Analysis
-
max time kernel
302s -
max time network
294s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
45562a03add8d10eed811e8717ca22c6b772bc227b49811850241d8f959dadc8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
45562a03add8d10eed811e8717ca22c6b772bc227b49811850241d8f959dadc8.exe
Resource
win10v2004-20230220-en
General
-
Target
45562a03add8d10eed811e8717ca22c6b772bc227b49811850241d8f959dadc8.exe
-
Size
49.5MB
-
MD5
887806ea5b8d903a16080c3bb2d8fc14
-
SHA1
fda4129fc96c366d123b40284815c68ced7bcdc1
-
SHA256
45562a03add8d10eed811e8717ca22c6b772bc227b49811850241d8f959dadc8
-
SHA512
e7bfde53af546921f32df35de64592ee849506e83aef3498744d59638204429cebde1c4c676ef3988737c0876be2349e2f866efe5e841133cac398ad916ee003
-
SSDEEP
786432:EOgXwdEYIb6UdIX/POO4T1I9CT9CKWE5v3i4RTr/b1rnbHqmntLBH53UErk:EHY26Bn0MCT9CKWuviC/b1rbHBtP3UE4
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1404 is-HDP6A.tmp 936 ReportE.exe -
Loads dropped DLL 8 IoCs
pid Process 1404 is-HDP6A.tmp 1404 is-HDP6A.tmp 936 ReportE.exe 936 ReportE.exe 936 ReportE.exe 936 ReportE.exe 936 ReportE.exe 936 ReportE.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: ReportE.exe File opened (read-only) \??\P: ReportE.exe File opened (read-only) \??\R: ReportE.exe File opened (read-only) \??\W: ReportE.exe File opened (read-only) \??\E: ReportE.exe File opened (read-only) \??\J: ReportE.exe File opened (read-only) \??\M: ReportE.exe File opened (read-only) \??\Q: ReportE.exe File opened (read-only) \??\Z: ReportE.exe File opened (read-only) \??\H: ReportE.exe File opened (read-only) \??\B: ReportE.exe File opened (read-only) \??\F: ReportE.exe File opened (read-only) \??\L: ReportE.exe File opened (read-only) \??\S: ReportE.exe File opened (read-only) \??\T: ReportE.exe File opened (read-only) \??\U: ReportE.exe File opened (read-only) \??\V: ReportE.exe File opened (read-only) \??\A: ReportE.exe File opened (read-only) \??\X: ReportE.exe File opened (read-only) \??\I: ReportE.exe File opened (read-only) \??\K: ReportE.exe File opened (read-only) \??\O: ReportE.exe File opened (read-only) \??\Y: ReportE.exe File opened (read-only) \??\G: ReportE.exe -
Drops file in Program Files directory 33 IoCs
description ioc Process File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-RG8IA.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-LPPH3.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-AV1G1.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-AK0GJ.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-S8TVI.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-5BPMC.tmp is-HDP6A.tmp File opened for modification C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\unins000.dat is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\Report.JQB is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\unins000.dat is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-D1D4F.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-9VHC1.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-DMM1C.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-HDJPK.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\NetLogin.ini ReportE.exe File opened for modification C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\NetLogin.ini ReportE.exe File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-48OSJ.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-PR80B.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-DHGDP.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-SJLG9.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-2P3I6.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-FA5D3.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-F0HBH.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-ADA43.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-QGJTL.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-8KMI9.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\Group.TSK ReportE.exe File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-2GG0R.tmp is-HDP6A.tmp File opened for modification C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\Group.TSK ReportE.exe File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-R3KLI.