Resubmissions
05-11-2022 19:59
221105-yqefyabgdl 1005-11-2022 19:56
221105-yn7dyabgcp 1005-11-2022 19:39
221105-ydcftabfgr 1005-11-2022 19:22
221105-x3ef2ahce6 10Analysis
-
max time kernel
608s -
max time network
615s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-de -
resource tags
arch:x64arch:x86image:win10v2004-20220812-delocale:de-deos:windows10-2004-x64systemwindows -
submitted
05-11-2022 19:39
Static task
static1
Behavioral task
behavioral1
Sample
Crack UZ1/DriverDoc.exe
Resource
win7-20220812-de
Behavioral task
behavioral2
Sample
Crack UZ1/DriverDoc.exe
Resource
win10v2004-20220812-de
Behavioral task
behavioral3
Sample
Setup_DriverDoc_2022.exe
Resource
win7-20220812-de
Behavioral task
behavioral4
Sample
Setup_DriverDoc_2022.exe
Resource
win10v2004-20220812-de
General
-
Target
Setup_DriverDoc_2022.exe
-
Size
6.0MB
-
MD5
c65a354ac28f2f45c7ca8a38e4f778d6
-
SHA1
42d84f6be5cfa1503dc7bd8275073872d71a4fc0
-
SHA256
396cb9e17c57f09c4afab97f91e72011e3f115b15e764c39d26473d92fe2c45e
-
SHA512
7acba2651fb1378a97c47ce6723808235ddd74d2cb736f5fb6f28a241f3b33188e9a511c6be2eb3ca8e7cad68c05a76a0c853edc5a417a16aacd5c0388950017
-
SSDEEP
98304:KSi1jH0UJukUYMwioEgGU9KM+ZFNIO05p0oO2gz8+fyTx:MUvkUMiij9KM+7Npc0R4+KTx
Malware Config
Signatures
-
Affect hook table 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\is-QOT80.tmp\Setup_DriverDoc_2022.tmp win_hook C:\Users\Admin\AppData\Local\Temp\is-QOT80.tmp\Setup_DriverDoc_2022.tmp win_hook C:\DriverDoc\DriverDoc.exe win_hook C:\DriverDoc\Extra\DriverPro.exe win_hook C:\DriverDoc\DriverDoc.exe win_hook -
Anti-Sandbox checks for ThreatExpert 1 IoCs
Processes:
resource yara_rule C:\DriverDoc\Extra\DriverPro.exe antisb_threatExpert -
Bypass DEP 6 IoCs
Processes:
resource yara_rule behavioral4/memory/1468-133-0x0000000000400000-0x00000000004E4000-memory.dmp disable_dep C:\Users\Admin\AppData\Local\Temp\is-QOT80.tmp\Setup_DriverDoc_2022.tmp disable_dep behavioral4/memory/1468-137-0x0000000000400000-0x00000000004E4000-memory.dmp disable_dep behavioral4/memory/1468-138-0x0000000000400000-0x00000000004E4000-memory.dmp disable_dep C:\Users\Admin\AppData\Local\Temp\is-QOT80.tmp\Setup_DriverDoc_2022.tmp disable_dep behavioral4/memory/1468-169-0x0000000000400000-0x00000000004E4000-memory.dmp disable_dep -
Check_OutputDebugStringA_iat 4 IoCs
Processes:
resource yara_rule C:\DriverDoc\sqlite3.dll Check_OutputDebugStringA_iat C:\DriverDoc\sqlite3.dll Check_OutputDebugStringA_iat C:\DriverDoc\Extra\sqlite3.dll Check_OutputDebugStringA_iat C:\DriverDoc\Extra\sqlite3.dll Check_OutputDebugStringA_iat -
Checks if being debugged 9 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\is-QOT80.tmp\Setup_DriverDoc_2022.tmp anti_dbg C:\Users\Admin\AppData\Local\Temp\is-QOT80.tmp\Setup_DriverDoc_2022.tmp anti_dbg C:\DriverDoc\DriverDoc.exe anti_dbg C:\DriverDoc\sqlite3.dll anti_dbg C:\DriverDoc\sqlite3.dll anti_dbg C:\DriverDoc\Extra\DriverPro.exe anti_dbg C:\DriverDoc\Extra\sqlite3.dll anti_dbg C:\DriverDoc\Extra\sqlite3.dll anti_dbg C:\DriverDoc\DriverDoc.exe anti_dbg -
