Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:39
Static task
static1
Behavioral task
behavioral1
Sample
1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe
Resource
win10v2004-20220812-en
General
-
Target
1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe
-
Size
49KB
-
MD5
66fccc97b5cbec264ae902e094182904
-
SHA1
ac57e923e4ed2438b72668477a0154edc2bde585
-
SHA256
1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14
-
SHA512
10ff43178c3229dd783fc72c770400316b9d0ca7c9f380cc3e8da6142d8c6a04fd13514b6e5ef03592afec27ebc3f9ecac67e587475e14505c2356d2d5cc6259
-
SSDEEP
768:eokswQQnAQ/rZSwk5ALCdB2DWG+qkCW78Yni1XH3XJzdqWPZBuUYIKsZEYbo7A:9kswQDYrZo5isPqo78fXJzgW5pxk7A
Malware Config
Signatures
-
Executes dropped EXE 11 IoCs
Processes:
appdomain.exesychost.exesychost.exesychost.exesychost.exesychost.exesychost.exesychost.exesychost.exesychost.exesychost.exepid process 4896 appdomain.exe 4948 sychost.exe 2112 sychost.exe 4304 sychost.exe 4340 sychost.exe 3584 sychost.exe 372 sychost.exe 1364 sychost.exe 3104 sychost.exe 4844 sychost.exe 4048 sychost.exe -
Loads dropped DLL 1 IoCs
Processes:
1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exepid process 768 1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
appdomain.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce appdomain.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\WindowsNT = "\"C:\\Users\\Admin\\AppData\\Roaming\\sychost\\appdomain.exe\"" appdomain.exe -
Drops file in Windows directory 1 IoCs
Processes:
dw20.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\sychost\appdomain.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\sychost\appdomain.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\sychost\appdomain.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\sychost\appdomain.exe nsis_installer_2 -
Checks processor information in registry 2 TTPs 27 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedw20.exedw20.exedw20.exedw20.exedw20.exedw20.exedw20.exedw20.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe -
Enumerates system info in registry 2 TTPs 18 IoCs
Processes:
dw20.exedw20.exedw20.exedw20.exedw20.exedw20.exedw20.exedw20.exedw20.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
dw20.exedw20.exedw20.exedw20.exedw20.exedw20.exedw20.exedw20.exedw20.exedescription pid process Token: SeRestorePrivilege 1660 dw20.exe Token: SeBackupPrivilege 1660 dw20.exe Token: SeBackupPrivilege 1660 dw20.exe Token: SeBackupPrivilege 1660 dw20.exe Token: SeBackupPrivilege 1660 dw20.exe Token: SeBackupPrivilege 3544 dw20.exe Token: SeBackupPrivilege 3544 dw20.exe Token: SeBackupPrivilege 4168 dw20.exe Token: SeBackupPrivilege 4168 dw20.exe Token: SeBackupPrivilege 3356 dw20.exe Token: SeBackupPrivilege 3356 dw20.exe Token: SeBackupPrivilege 2280 dw20.exe Token: SeBackupPrivilege 2280 dw20.exe Token: SeBackupPrivilege 4260 dw20.exe Token: SeBackupPrivilege 4260 dw20.exe Token: SeBackupPrivilege 1092 dw20.exe Token: SeBackupPrivilege 1092 dw20.exe Token: SeBackupPrivilege 4924 dw20.exe Token: SeBackupPrivilege 4924 dw20.exe Token: SeBackupPrivilege 1576 dw20.exe Token: SeBackupPrivilege 1576 dw20.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exepid process 768 1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exeappdomain.exesychost.exesychost.exesychost.exesychost.exesychost.exesychost.exesychost.exesychost.exesychost.exedescription pid process target process PID 768 wrote to memory of 4896 768 1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe appdomain.exe PID 768 wrote to memory of 4896 768 1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe appdomain.exe PID 768 wrote to memory of 4896 768 1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe appdomain.exe PID 4896 wrote to memory of 4948 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 4948 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 4948 4896 appdomain.exe sychost.exe PID 4948 wrote to memory of 1660 4948 sychost.exe dw20.exe PID 4948 wrote to memory of 1660 4948 sychost.exe dw20.exe PID 4948 wrote to memory of 1660 4948 sychost.exe dw20.exe PID 4896 wrote to memory of 2112 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 