Analysis
-
max time kernel
144s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe
Resource
win10v2004-20220812-en
General
-
Target
ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe
-
Size
408KB
-
MD5
87a3e3d92f26d64f3a06870178ab8cfc
-
SHA1
04f73ee223453b60f791f2d672c90ffbbd99d635
-
SHA256
ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313
-
SHA512
a17e037f2b6fbd382231c6f53039aee25b4212d5284ce649a6ef6ae5c755a43ce4beee39aa3ec6b60177eb1d3b9943626302ca36cc08137421090da315fe04e2
-
SSDEEP
6144:FYp7doardk1z6m4fY5v18RKzd4BoeAFooG/sLk/mDpQMIq1Peh8dd9s+x:euardpwvuR2AopFlGsLkUxNeh6dh
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2008 smss.exe 1700 smss.exe -
Loads dropped DLL 3 IoCs
pid Process 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 1968 cmd.exe -
Adds Run key to start application 2 TTPs 34 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsExplorer = "C:\\Windows\\system32\\explorer.exe" reg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.sys smss.exe File created C:\Windows\SysWOW64\explorer.sys smss.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\Prefetch\SVCHOST.EXE-2B6L01C596K2.pf ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe File opened for modification C:\WINDOWS\Cursors\smss.exe ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main smss.exe -
Modifies registry key 1 TTPs 17 IoCs
pid Process 1464 reg.exe 1544 reg.exe 1684 reg.exe 760 reg.exe 1372 reg.exe 968 reg.exe 1528 reg.exe 872 reg.exe 1552 reg.exe 1884 reg.exe 1616 reg.exe 1728 reg.exe 2032 reg.exe 2036 reg.exe 1672 reg.exe 1476 reg.exe 1088 reg.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 2008 smss.exe 1700 smss.exe 1700 smss.exe 1700 smss.exe 2008 smss.exe 2008 smss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 896 wrote to memory of 1940 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 27 PID 896 wrote to memory of 1940 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 27 PID 896 wrote to memory of 1940 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 27 PID 896 wrote to memory of 1940 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 27 PID 896 wrote to memory of 1492 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 29 PID 896 wrote to memory of 1492 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 29 PID 896 wrote to memory of 1492 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 29 PID 896 wrote to memory of 1492 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 29 PID 896 wrote to memory of 1464 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 31 PID 896 wrote to memory of 1464 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 31 PID 896 wrote to memory of 1464 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 31 PID 896 wrote to memory of 1464 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 31 PID 1940 wrote to memory of 628 1940 cmd.exe 33 PID 1940 wrote to memory of 628 1940 cmd.exe 33 PID 1940 wrote to memory of 628 1940 cmd.exe 33 PID 1940 wrote to memory of 628 1940 cmd.exe 33 PID 1492 wrote to memory of 1340 1492 cmd.exe 34 PID 1492 wrote to memory of 1340 1492 cmd.exe 34 PID 1492 wrote to memory of 1340 1492 cmd.exe 34 PID 1492 wrote to memory of 1340 1492 cmd.exe 34 PID 628 wrote to memory of 1724 628 net.exe 36 PID 628 wrote to memory of 1724 628 net.exe 36 PID 628 wrote to memory of 1724 628 net.exe 36 PID 628 wrote to memory of 1724 628 net.exe 36 PID 1340 wrote to memory of 1140 1340 net.exe 35 PID 1340 wrote to memory of 1140 1340 net.exe 35 PID 1340 wrote to memory of 1140 1340 net.exe 35 PID 1340 wrote to memory of 1140 1340 net.exe 35 PID 896 wrote to memory of 1968 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 37 PID 896 wrote to memory of 1968 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 37 PID 896 wrote to memory of 1968 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 37 PID 896 wrote to memory of 1968 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 37 PID 896 wrote to memory of 2008 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 39 PID 896 wrote to memory of 2008 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 39 PID 896 wrote to memory of 2008 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 39 PID 896 wrote to memory of 2008 896 ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe 39 PID 1968 wrote to memory of 1700 1968 cmd.exe 40 PID 1968 wrote to memory of 1700 1968 cmd.exe 40 PID 1968 wrote to memory of 1700 1968 cmd.exe 40 PID 1968 wrote to memory of 1700 1968 cmd.exe 40 PID 2008 wrote to memory of 2036 2008 smss.exe 43 PID 2008 wrote to memory of 2036 2008 smss.exe 43 PID 2008 wrote to memory of 2036 2008 smss.exe 43 PID 2008 wrote to memory of 2036 2008 smss.exe 43 PID 2008 wrote to memory of 1672 2008 smss.exe 45 PID 2008 wrote to memory of 1672 2008 smss.exe 45 PID 2008 wrote to memory of 1672 2008 smss.exe 45 PID 2008 wrote to memory of 1672 2008 smss.exe 45 PID 2008 wrote to memory of 1544 2008 smss.exe 47 PID 2008 wrote to memory of 1544 2008 smss.exe 47 PID 2008 wrote to memory of 1544 2008 smss.exe 47 PID 2008 wrote to memory of 1544 2008 smss.exe 47 PID 2008 wrote to memory of 872 2008 smss.exe 49 PID 2008 wrote to memory of 872 2008 smss.exe 49 PID 2008 wrote to memory of 872 2008 smss.exe 49 PID 2008 wrote to memory of 872 2008 smss.exe 49 PID 2008 wrote to memory of 1476 2008 smss.exe 51 PID 2008 wrote to memory of 1476 2008 smss.exe 51 PID 2008 wrote to memory of 1476 2008 smss.exe 51 PID 2008 wrote to memory of 1476 2008 smss.exe 51 PID 2008 wrote to memory of 1088 2008 smss.exe 53 PID 2008 wrote to memory of 1088 2008 smss.exe 53 PID 2008 wrote to memory of 1088 2008 smss.exe 53 PID 2008 wrote to memory of 1088 2008 smss.