DebuggerCheck__QueryInfo 2 IoCs
Processes:
resource yara_rule C:\DriverDoc\DriverDoc.exe DebuggerCheck__QueryInfo C:\DriverDoc\DriverDoc.exe DebuggerCheck__QueryInfo -
DebuggerException__SetConsoleCtrl 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\is-QOT80.tmp\Setup_DriverDoc_2022.tmp DebuggerException__SetConsoleCtrl C:\Users\Admin\AppData\Local\Temp\is-QOT80.tmp\Setup_DriverDoc_2022.tmp DebuggerException__SetConsoleCtrl -
SEH_Init 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\is-QOT80.tmp\Setup_DriverDoc_2022.tmp SEH_Init C:\Users\Admin\AppData\Local\Temp\is-QOT80.tmp\Setup_DriverDoc_2022.tmp SEH_Init C:\DriverDoc\DriverDoc.exe SEH_Init C:\DriverDoc\Extra\DriverPro.exe SEH_Init C:\DriverDoc\DriverDoc.exe SEH_Init -
SEH_Save 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\is-QOT80.tmp\Setup_DriverDoc_2022.tmp SEH_Save C:\Users\Admin\AppData\Local\Temp\is-QOT80.tmp\Setup_DriverDoc_2022.tmp SEH_Save C:\DriverDoc\DriverDoc.exe SEH_Save C:\DriverDoc\Extra\DriverPro.exe SEH_Save C:\DriverDoc\DriverDoc.exe SEH_Save -
Executes dropped EXE 3 IoCs
Processes:
Setup_DriverDoc_2022.tmpDriverDoc.exeDriverPro.exepid process 940 Setup_DriverDoc_2022.tmp 4088 DriverDoc.exe 4260 DriverPro.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Setup_DriverDoc_2022.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Setup_DriverDoc_2022.tmp -
Loads dropped DLL 2 IoCs
Processes:
DriverDoc.exeDriverPro.exepid process 4088 DriverDoc.exe 4260 DriverPro.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Setup_DriverDoc_2022.tmpdescription ioc process File opened (read-only) \??\T: Setup_DriverDoc_2022.tmp File opened (read-only) \??\W: Setup_DriverDoc_2022.tmp File opened (read-only) \??\X: Setup_DriverDoc_2022.tmp File opened (read-only) \??\J: Setup_DriverDoc_2022.tmp File opened (read-only) \??\K: Setup_DriverDoc_2022.tmp File opened (read-only) \??\L: Setup_DriverDoc_2022.tmp File opened (read-only) \??\M: Setup_DriverDoc_2022.tmp File opened (read-only) \??\Q: Setup_DriverDoc_2022.tmp File opened (read-only) \??\F: Setup_DriverDoc_2022.tmp File opened (read-only) \??\G: Setup_DriverDoc_2022.tmp File opened (read-only) \??\O: Setup_DriverDoc_2022.tmp File opened (read-only) \??\P: Setup_DriverDoc_2022.tmp File opened (read-only) \??\U: Setup_DriverDoc_2022.tmp File opened (read-only) \??\Z: Setup_DriverDoc_2022.tmp File opened (read-only) \??\A: Setup_DriverDoc_2022.tmp File opened (read-only) \??\B: Setup_DriverDoc_2022.tmp File opened (read-only) \??\I: Setup_DriverDoc_2022.tmp File opened (read-only) \??\R: Setup_DriverDoc_2022.tmp File opened (read-only) \??\S: Setup_DriverDoc_2022.tmp File opened (read-only) \??\E: Setup_DriverDoc_2022.tmp File opened (read-only) \??\H: Setup_DriverDoc_2022.tmp File opened (read-only) \??\N: Setup_DriverDoc_2022.tmp File opened (read-only) \??\V: Setup_DriverDoc_2022.tmp File opened (read-only) \??\Y: Setup_DriverDoc_2022.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2448 taskkill.exe 1448 taskkill.exe 3056 taskkill.exe 4164 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