2112 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 2112 4896 appdomain.exe sychost.exe PID 2112 wrote to memory of 3544 2112 sychost.exe dw20.exe PID 2112 wrote to memory of 3544 2112 sychost.exe dw20.exe PID 2112 wrote to memory of 3544 2112 sychost.exe dw20.exe PID 4896 wrote to memory of 4304 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 4304 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 4304 4896 appdomain.exe sychost.exe PID 4304 wrote to memory of 4168 4304 sychost.exe dw20.exe PID 4304 wrote to memory of 4168 4304 sychost.exe dw20.exe PID 4304 wrote to memory of 4168 4304 sychost.exe dw20.exe PID 4896 wrote to memory of 4340 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 4340 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 4340 4896 appdomain.exe sychost.exe PID 4340 wrote to memory of 3356 4340 sychost.exe dw20.exe PID 4340 wrote to memory of 3356 4340 sychost.exe dw20.exe PID 4340 wrote to memory of 3356 4340 sychost.exe dw20.exe PID 4896 wrote to memory of 3584 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 3584 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 3584 4896 appdomain.exe sychost.exe PID 3584 wrote to memory of 2280 3584 sychost.exe dw20.exe PID 3584 wrote to memory of 2280 3584 sychost.exe dw20.exe PID 3584 wrote to memory of 2280 3584 sychost.exe dw20.exe PID 4896 wrote to memory of 372 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 372 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 372 4896 appdomain.exe sychost.exe PID 372 wrote to memory of 4260 372 sychost.exe dw20.exe PID 372 wrote to memory of 4260 372 sychost.exe dw20.exe PID 372 wrote to memory of 4260 372 sychost.exe dw20.exe PID 4896 wrote to memory of 1364 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 1364 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 1364 4896 appdomain.exe sychost.exe PID 1364 wrote to memory of 1092 1364 sychost.exe dw20.exe PID 1364 wrote to memory of 1092 1364 sychost.exe dw20.exe PID 1364 wrote to memory of 1092 1364 sychost.exe dw20.exe PID 4896 wrote to memory of 3104 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 3104 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 3104 4896 appdomain.exe sychost.exe PID 3104 wrote to memory of 4924 3104 sychost.exe dw20.exe PID 3104 wrote to memory of 4924 3104 sychost.exe dw20.exe PID 3104 wrote to memory of 4924 3104 sychost.exe dw20.exe PID 4896 wrote to memory of 4844 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 4844 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 4844 4896 appdomain.exe sychost.exe PID 4844 wrote to memory of 1576 4844 sychost.exe dw20.exe PID 4844 wrote to memory of 1576 4844 sychost.exe dw20.exe PID 4844 wrote to memory of 1576 4844 sychost.exe dw20.exe PID 4896 wrote to memory of 4048 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 4048 4896 appdomain.exe sychost.exe PID 4896 wrote to memory of 4048 4896 appdomain.exe sychost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe"C:\Users\Admin\AppData\Local\Temp\1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Roaming\sychost\appdomain.exeC:\Users\Admin\AppData\Roaming\sychost\appdomain.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Roaming\sychost\sychost.exeC:\Users\Admin\AppData\Roaming\sychost\sychost.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 15684⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1660 -
C:\Users\Admin\AppData\Roaming\sychost\sychost.exeC:\Users\Admin\AppData\Roaming\sychost\sychost.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 15924⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3544 -
C:\Users\Admin\AppData\Roaming\sychost\sychost.exeC:\Users\Admin\AppData\Roaming\sychost\sychost.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 17004⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4168 -
C:\Users\Admin\AppData\Roaming\sychost\sychost.exeC:\Users\Admin\AppData\Roaming\sychost\sychost.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9884⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3356 -