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-QKH3G.tmp is-HDP6A.tmp File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\CONFIG.TSK ReportE.exe File created C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\is-JU6G2.tmp is-HDP6A.tmp File opened for modification C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\CONFIG.TSK ReportE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 33 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags ReportE.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" ReportE.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 ReportE.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 ReportE.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff ReportE.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" ReportE.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} ReportE.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" ReportE.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" ReportE.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff ReportE.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff ReportE.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell ReportE.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" ReportE.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings ReportE.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff ReportE.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 ReportE.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell ReportE.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU ReportE.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 ReportE.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ ReportE.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 ReportE.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" ReportE.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" ReportE.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" ReportE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ ReportE.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots ReportE.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 ReportE.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg ReportE.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" ReportE.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 ReportE.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" ReportE.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" ReportE.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 ReportE.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 936 ReportE.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 936 ReportE.exe 936 ReportE.exe 936 ReportE.exe 936 ReportE.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3592 wrote to memory of 1404 3592 45562a03add8d10eed811e8717ca22c6b772bc227b49811850241d8f959dadc8.exe 81 PID 3592 wrote to memory of 1404 3592 45562a03add8d10eed811e8717ca22c6b772bc227b49811850241d8f959dadc8.exe 81 PID 3592 wrote to memory of 1404 3592 45562a03add8d10eed811e8717ca22c6b772bc227b49811850241d8f959dadc8.exe 81 PID 936 wrote to memory of 2200 936 ReportE.exe 93 PID 936 wrote to memory of 2200 936 ReportE.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\45562a03add8d10eed811e8717ca22c6b772bc227b49811850241d8f959dadc8.exe"C:\Users\Admin\AppData\Local\Temp\45562a03add8d10eed811e8717ca22c6b772bc227b49811850241d8f959dadc8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\is-L28U1.tmp\is-HDP6A.tmp"C:\Users\Admin\AppData\Local\Temp\is-L28U1.tmp\is-HDP6A.tmp" /SL4 $A007C C:\Users\Admin\AppData\Local\Temp\45562a03add8d10eed811e8717ca22c6b772bc227b49811850241d8f959dadc8.exe 48224650 727042⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:1404
-
-
C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\ReportE.exe"C:\Program Files (x86)\JoinCheer\²ÆÕþ²¿Í³Ò»±¨±íϵͳ\ReportE.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2200
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1636
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5ff9cc3f988f949003769fd626d8e5166
SHA116d959fe14d1be611f879c86257714eb953f4431
SHA2561153b7f0f623b79ed622a629d8d8a196a277b6e36a0261545e2766ac67a0f371
SHA512d2a075c28f705f3771d3402cd9d66af2bbcf937c43b57e25a8bd210063d609f6c170c02e1b71ec304d2190c3b80dd179576605cd43f636be76999ce8f1303050
-
Filesize
6KB
MD5648f2160fa8794b475cd58160ddbd9f8
SHA1fb8a65dc8d07b74d1ebf1c65606e65efa4d9ed92
SHA2564944ee93f812df81c0a4e9674042dff50e06cc4668a4f65f6eda4886744a8db0