Setup_DriverDoc_2022.tmpDriverDoc.exeDriverPro.exepid process 940 Setup_DriverDoc_2022.tmp 940 Setup_DriverDoc_2022.tmp 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4088 DriverDoc.exe 4260 DriverPro.exe 4260 DriverPro.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Setup_DriverDoc_2022.tmppid process 940 Setup_DriverDoc_2022.tmp -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exeDriverDoc.exedescription pid process Token: SeDebugPrivilege 1448 taskkill.exe Token: SeDebugPrivilege 3056 taskkill.exe Token: SeDebugPrivilege 4164 taskkill.exe Token: SeDebugPrivilege 2448 taskkill.exe Token: SeDebugPrivilege 4088 DriverDoc.exe Token: SeIncreaseQuotaPrivilege 4088 DriverDoc.exe Token: SeImpersonatePrivilege 4088 DriverDoc.exe Token: SeLoadDriverPrivilege 4088 DriverDoc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Setup_DriverDoc_2022.tmppid process 940 Setup_DriverDoc_2022.tmp -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
Setup_DriverDoc_2022.exeSetup_DriverDoc_2022.tmpdescription pid process target process PID 1468 wrote to memory of 940 1468 Setup_DriverDoc_2022.exe Setup_DriverDoc_2022.tmp PID 1468 wrote to memory of 940 1468 Setup_DriverDoc_2022.exe Setup_DriverDoc_2022.tmp PID 1468 wrote to memory of 940 1468 Setup_DriverDoc_2022.exe Setup_DriverDoc_2022.tmp PID 940 wrote to memory of 1448 940 Setup_DriverDoc_2022.tmp taskkill.exe PID 940 wrote to memory of 1448 940 Setup_DriverDoc_2022.tmp taskkill.exe PID 940 wrote to memory of 1448 940 Setup_DriverDoc_2022.tmp taskkill.exe PID 940 wrote to memory of 3056 940 Setup_DriverDoc_2022.tmp taskkill.exe PID 940 wrote to memory of 3056 940 Setup_DriverDoc_2022.tmp taskkill.exe PID 940 wrote to memory of 3056 940 Setup_DriverDoc_2022.tmp taskkill.exe PID 940 wrote to memory of 4164 940 Setup_DriverDoc_2022.tmp taskkill.exe PID 940 wrote to memory of 4164 940 Setup_DriverDoc_2022.tmp taskkill.exe PID 940 wrote to memory of 4164 940 Setup_DriverDoc_2022.tmp taskkill.exe PID 940 wrote to memory of 2448 940 Setup_DriverDoc_2022.tmp taskkill.exe PID 940 wrote to memory of 2448 940 Setup_DriverDoc_2022.tmp taskkill.exe PID 940 wrote to memory of 2448 940 Setup_DriverDoc_2022.tmp taskkill.exe PID 940 wrote to memory of 4088 940 Setup_DriverDoc_2022.tmp DriverDoc.exe PID 940 wrote to memory of 4088 940 Setup_DriverDoc_2022.tmp DriverDoc.exe PID 940 wrote to memory of 4088 940 Setup_DriverDoc_2022.tmp DriverDoc.exe PID 940 wrote to memory of 4260 940 Setup_DriverDoc_2022.tmp DriverPro.exe PID 940 wrote to memory of 4260 940 Setup_DriverDoc_2022.tmp DriverPro.exe PID 940 wrote to memory of 4260 940 Setup_DriverDoc_2022.tmp DriverPro.