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe"C:\Users\Admin\AppData\Local\Temp\ff4ebabc5a5ef6908d8080f6712941ddbb523dbfca712f4755612ecbcabcb313.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\cmd.execmd /c net stop "SharedAccess"2⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\net.exenet stop "SharedAccess"3⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SharedAccess"4⤵PID:1724
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "wscsvc"2⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\net.exenet stop "wscsvc"3⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wscsvc"4⤵PID:1140
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe2⤵
- Adds Run key to start application
- Modifies registry key
PID:1464
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\WINDOWS\Cursors\smss.exe && exit2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\WINDOWS\Cursors\smss.exeC:\WINDOWS\Cursors\smss.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1700
-
-
-
C:\WINDOWS\Cursors\smss.exeC:\WINDOWS\Cursors\smss.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:2036
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:1672
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:1544
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:872
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:1476
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:1088
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:1372
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:1552
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:1616
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:968
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:1684
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:1728
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:760
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:1528
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:1884
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v WindowsExplorer /t REG_SZ /d C:\Windows\system32\explorer.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:2032
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD54b09c9c0a072b527cfb3cbeea416e632
SHA106654533af9e595c57451c578ce91549333792a2
SHA2568ff774a77b3e551f812ffc97720b92b1809b8148729bd64a35733657d10bf2d3
SHA512849627890d195046d130e36610b711b330488b463e583fb214a16cc07b69074ddb0338c6b8c7cf238e02605e0e874462a5ded4d718e7008a02bab09065b003ea
-
Filesize
372B
MD5c3c15654ff786d2a1a05d721ef3b8581
SHA14660b68243a219e7254264f13be933641de912b8
SHA2567783d35b63395d4e848a56da3ecd407dc79c4c6b656bbcf7ca5ad57b230af75a
SHA512d643766149f413f41cf84aec8eceafc33851a5a45bfa6a47da6901d7eab9b5780c7173da560fed31f20d94fe434d01bab70d48a88bf1c58b0aba5a78b0efc510
-
Filesize
104KB
MD54b09c9c0a072b527cfb3cbeea416e632
SHA106654533af9e595c57451c578ce91549333792a2
SHA2568ff774a77b3e551f812ffc97720b92b1809b8148729bd64a35733657d10bf2d3
SHA512849627890d195046d130e36610b711b330488b463e583fb214a16cc07b69074ddb0338c6b8c7cf238e02605e0e874462a5ded4d718e7008a02bab09065b003ea
-
Filesize
104KB
MD54b09c9c0a072b527cfb3cbeea416e632
SHA106654533af9e595c57451c578ce91549333792a2
SHA2568ff774a77b3e551f812ffc97720b92b1809b8148729bd64a35733657d10bf2d3
SHA512849627890d195046d130e36610b711b330488b463e583fb214a16cc07b69074ddb0338c6b8c7cf238e02605e0e874462a5ded4d718e7008a02bab09065b003ea
-
Filesize
104KB
MD54b09c9c0a072b527cfb3cbeea416e632
SHA106654533af9e595c57451c578ce91549333792a2
SHA2568ff774a77b3e551f812ffc97720b92b1809b8148729bd64a35733657d10bf2d3
SHA512849627890d195046d130e36610b711b330488b463e583fb214a16cc07b69074ddb0338c6b8c7cf238e02605e0e874462a5ded4d718e7008a02bab09065b003ea
-
Filesize
104KB
MD54b09c9c0a072b527cfb3cbeea416e632
SHA106654533af9e595c57451c578ce91549333792a2
SHA2568ff774a77b3e551f812ffc97720b92b1809b8148729bd64a35733657d10bf2d3
SHA512849627890d195046d130e36610b711b330488b463e583fb214a16cc07b69074ddb0338c6b8c7cf238e02605e0e874462a5ded4d718e7008a02bab09065b003ea
-
Filesize
104KB
MD54b09c9c0a072b527cfb3cbeea416e632
SHA106654533af9e595c57451c578ce91549333792a2
SHA2568ff774a77b3e551f812ffc97720b92b1809b8148729bd64a35733657d10bf2d3
SHA512849627890d195046d130e36610b711b330488b463e583fb214a16cc07b69074ddb0338c6b8c7cf238e02605e0e874462a5ded4d718e7008a02bab09065b003ea