SHA512307c1062ef262169218bb9a44dfa7eebabb2b2d0177da7aefaebaf6991160c04f3897e83846747e58a60ddbce63c7763fb00ba685a2f9c164c870f59e4d1dd5b
-
Filesize
5.8MB
MD54020bf652eb2bfe504af9194c0cb707c
SHA1c3c06ca0c7a7265d8a9f27ce65f1a96c14787cbe
SHA2562c1ea3a78fc892a69524c774d1273a3972c96e021be4b0a77bc7377745452430
SHA5121a04fa78885f72366f0cba4f5ad7847165bcf96492bbb521d2ea0aee12d9c71098feb2dcde7fde0f4463ff33644c0938be16673083f825c66d4f076758ecbeb0
-
Filesize
5.8MB
MD54020bf652eb2bfe504af9194c0cb707c
SHA1c3c06ca0c7a7265d8a9f27ce65f1a96c14787cbe
SHA2562c1ea3a78fc892a69524c774d1273a3972c96e021be4b0a77bc7377745452430
SHA5121a04fa78885f72366f0cba4f5ad7847165bcf96492bbb521d2ea0aee12d9c71098feb2dcde7fde0f4463ff33644c0938be16673083f825c66d4f076758ecbeb0
-
Filesize
5.8MB
MD54020bf652eb2bfe504af9194c0cb707c
SHA1c3c06ca0c7a7265d8a9f27ce65f1a96c14787cbe
SHA2562c1ea3a78fc892a69524c774d1273a3972c96e021be4b0a77bc7377745452430
SHA5121a04fa78885f72366f0cba4f5ad7847165bcf96492bbb521d2ea0aee12d9c71098feb2dcde7fde0f4463ff33644c0938be16673083f825c66d4f076758ecbeb0
-
Filesize
5.8MB
MD54020bf652eb2bfe504af9194c0cb707c
SHA1c3c06ca0c7a7265d8a9f27ce65f1a96c14787cbe
SHA2562c1ea3a78fc892a69524c774d1273a3972c96e021be4b0a77bc7377745452430
SHA5121a04fa78885f72366f0cba4f5ad7847165bcf96492bbb521d2ea0aee12d9c71098feb2dcde7fde0f4463ff33644c0938be16673083f825c66d4f076758ecbeb0
-
Filesize
5.8MB
MD54020bf652eb2bfe504af9194c0cb707c
SHA1c3c06ca0c7a7265d8a9f27ce65f1a96c14787cbe
SHA2562c1ea3a78fc892a69524c774d1273a3972c96e021be4b0a77bc7377745452430
SHA5121a04fa78885f72366f0cba4f5ad7847165bcf96492bbb521d2ea0aee12d9c71098feb2dcde7fde0f4463ff33644c0938be16673083f825c66d4f076758ecbeb0
-
Filesize
5.8MB
MD54020bf652eb2bfe504af9194c0cb707c
SHA1c3c06ca0c7a7265d8a9f27ce65f1a96c14787cbe
SHA2562c1ea3a78fc892a69524c774d1273a3972c96e021be4b0a77bc7377745452430
SHA5121a04fa78885f72366f0cba4f5ad7847165bcf96492bbb521d2ea0aee12d9c71098feb2dcde7fde0f4463ff33644c0938be16673083f825c66d4f076758ecbeb0
-
Filesize
5.8MB
MD54020bf652eb2bfe504af9194c0cb707c
SHA1c3c06ca0c7a7265d8a9f27ce65f1a96c14787cbe
SHA2562c1ea3a78fc892a69524c774d1273a3972c96e021be4b0a77bc7377745452430
SHA5121a04fa78885f72366f0cba4f5ad7847165bcf96492bbb521d2ea0aee12d9c71098feb2dcde7fde0f4463ff33644c0938be16673083f825c66d4f076758ecbeb0
-
Filesize
22.1MB
MD570115e16dee7d9460026605788c3d964
SHA17cd73b70be50f7fa08a8afaf8f17ef03f76df5fd
SHA2567210df29bf5132fcbf09e86d37572e345273da2da1f56f844244d21e7a893448
SHA512bb10178b8fbbb16f98f1ec6704afb50197b61f27c82d816796295f39f49716317f940d76f14656dd8cf16148c990eb21b2caccc207d76b19b8e8019990d59878
-
Filesize
22.1MB
MD570115e16dee7d9460026605788c3d964
SHA17cd73b70be50f7fa08a8afaf8f17ef03f76df5fd
SHA2567210df29bf5132fcbf09e86d37572e345273da2da1f56f844244d21e7a893448
SHA512bb10178b8fbbb16f98f1ec6704afb50197b61f27c82d816796295f39f49716317f940d76f14656dd8cf16148c990eb21b2caccc207d76b19b8e8019990d59878
-
Filesize
22.1MB
MD570115e16dee7d9460026605788c3d964
SHA17cd73b70be50f7fa08a8afaf8f17ef03f76df5fd
SHA2567210df29bf5132fcbf09e86d37572e345273da2da1f56f844244d21e7a893448
SHA512bb10178b8fbbb16f98f1ec6704afb50197b61f27c82d816796295f39f49716317f940d76f14656dd8cf16148c990eb21b2caccc207d76b19b8e8019990d59878
-
Filesize
12KB
MD59f015911c4073ba9b8ad5a4c36fcaf88
SHA1d4bd8d2348a2a6294f3f92ad7831f2cf660da6a5
SHA256c630fb87c007c1e3d008eac97edf7e025c0cb806c886971e32b7063d606fd125
SHA512c36dc582141259ec0813edf531431870f96acc346e3f9af0cd86544245a84bb2d6bc4c37518bf309fa0922cdd5535d087e4fef20f0d5aa0494b1a4b0ce388ea9
-
Filesize
12KB
MD59f015911c4073ba9b8ad5a4c36fcaf88
SHA1d4bd8d2348a2a6294f3f92ad7831f2cf660da6a5
SHA256c630fb87c007c1e3d008eac97edf7e025c0cb806c886971e32b7063d606fd125
SHA512c36dc582141259ec0813edf531431870f96acc346e3f9af0cd86544245a84bb2d6bc4c37518bf309fa0922cdd5535d087e4fef20f0d5aa0494b1a4b0ce388ea9
-
Filesize
14.7MB
MD5d801bb95400aaeb29d9a10799bf56257
SHA116170024d0103d73f79df117371a70dbafc390f2
SHA256b1e133d8803c9f964c6e29ffe382d17241b939c255c74dd0bf00256f75b474cd
SHA5121674ead059dc7a05fb2b5b5bdf5865f4f7d6d39c0955424d439220c52cd0265cc9d4d9477ebef21a7aa3ce270894b0dfbc9cd25b5df888c36e9733ea19a4f717
-
Filesize
14.7MB
MD5d801bb95400aaeb29d9a10799bf56257
SHA116170024d0103d73f79df117371a70dbafc390f2
SHA256b1e133d8803c9f964c6e29ffe382d17241b939c255c74dd0bf00256f75b474cd
SHA5121674ead059dc7a05fb2b5b5bdf5865f4f7d6d39c0955424d439220c52cd0265cc9d4d9477ebef21a7aa3ce270894b0dfbc9cd25b5df888c36e9733ea19a4f717