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup_DriverDoc_2022.exe"C:\Users\Admin\AppData\Local\Temp\Setup_DriverDoc_2022.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\is-QOT80.tmp\Setup_DriverDoc_2022.tmp"C:\Users\Admin\AppData\Local\Temp\is-QOT80.tmp\Setup_DriverDoc_2022.tmp" /SL5="$A0028,5347251,879104,C:\Users\Admin\AppData\Local\Temp\Setup_DriverDoc_2022.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im "DriverDoc.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1448 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im "DriverPro.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3056 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im "DOCSchedule.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4164 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im "DOCTray.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2448 -
C:\DriverDoc\DriverDoc.exe"C:\DriverDoc\DriverDoc.exe" /INSTALL3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4088 -
C:\DriverDoc\Extra\DriverPro.exe"C:\DriverDoc\Extra\DriverPro.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.9MB
MD5593731ec5ad57f5556ba30fbfab0d715
SHA1f1134e4ee01c4a38888193130ea5255f6a782685
SHA2565a5c40820ef02808d9d3759d915d8f8ff52dc6a3fc2590584f4c36a9ad3c1de4
SHA5128d28fcbe6f9b044648c730a189dc860e6fd6330fed4c60feb973b8f296358b83a1977ebe57fcfb22837cffd7a649d0f2d963b77982436e38b344d613c2b3df1f
-
Filesize
6.9MB
MD5593731ec5ad57f5556ba30fbfab0d715
SHA1f1134e4ee01c4a38888193130ea5255f6a782685
SHA2565a5c40820ef02808d9d3759d915d8f8ff52dc6a3fc2590584f4c36a9ad3c1de4
SHA5128d28fcbe6f9b044648c730a189dc860e6fd6330fed4c60feb973b8f296358b83a1977ebe57fcfb22837cffd7a649d0f2d963b77982436e38b344d613c2b3df1f
-
Filesize
12KB
MD5b24c70f0951a902d62e97321ee12be9d
SHA1759555b579c811eaa2bc123edbf49fa6fdc0ab72
SHA256226b01c08d3cd2f0099c6138d97e4ec3096207e220d0203400c9dbeabdf1a446
SHA512b521e94e80d4d97ce6bbc76e954ed3cacfe06fbe9408e8228a442e71c1672218033ba10191083a8dec90e8f5eed475b59c8ad9112c4648099bd1c51778260ee0
-
Filesize
12KB
MD5c4e19798b19173eca54cc2f615a0b99e
SHA16638701c7b4991227e1f883414bcd1315b7b0864
SHA25601539234b53ddc8ac82665ea18daeadd1edd2b4b918b21fa72f3848b6639a301
SHA5124c976fc3282531d5ad32f5ec1f436378cf73f068c650c578e54b25cbe2911a4709bd14c46ebc74ef395afb771e8f8d9f28798b204d5f2a89589f8119ea7c8d20
-
Filesize
4.9MB
MD55a1d85fb3c9062304547475d6bd383ed
SHA1dc8722d155277e841ea9404beabb1c012c7eefc0
SHA256de9a6adbda9378230f1a4caff8c23d208a0d19114dcec00391869a83e129787f
SHA512681b4341548c34e2b7dce6731ef7cd35a2271ef482984e4f706b44c07962ee4673d5b2596020c2d2dd1f92867e7001ea84549ac517032f25b3e899313c758e3f
-
Filesize
12KB
MD5cba424ebfd76fbab92e4c611ebbc6bdf
SHA19678ae22d9585dd12d692522c30aebc5b92a2249
SHA2566951d18ba89c4875983cce91305f802f0f690675d76fd14fa0cb0f792b0aaea3
SHA51222967f3bdd097fa5ffa06945a69d5d39c26b9bd21892a19e9efa234b24349fed7d7e62187506c8d18475055041af15e9b3a877f56ac7eae29478253bc31cc8dc
