f11a512cd45
-
Filesize
10KB
MD5a940b261ec4480bf5c5cdeb063d64b50
SHA1a528f41956a077f99b9fca2dd862f9462bb08834
SHA256a5085e4a6b469e14c9386b9e02acc95d80c8ad7431c9c5a7b468a071758f9611
SHA512d7096cc7b569b2cf0a49270ee0cb011ff7a7c346abdd4a958c8abea21d66a043cf983cee7c8e73c125a21f5b4c0e259194248105549d853f02110f11a512cd45
-
Filesize
854KB
MD57cfe2e952780ae0a43d725ff1afdf539
SHA1e813574b7586a374ee81e1ae1749d6214da56e21
SHA256dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91
SHA512a36b1cc8ec94b36dce24da6bcc29de3059f938c8280ba47164a1703d6ec4d61efa8b366ffadef4c1c1310a5a64e8393e82409f6599fe73cf74161c84865cef28
-
Filesize
854KB
MD57cfe2e952780ae0a43d725ff1afdf539
SHA1e813574b7586a374ee81e1ae1749d6214da56e21
SHA256dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91
SHA512a36b1cc8ec94b36dce24da6bcc29de3059f938c8280ba47164a1703d6ec4d61efa8b366ffadef4c1c1310a5a64e8393e82409f6599fe73cf74161c84865cef28
-
Filesize
854KB
MD57cfe2e952780ae0a43d725ff1afdf539
SHA1e813574b7586a374ee81e1ae1749d6214da56e21
SHA256dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91
SHA512a36b1cc8ec94b36dce24da6bcc29de3059f938c8280ba47164a1703d6ec4d61efa8b366ffadef4c1c1310a5a64e8393e82409f6599fe73cf74161c84865cef28
-
Filesize
405KB
MD59cb77bd039a53b629afedbac8b14c3d3
SHA173972a7f9ae35d51138a8122732f51175a53e051
SHA25607e2d5d58738aeb71422b0f237639b2a062114b893501033210be479c713414f
SHA512a538ce7f344779e0f64ddf6cf07a81d828d53a71dec9a2f75d053d08ea64b07994a9774a0718fc9b6f9063fd77430d462814709cec9263df98f1e673e34234bc
-
Filesize
405KB
MD59cb77bd039a53b629afedbac8b14c3d3
SHA173972a7f9ae35d51138a8122732f51175a53e051
SHA25607e2d5d58738aeb71422b0f237639b2a062114b893501033210be479c713414f
SHA512a538ce7f344779e0f64ddf6cf07a81d828d53a71dec9a2f75d053d08ea64b07994a9774a0718fc9b6f9063fd77430d462814709cec9263df98f1e673e34234bc
-
Filesize
405KB
MD59cb77bd039a53b629afedbac8b14c3d3
SHA173972a7f9ae35d51138a8122732f51175a53e051
SHA25607e2d5d58738aeb71422b0f237639b2a062114b893501033210be479c713414f
SHA512a538ce7f344779e0f64ddf6cf07a81d828d53a71dec9a2f75d053d08ea64b07994a9774a0718fc9b6f9063fd77430d462814709cec9263df98f1e673e34234bc