C:\Users\Admin\AppData\Roaming\sychost\sychost.exeC:\Users\Admin\AppData\Roaming\sychost\sychost.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8724⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2280 -
C:\Users\Admin\AppData\Roaming\sychost\sychost.exeC:\Users\Admin\AppData\Roaming\sychost\sychost.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 10084⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4260 -
C:\Users\Admin\AppData\Roaming\sychost\sychost.exeC:\Users\Admin\AppData\Roaming\sychost\sychost.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9244⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Users\Admin\AppData\Roaming\sychost\sychost.exeC:\Users\Admin\AppData\Roaming\sychost\sychost.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 16404⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4924 -
C:\Users\Admin\AppData\Roaming\sychost\sychost.exeC:\Users\Admin\AppData\Roaming\sychost\sychost.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 15924⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1576 -
C:\Users\Admin\AppData\Roaming\sychost\sychost.exeC:\Users\Admin\AppData\Roaming\sychost\sychost.exe3⤵
- Executes dropped EXE
PID:4048
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
Filesize
49KB
MD566fccc97b5cbec264ae902e094182904
SHA1ac57e923e4ed2438b72668477a0154edc2bde585
SHA2561faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14
SHA51210ff43178c3229dd783fc72c770400316b9d0ca7c9f380cc3e8da6142d8c6a04fd13514b6e5ef03592afec27ebc3f9ecac67e587475e14505c2356d2d5cc6259
-
Filesize
49KB
MD566fccc97b5cbec264ae902e094182904
SHA1ac57e923e4ed2438b72668477a0154edc2bde585
SHA2561faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14
SHA51210ff43178c3229dd783fc72c770400316b9d0ca7c9f380cc3e8da6142d8c6a04fd13514b6e5ef03592afec27ebc3f9ecac67e587475e14505c2356d2d5cc6259
-
Filesize
24KB
MD5a45321be660b0dbd93d6a2ea208f19bb
SHA104925aaee56724371ea040b223ed93a1b38b1c26
SHA256aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38
SHA512c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4
-
Filesize
24KB
MD5a45321be660b0dbd93d6a2ea208f19bb
SHA104925aaee56724371ea040b223ed93a1b38b1c26
SHA256aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38
SHA512c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4
-
Filesize
24KB
MD5a45321be660b0dbd93d6a2ea208f19bb
SHA104925aaee56724371ea040b223ed93a1b38b1c26
SHA256aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38
SHA512c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4
-
Filesize
24KB
MD5a45321be660b0dbd93d6a2ea208f19bb
SHA104925aaee56724371ea040b223ed93a1b38b1c26
SHA256aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38
SHA512c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4
-
Filesize
24KB
MD5a45321be660b0dbd93d6a2ea208f19bb
SHA104925aaee56724371ea040b223ed93a1b38b1c26
SHA256aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38
SHA512c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4
-
Filesize
24KB
MD5a45321be660b0dbd93d6a2ea208f19bb
SHA104925aaee56724371ea040b223ed93a1b38b1c26
SHA256aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38
SHA512c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4
-
Filesize
24KB
MD5a45321be660b0dbd93d6a2ea208f19bb
SHA104925aaee56724371ea040b223ed93a1b38b1c26
SHA256aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38
SHA512c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4
-
Filesize
24KB
MD5a45321be660b0dbd93d6a2ea208f19bb
SHA104925aaee56724371ea040b223ed93a1b38b1c26
SHA256aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38
SHA512c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4
-
Filesize
24KB
MD5a45321be660b0dbd93d6a2ea208f19bb
SHA104925aaee56724371ea040b223ed93a1b38b1c26
SHA256aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38
SHA512c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4
-
Filesize
24KB
MD5a45321be660b0dbd93d6a2ea208f19bb
SHA104925aaee56724371ea040b223ed93a1b38b1c26
SHA256aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38
SHA512c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4
-
Filesize
24KB
MD5a45321be660b0dbd93d6a2ea208f19bb
SHA104925aaee56724371ea040b223ed93a1b38b1c26
SHA256aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38
SHA512c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4