-
Filesize
11KB
MD52e509dd5f4217be553fbe379a0a90c23
SHA19dd8f007d11ad0f4cf30cbc555bb3cf36d4c2a02
SHA256a1e376b66a11846fd448708b81a894d279032d0247bd5c0f79f606c945397162
SHA5126c11872669e593d77dbcefc4a5bd5257c49329bfa8a5260fcb743855d5e7dcfeaf48a69bbe16b81057b049957fca263c7efca630a257fc5813edb687467063cf
-
Filesize
12KB
MD5d140f9ae6ca875d2f8bcec576bb2c203
SHA1871cc1e85dde0d2b4bdab5566defbe8483348fcf
SHA25639fca6cb75735a2bc2abe2b35ca94cde8da856955de641c165c7e1e1f8b5b516
SHA5125815e0d2e5f9242f587d6d79679232c32a9279b25fde308763f210a4cf365430e76d259b714de0aed9904277b586380fbb04a057dd66ae143cca0eef1329362c
-
Filesize
13KB
MD5637686253a68504cc01fe055a25346f7
SHA159e36e5a2e71887acb4eac090e1cdb8d240379b1
SHA256f008522a75e279cdb23489e24b4835ce6516cf2a669df705c072b23f311b7a3a
SHA51216377b987a8ede42a379a39b641cf3a6c2dc11c454e9cc460808ab3dc8dab5c5782de26923ce524eaeaa5d389bfce5ba46561791424a65b08de2a69b71652fda
-
Filesize
13KB
MD5cae7b08264859d094eccbcd1686e4b58
SHA131e000b5f93a4af158e3211e9ef6ee24a43df6ed
SHA2561cdef54fcbaf02d46fb31cee5738e2e1f9d5bcd89b58f49ef98c011329266e69
SHA51231646eba2f4e4d312fafe191608c5fa963c4ed1753cc55340314c9c6142424b36d819f67bd9218ad41c2627c8289c5764a752ebc449d3e8e43aa5ab833631771
-
Filesize
12KB
MD549c62ebd53b8d40b961ab63d16d1b18c
SHA1b002185abcc6f84fb272445a3579cfe96972e19a
SHA2569f47adfacf4d1855d0de2b806149084cf6051de2b6de09692fbf17a93b149343
SHA5127895f99d82f95cb3f6c0f91a0c283472205f052c81e8321cd01ebae20d94813a9139262815a0d4258bd719e4cba63e5a2ae9457902f10244affaebed33e72d24
-
Filesize
15KB
MD54cc34523cefbe42b62cf1839c0f54663
SHA1fdaa0ad16c693906978f7e1364b1c850869354bf
SHA25694c1b8fc0bda3ba585e92b4ed812421bc6dea4da29b2321b1286d27615571b79
SHA512c0ffb819229709cc3bc340c859330da8c5c91763fb5ccccbaed073ed282150dbcefd329fbab440e88dafe30c39e8055be0009113a1400d9170a6701ba63b2824
-
Filesize
11KB
MD53285372c3ad0355bd7eec8488f40629d
SHA148288694c5a5724e8c56339d675666d8476741aa
SHA2562c402fd6e6aab9d8ffc93ca29f07fc55420a598ed1368ec2ad381cb4808195f2
SHA512ea6bd5c5274deb99c4c70f29f17e324649139b5b47cc054a52a2e3b3c4f0e4b1fd80cd105fd32d0b3ab29af115cc09ced4c7f8529bd651f7a6d265dd3d00acab
-
Filesize
13KB
MD592bfc521b92d8ac30cb6fdb31ee37fb2
SHA114f04856f4a3661007fabb846b83499ebc34cdf7
SHA256357ac44df2a8fa996a78061bc67531b8dd5d2770a3a4aa7ed1aad3c5c52e4050
SHA5124dfc21cdaa3c00e93008ad55061bbb02d31504cec26271cb040356a1e04408fa766b12425aea0e91adb230fe0d231466de4392f0b48c1477b9f083e795ab9b66
-
Filesize
12KB
MD5d8bd59eb5dcd48a976d2ae97c2edb6a3
SHA1a03eea088611d0acb75aa0d02f14b7c1e5a24e32
SHA2562cb3920f6b44c3c0915c4b7e8f5f24b9c4e3ea0932e14c8c0742fafd07a992e2
SHA51274fca4cd378009775c0eef179ee1e0961591e5ab0b3551dbb91e858edca9437bb1d99f581ced11752adee2c2d8b9c6dfc4329d9a0fdeb0385c09ba1012ba8109
-
Filesize
21KB
MD5b4b289047fd327d99e5809234174736b
SHA1c9f2e45efa8ce22720f2dc49bc85764dee49025d
SHA256eb0f8c2bfd6f0d3744e16ddd7db56590e5c9a4f1960b4ea9c2240f691b2504e4
SHA512dccac50a017bb1482e7657f5b166f0316336d049ef446ecc26b1a3cd38ca7e90cbb713bdac3b59414f8e2800fd0b25d25d3ccd4641993213052329e272b96f9a
-
Filesize
73B
MD54dfd24933bec370032a0fde1452d9b14
SHA1f3c3bc92eabe67c9072a0a29968322adad9489c2
SHA256035c7dd8eef04f652d7d7b6b28c27ddb0b867502d088c1cba12319b5718fb1b6
SHA51285ccd0c6cf38ee620b0a4a2289c4161fcb01fcd3546e1cf3ebfe83a087133972661e8b3854db5643caaadded1fcb3d621141a8f39490866d21b53b947f42d97f
-
Filesize
12KB
MD53eb3ce7cb9d27f10c18ba319882cc7ed
SHA17e09a5a88f46570f0d95d19602f38379ae01742e
SHA256419ef75a40cc8d0ae3ae7767bc87f9c967b0068afa8bb03cd67b697c00f40cea
SHA5125ec29890eaf47e4ea91dc948811bd1f9dc7dac27b8b116a620b634baf8e33ee605a6e815da04df45478c1460f4cca371ae469f7e4093e12184e24a3a934ef059
-
Filesize
12KB
MD545b6b39f4009ef7a14dde07ceb42647a
SHA15372f2432e6a110ee2fff3b37e30a1443132f38f
SHA2561388b135d43d916af79f2630308b7a28e010fb5e32205c70e796130c0828c7fb
SHA51248936b2885b73c0c7841d237a78ad38b0c60f63cac5746e4da87342fbc3b234e7feb437e7456dcb5824c06d022e5351c237819231b3f0d013762c34a2c0844ec
-
Filesize
633KB
MD5094c675f4e0bfb27c2e77457cbcd9cc7
SHA19026248bd7802de39282653b0f56d68edfef30a1
SHA256d3dd110c4d330332a37f06268013e4595705981bc74e577f946485416651b83b
SHA512f1730b831df2805e10d78dc984e6e877e437de57cd20488ebfe48f92db8ced1889c369e70d17aee5eb366aa2c7baa14d426cf6c30324b527fa303b1bfccfe0a7
-
Filesize
633KB
MD5094c675f4e0bfb27c2e77457cbcd9cc7
SHA19026248bd7802de39282653b0f56d68edfef30a1
SHA256d3dd110c4d330332a37f06268013e4595705981bc74e577f946485416651b83b
SHA512f1730b831df2805e10d78dc984e6e877e437de57cd20488ebfe48f92db8ced1889c369e70d17aee5eb366aa2c7baa14d426cf6c30324b527fa303b1bfccfe0a7
-
Filesize
633KB
MD5094c675f4e0bfb27c2e77457cbcd9cc7
SHA19026248bd7802de39282653b0f56d68edfef30a1
SHA256d3dd110c4d330332a37f06268013e4595705981bc74e577f946485416651b83b
SHA512f1730b831df2805e10d78dc984e6e877e437de57cd20488ebfe48f92db8ced1889c369e70d17aee5eb366aa2c7baa14d426cf6c30324b527fa303b1bfccfe0a7
-
Filesize
633KB
MD5094c675f4e0bfb27c2e77457cbcd9cc7
SHA19026248bd7802de39282653b0f56d68edfef30a1
SHA256d3dd110c4d330332a37f06268013e4595705981bc74e577f946485416651b83b
SHA512f1730b831df2805e10d78dc984e6e877e437de57cd20488ebfe48f92db8ced1889c369e70d17aee5eb366aa2c7baa14d426cf6c30324b527fa303b1bfccfe0a7
-
Filesize
3.1MB
MD5d70a98daf7a810ee18ce451ec673e399
SHA1274dff37313f3fbdf82dfc4afd94582359b79fee
SHA2569621346beee2a257b1966b6dc3f1f850d54ae0746bf1718d35c966649ac9b340
SHA512a246aa8979a7bc1a8ae6d1c5ac637939e7ab3380484cb78a3fc98fe9ceccb51cb5d6dfe787ece6bb1420450741c0734a049849dac7242679b8660e71acf00e60
-
Filesize
3.1MB
MD5d70a98daf7a810ee18ce451ec673e399
SHA1274dff37313f3fbdf82dfc4afd94582359b79fee
SHA2569621346beee2a257b1966b6dc3f1f850d54ae0746bf1718d35c966649ac9b340
SHA512a246aa8979a7bc1a8ae6d1c5ac637939e7ab3380484cb78a3fc98fe9ceccb51cb5d6dfe787ece6bb1420450741c0734a049849dac7242679b8660e71acf00e60